Source: www.schneier.com – Author: Bruce Schneier
Comments
finagle • April 9, 2025 8:04 AM
TL;DR the author likes Signal. However he does mention The Guardian’s how to contact us securely help page which gives lots of options and their pros and cons which are generally applicable, and make it far more useful in my eyes than the linked article.
Donald J. Trump Your New G O D • April 9, 2025 10:05 AM
Why are the liberal scum like Bruce Schneier behaving like they do not know who’s been and still is, financing the liberal universities across the USA for which they “teach” and spread the liberal bullshit. Do not bite the hand that feeds ya Mr. Schneier. DO NOT work AGAINST YOUR OWN COUNTRY which has given you all you’ve got, your money, your reputation, your “big” name in your field of profession. It is extremely disrespectful Mr. Schneier. Shame on you and all other liberals leeching on your government which you so hate. You have no decency. SAD!
Clive Robinson • April 9, 2025 10:38 AM
@ ALL
No method currently available to ordinary individuals is secure not even close.
This is due to the simple fact that what is available technology wise is “consumer/commercial” and none of it has been designed to be even remotely secure.
Secondly because all the technology is like a “fish trap” designed to funnel every electronic communication into a single net.
There are two solutions to this,
1, Don’t put your toe in the water.
2, Ensure the stream you swim in is not the one that ends in the net.
As those who want to communicate with journalists are putting their toe in the water then that leaves only the second option to them.
There are two types of communication “half duplex” and “full duplex” the first is unidirectional and more secure than the bidirectional second.
Journalist almost always betray their sources because they want to ask questions first of which is almost always “verify who you are”…
This means that journalists will almost always want “full duplex” bidirectional communications and will do just about everything they can to force a source into it and in effect betraying themselves.
I’m not saying “don’t communicate with journalists” I’m saying that the process is always risky and relinquishing control of it is very very unlikely to reduce your risk, in fact the very opposite.
So if you are going to maintain control you have to be responsible for not just yourself, but all others directly or indirectly involved, including the journalist and all at their organisation, and those you work(ed) with and your friends and family.
It’s safe to assume that all communications you do not 100% control will get you caught. So all modern consumer or commercial electronic communications are unwise to use, unless you really understand the technology to the lowest levels.
Likewise all commercial post and package services will be risky to use because everything gets tracked these days one way or another. Primarily for “accounting and auditing” reasons which means they are “third party business records” that have no legal protection from inquisitive authorities.
Thus unless you are a technologist of wide scope you are better considering “Old School Field Craft”. But due to modern technology like wireless CCTV units that can fit in a cube the size of a games dice your golden rule has to be “never the same place or way twice.”
Unless of course you know how to lay a false scent that leads the blood hounds away. However that usually means giving them a sacrificial goat or more to rip the belly out of…
You might think that you can “start safe” unfortunately you can not and this is often the most dangerous step. History shows that during the cold war anyone working in a diplomatic mission was watched around the clock 24×365. But also anyone who approached or entered a diplomatic building or even NGO with foreign funding was photographed and where possible identified and checked.
It’s safe to assume with the paranoia about journalists that some are clearly displaying, and the unlimited resources they effectively command, that journalists today have the same level of surveillance or worse on them that cold war diplomats had.
Why worse?..
Well because technology is at least 20 generations advanced on the cold war thus the human resources needed are almost vanishing in comparison. Also they give a “time machine effect”. Think about CCTV tapes from cameras in a shopping center car park or cafe etc etc. As long as the exist, an investigator can “flip back in time” through the glass eye of the camera recording. They don’t need a human every place they only need one to go through the hundreds or thousands of tapes “facial identification software” pulls up as “possibles”.
None of this is SciFi it’s all very mundane today.
Oh and don’t forget all those “lets make history” devices you have on you like your Smart Devices such as fitness and medical devices, mobile phones, and just about anything with electronics in it these days even toys those in your family have even your pacemaker or other implanted medical electronics.
Bluetooth Low Energy is ubiquitous in “System On a Chip”(SoC) microcontrollers these days. Such microcontrollers are in so many products that avoiding them is at best difficult, at worst impossible. Those “air tags and tiles” luggage tags that people got briefly paranoid about are many times bigger than they need to be for just the electronics because batteries have a lousy power density. If you can find an alternative power source then think a fat grain of rice…
It’s what RFIDs became before we forgot about them. We know some RFIDs can be scanned from outside a shipping container they are in, or from the “bumper badge” to toll gate gantry 20ft up as you drive under it.
Making Smart-RFIDs to work with BLE Beaconing is a trivial manufacturing job these days (though expensive per unit below the 100,000 unit volume).
Old school field craft will if both parties have good OpSec enable you to have diminished risk. But history shows all to often journalists don’t do good OpSec. In part this is because the editors under guidance from the legal people want “full verification” at all costs otherwise they wont touch a story.
mianosm • April 9, 2025 12:40 PM
Using Signal, Telegram, WhatsApp, or any other ‘app’ is foolish, and it is a shame that GPG/PGP has been forgotten (even if Phil Zimmerman was quoted in your last post).
Much like the youth not knowing how to read an analog clock on the wall, we are losing our ability to maintain and provide confidence in the integrity of our communications.
Encryption isn’t that hard, and honestly, the juice is probably worth the squeeze if you’re delivering content you care about.
ResearcherZero • April 10, 2025 1:45 AM
The government itself deliberately leaks information to journalists on a regular basis. It also withholds public information far to frequently. Public information that would allow people to better adapt to the circumstances and prepare for challenges.
Or instead, if some prefer, a few politicians can pad out their own personal investment portfolio at your expense, by selfishly exploiting information that was developed and compiled for public benefit – is not classified – and was funded by tax payer funds, yet the government has withheld from public release. The old revolving consultancy door.
Some members were consultants before they became part of a political party, and once your public funds have been allocated to benefit a corporate contract, a consultancy job awaits.
In the meantime, you are funding their property investments, which they selectively purchase based on information about future housing conditions – information that is withheld from publication – which again, is not classified information.
They are manipulating stock and investment conditions while harming your retirement.
ResearcherZero • April 10, 2025 1:57 AM
Politicians and diapers have one thing in common: they should both be changed regularly… and for the same reason. Next time try the NSA, it is always listening to you.
ResearcherZero • April 10, 2025 2:48 AM
here is a tip – Peeking at regulators emails from 100 banks.
A group had access to an administrative email account of the OCC which oversees US and foreign banks. Who is responsible and who leaked the story – no one really knows.
‘https://fortune.com/2025/04/09/hackers-bank-regulators-government-china-emails-spying-congress/
The OCC was tipped off and discovered some 150,000 emails were accessed from early 2023.
https://www.theregister.com/2025/04/09/occ_bank_email_hack/
–
@Clive Robinson, ALL
Journalists are definitely watched as well as by other governments. This is a fact. Any secure rooms or safes within in a news media building will be covertly accessed, and communications and discussions with or between journalists eavesdropped on. Moles will be placed within organizations, cleaners, lawyers, anyone who can be planted or used as a source. People will be blackmailed, paid off or induced through various means (info).
Use all of the techniques that governments themselves use to avoid blame and responsibility. Employ the techniques of trade craft to degrade adversarial advantages and disperse and degrade culpability. Learn from the techniques used to reduce attribution.
Expect to get f–ked, or if lucky, beaten. The road to hell is paved with good intentions, which makes for a far more livelier and interesting ride, due to all the bumps and cracks.
Madness will complicate credibility, for all parties, especially if you are mad.
ResearcherZero • April 10, 2025 3:47 AM
position, threats and risk
Constraints on power are designed to prevent the executive from not just harming the people, but to also prevent the executive from abusing power and tempering its decisions.
Independence of agencies is crucial for the functioning of democracy and the safety of the public from national security threats and the threat of arbitrary and unreasonable arrest.
Agencies’ loyalties must lay with the public and the public interest, along with ensuring public safety and security above all else. They only function well when independent.
Agencies provide the same advice and range of options no matter what political party or ideology is in power. It is the politicians who choose which options are implemented.
Politicians are people. Legal constraints exist to protect them equally from themselves.
‘https://abcnews.go.com/Politics/protecting-us-government-leaders-security-analysis/story?id=66258938
Recently, protections have had to be put in place to ensure the safety of the judiciary.
https://judicature.duke.edu/articles/states-move-to-protect-judges-safety/
People who work in the security services are human. Constraints on the executive ensure everyone’s safety, as the intelligence services are sworn to protect the public.
https://harvardnsj.org/2025/01/12/protecting-the-u-s-national-security-state-from-a-rogue-president/
Congress is also afforded protections, as they must ensure legal protections are upheld.
https://www.nbcnews.com/politics/congress/here-s-how-congress-protected-n772296
ResearcherZero • April 10, 2025 4:52 AM
There are very good reasons for public disclosure about government.
The following example is a chilling example of a project in the UK.
‘https://www.theregister.com/2025/04/09/uks_ministry_of_justice_algorithm_murders/
–
Watching Americans calling each others names, is quite something to behold. The comments made on U.S. news sites in the commentary sections by both Democrats and Republicans, look a lot like a school yard brawl without any teachers to discipline unruly and ill mannered children. The truth is that most Americans are far more similar than different.
‘https://www.rochester.edu/newscenter/political-divide-megastudy-antidemocratic-attitudes-partisan-animosity-626562/
The political hamster wheel – how Americans have been mislead about one another.
https://hub.jhu.edu/2024/10/27/snf-agora-poll-september-2024/
The moral component is foundational.
Hate weaponizes fear and insecurity. Instead of finding solutions, it provides scapegoats.
https://theweek.com/articles/705728/how-american-politics-became-consumed-hate
In United States, the public have been led to believe it is the other side’s fault.
This hides the real causes of problems and prevents those problems from being solved.
https://time.com/6270884/americans-tackle-political-division-together/
Subscribe to comments on this entry
Leave a comment
Sidebar photo of Bruce Schneier by Joe MacInnis.
Original Post URL: https://www.schneier.com/blog/archives/2025/04/how-to-leak-to-a-journalist.html
Category & Tags: Uncategorized,leaks,whistleblowers – Uncategorized,leaks,whistleblowers
Views: 0