Use these tools to improve the security of your texts, calls, and emails to better protect your data and safeguard your sources.
Similar scenarios have happened several times to a major business news publication with operations in Western Europe and Asia. Even if you’re reporting on private interests, malicious state interests may intervene and vice versa. The security of your communications can determine what’s considered “public” and “private,” where journalistic privileges begin and end, and whether or not your stories ever reach their intended audience. Using verified, encrypted, and end-to-end communications allows for you to communicate on your terms.
It is important to use these apps prudently, though. One drawback to some end-to-end communication is little regulation against the spread of hate speech, disinformation, and impersonation. Since 2017, the misuse of some communications apps has led to mass violence. That’s why some apps allow you to establish a digital signature that can be used to verify the identity of your sources, so you’re not inadvertently communicating with one of your opponents nor are people able to use your accounts to spread disinformation. Because of the inherent privacy of these apps, some have been banned by local jurisdictions, so make sure to check whether they are legal to use before using the apps.
Select “Secure Instant Messaging” under the Category menu, and choose any of the tools listed to assist in securely sending and receiving messages, photos, videos, documents, and voice calls.
Use this tool to secure all of your device’s Internet traffic.
Use this tool to send encrypted email within your web browser.
Use this browser to anonymize your internet browsing.
Use this email system to have an encrypted email only you can access.
Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.
This resource provides an overview of virtual private networks (VPNs) including how they work, what kinds of protection they...
This GCA workshop provides real-world scenarios and walks participants through the implementation of recommendations through...
Totem is an online platform that offers interactive courses to learn how to increase digital security and privacy. The optimal...
Bot Sentinel is a free platform developed to classify and track inauthentic accounts and toxic trolls.
Social media is an invaluable extension of your brand. Make sure the people you engage with online maintain confidence in...
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.