{"id":178138,"date":"2017-08-20T22:48:55","date_gmt":"2017-08-20T20:48:55","guid":{"rendered":"https:\/\/scm.bz\/techsupport\/how-journalists-can-detect-electronic-surveillance.html"},"modified":"2018-02-11T23:03:35","modified_gmt":"2018-02-11T21:03:35","slug":"how-journalists-can-detect-electronic-surveillance","status":"publish","type":"post","link":"https:\/\/scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/","title":{"rendered":"How journalists can detect electronic surveillance"},"content":{"rendered":"<div class=\"region region-highlighted\">\n<div class=\"region-inner clearfix\">\n<div id=\"block-blockify-blockify-page-title\" class=\"block block-blockify no-title odd first block-count-6 block-region-highlighted block-blockify-page-title\"><\/div>\n<div id=\"block-fe-news-field-topic-block\" class=\"block block-fe-news no-title even last block-count-7 block-region-highlighted block-field-topic-block\">\n<div class=\"block-inner clearfix\">\n<div class=\"block-content content\">\n<div class=\"topic-block\">\n<section class=\"field-type-taxonomy-term-reference\">\n<p dir=\"ltr\"><strong>by:\u00a0<a href=\"https:\/\/ijnet.org\/en\/users\/latinointx\">Jorge Luis Sierra<\/a><\/strong><\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<section id=\"main-content\" dir=\"ltr\">\n<div id=\"content\">\n<div id=\"block-system-main\" class=\"block block-system no-title odd first last block-count-8 block-region-content block-main\">\n<div id=\"node-34067\" class=\"node node-news article odd node-lang-en node-full clearfix\">\n<div class=\"content\">\n<div class=\"field field-name-field-image field-type-image field-label-hidden view-mode-full\">\n<div class=\"field-items\">\n<figure class=\"clearfix field-item even\"><img decoding=\"async\" class=\"image-style-news-square alignright\" src=\"https:\/\/ijnet.org\/sites\/default\/files\/styles\/news_square\/public\/33870031091_38acfeda5e_k.jpg?itok=3YLdvibx&amp;c=6d982e2afa108923f5ee74e1102eb214\" alt=\"\" width=\" 306\" height=\"294\" \/><\/figure>\n<\/div>\n<\/div>\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden view-mode-full\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>Journalists who work in authoritarian environments tend to be under\u00a0<a href=\"https:\/\/cpj.org\/2015\/04\/attacks-on-the-press-surveillance-forces-journalists-to-think-act-like-spies.php\" target=\"_blank\" rel=\"noopener noreferrer\">electronic surveillance<\/a>. Sometimes the surveillance is being conducted at a mass scale, rather than directed at a specific target, and is intended to track what journalists in general are doing and what stories they are investigating.<\/p>\n<p>Other times, it is targeted surveillance \u2014 electronic espionage intended to track the actions of a specific reporter.<\/p>\n<p>Sometimes surveillance is perceived as something normal. Journalists may adapt themselves and end up accepting surveillance as an unwanted but unavoidable risk in their profession. \u00a0I have heard journalists from Pakistan say, \u201cThey can do all the surveillance they want, but they will find nothing.\u201d I\u2019ve heard Latin American journalists say things like, \u201cI have nothing to hide.\u201d In both cases, surveillance has been normalized and journalists tend to adopt a passive attitude.<\/p>\n<p>In other cases, a journalist may choose to fight electronic surveillance. After all, it may pose a security risk for them and their sources, and is, in fact, an attack against press freedom and freedom of expression.<\/p>\n<p>The key question is as follows: if a journalist wants to combat electronic surveillance, how are you supposed to recognize when it\u2019s happening?<\/p>\n<p>Here is how I would advise journalists who think that surveillance is a potential or actual risk to their privacy, personal safety, data security, and the identities of their sources:<\/p>\n<p><strong>Stay alert.<\/strong>\u00a0Electronic surveillance isn\u2019t just a way to gather information about a journalist\u2019s work and sources \u2014 it can also be used to prepare a more serious attack, if other forms of intimidation fail to stop the journalist\u2019s investigation. In any case, journalists should report the surveillance to official authorities and seek support from other colleagues in their networks, their media organization\u00a0and advocacy groups such as the Committee to Protect Journalists, Reporters Without Borders, Rory Peck Trust, Freedom House or Article 19.<\/p>\n<p><strong>Protect your devices.<\/strong>\u00a0All your devices \u2014 computers, mobile phone, tablets \u2014 should be protected with antivirus software, hard drive encryption and strong passwords or passphrases. You should also make sure that every app and all the software used on your devices is kept up-to-date. These two steps are going to be your first line of defense. You can find a more detailed list of information security tools that you can install on your devices\u00a0<a href=\"https:\/\/iscproject.org\/tools\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p><strong>Follow good security practices.<\/strong>\u00a0The most common way for private companies, abusive governments, and criminal groups to conduct electronic surveillance is to infect devices via spear-phishing. These are electronic messages that arrive via email, text\u00a0or instant messaging, inviting the target to open a link or file containing surveillance software. Whatever you do, don\u2019t click on suspicious links or files: analyze every message you receive, even if you trust the sender. I\u2019ve created a more detailed tutorial on identifying and avoiding spear-phishing\u00a0<a href=\"https:\/\/www.slideshare.net\/latinointx\/spear-phishing-attacks-67472017\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p><strong>Monitor your data.<\/strong>\u00a0If you suspect that your device is infected, check to see if there was a sudden increase in data use. When surveillance software is active, it drains your data plan in order to extract photos, messages, contacts, videos and metadata.<\/p>\n<p><strong>Monitor your battery.<\/strong>\u00a0Poor battery performance is an indicator that there may be an unwanted program running and draining your device\u2019s energy. Check to see if your device\u2019s battery is using up more power than usual when connected to the internet.<\/p>\n<p><strong>Monitor your device\u2019s temperature.<\/strong>\u00a0If you are not using your device and it is warmer than usual, this can be another indicator that a malicious program is running.<\/p>\n<p><strong>Reset your device.<\/strong>\u00a0One preventative action you can take is a hard reset of your device. If you think your mobile device is infected, back up your data and do a hard reset to get your phone back to factory settings.<\/p>\n<p><strong>Encrypt your communications.<\/strong>\u00a0If you need to make a phone call or send a message with sensitive information, try to use encryption.\u00a0<a href=\"http:\/\/openpgp.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">OpenPGP<\/a>\u00a0and\u00a0<a href=\"https:\/\/meet.jit.si\/\" target=\"_blank\" rel=\"noopener noreferrer\">MeetJitsi<\/a>\u00a0are good options, while\u00a0<a href=\"https:\/\/whispersystems.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Signal<\/a>\u00a0is the mobile app of preference for many investigative journalists.<\/p>\n<p><strong>Be aware of other types of surveillance.<\/strong>\u00a0If you suspect that you are under electronic surveillance, monitor your physical surroundings as well. Are there unusual or suspicious vehicles near your office or home? Journalists doing high-risk work should always check to make sure they\u2019re not being followed, especially if they\u2019re about to contact a sensitive source.<\/p>\n<p><em><a href=\"https:\/\/ijnet.org\/en\/users\/latinointx\">Jorge Luis Sierra<\/a>\u00a0is an award-winning Mexican investigative reporter and editor and an expert in digital security. Learn more about his work as an ICFJ Knight Fellow\u00a0<a href=\"http:\/\/www.icfj.org\/about\/profiles\/jorge-luis-sierra\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n<p>Main image CC-licensed by Flickr via\u00a0<a href=\"https:\/\/www.flickr.com\/photos\/jayphagan\/33870031091\/in\/photolist-TAYLei-8zrHfE-qJoib-qJoj5-9tYZtp-qJoh6-peVbFy-qJokG-qJok3-f4A53y-qJohF-qJogu-9DXu2z-bBY9F2-8d1ADr-6H9BL7-fUGUR1-nCnN5Z-gAj8Dm-6WwttH-b2vtQ-8jcsSE-7WEzrB-4KYQpB-THNcfW-5TXEX-aPnSB-fbvyQS-48Ri2G-oXGss-gUyMo-jZQV5-yW2VU-5JPCk6-VZxyW-azFqCi-e3uZxg-oLDWeu-6WwsMk-emcVv-7Zese-dDgdoa-dL6SK5-4yRZhv-3uXLbd-6Ncjk-7VibC7-4qJMB5-fJcarb-HaAT4\" target=\"_blank\" rel=\"noopener noreferrer\">Jay Phagan<\/a><\/p>\n<p>Source:\u00a0<a href=\"https:\/\/ijnet.org\/en\/blog\/how-journalists-can-detect-electronic-surveillance\">ijnet.org<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>by:\u00a0Jorge Luis Sierra Journalists who work in authoritarian environments tend to be under\u00a0electronic surveillance. Sometimes the surveillance is being conducted at a mass scale, rather than directed at a specific target, and is intended to track what journalists in general are doing and what stories they are investigating. Other times, it is targeted surveillance \u2014 [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":179715,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[372],"tags":[],"class_list":["post-178138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-support-and-digital-safety","post-wrapper"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.6 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How journalists can detect electronic surveillance - \u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression<\/title>\n<meta name=\"description\" content=\"%\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How journalists can detect electronic surveillance\" \/>\n<meta property=\"og:description\" content=\"%\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/scm.center\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-20T20:48:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-11T21:03:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mfu.scm.bz\/wp-content\/uploads\/2017\/08\/scurity10a.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"306\" \/>\n\t<meta property=\"og:image:height\" content=\"185\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"scmadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SyrianCenter\" \/>\n<meta name=\"twitter:site\" content=\"@SyrianCenter\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"scmadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/\"},\"author\":{\"name\":\"scmadmin\",\"@id\":\"https:\/\/scm.bz\/#\/schema\/person\/d116d4c43d9f3d4fe4b61619e91ead45\"},\"headline\":\"How journalists can detect electronic surveillance\",\"datePublished\":\"2017-08-20T20:48:55+00:00\",\"dateModified\":\"2018-02-11T21:03:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/\"},\"wordCount\":775,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/scm.bz\/#organization\"},\"image\":{\"@id\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/scm.bz\/wp-content\/uploads\/2017\/08\/scurity10a.jpg\",\"articleSection\":[\"Tech Support and Digital Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/\",\"url\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/\",\"name\":\"How journalists can detect electronic surveillance - \u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression\",\"isPartOf\":{\"@id\":\"https:\/\/scm.bz\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/scm.bz\/wp-content\/uploads\/2017\/08\/scurity10a.jpg\",\"datePublished\":\"2017-08-20T20:48:55+00:00\",\"dateModified\":\"2018-02-11T21:03:35+00:00\",\"description\":\"%\",\"breadcrumb\":{\"@id\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#primaryimage\",\"url\":\"https:\/\/scm.bz\/wp-content\/uploads\/2017\/08\/scurity10a.jpg\",\"contentUrl\":\"https:\/\/scm.bz\/wp-content\/uploads\/2017\/08\/scurity10a.jpg\",\"width\":306,\"height\":185},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/scm.bz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How journalists can detect electronic surveillance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/scm.bz\/#website\",\"url\":\"https:\/\/scm.bz\/\",\"name\":\"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/scm.bz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/scm.bz\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/scm.bz\/#organization\",\"name\":\"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression\",\"url\":\"https:\/\/scm.bz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/scm.bz\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/scm.bz\/wp-content\/uploads\/2021\/01\/SCM-logo-1-with-Clear-Space-1-2.png\",\"contentUrl\":\"http:\/\/scm.bz\/wp-content\/uploads\/2021\/01\/SCM-logo-1-with-Clear-Space-1-2.png\",\"width\":1450,\"height\":1450,\"caption\":\"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression\"},\"image\":{\"@id\":\"https:\/\/scm.bz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/scm.center\",\"https:\/\/x.com\/SyrianCenter\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/scm.bz\/#\/schema\/person\/d116d4c43d9f3d4fe4b61619e91ead45\",\"name\":\"scmadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/scm.bz\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8cb2b559549de2ba5e28f5d26e15c8f315b5dd63c953e348e6769ae2e88e3cdc?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8cb2b559549de2ba5e28f5d26e15c8f315b5dd63c953e348e6769ae2e88e3cdc?s=96&d=blank&r=g\",\"caption\":\"scmadmin\"},\"url\":\"https:\/\/scm.bz\/en\/author\/scmadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How journalists can detect electronic surveillance - \u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression","description":"%","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/","og_locale":"en_US","og_type":"article","og_title":"How journalists can detect electronic surveillance","og_description":"%","og_url":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/","og_site_name":"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression","article_publisher":"https:\/\/www.facebook.com\/scm.center","article_published_time":"2017-08-20T20:48:55+00:00","article_modified_time":"2018-02-11T21:03:35+00:00","og_image":[{"width":306,"height":185,"url":"https:\/\/mfu.scm.bz\/wp-content\/uploads\/2017\/08\/scurity10a.jpg","type":"image\/jpeg"}],"author":"scmadmin","twitter_card":"summary_large_image","twitter_creator":"@SyrianCenter","twitter_site":"@SyrianCenter","twitter_misc":{"Written by":"scmadmin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#article","isPartOf":{"@id":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/"},"author":{"name":"scmadmin","@id":"https:\/\/scm.bz\/#\/schema\/person\/d116d4c43d9f3d4fe4b61619e91ead45"},"headline":"How journalists can detect electronic surveillance","datePublished":"2017-08-20T20:48:55+00:00","dateModified":"2018-02-11T21:03:35+00:00","mainEntityOfPage":{"@id":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/"},"wordCount":775,"commentCount":0,"publisher":{"@id":"https:\/\/scm.bz\/#organization"},"image":{"@id":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#primaryimage"},"thumbnailUrl":"https:\/\/scm.bz\/wp-content\/uploads\/2017\/08\/scurity10a.jpg","articleSection":["Tech Support and Digital Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/","url":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/","name":"How journalists can detect electronic surveillance - \u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression","isPartOf":{"@id":"https:\/\/scm.bz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#primaryimage"},"image":{"@id":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#primaryimage"},"thumbnailUrl":"https:\/\/scm.bz\/wp-content\/uploads\/2017\/08\/scurity10a.jpg","datePublished":"2017-08-20T20:48:55+00:00","dateModified":"2018-02-11T21:03:35+00:00","description":"%","breadcrumb":{"@id":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#primaryimage","url":"https:\/\/scm.bz\/wp-content\/uploads\/2017\/08\/scurity10a.jpg","contentUrl":"https:\/\/scm.bz\/wp-content\/uploads\/2017\/08\/scurity10a.jpg","width":306,"height":185},{"@type":"BreadcrumbList","@id":"https:\/\/mfu.scm.bz\/en\/how-journalists-can-detect-electronic-surveillance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scm.bz\/en\/"},{"@type":"ListItem","position":2,"name":"How journalists can detect electronic surveillance"}]},{"@type":"WebSite","@id":"https:\/\/scm.bz\/#website","url":"https:\/\/scm.bz\/","name":"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression","description":"","publisher":{"@id":"https:\/\/scm.bz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scm.bz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/scm.bz\/#organization","name":"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression","url":"https:\/\/scm.bz\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scm.bz\/#\/schema\/logo\/image\/","url":"http:\/\/scm.bz\/wp-content\/uploads\/2021\/01\/SCM-logo-1-with-Clear-Space-1-2.png","contentUrl":"http:\/\/scm.bz\/wp-content\/uploads\/2021\/01\/SCM-logo-1-with-Clear-Space-1-2.png","width":1450,"height":1450,"caption":"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression"},"image":{"@id":"https:\/\/scm.bz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/scm.center","https:\/\/x.com\/SyrianCenter"]},{"@type":"Person","@id":"https:\/\/scm.bz\/#\/schema\/person\/d116d4c43d9f3d4fe4b61619e91ead45","name":"scmadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scm.bz\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8cb2b559549de2ba5e28f5d26e15c8f315b5dd63c953e348e6769ae2e88e3cdc?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8cb2b559549de2ba5e28f5d26e15c8f315b5dd63c953e348e6769ae2e88e3cdc?s=96&d=blank&r=g","caption":"scmadmin"},"url":"https:\/\/scm.bz\/en\/author\/scmadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/posts\/178138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/comments?post=178138"}],"version-history":[{"count":0,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/posts\/178138\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/media\/179715"}],"wp:attachment":[{"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/media?parent=178138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/categories?post=178138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/tags?post=178138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}