The BBC's expert in online information search, Paul Myers, explains why journalists need to be aware of the insecurity, insecurity of the devices they use, and the what journalists need to do to protect the information, protect themselves.
The information you store in your computer or phone, mobile device is easy to fall into the hands of others.
It could be that you forgot somewhere, maybe it was confiscated by airport security checkpoints, or taken away by a court or police order. Not to mention the risk of hackers attacking to steal your information.
You need to be aware of all the above risks and know the appropriate ways to protect your information, your information resources, and your own.

Here are some things you should know when investigating online, looking for information:
Metadata
In Greek, 'meta' means 'after' or 'before', and metada is the trace you leave when you do something on a device.
Every time you use your computer or create a new file, there is not only the data that makes up that file, but also a generated file that contains all the information about the main file.
Metadata can include time, location, type of camera used, the mobile device used, the computer, the file creator, the company where the person works, and other personal information about you.
Such information may be contained in the email you send out, the word document you compose, the photos you take, or the audio and video files that you record or record.
There are websites and programs that anyone can use to view the metadata content of files.
You can get a lot of information about your computer by right-clicking on the file and selecting 'properties' on your Windows computer, or 'get info' for Macs. More specific information will be disclosed if you use the appropriate websites.
You can of course use this method to check the information you receive.
Cookies
Every time you visit a new site, you send metadata related to your internet connection to the site's owner.
This allows them to see details of your connection to the network, including the type of computer you have, the browser you are using, and most importantly, your IP address. location, city where you live or work.
It also reveals the search keywords you have typed in.
When you are investigating a complicated, sensitive case, you will make the subject of the investigation suspect if they know that you work for the BBC.
The keywords you type in to search can also tell the audience about the content of the survey you are pursuing.
If you go to a website by clicking on a link, the site owner will see the address of the page that contains the link - such as from a Facebook page.
If that address matches your IP address, it will cause the subject to discover your investigation as well as your identity.
Therefore, there will be times when a reporter needs to take appropriate measures to hide this information.
Virtual private networks (VPNs)
VPNs are connections and software that hide your IP address and encrypt your activity. They will help protect your safety when you use the internet in countries where online activity is prohibited.
For example, in China, many websites were blocked. Using a VPN, you can bypass China's restrictions to view information on the internet.
If you are operating in hostile environments and are afraid of being discovered, or are afraid that your internet usage will be monitored, you should strongly use a VPN.
You can also use a VPN for accessing the internet, social networks, and email from your mobile phone. To learn how to secure your mobile phone, see the BBC guide here.
Prevention of viruses and malware (malware)
A virus is anything that can spread from computer to computer. Even urban myths can be considered viruses if they spread on social media.
Malware aims to infiltrate your privacy, attack you with a lot of different advertising content, or damage computers and devices.
Malware reveals not only email but also other content on your computer such as text files, messages, contacts, phone calls, internet usage, and access to your social networks.
There are malware that specializes in stealing information in contacts and then pretending to send you emails to contacts. However, malware is not necessarily capable of spreading to other computers.
Some malware can affect the quality of work you are pursuing.
If you save all the notes and phone numbers, contact information necessary for investigating, writing stories on your computer, then the object you are investigating will probably know all if they Install viruses or malware on your computer.
The solution is to install a remote access tool (RAT), or a Trojan, onto your computer.
These RATs invade your computer through email attachments, or through websites you visit if your internet browser is not up to date, by tricking you into downloading the software, or opening the attachment. email.
Once the computer is installed with malware, other people can hear what you say through the microphone, see you through the camera of the machine, and even track your every move from place to place. elsewhere (if you bring your laptop with you).
If you follow a complex, sensitive topic, you must always install antivirus software and accept that you are always ready to take risks.
In the case of investigating a very difficult, very dangerous case, you should consider buying a new laptop just for that investigation, then taping tape to your device's webcam to avoid being monitored.