{"id":573889465,"date":"2017-02-23T23:40:49","date_gmt":"2017-02-24T05:40:49","guid":{"rendered":"http:\/\/www.kennysmith.org\/wordpress\/?p=573889465"},"modified":"2017-02-26T15:56:57","modified_gmt":"2017-02-26T21:56:57","slug":"talking-about-the-cyber","status":"publish","type":"post","link":"http:\/\/www.kennysmith.org\/wordpress\/blog\/2017\/02\/23\/talking-about-the-cyber\/","title":{"rendered":"Talking about the cyber"},"content":{"rendered":"<p>Among the other parts of my day, editing a big document, watching students produce a sports show, handling the various comings and goings of emailing and scheduling and so on, I had the opportunity to hang out at an important panel this evening. And I took notes.<\/p>\n<p>Also, even if you aren&#8217;t interested in cybersecurity as a journalist or in your own professional role, <a href=\"https:\/\/cacr.iu.edu\/files\/documents\/pdf\/Everyday-Cybersecurity-Slides-CACR-Summit-2016.pdf\" target=\"_blank\">this slideshow<\/a> that gets mentioned people is accessible and worth your while. Check that out. Anyway, on to the tweets &#8230;<\/p>\n<p><center><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">About to sit down to listen and tweet about this panel on cybersecurity for journalists at <a href=\"https:\/\/twitter.com\/IUMediaSchool\">@IUMediaSchool<\/a>. <a href=\"https:\/\/t.co\/WGdD5CRJPO\">pic.twitter.com\/WGdD5CRJPO<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834898589637816320\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Panelists: <a href=\"https:\/\/twitter.com\/EFF\">@eff<\/a>&#39;s <a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a>, <a href=\"https:\/\/twitter.com\/indystar\">@indystar<\/a>&#39;s <a href=\"https:\/\/twitter.com\/IndyMarisaK\">@IndyMarisaK<\/a>, <a href=\"https:\/\/twitter.com\/iucacr\">@iucacr<\/a>&#39;s systems analyst <a href=\"https:\/\/twitter.com\/HedgeMage\">@hedgemage<\/a> and my <a href=\"https:\/\/twitter.com\/IUMediaSchool\">@IUMediaSchool<\/a> colleague <a href=\"https:\/\/twitter.com\/AnthonyFargo1\">@anthonyfargo1<\/a>.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834900267623657472\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">First up: <a href=\"https:\/\/twitter.com\/AnthonyFargo1\">@AnthonyFargo1<\/a>, professor and director of Center for Int&#39;l Media Law and Policy Studies at <a href=\"https:\/\/twitter.com\/IUMediaSchool\">@iumediaschool<\/a>, talking law and policy.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834902722545664004\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Fargo discusses the questions journalists&#39; protection of their phone records and data and the Risen\/Sterling case: <a href=\"https:\/\/t.co\/kuWI76fXHq\">https:\/\/t.co\/kuWI76fXHq<\/a> <a href=\"https:\/\/t.co\/YBvQyn31x3\">pic.twitter.com\/YBvQyn31x3<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834903889497436161\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Fargo: &quot;If you&#39;re a journalist, what can you do? If you want to protect information you can use drop boxes &#8230; You can use burner phones.&quot;<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834904251872718848\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Fargo also suggested encrypted email or Tor, The Onion Router.  Also, there&#39;s always going old school, like meeting in parking decks. <a href=\"https:\/\/t.co\/NlwNEpEznn\">pic.twitter.com\/NlwNEpEznn<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834904667347910657\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Next up is <a href=\"https:\/\/twitter.com\/HedgeMage\">@HedgeMage<\/a> who is a systems analyst at the IU Center for Applied Cybersecurity Research, or <a href=\"https:\/\/twitter.com\/iucacr\">@iucacr<\/a>.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834904862227906562\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Susan Sons, <a href=\"https:\/\/twitter.com\/HedgeMage\">@hedgemage<\/a>, says smart phone users should use a product like <a href=\"https:\/\/twitter.com\/whispersystems\">@whispersystems<\/a>&#39; Open Whisper Systems.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834905213878304768\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/HedgeMage\">@hedgemage<\/a> has a list of &quot;17 Doable To-Dos&quot; that <a href=\"https:\/\/twitter.com\/iucacr\">@iucacr<\/a> has created. She says everyone should do this. <a href=\"https:\/\/t.co\/n7TkVDouCn\">https:\/\/t.co\/n7TkVDouCn<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834905535736594432\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">For journalists, spy movies won&#39;t help, says <a href=\"https:\/\/twitter.com\/HedgeMage\">@hedgemage<\/a>. Use a drop box, from some place remote, like a rural library&#39;s public terminals. <a href=\"https:\/\/t.co\/GmTendbb9k\">pic.twitter.com\/GmTendbb9k<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834906234633486337\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">&quot;There is a point where it has gotten dangerous and technical enough,&quot; says <a href=\"https:\/\/twitter.com\/HedgeMage\">@hedgemage<\/a>, &quot;you need a hacker.&quot; Talking cartels, corrupt govt.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834906533750263810\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/HedgeMage\">@hedgemage<\/a> says email is like a postcard. Anyone touching it can read it. Encrypted email, like an envelope, viewers can&#39;t see contents.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834907094910398464\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Operational security matters in high risk scenarios, <a href=\"https:\/\/twitter.com\/HedgeMage\">@hedgemage<\/a> says. Sometimes it can be old-fashioned social engineering. Great anecdote.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834907406551429122\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Sons has talked about an everyone group, the journalists&#39; group and now a group she&#39;s labeled journalists&#39; cohorts.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834907544212631558\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Library data, <a href=\"https:\/\/twitter.com\/HedgeMage\">@hedgemage<\/a> tells us, is going out to corporations and probably including some agency&#39;s shell corp. Stick with paper, she says.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834907827453952000\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">That was an eye-opening glance from a birds&#39; eye view of security from someone in the digital security, hacking universe.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834908021113372674\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Next up is <a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a>. He does First Amendment and cyber security law as a senior staff attorney at <a href=\"https:\/\/twitter.com\/EFF\">@EFF<\/a>. <a href=\"https:\/\/t.co\/0hIV4NrSsw\">pic.twitter.com\/0hIV4NrSsw<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834908512769695744\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">He&#39;s talking about threat modeling, understanding what you&#39;re up against, given the story. <a href=\"https:\/\/twitter.com\/EFF\">@EFF<\/a> has resources here: <a href=\"https:\/\/t.co\/y7OjmDilyd\">https:\/\/t.co\/y7OjmDilyd<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834908926437109760\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> &quot;Even if you use everything you possibly could, technically&#8230;if your adversary is (big) and knows who you are, they&#39;ll get you.&quot;<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834909122525073408\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> says encryption tools can protect you from most sophisticated adversaries, but secure drop was designed to keep out lawyers.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834909404071854081\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a>: &quot;The best way of protecting your source (and data) is not having the data in the first place. That&#39;s what <a href=\"https:\/\/twitter.com\/SecureDrop\">@SecureDrop<\/a> gets you.&quot;<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834909939734818819\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> says journalistic privilege won&#39;t get you very far against determined lawyers. That&#39;s what products like Secure Drop are for.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834910142126784513\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> says smoke screen tech is good &#8212; iMessage, WhatsApp, etc &#8212; are good, if all parties are securely configured.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834910501041766401\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> says burner phones are good, but you can&#39;t slip up. Don&#39;t cross-pollenate the phone, it is a single-use tool. (Don&#39;t call mom.)<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834910679761096704\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> says email isn&#39;t that secure, but Gmail is better than running your own server. (Back to what <a href=\"https:\/\/twitter.com\/HedgeMage\">@HedgeMage<\/a> said: Call a white hat.)<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834910881561653249\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> The considerations and measures for border crossing is as varied as people in the room. (About 60 people at last count.)<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834911122801184768\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> is talking about <a href=\"https:\/\/twitter.com\/EFF\">@EFF<\/a>&#39;s &quot;Who has your back service.&quot; Great stuff here about ISPs: <a href=\"https:\/\/t.co\/eRClOiWS1b\">https:\/\/t.co\/eRClOiWS1b<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834911400006934528\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> says Microsoft is suing gov&#39;t to tell users more of what they having to provide. Twitter is suing NSA. <a href=\"https:\/\/twitter.com\/EFF\">@EFF<\/a> filed amicus in both.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834911811250049027\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Next is <a href=\"https:\/\/twitter.com\/indystar\">@indystar<\/a> investigative reporter <a href=\"https:\/\/twitter.com\/IndyMarisaK\">@IndyMarisaK<\/a>, who is talking about practical tips on cybersecurity on local\/domestic levels.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834912166230773768\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/IndyMarisaK\">@IndyMarisaK<\/a> says Signal is really easy to use. If you can text, you can use it. Also, she sometimes doesn&#39;t write names atop story notes. <a href=\"https:\/\/t.co\/RrW6ou9TMs\">pic.twitter.com\/RrW6ou9TMs<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834913411217702912\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/IndyMarisaK\">@IndyMarisaK<\/a> is talking about <a href=\"https:\/\/twitter.com\/indystar\">@indystar<\/a>&#39;s gymnastics abuse story. (You need to read it, they&#39;re doing great work.) <a href=\"https:\/\/t.co\/c8uyeTUqjd\">https:\/\/t.co\/c8uyeTUqjd<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834913808246272002\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/IndyMarisaK\">@IndyMarisaK<\/a> says ask sensitive sources how many people have secret info. If the number is two, people only have to look so far &#8230;<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834914069652062212\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/IndyMarisaK\">@IndyMarisaK<\/a> says if you&#39;re trying to protect a source, don&#39;t connect with them on social media (at least right away). It&#39;s a tell.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834914237235490818\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Q&amp;A at the <a href=\"https:\/\/twitter.com\/IUMediaSchool\">@IUMediaSchool<\/a>&#39;s cybersecurity for journalists panel. <a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> starts, comparing\/evaluating security-encrypted resources. <a href=\"https:\/\/t.co\/kyDL4hzx8v\">pic.twitter.com\/kyDL4hzx8v<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834915229733634048\">February 23, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/HedgeMage\">@HedgeMage<\/a> is talking about the security default configurations of WhatsApp and Signal. And it is important that both parties use config.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834915877594226689\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">We&#39;re talking about the <a href=\"https:\/\/twitter.com\/nytimes\">@nytimes<\/a> now famous &quot;bring it on&quot; letter. Most agree we&#39;d enjoy that as a spectator sport: <a href=\"https:\/\/t.co\/BYZiKbgEM4\">https:\/\/t.co\/BYZiKbgEM4<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834916410623148037\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> gets a question about what country&#39;s laws better protect ISPs. (So who to use.) Says US 6th circuit is good. US 9th is good.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834916889457475591\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> says data is vulnerable in any country that can be coerced by the U.S. &#8230; Soooooooo &#8230;.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834917061222629376\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/IndyMarisaK\">@IndyMarisaK<\/a> hasn&#39;t had a lawyer ask who a confidential source is, says that&#39;s a credit to Gannett&#39;s legal team, but sees it case-by-case.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834917733129203712\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Question about media impressions and reactions from recent DC rhetoric. <a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> talks about the policy that needs AG Sessions&#39; signature.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834918308050710528\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Following up <a href=\"https:\/\/twitter.com\/AnthonyFargo1\">@AnthonyFargo1<\/a> talks about Obama administration pursuit of leakers. Says we&#39;re waiting to see if the current &quot;bombast&quot; is real.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834918580663828480\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/AnthonyFargo1\">@AnthonyFargo1<\/a> says we might not yet know where exactly all the threats are going to come from. That&#39;d dictate what journalists need to do.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834918822763249664\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/IndyMarisaK\">@IndyMarisaK<\/a> says there is a &quot;temperature&quot; to attack main stream media. She points to the difficulty people have of separating journalists.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834919093849456640\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Different kinds of journalists are doing different kinds of things, <a href=\"https:\/\/twitter.com\/IndyMarisaK\">@IndyMarisaK<\/a> says. You particularly see it on social media. (Shocked?)<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834919287169122305\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/HedgeMage\">@HedgeMage<\/a> says there are ironies in the relationships between journalists and hackers, &quot;Because we&#39;ve never gotten good press.&quot;<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834919439229403136\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Whatever happens on the legal landscape, <a href=\"https:\/\/twitter.com\/HedgeMage\">@HedgeMage<\/a> says, there are still ways to thumb your nose at authority.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834919601704140800\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> says even as the president has announced a &quot;war on the media&quot; there are always issues of reality. Constitutional powers, etc.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834919881632006145\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/AnthonyFargo1\">@AnthonyFargo1<\/a> sees no anti-First Amendment groundswell, but says there is an uptick of non-pols who dislike the media. Not easy to combat.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834920301225996288\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/HedgeMage\">@HedgeMage<\/a> says punditry has become ubiquitous and that&#39;s serving as a stand-in for &quot;The Media.&quot;<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834920526971826177\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">The real winner of this (excellent) panel session, I&#39;d say, is <a href=\"https:\/\/twitter.com\/SecureDrop\">@SecureDrop<\/a>.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834921156792758272\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Now on risks to old school journalism techniques of meeting in public. Phone GPS tracking, facial recognition, ALPRs. <a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> takes it on.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834921568807550977\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/ncardozo\">@ncardozo<\/a> Don&#39;t drive. Don&#39;t take your phone. Take the bus. If you have any technology, you&#39;re likely being tracked. (ed: Have a nice day.)<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834921811313897472\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">And that was the big finish. Great panel by <a href=\"https:\/\/twitter.com\/IUMediaSchool\">@IUMediaSchool<\/a>, <a href=\"https:\/\/twitter.com\/iucacr\">@iucacr<\/a> and <a href=\"https:\/\/twitter.com\/IUMaurerLaw\">@IUMaurerLaw<\/a>.<\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834922293495201792\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Slides from tonight&#39;s cybersecurity for journalists panel (by <a href=\"https:\/\/twitter.com\/IUMediaSchool\">@IUMediaSchool<\/a>, <a href=\"https:\/\/twitter.com\/iucacr\">@iucacr<\/a> and <a href=\"https:\/\/twitter.com\/IUMaurerLaw\">@IUMaurerLaw<\/a>): <a href=\"https:\/\/t.co\/e3ecn31i4M\">https:\/\/t.co\/e3ecn31i4M<\/a><\/p>\n<p>&mdash; Kenny Smith \ud83d\udc22\ud83d\udeb4\ud83c\udffb (@kennysmith) <a href=\"https:\/\/twitter.com\/kennysmith\/status\/834930033038921729\">February 24, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Among the other parts of my day, editing a big document, watching students produce a sports show, handling the various comings and goings of emailing and scheduling and so on, I had the opportunity to hang out at an important panel this evening. And I took notes. Also, even if you aren&#8217;t interested in cybersecurity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[73,35,10,15,31],"tags":[],"class_list":["post-573889465","post","type-post","status-publish","format-standard","hentry","category-iu","category-journalism","category-photo","category-thursday","category-twitter"],"_links":{"self":[{"href":"http:\/\/www.kennysmith.org\/wordpress\/wp-json\/wp\/v2\/posts\/573889465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.kennysmith.org\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.kennysmith.org\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.kennysmith.org\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.kennysmith.org\/wordpress\/wp-json\/wp\/v2\/comments?post=573889465"}],"version-history":[{"count":2,"href":"http:\/\/www.kennysmith.org\/wordpress\/wp-json\/wp\/v2\/posts\/573889465\/revisions"}],"predecessor-version":[{"id":573889467,"href":"http:\/\/www.kennysmith.org\/wordpress\/wp-json\/wp\/v2\/posts\/573889465\/revisions\/573889467"}],"wp:attachment":[{"href":"http:\/\/www.kennysmith.org\/wordpress\/wp-json\/wp\/v2\/media?parent=573889465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.kennysmith.org\/wordpress\/wp-json\/wp\/v2\/categories?post=573889465"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.kennysmith.org\/wordpress\/wp-json\/wp\/v2\/tags?post=573889465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}