"Surveillance of journalists has become a very topical and controversial issue that now requires attention at a number of levels – the level of the state, CSOs, and journalism organisations themselves. The systematic and arbitrary harvesting of journalists’ information, tracking and targeting of journalists is on the increase especially in the SADC region where some regimes seek to retain control of the media and stifle divergent views and suffocate opponents. In countries such as Zambia, Zimbabwe, Namibia and Malawi, there is deep-rooted fear that enacted cyber laws are already being used for surveillance purposes. For instance, South Africa uses the RICA Act to regulate the interception of communication and Zimbabwe has the Interception of Communications Act while Zambia deploys the Electronic Communications and Transactions Act of 2009. Thus, anecdotal evidence in Southern Africa shows that governments in the region are increasingly resorting to digital tools for surveillance and this is a serious cause for concern. At least three Southern African countries; Botswana, Zambia, and Zimbabwe have acquired sophisticated tools developed by an Israeli company, Circles, which they use to monitor the behavior of their citizens online. This calls for journalists, their organisations and other media- support institutions to act in ways that protect journalists from surveillance, be it by state or non-state agency. There is need, therefore, to come up with a toolkit of strategies that journalists in Southern Africa can make use of in quotidian news gathering and reporting practices." (Introduction)
Contents
1 INTRODUCTION, 6
2 INTERNATIONAL FRAMEWORKS ON SURVEILLANCE AND PRIVACY ISSUES, 7
Key Features of Surveillance Laws in the SADC Region, 9
3 TACTICS OF SURVEILLANCE USED ON JOURNALISTS, 10
4 UNPACKING THE DIGITAL SECURITY SURVIVAL TOOLKIT, 11
Operational Security, 12
Personal Security, 16
Support Structures for Journalists, 17
Digital Hygiene Best Practices, 20
Protecting Your Data, 22
Advocacy Opportunities, 23
Additional Resources and Training Opportunities, 24
5 CONCLUSION, 25