Any information on your smartphone, including emails, chats, call history, notepads, and contacts, can fall into the hands of others without your knowledge, and the camera and microphone on/Off is remotely controlled and peeked at all the time.2021In July 2006, the spyware "Pegasus" that made such a horrific situation possible (note 1) was lurking in the terminals of politicians, activists, journalists, and others in various countries.Revealed.... Cases of journalists being killed or arrested after being targeted by Pegasus have been cited, posing a major threat to journalists who handle sensitive information.
On the other hand, the case can be viewed in another way. While some of Pegasus' targets were journalists, it was also journalists who revealed the problems with Pegasus. Journalists and news organizations collaborated with each other to investigate, and new facts continued to emerge after they were discovered.I'm telling you.The following is a list of the most common problems with the
To date, various conflicts have arisen between the state and others who seek to conceal injustice and inconvenient truths, and journalists who seek to expose them. In this age of technological advancement, even in countries where freedom of the press is supposed to be guaranteed, there are situations where that freedom is threatened. How do journalists and the press, which are said to play the role of "watchdogs" against the state, confront the power of the state? And how are state power moving against them? This article will focus on the impact of technological advances on journalism, particularly in countries where freedom of the press is considered to be guaranteed in principle, and will also look at Japanese media coverage of these developments.

Journalist covering a story with a smartphone (Photo: Tony Webster /) Flickr [CC BY-SA 2.0])
Table of Contents
Leaks and Journalists
When journalists, who are often called the "watchdogs" of power, uncover the injustices of those in power, the first and most important step is to leak the information. In many cases, confidential information, including information about corruption, is only accessible to a limited number of people, and journalists and citizens have little or no opportunity to come into contact with it. However, once information comes from a limited number of insiders, journalists can use the information as a basis for analysis and investigative reporting (*2) and can disseminate the fraud to the rest of the world. Before the spread of information technology such as the Internet, information providers had to physically take out the information they wanted to leak in paper or other forms, but now it is possible to exchange information in the form of data.
However, most people who leak do not want to be identified. This is because they may face a variety of serious penalties. For example, the U.S. National Security Agency (NSA) and the British Government Communications Department (GCHQEdward Snowden, who has accused Internet and phone line interceptions, hacking, and other information gathering by the government and others,2013Russia on several charges, including information leakage, in 2006.Exile.The report also states that the U.S. military has been working with the former Army intelligence analyst Also, Chelsea (formerly Bradley) Manning, a former Army intelligence analyst who leaked classified U.S. military intelligence on the wars in Iraq and Afghanistan, leaked information, etc.20for the crime of2013in the yearguilty verdictand inhuman treatment in the detention center.receivedThe risk of leaks is high. If the whistleblower has to pay a heavy price in exchange for information that reveals wrongdoing, leaks will decrease because of the fear of the risk. With fewer leaks, journalists and citizens lose one means of knowing the truth.
As evidenced by the fact that those who leak are charged with crimes, leaks and the reporting that follows them are accompanied by ethical and legal issues and are not fully supported. In addition, leaks include not only those provided by those with access to inside information, but also those brought about by illegal information gathering through hacking. "Contributions from hackers are welcome.Some information sources have stated that "hacking is a criminal act in most countries," but there are pros and cons to publishing information illegally obtained by hackers.It's divided.. Although leaks, including whistleblowing, are not generally the "right" thing to do from an ethical or legal standpoint, there are many cases in which such "illegal" acts have revealed fraud, corruption, or other moves by powerful people that are not in the public interest. If there is a high public interest in disclosing information, it is common in journalism worldwide for sources to use information obtained through illegal means to reporttrendThe first two are the following.
Although the development of information technology and the spread of electronic devices have made leaking easier, the identity of the leaker can still be easily identified by attaching the information to an e-mail or by other means. Therefore, systems have been developed to protect the anonymity of leakers. A typical example of this is the "WikiLeaks (WikiLeaks)The "WikiLeaks" is the name of the company that develops and operates the whistleblower system. WikiLeaks is a whistleblower system developed and operated by2006It is a non-profit organization founded in 1949. Based on the principle that transparency in government and business is the only way to prevent abuse of power, the organization mainly uses information obtained through whistleblowing.We've gone public.The WikiLeaks project was groundbreaking in that it ensured the anonymity of the accuser. What made WikiLeaks revolutionary was the fact that it thoroughly ensured the anonymity of the accuser. It has a proprietary encryption technology system that is so secure that not even WikiLeaks, which receives the information, can know the identity of the informant. WikiLeaks has been involved in the Afghan war (715,000 points), the Iraq War (40many dots), U.S. diplomatic communiqués (25many dots), the Trans-Pacific Partnership (TPP(of the agreement).draft(lessening the significance or value of the previous word) the likes of1,000It has published more than 10,000 documents and the results of its analysis. The story of the U.S. helicopter firing on civilians in Iraq that made WikiLeaks famous around the world.videoThese WikiLeaks revelations have revealed various injustices and wrongdoings, including Although WikiLeaks has previously collaborated with news organizations to disseminate information, it basically publishes information directly on its website.

Hackers and journalists gathered for a web-based security training (Photo: Ophelia Noor /) Flickr [CC BY-NC-ND 2.0])
2018formed in 1949.DDoSecrets (Decentralized covert disturbance:Distributed Denial of Secrets)The non-profit organization called "Tor (TorThe organization uses a system called "The Information System" (hereinafter referred to as "the system"), which is said to be able to transmit data anonymously, to publish the information it receives. The organization does not conduct thorough investigations or draw conclusions about the information it receives, but rather provides the information to journalists and citizens who need it, with the aim of functioning as a part of the journalistic system.
News organizations are also beginning to put in place mechanisms that allow each informant to safely leak information. The New York Times, The Guardian, and others around the world.50More than a dozen news organizations have introduced "Secure Drop (aka.SecureDrop)The system, called "leaks," is a system that allows leakers to receive information from anonymous informants in a safe and secure manner, free of charge. As technology advances, leaks are becoming more anonymous and secure electronically in a way that takes into account the safety of the leaker.
Collaboration among Journalists Without Borders
In order to protect the freedom of the press and develop better quality investigative reporting by enhancing information gathering, analysis, and dissemination capabilities, journalists around the world are collaborating with each other using advanced communications technology. The aforementioned WikiLeaks and Snowden have also collaborated with various news organizations to convey the truth. At times, such partnerships have been organized. Typical investigative journalism coalitions include theInternational Union of Investigative JournalistsICIJ)There is a "There is a "There is a "There is a "There is a "There is aICIJnetwork of the,100of countries and regions.267Two journalists participated in the event,100The company works with more thanPanama PapersIn addition to the Panama Papers, we have also published investigative reports on secret transactions and tax avoidance and evasion by wealthy individuals and corporations around the world using tax havens, such as China Leaks, Luxembourg Leaks, and the Paradise Papers.I've been there.The company will be in the process of developing a new product. Other,West African Leaks, ,Luanda Leaksand other exposés of corruption and fraud involving politicians and big business around the world.
The spyware "Pegasus" mentioned at the beginning of this article is also an international human rightsNGO(at sentence-end, falling tone) indicates a confident conclusionAmnesty International (Amnesty International)and countries around the world17Press of the,80More than 2,000 journalists will participate in the "Forbidden Press (Forbidden StoriesThe Pegasus Project by the "Pegasus Project" is currently underway to uncover the full extent of the problem.Forbidden Pressis a network of journalists whose purpose is to ensure that if a journalist is threatened, killed, or arrested and is unable to continue an ongoing investigation, another group of journalists will take his or her place and continue the investigation and publish it. Collaboration among journalists can improve the efficiency and quality of investigations. It can also show that, in the unlikely event that one of the journalists involved in an investigation is silenced, other journalists can take over the investigation and pass the information on to the public. Such solidarity among journalists can also demonstrate that journalism is not beholden to the powers that be and is willing to reveal the facts.

Forbidden Stories website (Photo: Yumi Ariyoshi)
Leakage Blocked
While journalists use a variety of techniques to uncover the truth, the state side is moving to hinder the work of such journalists. In particular, with regard to leaks, as mentioned earlier, leaking state secrets and other information is illegal in many countries. In the U.S., there is the Espionage Act, which was passed under World War I to prevent leaks of information to harm the military, but there have been few cases of its application. However, under Barack Obama's administration, even those who leaked in the public interestBegan to apply.For example, the former Central Intelligence Agency (CIS) For example, the former Central Intelligence Agency (Central Intelligence Agency) official, John Kiriakou, in connection with speaking to an American television station about waterboarding and other illegal interrogation methods used in the prison,2013for violations of the Espionage Act and other charges in 2006.Arrested.. Although the line between leaking information or spying that threatens national security and whistleblowing that seeks to bring wrongdoing into the public domain can be blurred, even if information of public interest is leaked and wrongdoing is brought to light, one can still be arrested under "spying" laws.
Prosecution against those who receive and disseminate leaks is also a major problem.2019In 2006, WikiLeaks founder Julian Assange was accused by the United States of violating the Espionage Act and other laws in connection with the aforementioned leaks by Manning.18on suspicion ofIndicted.The The charges include conspiracy, aiding and abetting, and abetting with Mr. Manning, as well as the mere act of disclosing leaked information to the public, which is also covered by the Espionage Act. The act of seeking further information from a source or attempting to protect the identity of that source, especially the act of disclosing information received, is not limited to Mr. Assange, but is the normal practice of journalists and news organizations in the normal course of their duties. If Mr. Assange is convicted, a precedent will be set for the "illegal" treatment of the "normal" work of journalists, so to speak.question (e.g. on a test)The company is in the process of becoming a

Rally against Assange's extradition to the U.S. and for his release (Photo: Garry Knight /) Flickr [CC BY 2.0])
Assange, fearing extradition to the U.S. after a separate arrest warrant was issued in Sweden, applied for asylum in Ecuador and was granted asylum in the U.S.7He was protected by the Ecuadorian Embassy in the United Kingdom for two years. Later, relations with the government deteriorated, partly due to a change in the Ecuadorian president,2019British police at the embassy in 2006.Arrested.The following is a list of the most common problems with the2021counter for years (following a number in the hito-futa-mi counting system)9As of June, he is being held in a British prison, and the U.S. is seeking his extradition. The British court has so far avoided making a political decision, and has ruled that extradition to the U.S. could result in Assange's suicide.I don't approve.but the U.S. has appealed. It could be argued that Assange's conviction and conviction for a crime could set a precedent that "just publishing a leak is a crime," an important case that threatens the freedom of the press.
Interference with journalists disseminating leaks they receive is not limited to the United States. In Australia, in connection with a state-run television station's acquisition and publication of government documents stating that Australian Special Forces killed unarmed civilians in Afghanistan,2019In 2006, the police raided this TV station.Gone.... The warrant requires the release of the journalist's notes and emails, as well as passwords, and is believed to be an attempt to find out where the documents were obtained. In addition, South Africa has a law that could punish journalists and editors who receive government material that is considered confidential.2011in the yearPassed.In Japan as well as in the U.S. Likewise in Japan,2013The Specified Secrets Protection Law in 2006.enactmentThe Act also provides for the protection of information that has been designated as a "specified secret" against leakage or illegal acquisition of such information, as well as conspiracy, abetment, or incitement of such activities.penal regulationsThe law also stipulates that the journalist who receives the information as well as the person who leaked it can be charged. This means that not only the leaker, but also the journalist who receives the leak may be charged with a crime under this law. Since the bill was submitted to the Diet, there have been objections to the arbitrary use of the law by the administration and to the loss of freedom of the press and of reporting.It was a lot.The United Kingdom's Official Secrets Act The Official Secrets Act of the United Kingdom also makes it a crime for government officials to reveal classified information or for journalists to publish it.honorific or passive form of the verb "suruThe company is concerned about the possibility of information leakage. More recently, we fear that information leaks are being carried out by new technologies.1989There are moves to broaden the scope of the Official Secrets Law, which has not been changed since 1964, and to increase penalties, and media organizations have stronglyI disagree.The following is a list of the most common problems with the

Australian National Broadcasting Corporation reporting in Afghanistan (Photo: NATO Training Mission-Afghanistan /) Flickr [CC BY-SA 2.0])
Hindering Online Coverage
Advances and diffusion of communication technology have expanded the dissemination of news from broadcast and print media to the Internet. However, state surveillance and restrictions on the Internet space are also increasing. In China, where the press and other forms of information control have long been extremely strict, and where freedom of the press can hardly be said to exist, the spread of the Internet seemed like an opportunity to connect with a world that had been closed to the press. In reality, however, large-scale censorship and blocking of access to the Internet occur on a daily basis, making it difficult for journalists to publish reports critical of the government and for citizens to find out about them. Furthermore,SNSInterviews, press conferences, and other reporting activities through2014in the yearProhibited.The government has been using the Internet as a tool to censor content that is "harmful" to the regime. In addition to the authorities responsible for monitoring and regulating the Internet, companies that deal with Internet businesses are also required to self-censor, and the manpower tactics of hiring large numbers of people to remove content that is "harmful" to the regime.be in the center ofAlso, the latest technology, such as detecting "harmful" keywords and blocking access to them.Used inFurthermore, not only direct criticism of the government, but also of corruption among local politicians.SNSJournalists are also detained for exposing things such ascase (e.g. receptacle, condition, event, legal action, letter style, etc.)Many are also occurring, making all kinds of reporting difficult, even on the Internet.
In the Philippines2020The Anti-Terrorism Act, passed in 2006, is based on a vague and broad definition of "terrorism" and allows authorities to use up to24days to detain anyone who "acts in a manner detrimental to public safety".make possibleIt was the first of its kind in the world. The law also applies to expression on the Internet, and anyone who makes statements or reports critical of the government can be arrested. Another "cyber defamation law" applies to institutions and journalists who report on news sites that are critical of the government.caseare. Some were covered by the law because they corrected the spelling of some of the articles submitted before the law was passed, after it was passedcase (e.g. receptacle, condition, event, legal action, letter style, etc.)There is also the issue of arbitrary use of the law by the state.

Journalist Maria Ressa arrested on cyber defamation charges in the Philippines (Photo: Deutsche Welle /) Flickr [CC BY-NC 2.0])
The adversity to freedom of the press has been compounded by the global outbreak of the new coronavirus infection. In addition to the difficulties in reporting due to restrictions on movement implemented in many countries to prevent infection, the use of cell phone location data for contact tracking and other purposes by government agencies has also led to the violation of journalists' confidentiality.Alerted.... In addition, some countries have taken advantage of the confusion of the pandemic to pass laws that suppress press freedom, such as penalties for disseminating "false" informationbe (usu. of inanimate objects)In fact, the Actual,2020In the yearBraziland ... andMalaysia, ,HungarySeveral countries, including the United States, are moving to address "fake news. However, these include the development of laws that allow governments to arbitrarily punish critical online sources, such as "anti-fake news laws" that are unclear as to what is being punished, and the denial of access to sites that distribute information that is unfavorable to the government under the guise of cracking down on "fake news. This is a concern for the suppression of freedom of the press.
Examples of Technology Attacks on Journalists
Laws and search and seizure are not the only measures available to governments seeking to prevent the exposure of inconvenient truths. They may also use advanced technology. The spyware "Pegasus," mentioned at the beginning of this article, is an Israeli cyber company,NSOdeveloped by the group, nominally to support criminal and terrorist investigations, and only to the government with the approval of the Israeli Minister of Defense.Sold by.However, the However.2021In 2006, he was considered a potential Pegasus target by Amnesty International.5A list of up to 10,000 phone numbers wasLeaked.The list included phone numbers of politicians, human rights activists, and journalists.NSOThe group has denied many of the allegations outright, though, saying that there is no special significance in the selection of the people on this list,NSOIt is believed that the numbers listed are of interest to the group's clients. Azerbaijan, Bahrain, Hungary, India, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, and the United Arab Emirates.10countries are the majorclientPegasus is a virus that infects people even if they do not take any action, such as pressing a link attached to an e-mail or other document. Pegasus can infect a user even if the user does not take any action, such as pressing a link attached to an email, etc. Once infected, all information and functions on a terminal, such as a smartphone, can be accessed. However, it is difficult for the owners of the infected devices to become aware of the infection or to confirm that such access has occurred during the investigation phase, and the full extent of the problem has not yet been revealed.

NSO Group's website (Photo: Yumi Ariyoshi)
In many cases, journalists have been targeted by this spyware, putting their lives in imminent danger. For example, in the murder of Jamal Khashoggi, a Saudi journalist who was critical of the government, it was later discovered that the cell phone of Khashoggi's fiancée was the target of spywareOkay, okay.The attack took place in the city of Rabat in the evening of October 7, 2012. Also, Moroccan journalist Omar Radi under surveillance after being arrested by authorities and attacked by PegasusPlaced.It is believed that In Mexico, where freelance journalist Cecilio Pineda Bildt was murdered after reporting an accusation against state police and politicians, his cell phone was also targeted by Pegasus andturned out to be... It is unclear whether information was actually extracted by Pegasus, but it is technically possible to locate them using Pegasus. Other journalists operating in various countries have been targeted, particularly in India.30 or morejournalists were reportedly included in the list.
Pegasus is by no means the only spyware that poses a threat to journalists. As technology advances, spyware becomes more complex and cheaper to develop.have become (formal, literary). It is becoming an easier and easier tool for governments to implement as a surveillance tool against journalists and citizens. Perhaps we should consider that the cell phones of journalists around the world are in danger of being constantly monitored, and at the same time, journalists themselves are at risk.
Is the Japanese press aware of the gravity of the situation?
As for Pegasus, a major threat to journalists around the world, all three major newspapers (Yomiuri Shimbun, Asahi Shimbun, and Mainichi Shimbun) have first-hand reports of the U.S. newspaper's coverage, followed by3, ,4The number of related reports was limited to only one (the*3(See Figure 1.). The issues related to Pegasus are complex, and the investigation will require technical knowledge and an extensive coverage network, which will make it difficult to develop an independent report. However, it will be necessary to consider the fact that we have missed a series of follow-up reports that have been issued by news organizations in other countries, including U.S. newspapers.

(Photo: fas / Pixabay [Pixabay License])
Regarding Assange, a case in which a journalist who received and disseminated a leak was indicted, the reaction of the three major newspapers was scant, despite the fact that Assange's departure is an important point for the future of journalism and whether freedom of the press will be protected (see*4(Japanese only). The only other newspaper, the Asahi Shimbun, in an editorial titled "Concerned about the Oppression of the Right to Know," stated that the suppression of speech under the guise of national security, as in Assange's case, is "no one else's business" and that it is a problem.Indication.The government has not yet decided whether it will apply the Espionage Act to Mr. Assange. However, other related to the application of the Espionage Act against Mr. Assange3The article about the case and the Mainichi Newspaper's2The article in the case reports only the fact that he was indicted under the Espionage Act, or "Concerns have been raised that if the revelation of classified information is deemed a violation of the Act, it could affect the activities of news organizations.The Yomiuri Shimbun did not report anything related to the Spy Act. The Yomiuri Shimbun did not report anything related to the Espionage Act. Nor did it report on Assange's extradition to the U.S. for trial in the U.K., where there are concerns about freedom of the press. Mr. Assange's prosecution is no stranger to the Japanese press. It is also relevant to the press.deepIf a precedent is set in the U.S., journalists and media organizations may be prosecuted under the law for "publishing leaks" as a crime in Japan as well. The Japanese press will need to keep a close eye on this case, which could shake the freedom of the press worldwide, depending on how it is handled.
It can also be pointed out that for those who are willing to provide information, the Japanese press is hardly safe. Although most newspapers, magazines, television and other media outlets encourage the provision of information on their websites, the protection of informants is notWe will always protect our sources of coverage.Although the "security measures" are mentioned, it is not clear to what extent they have taken measures against hacking or requests for information disclosure from the government. The fact that none of the Japanese media organizations have introduced a leakage system that guarantees a high level of security and anonymity, such as the aforementioned Secure Drop or its alternatives, indicates a lack of awareness of the need to protect informants.

Journalists conducting interviews (Photo:Piqsels [CC 0])
In summary: Tomorrow is my life
As we have seen, technological advances have had both positive and negative effects on journalism. While in one aspect, improvements in the Internet and telecommunications technology have helped journalists gather information, supporting their function as "watchdogs" of power and expanding their sources, in another aspect, they have threatened journalists and caused them to interfere with their work. While journalists are empowered by technology to further expose wrongdoing, even in countries that claim to have a free press, the powers that be are using state-of-the-art technology and laws to obstruct journalists' work.
Even when the secrets of those in power violate the public interest, can journalists who expose them be considered spies who violate privacy or threaten national security? As technology is expected to advance further in the future, it will be important to know how to utilize cutting-edge technology while protecting the freedom of the press in order to prevent those in power from violating the public interest and to realize a society that does not tolerate injustice. To this end, it will be necessary for the world's press and citizens to share the stance of not tolerating the repressive attitude of the state toward the press and journalists, which has been growing stronger in recent years in countries around the world. It is also important to have a global perspective, with a sense of crisis about press freedom violations in other countries, as "tomorrow is our own day.
note 1 spywareis software that sends information from computers, smartphones, and other electronic devices to the Internet. In many cases, users are unaware that such software is installed on their electronic devices, and information is sent outside without their knowledge.
*2 investigative journalismis a method in which news organizations and journalists uncover issues through independent research and report them on their own responsibility.
*3Counts were made using the paper retrieval systems of the Yomiuri Shimbun, the Mainichi Shimbun, and the Asahi Shimbun (Yomiuri Shimbun Yomidas Rekishi Kan, Mainichi Shimbun My Search, and Asahi Shimbun Monsho II Visual). Here, the period and form of publication (region) are not limited, and those that mention Pegasus, the spyware, in the headline or text are1The number of cases is assumed to be the same. As a result, the Yomiuri Shimbun and the Asahi Shimbun4The case, in the Mainichi Newspaper6(1) The number of cases was 1. (See2021counter for years (following a number in the hito-futa-mi counting system)9month2Daily Browsing )
*4The Yomiuri Shimbun, Mainichi Shimbun, and Asahi Shimbun newspapers were browsed using their paper retrieval systems (Yomiuri Shimbun Yomidas Rekishi Kan, Mainichi Shimbun My Search, and Asahi Shimbun Munkura II Visual). The period and form of publication (region) were not limited here, and the headlines or text content were checked. As a result, the Yomiuri Shimbun's articles on the application of the Espionage Act to Mr. Assange were2case (no direct reference to the "Espionage Act" but describes it as "the crime of acquiring or leaking classified documents related to national defense"), and in the Asahi Shimbun4The case, in the Mainichi Newspaper2(1) The number of cases was 1. (See2021counter for years (following a number in the hito-futa-mi counting system)9month2(Viewed on)
Writer: Yumi Ariyoshi






















I never worried about "freedom of the press" in my daily life. But reading this article made me realize that freedom is not guaranteed. I felt that it is a topic that one should have an interest in because it affects democratic politics (democracy?). I felt that this is a topic that each and every one of us should be concerned about because it affects our democratic government (democracy?).