Investigative Journalism David Leigh Investigative Journalism

Total Page:16

File Type:pdf, Size:1020Kb

Investigative Journalism David Leigh Investigative Journalism Investigative Journalism David Leigh Investigative Journalism A Survival Guide David Leigh City, University of London London, UK ISBN 978-3-030-16751-6 ISBN 978-3-030-16752-3 (eBook) https://doi.org/10.1007/978-3-030-16752-3 © The Editor(s) (if applicable) and The Author(s), under exclusive licence to Springer Nature Switzerland AG 2019 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the pub- lisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institu- tional affiliations. Cover illustration: eStudioCalamar This Palgrave Macmillan imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland PREFACE Few—if any—textbooks like this are available. The author combines an academic background with a prominent track record in investigative jour- nalism. This is therefore intended to be a candid practical guide for jour- nalism students interested in investigative reporting in print, online, or video. It will be useful to media professionals who themselves want to do more work in this demanding field and also to anyone in the wider public with a concern for keeping democracy alive. The book is based on long insider experience of adversarial writing. It sets out to describe the key enemies and dangers that investigative journal- ists face, with the intention of better equipping those reporters for profes- sional survival. The idea is to provide guidelines for people who want to develop the discipline and flair they will need to succeed as public interest reporters in an often hostile environment. This is not, however, a training manual of the kind which explains how to do basic journalistic interviews, make freedom of information requests, manipulate spreadsheets, or scrape data. There are many such technical handbooks already accessible, some of which are indicated in the appen- dix. Nor does this guide include more than a minimum of media theory and history. Instead, the book takes a broad and essentially practical approach, with autobiographical aspects. It offers an analysis of institutions, laws, tech- niques, problems, and case-histories from the field. The first chapter reviews the existential challenges faced by modern investigative journal- ism. Chapter 2 is an introductory account of the historical tension between commercial greed and liberal ideals of public service which culminated in v vi PREFACE the Watergate generation of investigative reporters. The rest of the book gives specific examples of investigative stories alongside a systematic analy- sis of the obstacles which the would-be investigative reporter faces in such work. Chapter 3 dissects two key case-histories. These were the journalistic exposures of UK minister Jonathan Aitken and the UK’s giant arms manu- facturer BAe. Chapter 4 discloses the perils and pitfalls of carrying out investigations while working for a media boss. Chapter 5 focuses on the obstacles the law places in the way of the probing reporter and provides methods to defeat legal bullies. Chapter 6 unearths the ways intelligence agencies threaten the work of journalists. Chapter 7 shows why conspiracy theories can lead excitable investigative reporters astray. Chapter 8 docu- ments how over-enthusiasm and personal vulnerabilities can also derail reporters (and sometimes get them killed). Chapter 9 explains that the new need for collaborative international work on a large scale has reduced the scope for the lone mavericks of yesteryears. Chapter 10 considers “fake news” from a fresh angle, chronicling the menace of bogus “investiga- tions” published by the mainstream media. Chapter 11 rounds off the case histories with a single detailed study of the Trafigura toxic waste scandal, showing how modern investigative reporters can combine across borders to defeat their many enemies. Chapter 12 looks to the future with a cer- tain amount of optimism. An appendix lists some basic public sources of key types of information. Investigative journalism, by its nature, is highly culture specific. A lot of investigative work is about “feel”—a sense of where to go in a particular society, at a particular moment, to find things out and get them success- fully published. Techniques that succeed in one legal or administrative environment frequently do not cross over into another. The context of this book is therefore inevitably primarily British, but many of its more general ideas and attitudes will also be relevant to investigative journalists worldwide. So will the realisation, particularly outlined in Chap. 9, that journalists from the northern hemisphere and from the developing south can nowadays work fruitfully together. The right kind of mindset is what matters. My postgraduate students at City, University of London, debated many of these topics with me for 12 years. I am also grateful to Jeannie Mackie above all, and to Rob Evans, Paul Lashmar, Adrian Gatton, Elena Egawhary, James Ball, James Oliver, and Sara Beremenyi for entertain- ment and encouragement; and, for particular pieces of help, to Meirion PREFACE vii Jones, Lindsay Mackie, and Fred Laurin. I owe a sizeable debt to Godfrey Hodgson, Sally Sampson, and the Gatsby Foundation for launching the Anthony Sampson chair at City University in honour of one of Britain’s finest journalists. The Monty Python script extract is quoted in Chap. 3 by permission of Methuen. I should also like to thank those editors who over the years gave me a job: Eric Mackay at the Scotsman; Ben Bradlee at the Washington Post; Robin Lustig at the Observer; Roger Bolton at This Week; Charles Tremayne at World in Action; and Alan Rusbridger at the Guardian. They helped me learn the trade and pay my rent, which are things for which an investigative reporter should always be grateful. London, UK David Leigh CONTENTS 1 Introduction 1 2 A Short History of Investigative Journalism 5 3 Two Case Histories: Jonathan Aitken and BAe 23 4 Investigative Journalists and Their Bosses 43 5 Journalists Versus the Law 59 6 Dealing with Spies and Spooks 85 7 Conspiracy Theories 99 8 Bad Practice and Good Practice 111 9 Cross-border Collaboration 127 10 Fake News in Mainstream Journalism 155 ix x CONTENTS 11 Trafigura: A Classic Investigation 175 12 Conclusion: A Golden Age for Investigative Journalism? 197 Appendix: Basic Public Sources 209 Index 215 ABOUT THE AUTHOR David Leigh Anthony Sampson Professor of Reporting at City University of London 2006–18 is one of Britain’s best-known investigative journal- ists. He was head of investigations at the Guardian 2000–15 and at the Observer 1980–89. He was a TV producer at This Week and World in Action 1989–97 and the first Laurence Stern Fellow at theWashington Post 1979–80. He is one of the founder members of the International Consortium of Investigative Journalists based in Washington DC; was a trustee of the Centre for Investigative Journalism in London 2008–14; and is a director of the independent press regulator IMPRESS. He has won numerous UK and international journalism awards in a 40-year career. His books include biographies of Michael Foot and Howard Marks; an account of Prime Minister Harold Wilson’s relations with the intelli- gence services; and a study of secrecy in British life. xi.
Recommended publications
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • How US and UK Spy Agencies Defeat Internet Privacy and Security James Ball , Julian Borger and Glenn Greenwald Theguardian.Com
    Revealed: how US and UK spy agencies defeat internet privacy and security James Ball , Julian Borger and Glenn Greenwald theguardian.com US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. This story has been reported in partnership between the New Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. Photograph: Kacper York Times, the Guardian and Pempel/Reuters ProPublica based on documents obtained by the Guardian. For the Guardian: James Ball, Julian Borger, Glenn Greenwald 1. For the New York Times: Nicole Perlroth, Scott Shane For ProPublica: Jeff Larson Read the New York Times story here The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.
    [Show full text]
  • The Authorised History of MI5 by Christopher Andrew (Book Review)
    Lobster 58 The Defence of the Realm The Authorised History of MI5 Christopher Andrew Page 134 Winter 2009/10 Lobster 58 London: Allen Lane, 2009, £30 Covering the same area as the Hennessy/Thomas book but with access to more recent MI5 documents, Andrew does at least refer to the dissenters named in the preceding paragraph. This is a thousand pages long and will be of major interest to academic students of British intelligence and political history for years to come. Discounted from sellers like Amazon, this is a seriously good buy. But I’m not an academic and my interests are political. I looked initially at two areas: what it said about MI5’s relationship with the British left since WW2, and particularly the role of the CPGB in British politics; and the so-called Wilson plots. Let’s take the left first. Elsewhere in this issue is my contribution to the Campaign for Press and Broadcasting Freedom’s book on the 1984 miners’ strike. In that I repeat for the umpteenth time Peter Wright’s story in Spycatcher that MI5 knew about the covert Soviet funding of the CPGB in the 1950s and neither exposed it nor tried to stop it. Wright is rubbished repeatedly by Andrew and he does not refer to this claim of Wright’s. However on p. 403 he writes this: ‘The Security Service had “good coverage” of the secret Soviet funding of the CPGB, monitoring by surveillance and telecheck the regular collection of Moscow’s cash subsidies by two members of the Party’s International Department, Eileen Palmer and Bob Stewart, from the north London address of two ex-trainees of the Moscow Radio School.’ This isn’t dated but from the context it is the early 1950s.
    [Show full text]
  • The U.S. Surveillance State Part 1: Early Answers in Washington DC – Guest Contribution by Jim Farmer
    The U.S. Surveillance State Part 1: Early Answers in Washington DC – Guest Contribution by Jim Farmer (This is the first of three Guest Contributions by US-based Jim Farmer [biography, email jfx "AT" immagic "DOT" com]. Jim has contributed occasionally to Fortnightly Mailing over the years.) Several months after National Security Agency (NSA) documents were revealed by Edward Snowden, the impact on higher education remains unclear clear. Some differences between the explanations from the intelligence establishment and observations from the Washington “think tank” writers and scholars are emerging. On Friday, 6 September 2013 Guardian reporter James Ball and cryptology expert Bruce Schneier answered reader questions. Three questions are key to better understanding the extent of the public awareness of the intelligence community’s practices, and its likely impact. Here the responses of the Guardian are compared to those of the intelligence establishment and “think tank” scholars in recent Washington DC presentations. All presentations were scheduled before and held after Glenn Greenwald’s 5 June report about NSA’s collection of phone records. The answers provide some insight into the U.S. government’s position. The questions and answers Question 1. Reader SteppenHerring asked: How hard do you think it will be to get people to take security seriously when people are willing to type so much personal data into Facebook/Google+ etc? The Guardian’s James Ball answers: I think we need more awareness of privacy and security generally, and I think as generations grow up net-native (as today’s teens are), that’s taking care of itself.
    [Show full text]
  • DEFENCE STRATEGIC COMMUNICATIONS the Official Journal of the NATO Strategic Communications Centre of Excellence
    Volume 3 | Autumn 2017 DEFENCE STRATEGIC COMMUNICATIONS The official journal of the NATO Strategic Communications Centre of Excellence Overwriting the City: Graffiti, Communication, and Urban Contestation in Athens Putting the Strategy Back into Strategic Communications Japanese Strategic Communication: Its Significance As a Political oolT ‘You Can Count On Us’: When Malian Diplomacy Stratcommed Uncle Sam Strategic Communications, Boko Haram, and Counter-Insurgency Fake News, Fake Wars, Fake Worlds Living Post-Truth Lives … But What Comes After? ‘We Have Met The Enemy And He Is Us’ Defence Strategic Communications | Volume 3 | Autumn 2017 1 ISSN 2500-9478 Defence Strategic Communications Editor-in-Chief Dr. Neville Bolt Managing Editor Linda Curika Editor Anna Reynolds Editorial Board Professor Mervyn Frost Professor Nicholas O’Shaughnessy Professor Žaneta Ozoliņa Professor J. Michael Waller Professor Natascha Zowislo-Grünewald Dr. Emma Louise Briant Dr. Nerijus Maliukevicius Dr. Agu Uudelepp Matt Armstrong Thomas Elkjer Nissen Defence Strategic Communications is an international peer-reviewed journal. The journal is a project of the NATO Strategic Communications Centre of Excellence (NATO StratCom COE). It is produced for scholars, policy makers and practitioners around the world. It does not represent the opinions or policies of NATO or the NATO StratCom COE. The views presented in the following articles are those of the authors alone. © All rights reserved by the NATO StratCom COE. These articles may not be copied, reproduced, distributed or publicly displayed without reference to the NATO StratCom COE and the academic journal Defence Strategic Communications. NATO Strategic Communications Centre of Excellence Riga, Kalnciema iela 11b, Latvia LV1048 www.stratcomcoe.org Ph.: 0037167335463 [email protected] Living Post-Truth Lives … But What Comes After? 191 LIVING POST-TRUTH LIVES … BUT WHAT COMES AFTER? A review essay by Kevin Marsh Post-Truth: The New War on Truth and How to Fight Back Matthew D’Ancona.
    [Show full text]
  • IN the EUROPEAN COURT of HUMAN RIGHTS App No. 24960/15 10 HUMAN RIGHTS
    IN THE EUROPEAN COURT OF HUMAN RIGHTS App No. 24960/15 10 HUMAN RIGHTS ORGANIZATIONS AND OTHERS – v – THE UNITED KINGDOM THIRD PARTY INTERVENTION OF THE ELECTRONIC PRIVACY INFORMATION CENTER Introduction 1. The Electronic Privacy Information Center (“EPIC”) welcomes the opportunity to submit these written comments pursuant to leave granted on February 26, 2016, by the President of the First Section under Rule 44 §3 of the Rules of the Court. These submissions do not address the facts or merits of the applicants’ case. 2. EPIC is a public interest, non-profit research and educational organization based in Washington, D.C. 1 EPIC was established in 1994 to focus public attention on emerging privacy and civil liberties issues and to protect privacy, freedom of expression, and democratic values in the information age. EPIC routinely files amicus briefs in U.S. courts, pursues open government cases, defends consumer privacy, coordinates non- profit participation in international policy discussions, and advocates before legislative and judicial organizations about emerging privacy and civil liberties issues. EPIC is a leading privacy and freedom of information organization in the US with special expertise in government surveillance related legal matters. 3. The matter before the Court in 10 Human Rights Organizations and Others v. the United Kingdom impacts the human rights to privacy, data protection and freedom of expression of people around the world, which is reflected also by the variety of the applicants’ affiliations. The matter before the Court is an issue of broad international importance because it involves arrangements to transfer personal data between the United States and European countries.
    [Show full text]
  • On 26 September 2014, the NCP Asked Reprieve to Split Its Complaint
    Complaint to the UK National Contact Point under the Specific Instance Procedure of the OECD Guidelines for Multinational Enterprises: British Telecommunications plc 10 October 2014 Contents 1. Summary of Complaint 2. Introduction 3. BT Plays Key Role in Mass Surveillance by Intelligence Agencies 4. Mass Surveillance and Drone Strikes 5. Breaches of the OECD Guidelines 6. Objectives 7. Supporting documentation 1. Summary of Complaint 1.1. Reprieve submits that British Telecommunications plc (BT) has breached the OECD Guidelines by: • Facilitating the US drone programme by providing the Government Communications Headquarters (GCHQ) and the National Security Agency (NSA) with mass surveillance infrastructure. In exchange for tens of millions of pounds from these intelligence agencies, BT installs wiretaps on the United Kingdom’s telecommunication cables and operates compromised optical fibre networks to enable the mass surveillance of global internet and phone traffic. Intelligence agencies openly acknowledge they rely upon this type of data to choose targets for drone strikes. • Failing to provide evidence of due diligence mechanisms undertaken by the company to prevent the mass surveillance data from being used for targeting by unlawful US drone strikes in non-war zones. 1 2. Introduction 2.1. Reprieve is an international NGO that works to safeguard the human rights of people impacted by the counter-terrorism operations of the US and other governments. 2.2. BT is a major provider of global telecommunications networks and services in more than 170 countries. The company is headquartered at 81 Newgate Street, London EC1A 7AJ. 2.3. Reprieve brings this complaint on behalf of its clients Mohammed al-Qawli and Faisal bin Ali Jaber, who have both lost family members to drone strikes guided by analysis of mass surveillance data.
    [Show full text]
  • Making Or Breaking News?
    Making or breaking news? A paper considering the use of Twitter by journalists during the 2011 UK riots, completed for the Robert Bell Travelling Scholarship, University of Canterbury John Hartevelt BA (Hons) GradDipJ [email protected] March 2013 CONTENTS 1. INTRODUCTION - “An explosion of violence” - A turning point for Twitter in the UK media 2. TWITTER AS A NEWS GATHERING TOOL - Where news breaks - Finding eyewitnesses - Verifying content - Crowd sourcing - Who are these people? - Trend recognition 3. TWITTER AS A NEWS MEDIUM - Where people get their news - Mainstream media in the box-seat - User-generated content, re-packaged - What to tweet? - Tweeting with personality - A richer narrative - Safe tweeting 4. CONCLUSION - Part of the jigsaw - News gathering first, broadcast second 5. BIBLIOGRAPHY 1. INTRODUCTION “An explosion of violence” It was a quiet evening on the news desk at the Sunday Telegraph. Working his regular Saturday night late shift, then-reporter Michael Howie had his radar up for anything that might make a late run for tomorrow’s paper. Around 9pm, on August 6, 2011, the picture desk spotted something with potential. Howie recalls: There was a really grainy picture of a burning car on Twitter – it looked quite interesting … It was a terrible picture but I did a search on Twitter and I found a couple of references to things kicking off in Tottenham.1 There were many versions of the picture circulating on Twitter, including this one: charmskil Queen of Sheba New photo: Police car set ablaze during Tottenham, UK riot, via @teakay09 - http://yfrog.com/gzkholrj 08/06/2011 Reply Retweet Favorite It was not immediately apparent that this was a story of national significance that the Sunday Telegraph would make a great show of.
    [Show full text]
  • Infographics in Booklet Format
    SWITZERLAND CHINA 243 535 ITALY AUSTRALIA 170 183 State of Corporate pOWER 2012 Toyota Motor Exxon Mobil Wal-Mart Stores $ Royal Dutch Shell Barclays plc 60 USA Capital Group Companies 28 Japan 20 China Carlos Slim Helu Mexico telecom 15000 T 10000 op 25 global companies based ON revenues A FOssIL-FUELLED WORLD 5000 Wal-Mart Stores 3000 AUTO Toyota Motor retail Volkswagen Group 2000 General Motors Daimler 1000 Group 203 S AXA Ford Motor 168 422 136 REVENUES US$BILLION OR Royal C Group 131 OIL Dutch powerorporationsFUL THAN nationsMORE ING Shell 2010 GDP 41 OF THE World’S 100 L 129 EC ONOMIE Allianz Nation or Planet Earth Company 162 USA S ARE C China F Japan INANCIAL 149 A Germany ORP France ORatIONARS Corpor United Kingdom GE 143 Brazil st Mobil Exxon Italy Hathaway India Berkshire 369 Canada Russia Spain 136 Australia Bank of America Mexico 343 BP Korea Netherlands Turkey 134 Indonesia ate Switzerland BNP 297 Paribas Poland Oil and gas make Belgium up eight of the top Group Sweden 130 Sinopec Saudi Arabia ten largest global Taiwan REVENUES World US$BILLIONS 273 corporations. Wal-Mart Stores Norway Iran Royal Dutch Shell 240 China Austria Petro Argentina South Africa 190 Exxon Mobil Thailand Denmark 188 BP Chevron 176 131 127 134 150 125 Total Greece United Arab Emirates Venezuela Hewlett Colombia Packard other Samsung ENI Conoco Sinopec Group Electronics Phillips PetroChina E.ON Finland General Malaysia Electric Portugal State Grid Hong Kong SAR Singapore Toyota Motor http://www.minesandcommunities.org Egypt http://europeansforfinancialreform.org
    [Show full text]
  • James Ball Investigative Journalist and Author Media Masters – January 24, 2019 Listen to the Podcast Online, Visit
    James Ball Investigative Journalist and Author Media Masters – January 24, 2019 Listen to the podcast online, visit www.mediamasters.fm Welcome to Media Masters, a series of one-to-one interviews with people at the top of the media game. Today I’m joined by James Ball, investigative journalist and author. Perhaps best known for his involvement in WikiLeaks, he has reported for a wealth of broadcast and print outlets including Channel 4, the BBC, Al Jazeera, ITN, the Guardian, BuzzFeed and the New European. In 2013, after two years on the Guardian’s investigations team, he became their data editor, and reported on the global surveillance scandal prompted by NSA whistleblower Edward Snowden. James has earned a number of accolades throughout his career, including a Pulitzer Prize and a Paul Foot Award. James, thank you for joining me. Thanks for having me. A Pulitzer Prize! That’s amazing. I’ve never won anything. Yes, I was... How do you win one? Well, you’ve got to move to America first! They’re a Bit picky like that. It was a big team of us that got it, but really it was for... But it was your insight, your general genius that was the killer? I think everyone would agree it was that, yes! But no, it was the nice easy matter of spending about 18 months of our lives going through the Edward Snowden files, so it was a doddle, really... Let’s go straight to that then. Tell us about those 18 months. How did the name Edward Snowden come on your radar? One minute you were sitting at a bus stop having never heard of him.
    [Show full text]
  • Two Years After Snowden
    TWO YEARS AFTER SNOWDEN PROTECTING HUMAN RIGHTS IN AN AGE OF MASS SURVEILLANCE (COVER IMAGE) A student works on a computer that is projecting former U.S. National Security Agency contractor Edward Snowden as he appears live via video during a world affairs conference in Toronto © REUTERS/Mark Blinch 2 TWO YEARS AFTER SNOWDEN JUNE 2015 © REUTERS/Zoran Milich © REUTERS/Zoran “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether.” Ben Emmerson QC, UN Special Rapporteur on counter-terrorism and human rights EXECUTIVE SUMMARY On 5 June 2013, a British newspaper, The exposed by the media based on files leaked by Guardian, published the first in a series Edward Snowden have included evidence that: of revelations about indiscriminate mass surveillance by the USA’s National Security Companies – including Facebook, Google Agency (NSA) and the UK’s Government and Microsoft – were forced to handover Communications Headquarters (GCHQ). their customers’ data under secret orders Edward Snowden, a whistleblower who had through the NSA’s Prism programme; worked with the NSA, provided concrete evidence of global communications the NSA recorded, stored and analysed surveillance programmes that monitor the metadata related to every single telephone internet and phone activity of hundreds call and text message transmitted in of millions of people across the world. Mexico, Kenya, and the Philippines; Governments can have legitimate reasons GCHQ and the NSA have co- for using communications surveillance, for opted some of the world’s largest example to combat crime or protect national telecommunications companies to tap security.
    [Show full text]
  • The Prospect of Extraditing Julian Assange
    NORTH CAROLINA JOURNAL OF INTERNATIONAL LAW Volume 37 Number 3 Article 7 Spring 2012 The Prospect of Extraditing Julian Assange Molly Thebes Follow this and additional works at: https://scholarship.law.unc.edu/ncilj Recommended Citation Molly Thebes, The Prospect of Extraditing Julian Assange, 37 N.C. J. INT'L L. 889 (2011). Available at: https://scholarship.law.unc.edu/ncilj/vol37/iss3/7 This Note is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Journal of International Law by an authorized editor of Carolina Law Scholarship Repository. For more information, please contact [email protected]. The Prospect of Extraditing Julian Assange Cover Page Footnote International Law; Commercial Law; Law This note is available in North Carolina Journal of International Law: https://scholarship.law.unc.edu/ncilj/vol37/iss3/ 7 The Prospect of Extraditing Julian Assange Molly Thebes t I. Introduction .......................... ...... 889 II. Is Julian Assange a Journalist .......... ...... ......... 894 III. The Feasibility of Extraditing Journalists ....... ...... 898 A. Sweden ........................... ..... 899 B. Iceland.............903 1. Libel Tourism .................... ..... 904 2. Source Protection.. ................. ..... 906 3. Whistleblower Protections.....................907 4. International Effect of the Initiative ...... .... 908 5. Limitations of the Initiative .......... ...... 909 C. European Media Laws ................ ..... 911 IV. Conclusion............... ................. 913 I. Introduction The legal battle over the custody of Julian Assange has been well publicized in the media, with both Sweden and the United States vying for authority over the WikiLeaks founder and ex- computer hacker.' While the United States is seeking jurisdiction over Assange for his well-documented involvement in the unauthorized acquisition and dissemination of a quarter of a million diplomatic cables2 and tens of thousands of wartime tB.A.
    [Show full text]