Hu Shuli: ‘The power of truth is stronger than anything else’

By Cong B. Corrales

JOURNALIST Hu Shuli | Photo by Julius D. Mariveles

JOURNALIST Hu Shuli | Photo by Julius D. Mariveles

TRUTH-TELLING has always been at the core of journalism and “the power of truth is more powerful than anything else.”

Thus said Hu Shuli, 2014 Ramon Magsaysay Awardee, as she opened the 2014 Magsaysay Festival Month Lecture-Dialogues with her presentation “Caixin Media: Promoting Transparency and Accountability through Investigative Journalism” at the University of the Philippines Asian Center on Monday.

The lecture-dialogue was sponsored by the Ramon Magsaysay Transformative Leadership Institute in partnership with UP Asian Center, the Philippine Business for Education (PBEd) and the Philippine Center for Investigative Journalism (PCIJ).

It the spirit of the team which has brought me here,” she said.

I became a journalist and wrote stories about fraudulent transactions of state-owned companies and challenged unwise policies through solid investigation, standards and skills, perspective and vision, and fair presentation,” she said.

After her two fellowships in the US—in 1986 and 1994—Hu decided to return to China. One of her professors at Stanford University, Lyle Nelson, discourage her decision saying: “Shuli, I respect your decision to go back to China. But it would be very hard for you. Chinese Journalism will never be part of mainstream international journalism.”

In 1998, Hu set up a finance and business magazine called Caijing, applying the highest standard to cover stories in China’s historical transition through transparent, objective, and reliable stories. Also in the 90s, China had no “real open media” and the finance industry was at its infancy.

shuli_04

Photo by Cong B. Corrales

Hu said that although journalists are not paid well in China, there is a “strong demand for the truth,” which is why Hu along and members of her team resigned from the company they worked for in 2009 and formed the Caixin Media.

We want to be trusted. We worked hard with our lawyers to protect our brand,” said Hu adding that now that they own their media outlet they have enjoyed freedom in covering stories that matter. She also said they hold this freedom carefully by being responsible in their reportage.

It was because of this conditions in China that Hu’s team said they could not afford to commit mistakes in their investigative reports. She said that they have to be “200% sure” not only of their sources but also of the documents they gather for any given report.

It was also by this time, Hu said, that the business sector in China wanted transparent, objective, and reliable news. She added that this “thirst for the truth” rippled through China’s middle-class.

Revealing the truth to the public requires layers of checking and multiple source verification. Good journalism can safeguard interests and foster changes of rules.”

She said that it was not only their credibility and reputation that is at stake but also “our hard-earned right to report.”

Hu said the missions of a journalist are to be critical thinkers, promote rational discussion, and do solid investigation.

In the dialogue portion of the program, a panel of reactors joined Hu on the center stage. These were Melinda Quintos de Jesus, executive director of the Center for Media Freedom and Responsibility (CMFR), Prof. Randy David and PCIJ’s Ed Lingao.
De Jesus pointed out the importance of what Hu said about not making any mistakes in news reports and that in the Philippine context this responsibility has been taken lightly most of the time.

Let’s not waste press freedom by careless reporting,” she said.

shuli_03

Photo by Cong B. Corrales

David said that even with China having a “over-regulation on its affairs,” it would still need a feedback mechanism and this would be journalism.

Without feedback you cannot identify blind spots in your system. (Societies will be) unable to observe itself,” said David adding that he did not expect that uncompromising investigative journalism will come from China.

Lingao, on the other hand, echoed the views of Hu that in doing investigative journalism “courage alone is not enough.” However, he also said that responsibility in reporting should not be imposed by governments. He added that the Caixin experience reminds us of the dangers the community journalists have to go through in covering news stories where they have to “tip-toe around powerful political dynasties and local warlords.”

Hu replied that media outlets should be responsible for their reporters.

Outlets should ensure the safety of their reporters. As editor, we worry about our reporters. I buy insurance for my reporters,” Hu said.

She reiterated that it is “more dangerous to keep a story from being published.”

 

JOURNALIST’S TOOLBOX: Beginner’s guide to improving online security

March 5, 2014, 10:45 am

INVESTIGATIVE journalists like the members of ICIJ are facing growing concerns about security. Our members often work with leaks or other materials requiring protection of sources, collaborate across borders with colleagues at risk for their physical safety, and communicate with devices and services open to surveillance or attack.

Photo from Shutterstock

 

And that’s not to mention the growing revelations of surveillance and hacking by the U.S. National Security Agency and its allies – such as efforts to infiltrate and destroy the reputations of “hacktivists” and other targets unrelated to counterterrorism.

For journalists, the ease and low cost of communicating and sharing via e-mail, instant messaging, file sharing tools and cell phones have weighed in favor of convenience versus security. But if your reporting puts you at risk, and you need to protect your data, your sources and your stories, you can take steps to gain security savvy and reduce vulnerability.

Last week at a conference in Baltimore that broke attendance records for the National Institute for Computer Assisted Reporting (NICAR), questions about digital security sent me to sessions on surveillance, safety, privacy and anonymity and between-session conversations on security threats and solutions.

Speakers at NICAR included Jonathan Stray and Susan McGregor (Columbia Journalism School), Jennifer Valentino-DeVries (Wall Street Journal), Josh Meyer (Medill National Security Journalism Initiative) Chris Doten (National Democratic Institute), Kelley Misata (Tor Project) and Gary Price (infoDocket.com).

Here are some of the basics I learned from the experts at NICAR.

  • Protect your identity and data with better and safer passwords or 2-step verification – you log in with password and then confirm with a verification number sent to your phone.
  • Phishing – tricking a user to visit a site to enter personal information and passwords or download malware – is the most common attack. So check any link you receive in e-mail: read the URL and underlying html, don’t click on it!
  • Spear phishing – Personalized message targeting attempted by researching your information or impersonating your friends or colleagues – is growing. You may think you know the sender but it can be a hoax.
  • The weakest link: everyone in your newsroom or collaboration must use safe practices to prevent phishing attacks on others in a trusted group.
  • Encrypt everything. Make it a habit. If you use encryption all the time for communications and data, and encourage or demand it from colleagues and sources, then content will be protected and encryption can become normal behavior for journalists and the industry.
  • PGP is encryption for e-mail. OTR is Off The Record encryption for messaging, which is used by chat programs like Pidgin (PC), Adium (Mac) and CryptoCat (web based). Google “off the record” chat is NOT Off The Record (OTR).
  • Encryption is not anonymity. Encryption protects content but not the identity of the sender and recipient. To anonymize communication traffic and web browsing, go to the Tor Project, learn about the Tor network and download Tor software.
  • Having the Tor software on your computer indicates you are using anonymous communications. If this puts you at risk, you can instead use Tails – Tor on a USB stick, which leaves no trace. Find out at https://www.torproject.org.
  • Protect your data on physical devices. What if your laptop is stolen? Your USB drive? Your cell phone? What about your address book? Encrypt everything. Secure your passwords.
  • Your cell phone is a location device. It holds all your contacts. Think about security. Know where your data is and take steps to protect it.

If you want to learn more about enhancing your security online, you can get Jonathan Stray’s complete presentation “Threat modeling: Security for your story” with audio here. The Journalist Security Guide from the Committee to Protect Journalists also offers useful tips on protecting your online activities in its section on information security.

JOURNALIST’S TOOLBOX: Beginner’s guide to improving online security

March 5, 2014, 10:45 am

INVESTIGATIVE journalists like the members of ICIJ are facing growing concerns about security. Our members often work with leaks or other materials requiring protection of sources, collaborate across borders with colleagues at risk for their physical safety, and communicate with devices and services open to surveillance or attack.

Photo from Shutterstock

 

And that’s not to mention the growing revelations of surveillance and hacking by the U.S. National Security Agency and its allies – such as efforts to infiltrate and destroy the reputations of “hacktivists” and other targets unrelated to counterterrorism.

For journalists, the ease and low cost of communicating and sharing via e-mail, instant messaging, file sharing tools and cell phones have weighed in favor of convenience versus security. But if your reporting puts you at risk, and you need to protect your data, your sources and your stories, you can take steps to gain security savvy and reduce vulnerability.

Last week at a conference in Baltimore that broke attendance records for the National Institute for Computer Assisted Reporting (NICAR), questions about digital security sent me to sessions on surveillance, safety, privacy and anonymity and between-session conversations on security threats and solutions.

Speakers at NICAR included Jonathan Stray and Susan McGregor (Columbia Journalism School), Jennifer Valentino-DeVries (Wall Street Journal), Josh Meyer (Medill National Security Journalism Initiative) Chris Doten (National Democratic Institute), Kelley Misata (Tor Project) and Gary Price (infoDocket.com).

Here are some of the basics I learned from the experts at NICAR.

  • Protect your identity and data with better and safer passwords or 2-step verification – you log in with password and then confirm with a verification number sent to your phone.
  • Phishing – tricking a user to visit a site to enter personal information and passwords or download malware – is the most common attack. So check any link you receive in e-mail: read the URL and underlying html, don’t click on it!
  • Spear phishing – Personalized message targeting attempted by researching your information or impersonating your friends or colleagues – is growing. You may think you know the sender but it can be a hoax.
  • The weakest link: everyone in your newsroom or collaboration must use safe practices to prevent phishing attacks on others in a trusted group.
  • Encrypt everything. Make it a habit. If you use encryption all the time for communications and data, and encourage or demand it from colleagues and sources, then content will be protected and encryption can become normal behavior for journalists and the industry.
  • PGP is encryption for e-mail. OTR is Off The Record encryption for messaging, which is used by chat programs like Pidgin (PC), Adium (Mac) and CryptoCat (web based). Google “off the record” chat is NOT Off The Record (OTR).
  • Encryption is not anonymity. Encryption protects content but not the identity of the sender and recipient. To anonymize communication traffic and web browsing, go to the Tor Project, learn about the Tor network and download Tor software.
  • Having the Tor software on your computer indicates you are using anonymous communications. If this puts you at risk, you can instead use Tails – Tor on a USB stick, which leaves no trace. Find out at https://www.torproject.org.
  • Protect your data on physical devices. What if your laptop is stolen? Your USB drive? Your cell phone? What about your address book? Encrypt everything. Secure your passwords.
  • Your cell phone is a location device. It holds all your contacts. Think about security. Know where your data is and take steps to protect it.

If you want to learn more about enhancing your security online, you can get Jonathan Stray’s complete presentation “Threat modeling: Security for your story” with audio here. The Journalist Security Guide from the Committee to Protect Journalists also offers useful tips on protecting your online activities in its section on information security.

The PCIJ Blog 2014-09-01 16:58:12

Inge Springe is the founder and director of the Baltic Center for Investigative Journalism. Her stories for the center, which is also known as Re:Baltica, have resulted in action against public officials and helped bring about changes in Latvian economic and tax policy.

Your work in Latvia explored topics including organized crime and corruption. What were some of the most significant stories that you discovered?

In autumn 2011, together with colleagues from Balkan countries, Russia and the Ukraine, we published a project called The Proxy Platform. Re:Baltica, the center which I direct, worked on a part of the project related to a Latvian bank’s involvement in money laundering schemes and murky business offshore.

The Proxy Platform project was divided into several parts. Colleagues from OCCRP discovered that several Latvian banks were used as hubs to channel stolen taxpayer money from Russia and the Ukraine. We took a deeper look at a company called Tormex’s bank account in one of Latvia’s banks – Baltic International Bank. As the investigation showed, this company was used to channel “dirty” money from all around the world. Even Mexico’s Sinaloa drug cartel used this account.

Inga Springe with the Dalai Lama | Photo by Reinis Hofmanis.

Inga Springe with the Dalai Lama. Photo:Reinis Hofmanis.

Along with a colleague from Germany, Graham Stack, I researched an offshore services company called Overseas International Services. The company was based in Latvia’s capital Riga since the mid 90s, and its services were used by individuals from Russia and the Ukraine. The interesting point was that the nominee directors for these offshore companies (mainly registered in New Zealand, Panama, UK) were Latvian people. The most famous of them was an old and impoverished pensioner named Erik Vanagels, who appeared as a nominee director in at least 300 offshore companies.

During our research, the International Overseas Services was shut down. You read the story here.

Our latest and most successful project was about social inequality in Latvia. For the first time we used statistics and examples to show why Latvia is such a poor country.

According to Eurostat data, Latvia has the highest GINI coefficient in EU (the GINI measures income inequality). We calculated the incomes of bottom 90% of Latvia’s society, top 10% and top 1%. The richest households made seven times more than the average among the bottom 90% of the population. You see the info graphics here.

Our research also showed that Latvia’s tax and benefit system is built to advantage wealthy people rather than small wage earners. For example, someone who owns a company could “save” money by registering his/her car on a company’s name. In such a way the company owner could “optimize” on VAT tax, fuel and repairing costs, while poorer people have no such option. To prove this, we got the data for all registered cars in Latvia in 2009 and 2010. We filtered out how many brand new BMW cars had been registered in Latvia. The result showed that 80% of these brand new BMW were registered in a company’s name and not in a physical person’s name.

The project received huge publicity and the prime minister announced reduction of social inequality as a priority for 2013.

What were the results of your publishing these stories?

After several years of talk and promises, for the first time there has been a big effort in government recently to reduce the tax burden on a people with small wages. We believe this will help a lot to encourage people to stay in Latvia instead of leaving the country. I assume that this project was also successful because people are tired and really want changes. So there were all the conditions in place to hit the target – to create some movement among decision makers in Latvia.

As founder of the Baltic Center for Investigative Journalism, what have been the greatest challenges in setting up an organization dedicated to investigative reporting?

The greatest challenge for me still is lack of good journalists who can do deeper analyses, write in a non-fiction style (which is undeveloped in Latvia), speak in English, and, most important – to have passion for a job they are doing! At the beginning I thought I would just hire a journalist, and they would give me a great story after several months. I had never led people before that.

But to my surprise I was wrong. We have very few good investigative journalists in Latvia and they are overwhelmed with their jobs.

Funding is also a challenge. Compared to the US, former Soviet countries like the Baltics don’t have traditions of charitable donation. In addition, we are part of the EU, so we are not eligible for large international funds anymore. The EU spends a lot of money for media, but to “write about” the EU, not to do investigative journalism.

Another challenge was that it took time for other commercial media to understand the idea of non-profit investigative journalism organization. They were cautious at the beginning, but recently many of them have approached us with offers to collaborate.

What is the path that led you to investigative journalism in the first place?

Desire to find answers to all questions. I always wanted to go as deep as possible to learn every aspect of the issue. It is exciting to discover the things that someone tries to hide, and it’s especially great if there are all the conditions in place to make changes to improve the situation. Sometimes (most often) it takes years for much-needed changes to be implemented in real life.

How has the increasing importance of digital and online media (especially the immediacy factor they emphasize) impacted the quality and practice of investigative journalism?

It’s harder to get people’s attention. Because of the vast variety of information available, the audience is more demanding and distracted at the same time. Just because there is more information available, it doesn’t mean that people are more informed.

For journalists (including investigative journalists) it means that we have to be creative in thinking of how to deliver a message in a more attractive way. Very few people are ready to read long form stories of printed text nowadays. The reading of a journalistic piece should be like a kind of game – with pictures and graphics involved.

On the other hand, it’s easier for journalists to find information and sources. Very often I use social networks such as Twitter and Facebook to find information or people I need for my stories.

Have you employed a lot of data-based methods in your investigative reporting? If yes, what kinds of data do you use and how?

I have done several projects that used data. Before the last parliamentary elections in Latvia, my students and I analyzed the donors of the ruling political parties. We merged several databases – data of political donors, the business register, and the state procurement database. This allowed us to see if the companies owned by political donors have won state tenders. The result was quite interesting. To show a summary of the results, we made an interactive infographic.

Talk about your approach to stories. Is there anything unusual about the way you conduct your research or choose your themes.

More and more often I use social networks. Instead of hiding on what I am working, I say it out loud to the public. I don’t go into detail, but I might announce that we are going to do research on the effectiveness of the health system in Latvia. I say: if there are people who have things to say or could help us as experts, you are welcome. I have gotten good results with this approach.

What do you consider some of the most important lessons you have learned over the years?

Be open and honest to people. I never lie about my aim when I approach people. If I know that they might not like the result, I warn them about that. If I can’t reveal the source of certain information, I say that to people instead of lying or pretending. I believe that a good reputation is the most important thing for an investigative journalist, otherwise you lose trust and that means you lose sources and information.

What are the key elements that make an investigative story truly “click”? What do they have to have and what should they not be missing?

Clearly stated facts. There are two important skills for investigative journalist: 1) ability to find information; 2) ability to write the story or produce the film in an easy, understandable way. I have seen several well done research projects which were written in a very complicated or boring way. And people just don’t read it! It’s a waste of time and a big tragedy at the same time.

Making a story work doesn’t depend only on the journalist or the topic of the project. There should be also willingness to change the situation by decision makers. I had been writing about an influential and corrupt Latvian State Revenue Service officer for many years, but nothing changed because he was supported by the ruling political party. Four years after I wrote the story, the political situation in the country changed, and he was removed from his post and later accused of corruption. This example always encouraged me to keep going even if I don’t see the result immediately.

What advice would you give to young, emerging, investigative reporters?

Everyone can be an investigative journalist – this is what I keep saying to my students. Everyone! The main thing is just to have passion, a real desire and interest in what are you doing. The skill will come over time. The second rule: start with a small topic which is close to you. Don’t try to overthrow a president of the country with your first research. Most probably you will fail. Have patience and the result will come.

mac lipstick high tea Mens Womens Sale UK For Year 2014 New Style. BFSBU-811

mac lipstick high tea Mens Womens Sale UK For Year 2014 New Style. BFSBU-811

Wholesale-Mac-Makeup/macmakeup-cheap-dior-natural-glow-sculpting-powder-13.5g-0.47oz-outlet-2704air max 2014 pas cher Damaged NSA payment travels outside of Household committeeCritics on the payment, at this point advancing with the Household bottom, claimed a modification eventually left start additionally, firm abs loophole of which and so angered Us residents as soon as ıt had been disclosed by means of Edward cullen Snowden not too long ago. Sen. What is the news regarding Khatallah’s seize will more than likely undercut any repeated Republican complaint the government have not completed adequate to be able to follow people in charge of the particular assaults in which generated the particular demise regarding Ambassador Joe Stevens and also a few some other Us citizens. mac cosmetics uk sale 20 (UPI) — This panel with the 2015 State of arizona Tremendous Jar ruined this california’s rules giving small business the suitable to help not allow services towards LGBT group by strict overall flexibility. “A spokesperson for your NRA projected concerning 12, 000 seat tickets have been marketed for your function which usually deducted nowadays with all the Countrywide Firearm Lovers prizes service.. Jill Biden, as well as their own 2 son’s Love as well as Seeker with the Wireless bluetooth. Law enforcement officials searching for person and also require information about absent N. At the same time the actual Pentagon verified which within the last twenty four hours Euro aircrafts had been noticed violating Ukranian edges. meters. By simply JC Finley |April 40, 2014 in 9: 2009 ARE | Responses 61605 CAIRO, The spring 40 (UPI) — Silk pro-democracy doodlekit Bassem Sabry passed on Mondy in age thirty-one, apparently coming from a slide off of a new deck throughout Cairo. vacationer defined as Callier Matthew Todd has been detained with a N . A person, Chen Xinguo, shared with a paper Caijing her methods ended up being around demonstration of your made demolition with her dwelling. However digital photographer Lindsey Villatoro created which desire become a reality through getting a model wedding ceremony for that woman your day following the woman’s 11th birthday celebration therefore she would have the ability to reveal the actual unique second along with the woman’s dad, 62-year-old Rick Zetz. mac cosmetics for sale mac makeup best foundation Utes. A new burst features sunk inside #Chicago Pond within the LaSalle Block Fill. A situation huge court turned down so that you can indict Expert Jose Flores, whoever legal representative quarreled this Saenz appeared to be very musclebound for your taser to work plus reported Flores’ pistol dispatched should the gaol secure bumped within the pup, although the training video would not look as if represent the following immunity. “So My business is very happy to reach money while using the Big apple Talk about Attorney at law Normal to alter problems the group manufactured in this region. “There ended up being nothing at all in this report in accordance with just about any page they quit, inch Chambliss explained, alluding for you to stories that will assert Bergdahl quit a new “resignation” page about the supposed desertion. NATO suspends civilian plus government co-operation by using RussiaNATO unknown ministers interacting with around Brussels The following friday published your report with aid to get Ukraine plus disapproval with European methods for Ukraine. Legal professional John Kelly. Boko Haram features believed accountability pertaining to abducting over 230 young ladies off their institution throughout Borno point out in The spring 15. Anticipate to quit appropriate. “Rep. “We need to redefine what’s smartness. Azines. “Kerry foresees not one but two particular tracks previous to Iran: “If Iran may generate all these decisions, you’ll encounter favourable consequences for any Iranian people today plus with regard to their financial state. 2014-08-30sab@iscs mac pudder myspace. Ohydrates. inches.. Azines. Vertisements. “”The Household has become analyzing this violations for the VIRTUAL ASSISTANT intended for around 1 year at this point. Nagasaki sits within the southwestern shore connected with Kyushu, a lot less than 250 mile after mile on the lower word of advice connected with Korea. Lamberto Zannier, admin normal on the Group intended for Safety measures in addition to Co-operation with European union, stopped at refugees from the Rostov spot Thurs ., in addition to proposed which the Un Excessive Commissioner intended for Refugees become involved in encouraging these those who fled.. genuine mac brushes com/7PiNlM7WIz— ABC Media Nation-wide politics (@ABCPolitics) Feb . Despite the fact that ballots have been largely alongside get together traces, together with Democrats favoring the particular determine and also Republicans other, the particular costs has been taken to be able to success by way of a bipartisan coalition in which integrated forty nine Republican “aye” ballots.. This current administration, claimed the state, is usually thinking of “what sorts of service we’re able to produce towards Ukrainians, along with the Pentagon has become going over of which all the time possesses advised we now have a number of sorts of non-lethal service, in particular, that any of us usually are giving. isabel marant shoes sale pale pink lipstick mac might be place on default if your co-signer with their mortgage loan dead as well as says individual bankruptcy. cam. “There has been the particular long-distance swimmers via Hermosa [Beach]. inch Throughout reply to Ruskies Us president Vladimir Putin’s record Mondy in his very own click seminar throughout Russian federation that they preserves the correct for you to use Ruskies soldiers straight into Ukraine, Obama joked, “I recognize Us president Putin has some other list of legal representatives setting up a distinct list of interpretations, nevertheless My spouse and i don’t even think that is certainly simply kidding any individual.