CIJ Logan 2018: Source Protection in the Digital Age

CIJ Logan 2018: Source Protection in the Digital Age

CIJ Logan 2018: What Should We Be Afraid Of?Подробнее

CIJ Logan 2018: What Should We Be Afraid Of?

CIJ Logan 2018: A History of HackingПодробнее

CIJ Logan 2018: A History of Hacking

CIJ Logan 2018: Cyber Crime and IRL PunishmentПодробнее

CIJ Logan 2018: Cyber Crime and IRL Punishment

CIJ Logan 2018: Threats to JournalistsПодробнее

CIJ Logan 2018: Threats to Journalists

CIJ Logan 2018: Investigating via Forensic ArchitectureПодробнее

CIJ Logan 2018: Investigating via Forensic Architecture

CIJ Logan 2018: The Murder Accountability ProjectПодробнее

CIJ Logan 2018: The Murder Accountability Project

CIJ Logan 2018: From FOIA to WikileaksПодробнее

CIJ Logan 2018: From FOIA to Wikileaks

Protecting journalism sources in the digital ageПодробнее

Protecting journalism sources in the digital age

CIJ Logan 2018: Investigation Khan SheikhounПодробнее

CIJ Logan 2018: Investigation Khan Sheikhoun

CIJ Logan 2018: The Yemen Data ProjectПодробнее

CIJ Logan 2018: The Yemen Data Project

CIJ Logan 2018: Aesthetic JournalismПодробнее

CIJ Logan 2018: Aesthetic Journalism

CIJ Logan 2018: Schedule 7Подробнее

CIJ Logan 2018: Schedule 7

CIJ Logan 2018: Illustrating SyriaПодробнее

CIJ Logan 2018: Illustrating Syria

CIJ Logan 2018: Collusion or the New McCarthyism?Подробнее

CIJ Logan 2018: Collusion or the New McCarthyism?

CIJ Logan 2018: Growing up with fake news — consciousness lost and re gainedПодробнее

CIJ Logan 2018: Growing up with fake news — consciousness lost and re gained

CIJ Logan 2018: Surveillance CapitalismПодробнее

CIJ Logan 2018: Surveillance Capitalism

События