SPECIAL REPORTS AND PROJECTS
Surveillance forces journalists to think and act like spies
Published
7 years agoon
Once upon a time, a journalist never gave up a confidential source. When someone comes forward, anonymously, to inform the public, it’s better to risk time incarcerated than give them up. This ethical responsibility was also a practical and professional necessity. If you promise anonymity, you’re obliged to deliver. If you can’t keep your word, who will trust you in the future? Sources go elsewhere and stories pass you by.
Grizzled correspondents might recall this time with nostalgia. For many young journalists, it’s more like historical fiction–a time when reporters could choose not to give up a source, gruff editors chain-smoked cigars, and you could spot a press hack by the telltale notebook and card in the brim of a hat.
The experience of a new generation of news writers tells a different story. Whether you choose to yield a source’s name is secondary. Can you even protect your source to begin with? Call records, email archives, phone tapping, cell-site location information, smart transit passes, roving bugs, and surveillance cameras–our world defaults to being watched. You can perhaps achieve privacy for a few fleeting moments, but, even then, only with a great deal of effort.
Yet this is journalism’s brave new world. In the United States, the National Security Agency, otherwise known as the NSA, seeks to listen to every electronic communication sent or received. In the U.K., the Government Communications Headquarters, or GCHQ, has succeeded in intercepting and storing every peep that passes over the wires. Commercial spy software FinFisher (also called FinSpy) monitors citizens in at least 20 other countries, according to a report by The Citizen Lab, a research group based at the Munk School of Global Affairs at the University of Toronto in Ontario, Canada. Global Information Society Watch’s global report details the state of communications surveillance in plenty more. Even Canada’s spy agency may be watching Canadians illegally, though the GISWatch report could not say so conclusively.
If journalists can protect the identity of their sources at all, it’s only with the application of incredible expertise and practice, along with expensive tools. Journalists now compete with spooks and spies, and the spooks have the home-field advantage.
Shadowy worlds of subterfuge and surveillance should not be a journalist’s habitat. The time journalists spend learning to play Spy-vs.-Spy could be better spent honing their craft. Every hour spent wrangling complex security tools could be an hour spent researching and writing. All the staff on a newsroom’s security team could be writers and editors instead. Each geeky gizmo and air-gapped computer (a computer that is never connected to a network) could be another camera or microphone, or the cost could be spent on payroll. All the extra labor and logistics dedicated to evading espionage is a loss.
This poses sometimes-steep financial costs on newsrooms. If journalists and media organizations are to protect themselves, they must buy more tools and adopt practices that limit their efficiency. Robust security practices are complex and time-consuming, imposing logistical costs. The psychological toll of constant surveillance leads to exhaustion and burnout. Few journalists do their best work when they know that government thugs could break down the door at any moment–as they did at the home of independent New Zealand reporter Nicky Hager in October 2014, according to The Intercept.
Many have worked to slow the swing of the pendulum from privacy to panopticon, increasing development of anti-surveillance tools and advice for journalists. The response to widespread knowledge of the long arm of the surveillance state has been gradual but impressive. Developers have increased work on surveillance–resistance projects and anonymous tip lines. Experts have put together numerousdigital security guides and training programs, all intended to help reporters from falling under the focused gaze of government surveillance.
Perhaps the flagship of this proliferation is SecureDrop, a secure and anonymous submission system for journalists. First pioneered by the former hacker and current digital security journalist Kevin Poulsen and the late programmer and political activist Aaron Swartz under the moniker DeadDrop, SecureDrop is intended to allow potential sources or whistleblowers to get in touch with journalists without leaving any dangerous records of their identity.
SecureDrop combines several pieces of security and privacy software into an integrated system, ensuring that only the journalists can read anonymous tips. Messages are protected with PGP, the tried-and-true gold standard for this task. Sources’ anonymity is provided by Tor, the anonymity network that underpins private communications for everyone from the U.S. Navy and CIA to large businesses and survivors of domestic abuse. The result is safely encrypted messages and no metadata trail. With SecureDrop, journalists don’t just choosenot to reveal a source’s identity. Unless sources choose to reveal their identity, the reporters could not unmask sources even if they tried.
Initially just an idea and some prototype code, SecureDrop was mostly theoretical until early 2013. The first major deployment was at The New Yorker. The project was soon adopted by the nonprofit Freedom of the Press Foundation, which was founded with the specific mission of facilitating journalism that governments oppose. FPF, as the foundation is known, soon took over SecureDrop’s development and maintenance, as well as outreach and funding. More than a dozen other news organizations and prominent journalists have now deployed SecureDrop. With an ongoing crowdfunding campaign, FPF plans to bring it to many more.
SecureDrop works hard to evade even targeted attacks and surveillance. Making use of cutting-edge technology and contemporary security best practices, SecureDrop separates different tasks onto different computers. Each machine only performs part of the puzzle, so it’s very difficult to compromise the whole system at once.
This makes SecureDrop quite expensive to deploy. FPF estimates that a single SecureDrop installation would set a newsroom back around $3,000, which is a lot to ask for a tool designed to protect the most important of tips from the most advanced of snoops.
Other organizations have developed and distributed best practices and training materials. Universities have deepened their research into the threats journalists face. The Citizen Lab, already discussed in this piece, is dedicated to deep research about how technology and security affect human rights and is the source of some of the most detailed and comprehensive technical reports of recent years. If you want to know about the threats facing journalists and human rights groups, Citizen Lab is the place to go.
Yet, as deep as Citizen Lab’s work goes, it is as likely to induce security nihilism as it is to produce savvy security practices. An August 2014 report tells of terrifying new tools for state attacks on the media. Called “network injection appliances,” these devices insert malicious software into otherwise innocuous traffic. Used right, one can modify an online video, adding malware that takes over a journalist’s computer. If a journalist is using a service such as YouTube or Vimeo, session cookies allow the journalist to be targeted precisely. This makes these attacks very difficult to detect and prevent.
With this new technology, journalists don’t have to make a mistake to be compromised. Gone are the phishing days of opening a malicious attachment or clicking a suspicious link. There’s no trap to notice and avoid. Just browsing the Web puts one at risk, and avoiding online video is an impractical ask of a journalist conducting research. Network injection appliances have likely already been deployed in Oman and Turkmenistan, according to Citizen Lab, and because they’re commercially developed by private companies, the price of these devices will only continue to drop as their capabilities expand.
Another Citizen Lab paper paints a disturbing picture of government cyberattacks. Journalists, among the principal victims of this sort of technological espionage, face state-level threats while lacking the funds and expertise to protect themselves. Attacks on computer systems can reach across borders into seemingly safe locations, allowing attackers to disrupt communications and impairing journalists’ ability to do their core work. Sometimes attacks are simply a nuisance or a resource drain; at other times they present major risks to individuals’ safety.
It’s all but impossible for journalists to learn the strategies of the state and appropriate countermeasures on a shoestring budget. Websites and service providers are often better positioned to protect journalists from these attacks. Securing the everyday tools of the trade works much better than does demanding that journalists jump through arcane hoops to stay safe. Simple measures can go a long way. Just enabling secure HTTPS rather than insecure HTTP can make a huge difference. The New York Times has called on all news sites to adopt this very measure by the end of 2015.
As noted security expert The Grugq puts it: “We can secure the things people actually do, or we can tell them to do things differently. Only one of these has any chance of working.”
Since we first saw Edward Snowden’s face, in 2013, computer-security guides for journalists have multiplied, but using computers safely is hard when a government is trying to get the drop on you. Many guides only scratch the surface, detailing basic–but important–steps. Turning on automatic software updates or using password managers and two-factor authentication for online accounts make a big difference. These first steps make journalists slightly harder to attack.
In fact, simple practices probably have a greater impact than do more complex ones. Esoteric security strategies are a lot of work and sometimes only inconvenience a savvy attacker. Simple measures completely stymie simple attacks and force advanced attackers to change their tactics. A sophisticated attacker will never use an advanced technique when a simple one will do. More sophisticated attempts require more work, cost more, and are more prone to detection. Changing the game by forcing attackers to use scarce resources helps everyone stay safe.
Other guides delve deeply into advanced principles of operational security. Abbreviated “OPSEC,” the term is military jargon for measures taken to keep critical information out of hostile hands. If the phrase sounds more at home in a spy thriller than in a journalism manual, that’s a hint at the problems posed by press surveillance. Mainstream journalists and press organizations openly acknowledge their need to learn spies’ tactics and techniques to stay a step ahead.
The adoption of military tactics and an espionage mindset has a substantial downside. The Grugq explains: “OPSEC comes at a cost, and a significant part of that cost is efficiency. Maintaining a strong security posture … for long periods of time is very stressful, even for professionally trained espionage officers.”
Yet even in apparently free democratic societies, compromising a free press is the day-to-day work of the security services.
Intelligence services sometimes target journalists for surveillance, even when the missions of the agencies involved are ostensibly centered around foreign intelligence. Iranian spies orchestrate elaborate campaigns to bamboozle journalists; they even pose as journalists when targeting think tanks and lawmakers, Wired has reported. The FBI has also admitted using the latter tactic and actually defended it publicly when criticized. In the U.K., security services have abandoned restraint when it comes to surveillance of journalists and civil society, Ryan Gallagher wrote in The Intercept, summarizing: “An investigative journalist working on a case or story involving state secrets could be targeted on the basis that they are perceived to be working against the vaguely defined national security interests of the government.”
*****
Some journalists have risen to this challenge. After meeting with Snowden, Laura Poitras and Glenn Greenwald realized that traditional newspapers and media groups were not well suited to this world of watchers. They needed a new sort of organization–one ready to play spy games with professional spies from the very start.
They founded the First Look Media group with help from fellow investigative journalist Jeremy Scahill and funding from eBay mogul Pierre Omidyar. First Look’s flagship online magazine, The Intercept, is dedicated to exposing the abuses of the surveillance state. Choosing such powerful foes meant that The Intercept had to stay one step ahead from the start.
Micah Lee is The Intercept‘s resident security expert. Formerly a staff technologist at technology civil rights group the Electronic Frontier Foundation, Lee was on The Intercept team from the beginning. He designed and implemented the security measures that Greenwald, Poitras, and Scahill–and now a team of 20–use to stay safe. When asked about the infrastructure needed to protect the publication, he frankly admitted: “When we think it’ll make us safer, we normally just buy another computer or device. We’re willing to spend money on these things when there’s a clear security benefit.”
Lee was referring to security practices typically only needed when one is facing adversaries with the sophistication of governments. Protecting important information on separate air-gapped computers is a common practice at The Intercept. Lee and other technologists are fond of a security principle called “defense in depth,” an approach that assumes that some security measures will fail and calls for systems that remain secure even when that happens. In the planning for defense in depth, a process should become insecure not when onesecurity measure fails but instead when dozens do.
Systems built this way demand more hardware than do those where security is more brittle. Several computers ensure that the compromise of one will leave the others safe. Smartcards protect cryptographic keys even when other things go wrong. All of this tech costs money and requires experienced technologists like Lee to design and operate.
In keeping with this level of prudent paranoia, Lee and his colleagues often eschew regular smartphones in favor of the CryptoPhone. These $3,500 devices, made by German manufacturer GSMK, don’t just provide encrypted calls; they’re heavily customized and locked-down Android devices loaded with a whole host of custom software. They even try to detect anomalies in cellular networks that might be indicative of an attack or targeted surveillance.
These practices and this technology are the best that media organizations can buy. It’s a far cry from the James Bond-esque gadgetry that one might see at MI6 or the CIA, but, used correctly, it can keep the spooks at bay long enough for you to meet with sources and write the stories that need to be written.
Staff at The Intercept use PGP for email encryption by default. Lee estimates that more than 80 percent of the emails he sent in the last six months were encrypted in this way. For most people who aren’t security experts, PGP is a niche tool with a notoriously steep learning curve. Getting started requires hours of training and practice to wrap one’s head around complex and unintuitive principles of public-key cryptography. The process takes even longer if one doesn’t have an experienced guide.
Between building sustainable long-term security strategies and jetting around protecting the magazine’s VIP writers, Lee quickly ran out of the time needed to show each new hire how to use PGP. But he noticed that he wasn’t always needed: “Folks learn PGP the same way they do any other tricky technical thing–they Google it, or they ask their nerd friends, and sometimes they get bad advice,” he said. At The Intercept, new hires were learning PGP from folks already there–journalists and editors as well as technologists.
The Intercept had developed what Lee calls a “security culture,” an operational security term that has its roots in activism. In a “security culture,” a community adopts customs and norms that protect its members. It’s a wholesale adoption of operational security practices into the everyday work and activities of the group. The Intercept team considers security a core value, so people there are willing to work together to protect one another, even when that’s outside their usual work.
“Of course, having Erinn in New York helps, too,” Lee joked, referring to Erinn Clark, the most recent member of First Look’s security team. Clark came to First Look from the Tor Project, the nonprofit group responsible for developing Tor. Another security virtuoso, Clark is more than familiar not only with the nitty-gritty of security tools but also with the adoption of secure practices across an organization. In technology circles, the Tor Project is famous both for the exotic ways in which states have tried to infiltrate and attack it and for the extreme security measures its members have adopted to protect themselves.
Leading the incredible heavy hitters of First Look’s security team is Morgan “Mayhem” Marquis-Boire. A security superstar, Marquis-Boire worked on Google’s security incident-response team, and he is a senior researcher at The Citizen Lab. This incredible brain trust isn’t just there to keep just First Look safe. Once First Look’s basic security needs are met, the group plans to branch out. “We want the security team to start developing tools and hardware and doing bigger research.” Lee said. The team members plan to use their skills and expertise to help other organizations that can’t afford their own elite security teams.
The challenge is always resources. First Look has a billionaire on call to pay for the latest technology and fancy technologists. This is a rarity. Other journalists may face a stark choice between hard-hitting stories and staying safe.
What does information security look like at publications that don’t have First Look’s billionaire funding? FPF regularly sends technical experts to help newsrooms install, set up, and upgrade SecureDrop. Every time they set foot in a newsroom, FPF techs find themselves flooded with security questions from reporters and editors. Questions aren’t just about SecureDrop or FPF; news teams want to know about everything from the ins and out of other tools, such as OTRand Tails, to the sort of advanced operational security measures that can help them keep their heads above water when spies come snooping.
Runa A. Sandvik, a member of FPF’s technical team, said, “Even if you wanted to use these tools and had all the patience to learn them, there’s still so much conflicting information–it’s very confusing, very intimidating.” And though few media organizations have the ability to hire technologists to work with their reporting staffs, Sandvik notes that the situation for journalists not affiliated with a major organization is even bleaker: “If you have a technologist, someone to help you, that’s one thing. If you’re freelance and not overly technical, I don’t know how you’re going to work this stuff out.” She added, “Many feel overwhelmed; they don’t know who to ask for help.”
Just having a technologist to help with analysis and security may not be enough. The newsroom has to commit to understanding the issues and taking good advice. Barton Gellman, who currently writes for The Washington Post, was one of the recipients of the document cache Snowden assembled, and he knew that he didn’t have the technical skills to work on the documents alone. He brought prominent security researcher Ashkan Soltani (now chief technologist for the Federal Trade Commission) on board to help. Soltani bolstered Gellman’s security practices and helped Gellman analyze and understand the more technical material in the collection.
To make matters worse, intelligence agencies encourage confusion and misunderstanding when it comes to secure tools and practices. They try to associate a need for privacy with wrongdoing. This association makes it even harder for journalists to protect themselves and their sources. Persuading sources to protect themselves is harder when the tools of safety are associated with suspicion. In some cases, making secure tools seem suspicious actively endangers sources who live in less tolerant environs, such as dissidents in mainland China who use Tor. This doublethink is a strange flip side to the surveillance state: First, watch everyone, always, then vilify any attempt to recover some privacy. This is especially disruptive to journalists and their ability to serve as watchdogs.
Even without state propaganda and unforced errors, covert action takes a substantial toll on the press’s ability to hold leaders accountable. Espionage targeting journalists and their sources impairs the healthy function of the states where it occurs. And these practices are not just a feature of regimes known to be restrictive or autocratic.
In 2013, David Miranda was detained for most of a day while making a connection between flights at Heathrow Airport in London. Miranda was changing planes on a journey from Germany to Brazil on which he was transporting documents and video footage between Glenn Greenwald and Laura Poitras. British police held him under measures designed to combat terrorism. Their reasoning? Miranda was promoting a “political or ideological cause.”
In July 2013, surveillance agency GCHQ destroyed computers at the Guardiannewspaper in London. The security agency had already threatened the newspaper’s editors, demanding that the Guardian stop reporting on government surveillance. A security service literally knocked on the doors of a prominent and critical newspaper in Western Europe. They ground a computer into pieces with the use of power tools. All of this was done in a vain attempt to prevent the publication of more articles on a topic that discomfited the government.
These are the tools the state has at its disposal to discourage dissent. It is understandable that, for some, the risk of challenging this authority is simply too great. When these are the consequences of hard-hitting reporting, sticking to “safe” topics and innocuous pieces is a reasonable response.
But even for those who choose to continue the hard work of comforting the afflicted and afflicting the comfortable, evading the panopticon comes at a tremendous cost. There are the costs incurred in avoiding simple tools in favor of secure ones. The costs of using extra hardware to protect sensitive materials. The costs of hiring elite security teams instead of extra editors. The costs of worrying that you’ve made a mistake in your security measures. The costs of wondering whether your hotel room will be undisturbed when you get back. The costs of hoping that today isn’t the day that a government agent knocks at the door and asks to destroy your work, or worse.
When journalists must compete with spies and surveillance, even when they win, society loses.
DISCLOSURE: The author previously worked at the Tor Project, the non-profit organization responsible for developing and maintaining the Tor software and network
Tom Lowenthal is CPJ’s resident expert in operational security and surveillance self-defense. He is also a freelance journalist on security and tech policy matters.
Related posts:
You may like
SPECIAL REPORTS AND PROJECTS
How Carbon Markets are Exploiting Marginalised Communities in the Global South Instead of Uplifting them
Published
2 weeks agoon
December 11, 2024The billion-dollar fiction of carbon offsets
Carbon markets are turning indigenous farming practices into corporate profit, leaving communities empty-handed.
For Janni Mithula, 42, a resident of the Thotavalasa village in Andhra Pradesh, cultivating the rich, red soil of the valley was her livelihood. On her small patch of land grow with coffee and mango trees, planted over decades with tireless care and ancestral knowledge. Yet, once a source of pride and sustainability, the meaning of these trees has been quietly redefined in ways she never agreed to.
Over a decade ago, more than 333 villages in the valley began receiving free saplings from the Naandi Foundation as part of a large-scale afforestation initiative funded by a French entity, Livelihoods Funds. Unbeknownst to Janni and her neighbours, these trees had transfigured into commodities in a global carbon market, their branches reaching far beyond the valley to corporate boardrooms, their roots tethered not to the soil of sustenance but to the ledger of profit and carbon offsets.
The project claims that it would offset nearly 1.6 million tonnes of carbon dioxide equivalent over two decades. On paper, it is a triumph for global climate efforts. In reality, the residents’ lives have seen little improvement. While the sale of carbon credits has reportedly fetched millions of dollars for developers, Janni’s rewards have been minimal: a few saplings, occasional training sessions, and the obligation to care for trees that she no longer fully owns. These invisible transactions pose a grave risk to marginalised communities, who practice sustainable agriculture out of necessity rather than trend.
Also Read | COP29: The $300 billion climate finance deal is an optical illusion
The very systems that could uplift them—carbon markets intended to fund sustainability—end up exploiting their resources without addressing their needs.
Earlier this year, the Centre for Science and Environment (CSE) and Down To Earth (DTE) released a joint investigative report on the functioning of the voluntary carbon market in India. The report critically analysed the impacts of the new-age climate solution, its efficacy in reducing carbon emissions, and how it affected the communities involved in the schemes.
The findings highlighted systemic opacity, with key details about the projects, prices, and beneficiaries concealed under confidentiality clauses. Developers also tended to overestimate their emission reductions while failing to provide local communities with meaningful compensation. The report stated that the main beneficiaries of these projects were the project developers, auditors and companies that make a profit out of the carbon trading system.
Carbon markets: The evolution
On December 11, 1997, the parties to the United Nations Framework Convention on Climate Change (UNFCC) convened and adopted the Kyoto Protocol with the exigence of the climate crisis bearing down on the world. The Kyoto Protocol, revered for its epochal impact on global climate policy, focused on controlling the emissions of prime anthropogenic greenhouse gases (GHGs). One of the key mechanisms introduced was the “Clean Development Mechanism”, which would allow developed countries to invest in emission reduction projects in developing countries. In exchange, the developed countries would receive certified emission reduction (CER) credits, or carbon credits as they are commonly known.
One carbon credit represents the reduction or removal of one tonne of CO2. Governments create and enforce rules for carbon markets by setting emission caps and monitoring compliance with the help of third-party organisations. For example, the European Union Emissions Trading System (EU-ETS) sets an overall cap on emissions and allocates allowances to industries. A financial penalty system was also put in place to prevent verifiers and consultants from falsifying emissions data. The impact of these renewable projects is usually verified through methods such as satellite imagery or on-site audits.
Companies such as Verra and Gold Standard have seized this opportunity, leading the designing and monitoring of carbon removal projects. Governments and corporations invest in these projects to meet their own net-zero pledges. The companies then issue carbon credits to the investing entity. Verra has stated that they have issued over 1 billion carbon credits, translating into the reduction of 1 billion tonnes of greenhouse gas emissions. However, countless case studies and reports have indicated that only a small fraction of these funds reach the local communities practising sustainability.
Article 6 under the Paris Agreement further concretised and regulated the crediting mechanism to enable countries interested in setting up carbon trading schemes. However, the parties failed to reach a consensus regarding the specifics of Article 6 at COP 27 and COP 28. So, climate finance experts and policymakers were very interested in the developments taking place at the COP 29 summit in Baku, Azerbaijan. Unlike its predecessors, the COP 29 summit has seen a diminished attendee list, with major Western political leaders including Joe Biden, Ursula von der Leyen, Olaf Scholz, and Emmanuel Macron failing to make it to the summit due to the increasingly turbulent climate within their own constituencies.
Sceptics questioned whether this iteration of the summit would lead to any substantial decisions being passed. However, on day-two of the summit, parties reached a landmark consensus on the standards for Article 6.4 and a dynamic mechanism to update them. Mukhtar Babayev, the Minister of Ecology and Natural Resources of Azerbaijan and the COP 29 President, said: “By matching buyers and sellers efficiently, such markets could reduce the cost of implementing Nationally Determined Contributions by 250 billion dollars a year.” He added that cross-border cooperation and compromise would be vital in fighting climate change.
India has positioned itself as an advocate for the Like-Minded Developing Countries (LMDCs) group, with Naresh Pal Gangwar, India’s lead negotiator at COP 29, saying, “We are at a crucial juncture in our fight against climate change. What we decide here will enable all of us, particularly those in the Global South, to not only take ambitious mitigation action but also adapt to climate change.”
The COP 29 decision comes in light of the Indian government’s adoption of the amended Energy Conservation Act of 2022, which enabled India to set up its own carbon market. In July 2024, the Bureau of Energy Efficiency (BEE), an agency under the Ministry of Power, released a detailed report containing the rules and regulations of the Carbon Credit Trading Scheme (CCTS), India’s ambitious plan for a compliance-based carbon market. The BEE has aimed to launch India’s carbon market in 2026.
CSE’s report highlighted the challenges and possible strategies that the Indian carbon market could adopt from other carbon markets around the world. Referring to this report, Parth Kumar, a programme manager at CSE, pointed out how low carbon prices and low market liquidity would be prominent challenges that the nascent Indian market would have to tackle.
The Global South should be concerned
Following the landmark Article 6.4 decision, climate activists called out the supervisory board for the lack of discussion in the decision-making process. “Kicking off COP29 with a backdoor deal on Article 6.4 sets a poor precedent for transparency and proper governance,” said Isa Mulder, a climate finance expert at Carbon Market Watch. The hastily passed decision reflects the pressure that host countries seem to face; a monumental decision must be passed for a COP summit to be touted as a success.
The science behind carbon markets is rooted in the ability of forests, soil, and oceans to act as carbon sinks by capturing atmospheric carbon dioxide. This process is known as carbon sequestration, and it is central to afforestation and soil health restoration projects. However, the long-term efficacy and scalability of these projects have been repeatedly questioned. The normative understanding of carbon markets as a tool to mitigate climate change has also come under scrutiny recently, with many activists calling the market-driven approach disingenuous to the goals of the climate movement.
From a post-colonial perspective, carbon markets have been viewed as perpetuating existing global hierarchies; wealthier countries and corporations fail to reduce their emissions and instead shift the burden of mitigation onto developing nations. Olúfẹ́mi O. Táíwò, Professor of Philosophy at Georgetown University, said, “Climate colonialism is the deepening or expansion of foreign domination through climate initiatives that exploit poorer nations’ resources or otherwise compromises their sovereignty.” Moreover, the effects of climate change disproportionately fall on the shoulders of marginalised communities in the Global South, even though industrialised nations historically produce the bulk of emissions.
There have also been doubts surrounding the claiming process of carbon credits and whether the buyer country or the country where the project is set can count the project towards its own Nationally Determined Contributions (NDCs). Provisions under Article 6 of the Paris Agreement state that countries cannot use any emission reductions sold to another company or country towards their own emissions targets. However, this has become a widespread issue plaguing carbon markets. The EU has recently been criticised for counting carbon credits sold to corporations under the Carbon Removal Certification Framework (CRCF) towards the EU’s own NDC targets. This has led to concerns over the overestimation of the impact of mission reduction projects.
Also Read | India needs climate justice, not just targets
Carbon offset projects, additionally, alienate local communities from their land as the idea of ownership and stewardship becomes muddled with corporate plans on optimally utilising the land for these projects. For example, in 2014, Green Resources, a Norwegian company, leased more than 10,000 hectares of land in Uganda, with additional land being leased in Mozambique and Tanzania. This land was used as a part of afforestation projects to practise sustainability and alleviate poverty in the area. However, interviews conducted with local Ugandan villagers revealed that the project forcibly evicted the local population without delivering its promises to improve access to health and education for the community. These concerns highlighted how the burden of adopting sustainable practices is placed on marginalised communities.
While carbon markets are rightfully criticised, they remain a key piece of the global climate adaptation puzzle. Addressing the issues surrounding transparency and equitable benefit-sharing with local communities could lead to carbon markets having a positive impact on climate change. The system must ensure that larger corporations and countries do not merely export their emissions, but instead implement measures to reduce their own emissions over time. It is also imperative to explore other innovative strategies such as circular economy approaches and nature-based solutions that are more localised, offering hope for a just and sustainable future.
Adithya Santhosh Kumar is currently pursuing a Master’s in Engineering and Policy Analysis at the Delft University of Technology in the Netherlands.
Source: frontline.thehindu.com
Related posts:
DEFENDING LAND AND ENVIRONMENTAL RIGHTS
Statement: The Energy Sector Strategy 2024–2028 Must Mark the End of the EBRD’s Support to Fossil Fuels
Published
1 year agoon
September 27, 2023The European Bank for Reconstruction and Development (EBRD) is due to publish a new Energy Sector Strategy before the end of 2023. A total of 130 civil society organizations from over 40 countries have released a statement calling on the EBRD to end finance for all fossil fuels, including gas.
From 2018 to 2021, the EBRD invested EUR 2.9 billion in the fossil energy sector, with the majority of this support going to gas. This makes it the third biggest funder of fossil fuels among all multilateral development banks, behind the World Bank Group and the Islamic Development Bank.
The EBRD has already excluded coal and upstream oil and gas fields from its financing. The draft Energy Sector Strategy further excludes oil transportation and oil-fired electricity generation. However, the draft strategy would continue to allow some investment in new fossil gas pipelines and other transportation infrastructure, as well as gas power generation and heating.
In the statement, the civil society organizations point out that any new support to gas risks locking in outdated energy infrastructure in places that need investments in clean energy the most. At the same time, they highlight, ending support to fossil gas is necessary, not only for climate security, but also for ensuring energy security, since continued investment in gas exposes countries of operation to high and volatile energy prices that can have a severe impact on their ability to reach development targets. Moreover, they underscore that supporting new gas transportation infrastructure is not a solution to the current energy crisis, given that new infrastructure would not come online for several years, well after the crisis has passed.
The signatories of the statement call on the EBRD to amend the Energy Sector Strategy to
- fully exclude new investments in midstream and downstream gas projects;
- avoid loopholes involving the use of unproven or uneconomic technologies, as well as aspirational but meaningless mitigation measures such as “CCS-readiness”; and
- strengthen the requirements for financial intermediaries where the intended nature of the sub-transactions is not known to exclude fossil fuel finance across the entire value chain.
Source: iisd.org
Download the statement: https://www.iisd.org/system/files/2023-09/ngo-statement-on-energy-sector-strategy-2024-2028.pdf
Related posts:
SPECIAL REPORTS AND PROJECTS
Will more sovereign wealth funds mean less food sovereignty?
Published
2 years agoon
April 13, 2023- 45% of Louis Dreyfus Company, with its massive land holdings in Latin America, growing sugarcane, citrus, rice and coffee;
- a majority stake in Unifrutti, with 15,000 ha of fruit farms in Chile, Ecuador, Argentina, Philippines, Spain, Italy and South Africa; and
- Al Dahra, a large agribusiness conglomerate controlling and cultivating 118,315 ha of farmland in Romania, Spain, Serbia, Morocco, Egypt, Namibia and the US.
Sovereign wealth funds invested in farmland/food/agriculture (2023)
|
|||
Country
|
Fund
|
Est.
|
AUM (US$bn)
|
China
|
CIC
|
2007
|
1351
|
Norway
|
NBIM
|
1997
|
1145
|
UAE – Abu Dhabi
|
ADIA
|
1967
|
993
|
Kuwait
|
KIA
|
1953
|
769
|
Saudi Arabia
|
PIF
|
1971
|
620
|
China
|
NSSF
|
2000
|
474
|
Qatar
|
QIA
|
2005
|
450
|
UAE – Dubai
|
ICD
|
2006
|
300
|
Singapore
|
Temasek
|
1974
|
298
|
UAE – Abu Dhabi
|
Mubadala
|
2002
|
284
|
UAE – Abu Dhabi
|
ADQ
|
2018
|
157
|
Australia
|
Future Fund
|
2006
|
157
|
Iran
|
NDFI
|
2011
|
139
|
UAE
|
EIA
|
2007
|
91
|
USA – AK
|
Alaska PFC
|
1976
|
73
|
Australia – QLD
|
QIC
|
1991
|
67
|
USA – TX
|
UTIMCO
|
1876
|
64
|
USA – TX
|
Texas PSF
|
1854
|
56
|
Brunei
|
BIA
|
1983
|
55
|
France
|
Bpifrance
|
2008
|
50
|
UAE – Dubai
|
Dubai World
|
2005
|
42
|
Oman
|
OIA
|
2020
|
42
|
USA – NM
|
New Mexico SIC
|
1958
|
37
|
Malaysia
|
Khazanah
|
1993
|
31
|
Russia
|
RDIF
|
2011
|
28
|
Turkey
|
TVF
|
2017
|
22
|
Bahrain
|
Mumtalakat
|
2006
|
19
|
Ireland
|
ISIF
|
2014
|
16
|
Canada – SK
|
SK CIC
|
1947
|
16
|
Italy
|
CDP Equity
|
2011
|
13
|
China
|
CADF
|
2007
|
10
|
Indonesia
|
INA
|
2020
|
6
|
India
|
NIIF
|
2015
|
4
|
Spain
|
COFIDES
|
1988
|
4
|
Nigeria
|
NSIA
|
2011
|
3
|
Angola
|
FSDEA
|
2012
|
3
|
Egypt
|
TSFE
|
2018
|
2
|
Vietnam
|
SCIC
|
2006
|
2
|
Gabon
|
FGIS
|
2012
|
2
|
Morocco
|
Ithmar Capital
|
2011
|
2
|
Palestine
|
PIF
|
2003
|
1
|
Bolivia
|
FINPRO
|
2015
|
0,4
|
AUM (assets under management) figures from Global SWF, January 2023
|
|||
Engagement in food/farmland/agriculture assessed by GRAIN
|
Related posts:
Urgent Call for Conditionalities on New IFC and EBRD Loan to Oyu Tolgoi Mine
COP16 in Riyadh: World Leaders Commit $12.15B to Combat Land Degradation and Drought
Church of Uganda’s call to end land grabbing is timely and re-enforces earlier calls to investigate quack investors and their agents fueling the problem.
Op-Ed | A Missing Investment Strategy: Climate Resilience Hides in Local Food Markets
A bail application for the 15 EACOP activists failed to take off, and they were remanded back to Prison.
Breaking: Buganda Road Court grants bail to 15 stop EACOP activists after 30 days in prison.
Witness Radio Statement on the International Human Rights Day 2024: A call to the government of Uganda to protect Land and Environmental Rights Defenders and Communities affected by irresponsible land-based investments in Uganda.
UNCCD COP16: NGOs issue a stark warning and call for urgent actions to deal with the escalating threats of desertification, land degradation, and drought.
Innovative Finance from Canada projects positive impact on local communities.
Over 5000 Indigenous Communities evicted in Kiryandongo District
Petition To Land Inquiry Commission Over Human Rights In Kiryandongo District
Invisible victims of Uganda Land Grabs
Resource Center
- LAND GRABS AT GUNPOINT REPORT IN KIRYANDONGO DISTRICT
- 12 KEY DEMANDS FROM CSOS TO WORLD LEADERS AT THE OPENING OF COP16 IN SAUDI ARABIA
- PRESENDIANTIAL DIRECTIVE BANNING ALL LAND EVICTIONS IN UGANDA
- FORCED LAND EVICTIONS IN UGANDA: TRENDS, RIGHTS OF DEFENDERS, IMPACT AND CALL FOR ACTION
- FROM LAND GRABBERS TO CARBON COWBOYS A NEW SCRAMBLE FOR COMMUNITY LANDS TAKES OFF
- African Faith Leaders Demand Reparations From The Gates Foundation.
- GUNS, MONEY AND POWER GRABBED OVER 1,975,834 HECTARES OF LAND; BROKE FAMILIES IN MUBENDE DISTRICT.
- THE SITUATION OF PLANET, ENVIRONMENTAL AND LAND RIGHTS DEFENDERS IS FURTHER DETERIORATING IN UGANDA AS 2023 WITNESSED A RECORD OF OVER 180 ATTACKS.
Legal Framework
READ BY CATEGORY
Newsletter
Trending
-
DEFENDING LAND AND ENVIRONMENTAL RIGHTS2 weeks ago
Breaking: Buganda Road Court grants bail to 15 stop EACOP activists after 30 days in prison.
-
STATEMENTS2 weeks ago
Witness Radio Statement on the International Human Rights Day 2024: A call to the government of Uganda to protect Land and Environmental Rights Defenders and Communities affected by irresponsible land-based investments in Uganda.
-
DEFENDING LAND AND ENVIRONMENTAL RIGHTS2 weeks ago
Breaking: The Bail Application for the 15 EACOP Activists flops for the second time, as the trial magistrate is reported to have been transferred.
-
DEFENDING LAND AND ENVIRONMENTAL RIGHTS2 weeks ago
Buganda Road Court will hear a bail application for 15 EACOP activists today.
-
MEDIA FOR CHANGE NETWORK2 weeks ago
Hearing of a case against a 72-year-old woman for disobeying NEMA orders is kicking off today..
-
MEDIA FOR CHANGE NETWORK2 weeks ago
Three-quarters of Earth’s land became permanently drier in last three decades: UN
-
MEDIA FOR CHANGE NETWORK1 week ago
Church of Uganda’s call to end land grabbing is timely and re-enforces earlier calls to investigate quack investors and their agents fueling the problem.
-
SPECIAL REPORTS AND PROJECTS2 weeks ago
How Carbon Markets are Exploiting Marginalised Communities in the Global South Instead of Uplifting them