Last week I said we needed an ethical code for dealing with hacking leaks, and promised to explore that.
Now yet another site – “casual sex and cheating network” Ashley Madison – has been hacked and the results leaked, so I thought I’d better deliver.
How do you come up with an ethical framework for dealing with hacked documents? Firstly, it’s useful to look at what concerns are raised when journalists use them.
Looking at previous reporting based on leaked documents these break down into three broad categories:
- Firstly, that the information was ‘stolen’ (method)
- Secondly, that the motivation behind obtaining the information was tainted (source)
- And thirdly, that the information represents an invasion of privacy (effect)
Put another way: people are generally concerned with how the leaked information was obtained, why, and to what effect. Continue reading