master
1<?xml version="1.0" encoding="utf-8"?>
2<feed xmlns="http://www.w3.org/2005/Atom">
3
4 <title><![CDATA[Category: Stieg | BryFry]]></title>
5 <link href="http://bryfry.github.com/blog/categories/stieg/atom.xml" rel="self"/>
6 <link href="http://bryfry.github.com/"/>
7 <updated>2013-03-05T07:22:42-05:00</updated>
8 <id>http://bryfry.github.com/</id>
9 <author>
10 <name><![CDATA[bryfry]]></name>
11
12 </author>
13 <generator uri="http://octopress.org/">Octopress</generator>
14
15
16 <entry>
17 <title type="html"><![CDATA[On Hacking: Larsson's Folly]]></title>
18 <link href="http://bryfry.github.com/blog/2011/12/07/on-hacking-larssons-folly/"/>
19 <updated>2011-12-07T00:00:00-05:00</updated>
20 <id>http://bryfry.github.com/blog/2011/12/07/on-hacking-larssons-folly</id>
21 <content type="html"><![CDATA[<p><img class="right" src="http://i.imgur.com/a7jUo.jpg"></p>
22
23<p>This post is a tangent that I was thinking about this past week when I was listening to <a href="http://www.npr.org/">NPR's</a> <a href="http://www.onthemedia.org/">On The Media</a>. The specific segment, <a href="http://www.onthemedia.org/2011/nov/25/chiquita-phone-hacking-scandal/">The Chiquita Phone Hacking Scandal</a>, examines the current News of the World phone 'hacking' case and illegal and unethical journalistic practices in the light of the historic "Chiquita Phone Hacking Scandal". The segment is worth while and I highly recommend listening to it if you have a few minutes (or you can read the transcript <a href="http://www.onthemedia.org/2011/nov/25/chiquita-phone-hacking-scandal/transcript/">here</a>).</p>
24
25<p>At any rate here is a nice little synopses: Chiquita was doing bad things and the Enquirer published the findings of reporter Mike Gallagher. Unbeknownst to the Enquirer, Gallagher had 'hacked' Chiquita's phone systems and this fact was revealed after the publication. The result, "The Enquirer fired Gallagher, relocated its editor, agreed to pay Chiquita millions of dollars, apologized repeatedly and recanted the stories."</p>
26
27<p>The take away nugget is this, summarized by Kelly McBride of The Poynter Institute:
28<blockquote><p>The lesson is when your methods for gathering information are dishonest, the information you gather is suspect. And that case is the perfect lesson in that. No one has challenged the findings of the newspaper. Yet, nobody talks about that as a great investigative piece. They talk about it as an ethical scandal.</p></blockquote></p>
29
30<p>Okay, so that all makes sense. But then I had a secondary thought and which gave me flashbacks to Steig Larssons Milenium Trilogy (The Girl With the Dragon Tattoo, The Girl Who Played With Fire and The Girl Who Kicked the Hornets' Nest): In each book, the main character hacks into the antagonists machines and the information she gathers almost becomes a deus ex machina saving her and the rest of the journalist protagonists. This is great for a fictional story and it draws attention to the ease and power of information gathering. However, I do not think Mr. Larsson addressed the seriousness of how screwed they all would be if their 'informant' was actually revealed to be a hacker, illegally gaining access to the information.</p>
31
32<p>If there were one take away it would be this: All fiction aside, hacking will never save your ass, it will burn it.</p>
33]]></content>
34 </entry>
35
36</feed>