We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

How to Report on a Hack Without Becoming a Puppet

00:00

Formal Metadata

Title
How to Report on a Hack Without Becoming a Puppet
Title of Series
Number of Parts
234
Author
License
CC Attribution - ShareAlike 3.0 Germany:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Pretty much everyday hackers target websites, databases, and then in some cases, government institutions too. But for journalists, reporting on these incidents can be an ethical minefield. In this panel we look at the specific responsibilities of the media when it comes to reporting on hacked data, and why the guiding principles such as independence, verification, and transparency are more important than ever, especially when it comes to stories with geopolitical significance like the hack of the US Democratic National Committee.
Right anglePoint (geometry)PlotterCybersexMotherboardComputerTelecommunicationMultiplication signInformationBitMessage passingHacker (term)Group actionOcean currentMeasurementMereologyArmObservational studyInformation securityArithmetic meanEncryptionWebsiteComputer animationJSONXMLUML
MotherboardMessage passingMultiplication signScaling (geometry)BitPasswordDesign by contractInformationFamilyEmailType theoryInformation securityAngleFigurate numberWebsiteQuicksortHacker (term)Information privacyMeeting/Interview
WebsiteINTEGRALInformation privacyHacker (term)State of matterCore dumpRight angleAddress spaceFormal verificationHoaxEmailBitMeeting/Interview
BitAddress spaceFormal verificationMultiplication signEmailInformationReal numberRhombusInternet service providerCASE <Informatik>Design by contractInsertion lossPasswordTraffic reportingGoodness of fitMeeting/Interview
Maxima and minimaBitCASE <Informatik>Software developerAddress spaceSpywareDigital photographySoftwareMessage passingSystem callIntercept theoremMeeting/Interview
Dependent and independent variablesPhysical systemFlow separationQuicksortDivisorDigital photographyFormal verificationPhysical lawElectronic mailing listMeeting/Interview
BitFormal verificationHacker (term)Film editingMeeting/Interview
InformationMultiplication signCASE <Informatik>Formal verificationSource codeSet (mathematics)Meeting/Interview
WebsiteRight angleWater vaporPhysical systemGame theoryInternet forumRevision controlGroup actionGoodness of fitMeeting/Interview
Attribute grammarHacker (term)Condition numberWebsiteCASE <Informatik>PasswordEmailGame theoryMeeting/Interview
CASE <Informatik>Source codeMultilaterationHacker (term)Core dumpEmailAttribute grammarCondition numberPlastikkarteInformationNumberAddress spaceQuicksortLeakMeeting/Interview
Content (media)Link (knot theory)LeakFilesharing-SystemTerm (mathematics)EmailWebsiteComputer fileInformationMeeting/Interview
MotherboardCASE <Informatik>LeakQuicksortMeeting/Interview
CASE <Informatik>Attribute grammarSound effectGroup actionBuildingMultiplication signFerry CorstenOrder (biology)Forcing (mathematics)IP addressEquivalence relationIntegrated development environmentFlow separationSimilarity (geometry)SoftwarePhysicalismGame controllerIdentity managementLink (knot theory)RhombusLibrary (computing)Instance (computer science)Control flowContent (media)Process (computing)InformationHacker (term)Meeting/Interview
CASE <Informatik>Physical systemTwitterHacker (term)Medical imagingHypermediaNormal (geometry)WebsiteLikelihood functionAdditionSource codeEmailInformationPoint (geometry)Covering spaceStapeldateiDivisorSpeech synthesisConservation lawNatural numberCore dumpAttribute grammarMaxima and minimaQuicksortMeeting/Interview
Traffic reportingPairwise comparisonContext awarenessOperator (mathematics)Meeting/Interview
Hand fanMultilaterationMereologyBitOnline helpEmailContext awarenessInformationLecture/ConferenceMeeting/Interview
EmailMereologyWage labourScaling (geometry)Public domainHacker (term)InformationMeeting/Interview
MereologyProcess (computing)Hacker (term)InformationReal numberNumberCASE <Informatik>Operator (mathematics)LeakMeeting/Interview
Traffic reportingEmailHypermediaInternetworkingCurvatureFile archiverLink (knot theory)Multiplication signSelectivity (electronic)Core dumpMereology2 (number)Meeting/Interview
Moment (mathematics)HypermediaReal numberHacker (term)EmailScheduling (computing)Right angleCore dumpMeeting/Interview
QuicksortEntire functionInformationPublic domainLeakSingle-precision floating-point formatHacker (term)Meeting/Interview
Information privacyChemical equationCore dumpWebsiteInformationInformation securityWave packetEmailHacker (term)QuicksortMeeting/Interview
Operator (mathematics)Multiplication signSystem callLeakIntercept theoremUniqueness quantificationMeeting/Interview
ArmInformationOperator (mathematics)TelecommunicationLeakMeeting/Interview
GenderInformationArithmetic meanSoftware developerLeakEmailStructural loadGroup actionLevel (video gaming)Operator (mathematics)Pattern languageModemRight angleWeb 2.0Core dumpMeeting/Interview
TwitterCoefficientLine (geometry)Hacker (term)WordMultiplication signMeeting/Interview
Multiplication signInformationStress (mechanics)CASE <Informatik>State of matterTwitterLie groupQuicksortTraffic reportingMeeting/Interview
HypermediaLeakTwitterParameter (computer programming)Game controllerOrder of magnitudeService-oriented architectureStress (mechanics)Row (database)Acoustic shadowCycle (graph theory)Hacker (term)ArmInformation securityLecture/ConferenceMeeting/Interview
Set (mathematics)MotherboardGroup actionService-oriented architectureAcoustic shadowHacker (term)Selectivity (electronic)TwitterPhysical system1 (number)DatabaseWindowIntercept theoremInstance (computer science)Revision controlCybersexMalwareLeakQuicksortInformation securityTransport Layer SecuritySoftware development kitMeeting/Interview
State observerReal-time operating systemEvent horizonService-oriented architectureAcoustic shadowInstance (computer science)Term (mathematics)Maxima and minimaPhysical systemMultiplication signEquivalence relationSound effectElectronic mailing listVulnerability (computing)Order (biology)InformationArithmetic meanMeeting/Interview
Service-oriented architectureAttribute grammarAcoustic shadowCASE <Informatik>MereologyComputer forensicsOperator (mathematics)2 (number)SpacetimeState observerOrder (biology)Multiplication signObservational studyLatent heatLeak
Multiplication signPerspective (visual)MereologyCASE <Informatik>Open set1 (number)Performance appraisalDecision theorySemiconductor memoryQuicksortInterpreter (computing)Right angleContext awarenessDifferent (Kate Ryan album)Table (information)ArmAddress spaceHacker (term)LeakMeeting/Interview
Sound effectCASE <Informatik>Theory of relativityDegree (graph theory)Multiplication signTelecommunicationSource codeAuthorizationInteractive televisionInformationResultantWebsiteHacker (term)Meeting/Interview
Regulator geneSystem callBlogInformationHecke operatorPoint (geometry)FamilyDivisorForcing (mathematics)Physical lawAddress spaceHacker (term)Office suiteNumberSource codeMultiplication signInformation securityInternetworkingFigurate numberData conversionWebsiteCASE <Informatik>Goodness of fitPlastikkarteScaling (geometry)Web 2.0CausalitySoftware testingHypermediaCodeLatent heatClient (computing)Server (computing)Bit
Observational studyCASE <Informatik>AuthorizationPhysical lawInformation securityComputer hardwareNeuroinformatikRadical (chemistry)Group actionMoment (mathematics)Form (programming)SpacetimeLecture/Conference
Source codeRamificationGroup actionInsertion lossPoint (geometry)Touch typingWordProcess (computing)WebsiteHypermediaLine (geometry)Cellular automatonRight angleRow (database)Hacker (term)BitData conversionGoodness of fitLecture/ConferenceMeeting/Interview
Multiplication signPoint (geometry)MereologyFormal verificationAttribute grammarProcess (computing)Hacker (term)CASE <Informatik>Speech synthesisSource codeContext awarenessQuicksortRight angleMeeting/Interview
Ocean currentQuicksortMoment (mathematics)Perspective (visual)Different (Kate Ryan album)Computer clusterLecture/Conference
TwitterDataflowRobotInstance (computer science)Dependent and independent variablesVolume (thermodynamics)Public domainDatabaseComputing platformHypermediaInternet service providerOperator (mathematics)Information securitySound effectData storage deviceMereologyTrailMultiplication signProduct (business)InformationNoise (electronics)
Computer animation
Transcript: English(auto-generated)