Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 2-5, 2019
London UK
12/4/2019
03:10 PM
Alex Wawro, Special to Dark Reading
Alex Wawro, Special to Dark Reading
News
100%
0%

Black Hat Europe Q&A: Understanding the Ethics of Cybersecurity Journalism

Investigative journalist Geoff White chats about why now is the right time for his Black Hat Europe Briefing on hackers, journalists, and the ethical ramifications of cybersecurity journalism.

Now that major data leaks are a semi-regular occurrence it’s more important than ever for cybersecurity professionals to understand how the media covers them, and there’s no better place to do that than Black Hat Europe in London this week.

In his Black Hat Europe Briefing this afternoon on Hackers, Journalists and the Ethical Swamp investigative journalist Geoff White (who has covered technology for, among others, BBC News, Channel 4 News and Forbes) takes five high-profile hacking incidents and analyzes how they reflect key trends and tactics for working with (and some cases manipulating) the news media.

White chats with us a bit about why now is the right time for a talk like this, and what practical takeaways Black Hat Europe attendees can expect from him at the event.

Alex: Tell us a bit about yourself and your path into security work.

Geoff: I’m an investigative journalist and I’ve covered tech for, among others, BBC News, Channel 4 News and most recently The Times. I started doing security coverage while at Channel 4 News about ten years ago when I (and a lot of other people) started to realize the amount of power the tech companies were wielding, and how swaths of society were becoming increasingly reliant on the industry.

Since then I’ve covered election hacking, the Snowden leaks, Bitcoin fraud, bank hacking and energy sector attacks (I’ve got a book coming out in July next year covering all of this, called Crime Dot Com).

Alex: What inspired you to pitch this talk for Black Hat Europe?

Geoff: As part of my book I wrote a chapter about how “hackers” (in all senses of the word) interact with journalists. It’s an experience I’ve been through a few times, and of course there are many examples of data leakers, whistleblowers and occasionally cyber criminals leaking information to journalists either directly or indirectly.

But it struck me that there’s been a sea-change in tactics and approaches: we’re now at a stage where huge swathes of information can be strategically leaked either directly online or via the media, some sections of which are increasingly struggling for attention and therefore keen to cover the latest leaks regardless of the source.

For those whose information is leaked, the effects can be ruinous. It’s an area fraught with ethical challenges, and I don’t think there’s enough open and honest conversation about it.

Alex: What do you hope Black Hat Europe attendees will get out of attending your talk?

Geoff: I hope the talk will get them thinking about the ethics of data leaking and journalism. At one end of the spectrum there are (as there always have been) cases of anonymous whistleblowers working with diligent journalists to reveal stories of huge public importance. At the other end, there are cyber-criminals strategically and cynically dumping sensitive stolen information to harm a target.

But in between there is a big grey area, and if journalists and ethical data leakers want to get public support for their work, they need to be aware of the pitfalls.

Alex: Can you share a specific example of a leak in the big grey area between "of high public importance" and "weaponized disclosure" that you think was handled poorly, and how you hope it would have been improved based on your learnings?

Geoff: For me the most troubling example was the hacking of Sony Pictures Entertainment in late 2014, which has now been attributed by the US to the North Korean government.

Of course, at the time it was far from clear who was behind it, but nonetheless you had a situation where journalists were being emailed directly with stolen information by unknown sources. They were spoon-fed a series of increasingly damaging leaks that, in hindsight, had been calculated to do maximum damage to the company.

You could argue that it was in the public interest to expose sensitive information about a major media company, but the moral high ground got increasingly hard to occupy as more information emerged about who was behind the hack, and I worry that damages public support for journalism.

Learn more about Geoff’s Briefing (and lots of other interesting cybersecurity content) in the Briefings schedule for Black Hat Europe, which returns to The Excel in London December 2-5, 2019.

For more information on what’s happening at the event and how to register, check out the Black Hat website.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Major Brazilian Bank Tests Homomorphic Encryption on Financial Data
Kelly Sheridan, Staff Editor, Dark Reading,  1/10/2020
Will This Be the Year of the Branded Cybercriminal?
Raveed Laeb, Product Manager at KELA,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3682
PUBLISHED: 2020-01-17
The docker-kubic package in SUSE CaaS Platform 3.0 before 17.09.1_ce-7.6.1 provided access to an insecure API locally on the Kubernetes master node.
CVE-2019-17361
PUBLISHED: 2020-01-17
In SaltStack Salt through 2019.2.0, the salt-api NEST API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
CVE-2019-19142
PUBLISHED: 2020-01-17
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.
CVE-2019-19801
PUBLISHED: 2020-01-17
In Gallagher Command Centre Server versions of v8.10 prior to v8.10.1134(MR4), v8.00 prior to v8.00.1161(MR5), v7.90 prior to v7.90.991(MR5), v7.80 prior to v7.80.960(MR2) and v7.70 or earlier, an unprivileged but authenticated user is able to perform a backup of the Command Centre databases.
CVE-2019-19802
PUBLISHED: 2020-01-17
In Gallagher Command Centre Server v8.10 prior to v8.10.1134(MR4), v8.00 prior to v8.00.1161(MR5), v7.90 prior to v7.90.991(MR5), v7.80 prior to v7.80.960(MR2) and v7.70 or earlier, an authenticated user connecting to OPCUA can view all data that would be replicated in a multi-server setup without p...