Finding True North
Every once in a while, there comes along a news story which makes absolutely no difference about anything but some how can’t be erased from the public spot light. The alleged North Korean hacking of Sony Pictures is just such an example.
Sony Pictures has produced a movie with a plot involving a CIA planned assassination of North Korean President Kim Jong-Un. Why anyone would write such a script? And make it a fictional comedy? for
The real life story involves North Korean agents hacking into the Sony Pictures’ computers and up loading movies and emails. This is theft. Subsequently, this pirated material was released to private sources who intern up loaded it to publicly available sites.
But it didn’t stop there.
In quick pursuit, all the major print and electronic news agencies published from this treasure trove of gossip as juicy material as they could find. And like all good news persons, these major media outlets contacted the individuals involved seeking quotes. Hmmm.
After a few days when the great revelations had given way to more minor and petty ones, a new set of voices stepped forward. “How can the media print stolen material?” Was this going to be a battle between the 1st and 4th Amendments? Where were the major outlets standards?
The Pentagon Papers were in essence “stolen material”, yet most observers would justify the publishing of them pointing to Government misdeeds. The Sony Pictures’ materials, however, do not rise to that standard of national security… or do they?
In this age of competition between old media and new digital media, the main stream printed or televised media appears afraid of its own shadow. Old media has to move so much faster than in the past in order not to get scooped. In this new speed, old media appears to have lowered its thinking standards.
The type of “news” exposed by these pirated up loads has in the past been found in the checkout aisles of grocery stores, not on the front pages of the Washington Post or New York Times.
Ironically, the real news story has yet to be printed.
Who broke into Sony Pictures electronic files? How did they break in and take this data without tipping off Sony? How could the thieves pass this information onto others without leaving a clear trace leading to their door steps? How much broader could these techniques be applied and what other personal or public data could be made public without permission? (Remember Bradley Manning and Wikileaks?)
I would have expected better from the likes of NBC, CBS, ABC, and Fox (well maybe not Fox). I wonder whether these media giants still test their news producers about whether they can find “true north”?