Moral Crucifixion: Privacy Leakage and Data Security of Ashley

advertisement
Moral Crucifixion:
Privacy Leakage and Data Security of Ashley Madison
Yang Yang (yy362)
Problem
As a website caters to people already in a relationship yet still want extramarital affairs, Ashley
Madison is the largest and fastest growing online social networking community of its kind.1 Since
the hacker gradually released its users’ data this summer, Ashley Madison has drawn massive
attention worldwide and overwhelmed with various consequences. With the data leakage of the
names and private information of its 37million users2, the website faces at least $578 million
class-action lawsuit3 and two suicides linked to the hack4.
The attack towards Ashley Madison revealed the escalating risks of data security. So far, though
the investigation on this hack was carried out by joint forces including Ashley Madison, the Royal
Canadian Mounted Police, the US Department of Homeland Security, the FBI and others5, there’s
little known about the identity of the hacker- the Impact team6, or its motivation.
“Hollywood Courts Toronto-Based Ashley Madison.” Accessed December 12, 2015.
http://www.prnewswire.com/news-releases/hollywood-courts-toronto-based-ashley-madison-75587257.html.
2
22, CBS News July, 2015, and 12:27 Pm. “Hackers Expose First Ashley Madison Users.” Accessed December 12,
2015. http://www.cbsnews.com/news/hackers-expose-first-ashley-madison-users/.
3
Basu, Tanya. “Ashley Madison Slammed With $578 Million Lawsuit.” Time, August 23, 2015.
http://time.com/4007374/ashley-madison-578-million-lawsuit-canada/.
4
Bluestone, Gabrielle. “Police: At Least Two Suicides Linked to Ashley Madison Hack.” Gawker. Accessed
December 13, 2015. http://gawker.com/police-at-least-two-suicides-linked-to-ashley-madison-1726104618.
5
Goodin, Dan. “Ashley Madison Offers $500,000 Reward amid Reports of Member Suicides: Global Investigation
Involving FBI, Homeland Security Pledges No Unturned Stones.” In ArsTechnica.com, n/a. New York, United
States: Condé Nast Publications, Inc., 2015. http://search.proquest.com/docview/1706271283/abstract.
6
Simon Thomsen, Business Insider Australia, 2015 Jul. 20, 091 32, and 41. “Extramarital Affair Website Ashley
Madison Has Been Hacked and Attackers Are Threatening to Leak Data Online.” Business Insider. Accessed
1
However, the usage of released data extended and permeated rapidly. Companies and Federal
Institutions now use the data to conduct background checks on both current employees as well as
candidates; leaked information was also used to impersonate users in order to gain access to his/her
network7; and cyber extortions and scams were followed as well8. On top of all above, users’ most
private information including real names, credit card information, addresses, and sexual
preferences and fantasies are exposed and perpetuated online for others to browse, to pry and to
judge from a condescending angle. This makes the Internet a crucifixion and nails those who
commit infidelity. However, the legitimacy and morality of the leakage and reuse of these data is
ambiguous and remains to be studied.
Question
1. In the case of Ashley Madison data breach, how can we protect users’ privacy and their “rights
to be forgotten”, when they are both the offenders and the victims at the same time, from the
angle of law and technology? (Prof. Meg Jones)
2. What are the potential motivations of people using leaked data of Ashley Madison? (Prof.
Bode)
Method
1. Content Analysis. (Prof. Meg)
7
8
December 13, 2015.
http://www.businessinsider.com/cheating-affair-website-ashley-madison-hacked-user-data-leaked-2015-7.
Levin, Mintz. “Data Dump! AshleyMadison.com Fallout Deepens.” Privacy & Security Matters. Accessed
December 13, 2015.
https://www.privacyandsecuritymatters.com/2015/08/data-dump-ashleymadison-com-fallout-deepens/.
24, Charlie Osborne for Zero Day | September, and 2015-- 09:00 GMT| Topic: Security. “In Ashley Madison’s
Wake, Here’s One Man’s Story of Sex, Sorrow and Extortion.” ZDNet. Accessed December 13, 2015.
http://www.zdnet.com/article/in-ashley-madisons-wake-heres-one-mans-story-of-sex-sorrow-and-extortion/.
To solve this question, first search for relevant content in several disciplines. In the aspect of
law, collect relevant textual materials such as legislations, regulations, case law and legislative
history, then scrutinize them and try to find conflicts and vulnerability with the intention of
protecting Ashley Madison users’ human rights and privacy. In the aspect of technology, to
collect text materials such as programs, manuals, IEEE & ACM journals, company
communications, then scrutinize them and try to find the loopholes of information leakage. In
both cases, to look for ways to amend the current law and technology in a whole, aiming to
enhance data security or to rectify them with the interrelations between disciplines.
Interdisciplinary approach in this case could help to bring and combine solutions from
different angles and let policies, law, and technology to restrain and to compensate for each
other. Nevertheless, efforts made by several disciplines make it harder to guarantee a fair and
even interest relationship among various stakeholders, which might lead to a biased preference
of users and harming the commercial development. Furthermore, in this case, it might even
encourage extramarital affairs and infidelity in the society.
2. Survey (Prof. Bode)
To detect the motivations behind people flocking to the website and searching for others’
information, we could conduct a simple survey before their search.
The survey would ask people to declare their relationships with the person they’re searching,
which leads to multiple choices based on different reasons for using the leaked information.
Relationship between you and the person
Reasons
you are searching for

Someone I know is probably on Ashley
1.
cheating on me
Madison
(Could be spouse, friends, acquaintances
2.
To check if my friends/acquaintances
are potentially cheating
or yourself)

To check if my spouse is potentially
Employers
3.
Other
1.
To see if my employees have
infidelities.
(Could be
corporations/institutions/Government)
2.
To check my prospective employees’
fidelities in pre-employment

Strangers
1.
Out of curiosity
The advantage of conducting a quantitative method, such as survey, is that the outcome is usually
directly perceived, whereas it might include falsehood due to human’s complex psychology and
behavior. There is no reliable way to verify the information offered.
Summary
Despite of the shame on Ashley Madison users, the fact that community witch-hunts them online
and imposes their ideologies onto others is also a terrifying moral crucifixion that is worth
studying and should be brought into light. Interdisciplinary methods applied in this case may
contribute to protect users’ “rights to be forgotten”, however the fairness of conducting such
methods simultaneously can not be guaranteed.
Download