To start with the obvious, ethical methods are acceptable, while unethical methods are not. The challenge is developing principles to distinguish between the two. As there are too many possible methods to address, I will focus on commonly used methods.
One ethical method is gathering information using publicly available methods. information One obvious example is acquiring publicly available voting records for politicians. Other examples include gathering information through requests for public documents, searching through public sites such as YouTube, Facebook and Twitter. As a final example, interviewing people who agree to be interviewed would, in general, be ethical. While there is an overlap between methods and sources, there are important distinctions that require considering them separately. Methods are how you get information. Sources are where it comes from. While methods are used on sources, there can be a difference in their ethics. An ethical method might be used to get information from a morally problematic source, or an unethical method might be used to gather information from a morally unproblematic source.
Research methods become potentially more morally controversial the further one strays from publicly available methods. To use an analogy, looking at what a person is doing in public is (generally) not morally problematic. Peeping into their house from the sidewalk raises some moral concerns and hiding cameras in their bedroom is clearly wrong. As the analogy suggests, the methods become more morally problematic when they involve breaching the wall of privacy. While it might be tempting to regard all such methods as immoral, it will be argued that this is not the case: there are morally acceptable methods that breach this wall. To use an analogy, reporters engaged in legitimate reporting can justly break the walls of privacy.
In some cases, the desired information is not accessible by publicly available means, but the methods are still morally acceptable. For example, it is acceptable to privately interview sources who willingly talk to the researchers but would be unwilling to be interviewed in public view on, for example, the news.
In other cases, the methods used to breach the wall of privacy would be morally unacceptable. Likely examples include hacking, bribery, theft, and using intimidation or deceit. While these examples provide some limited guidance, what is needed is a more general principle. It is natural enough to seek guidance from the law.
While legality is not the same as morality, the use of illegal methods such as hacking, theft, threat and bribery and so on are morally problematic. In many cases of illegal methods, such as theft and hacking, there are independent moral arguments that establish such actions as wrong (over and above their illegality). It is, however, possible for morally acceptable methods of information gathering to be against the law. For example, a repressive state (such as Florida) might pass laws to shield the activities of politicians from the public. As other examples, there are laws that hide the identity of campaign contributors or impose draconian non-disclosure agreements. As such, the law is not a perfect guide to morality but does provide a useful starting point.
Because most information is now digital, one method of concern is hacking (broadly construed). For the sake of simplicity, this can also be taken to include such things as phishing and other methods that are not, strictly speaking, hacking. This method includes various means of gaining access to digital information without the permission of the owner.
The various methods that breach the wall of privacy could be morally justified on utilitarian grounds. To illustrate, if a candidate had child pornography on his laptop, then it could be argued that hacking into his laptop would be morally justified because doing so could help keep a pedophile out of power. But this could be countered by arguing that this should be left up to law enforcement. The counter to that counter is that law enforcement can be selective about which criminals they decide to pursue.
Another approach is arguing that the citizens’ right to know justifies the use of means that would otherwise seem unethical. To use an analogy, a person’s privacy rights do not (in general) permit them to hide their crimes from the police. There can, of course, be clear exceptions in cases involving tyrannical laws or oppressive policing. Likewise, a political candidate (broadly defined) does not have a right to privacy when it comes to their misdeeds that voters have a right to know. For example, it could be argued that opposition researchers would be acting ethically by stealing documents from a corrupt politician that prove their corruption.
The obvious counter to such reasoning is that opposition researchers are not law enforcement (or moral enforcement). They are members of the public and lack any special moral right to use such methods. If they suspect that something bad is occurring, they should refer the matter to the appropriate authorities. The danger of citizens taking such research into their own hands is illustrated by the case of a concerned citizen who decided to investigate rumors that Hillary Clinton and other Democrats were operating a slavery ring in the basement of a pizza shop. During this “investigation” no one was hurt, but the “investigator” fired shots. As such, if something is bad enough to seem to justify using morally problematic methods, then the matter should be referred to the police (assuming they are not corrupt) and, where appropriate, to the press. But, once again, there can be situations where the authorities are unwilling to do anything even when crimes have been committed.
In the next essay, I will look at the ethics of sources.