Difference between revisions of "Ethics in Hacking"

From SI410
Jump to: navigation, search
(Ethics of Cyber Attacks)
Line 11: Line 11:
  
 
===Ethics of Cyber Attacks===
 
===Ethics of Cyber Attacks===
The ethical grounds for a cyber attack should be based on warfare. The attacks are criminal by nature. Since computer information is not tangable like food, there isn't a necessity for such cyber crime. The role of war in the cyber attack can vary. There are war's against private information like wikileaks<ref> wikileaks </ref>, warfare against countries known as cyber warfare <ref> espionage </ref>, or even personal wars against large corporations like the attacks on facebook and sony. John Arquilla stated that "war and terror have grown more 'thinkable' and ethically acceptable due to the rise of disruptive, cyberspace-based means of attack"<ref> textbook pg 134 <ref>. Cyber crime is a form of warfare and repeated exposure understandably makes physical warfare a more acceptable concept.
+
The ethical grounds for a cyber attack should be based on warfare. The attacks are criminal by nature. Since computer information is not tangable like food, there isn't a necessity for such cyber crime. The role of war in the cyber attack can vary. There are war's against private information like wikileaks<ref> wikileaks </ref>, warfare against countries known as cyber warfare <ref> espionage </ref>, or even personal wars against large corporations like the attacks on facebook and sony. John Arquilla stated that "war and terror have grown more 'thinkable' and ethically acceptable due to the rise of disruptive, cyberspace-based means of attack"<ref> textbook pg 134 </ref>. Cyber crime is a form of warfare and repeated exposure understandably makes physical warfare a more acceptable concept.
  
  
Line 17: Line 17:
 
Anonymous attacks sony <ref>www.pcmag.com/article2/0,2817,2383018,00.asp</ref>
 
Anonymous attacks sony <ref>www.pcmag.com/article2/0,2817,2383018,00.asp</ref>
 
Nissan is hacked <ref>bits.blogs.nytimes.com/2012/04/24/nissan-is-latest-company-to-get-hacked/</ref>
 
Nissan is hacked <ref>bits.blogs.nytimes.com/2012/04/24/nissan-is-latest-company-to-get-hacked/</ref>
 
  
 
==Information Hacks==
 
==Information Hacks==

Revision as of 17:06, 11 October 2012

The Ethics in Hacking article will look at the ethical grounds hacking. The good points on hacking, like how it can be beneficial, and how hacking can affect society in a bad way. Also the dissection of previous hacks and their ethical issues.

Hackers

"Yes, I am a criminal. My crime is that of curiosity" [1].. Written by someone called The Mentor, "The Hacker Manifesto" strikes against criminal accusations to hackers. By The Mentor's definition, a hacker is a curious person about information. But by the definition of the public media of the 90's, hackers are cyber criminals who steal information and cause public mischief[2][3][4]. According to the 1960's MIT's Tech Model Railroad Club, they're a bunch of pranksters who enjoy programming[5]. The linking details between them all are computers and the digital era.

Ethical grounds of Hacks

Cyber Attacks

computers. services. websites. banks. Cyber attacks are conscience decisions to get unauthorized access to a computer system. Usually they are "cyberspace-based forms of strategic attack, designed to cause costly, crippling disruptions"[6]. The attacks are also done to steal information such as social security numbers, bank accounts, and private data.

Ethics of Cyber Attacks

The ethical grounds for a cyber attack should be based on warfare. The attacks are criminal by nature. Since computer information is not tangable like food, there isn't a necessity for such cyber crime. The role of war in the cyber attack can vary. There are war's against private information like wikileaks[7], warfare against countries known as cyber warfare [8], or even personal wars against large corporations like the attacks on facebook and sony. John Arquilla stated that "war and terror have grown more 'thinkable' and ethically acceptable due to the rise of disruptive, cyberspace-based means of attack"[9]. Cyber crime is a form of warfare and repeated exposure understandably makes physical warfare a more acceptable concept.


Examples of Cyber Attacks

Anonymous attacks sony [10] Nissan is hacked [11]

Information Hacks

{Privacy vs Open, Right to disbribute personal encryption software (why needed?)}

Ethics of Information Hacks

{Release info to the public, Release of Truth, Data Protection Act...}

Examples of Information Hacks

{Wikileaks, FBI hacks...}

Product Hacks

{Modifying products}

Ethics of Product Hacks

{Property ownership, IP...}

Examples of Product Hacks

{Microsoft Kinect, N64 Missile Component}

References

  1. The Mentor. The Hacker Manifesto. http://www.mithral.com/~beberg/manifesto.html.
  2. http://www.nytimes.com/1992/04/19/us/a-nationwide-computer-fraud-ring-is-broken-up.html
  3. http://www.nytimes.com/1992/07/07/nyregion/2d-jail-term-looms-for-man-who-plundered-a-foundation.html
  4. http://www.nytimes.com/1990/01/24/us/from-hacker-to-symbol.html?pagewanted=all&src=pm
  5. Chapter 1 of Levy, Steven. Hackers. Sebastopol, Calif.: O'Reilly Media, 2010.
  6. John Arquilla textbook pg 134
  7. wikileaks
  8. espionage
  9. textbook pg 134
  10. www.pcmag.com/article2/0,2817,2383018,00.asp
  11. bits.blogs.nytimes.com/2012/04/24/nissan-is-latest-company-to-get-hacked/