Difference between revisions of "Ethics in Hacking"

From SI410
Jump to: navigation, search
(Ethics of Cyber Attacks)
Line 16: Line 16:
  
 
==Information Hacks==
 
==Information Hacks==
{Privacy vs Open, Right to disbribute personal encryption software (why needed?)}
+
Hacks for information seek to uncover the unknown. The subjects of such hacks range from celebrities to governments databases. Software was developed to conceal and protect data transmitted over the internet, such as private data encryption, due to such attacks. The driving concept of these hacks are privacy and what information should not be open to the general public.
 +
 
 +
 
 
===Ethics of Information Hacks===
 
===Ethics of Information Hacks===
 +
The internet has given the computer age the ability to distribute information with ease. Facebook and twitter are venues for the general public to share information about themselves. There is information that users of such information distribution systems would like to keep a secret, for example personal details about their lives. The target of information hacks on people is information the subject of the attacks does not want the public to know. A common battle ground for information hacks is the target's cell phone where private messages, account details, emails, and images are often stored<ref>http://www.nytimes.com/2011/06/08/world/europe/08london.html</ref>.
 +
The privacy battles have been waged not only by the public but the government as well. Cases against privacy from the government are the rights of personal encryption data distribution (Bernstein v. US Department of Justice<ref>John Sullins textbook pg123</ref> and a probable cause needed to track people using cell phone data (USA v. Pen Register)<ref>John Sullins textbook pg123</ref>.
 
{Release info to the public, Release of Truth, Data Protection Act...}
 
{Release info to the public, Release of Truth, Data Protection Act...}
  

Revision as of 17:56, 11 October 2012

The Ethics in Hacking article will look at the ethical grounds hacking. The good points on hacking, like how it can be beneficial, and how hacking can affect society in a bad way. Also the dissection of previous hacks and their ethical issues.

Hackers

"Yes, I am a criminal. My crime is that of curiosity" [1].. Written by someone called The Mentor, "The Hacker Manifesto" strikes against criminal accusations to hackers. By The Mentor's definition, a hacker is a curious person about information. But by the definition of the public media of the 90's, hackers are cyber criminals who steal information and cause public mischief[2][3][4]. According to the 1960's MIT's Tech Model Railroad Club, they're a bunch of pranksters who enjoy programming[5]. The linking details between them all are computers and the digital era.

Cyber Attacks

computers. services. websites. banks. Cyber attacks are conscience decisions to get unauthorized access to a computer system. Usually they are "cyberspace-based forms of strategic attack, designed to cause costly, crippling disruptions"[6]. The attacks are also done to steal information such as social security numbers, bank accounts, and private data.

Ethics of Cyber Attacks

The ethical grounds for a cyber attack should be based on warfare. The attacks are criminal by nature. Since computer information is not tangable like food, there isn't a necessity for such cyber crime. The role of war in the cyber attack can vary. There are war's on private information like wikileaks[7], warfare against countries known as cyber warfare [8], or even personal wars against large corporations like the attacks on Sony[9]. John Arquilla stated that "war and terror have grown more 'thinkable' and ethically acceptable due to the rise of disruptive, cyberspace-based means of attack"[10]. Cyber crime is a form of warfare and repeated exposure understandably makes physical warfare a more acceptable concept.

Examples of Cyber Attacks

Anonymous attacks sony [11] Nissan is hacked [12]

Information Hacks

Hacks for information seek to uncover the unknown. The subjects of such hacks range from celebrities to governments databases. Software was developed to conceal and protect data transmitted over the internet, such as private data encryption, due to such attacks. The driving concept of these hacks are privacy and what information should not be open to the general public.


Ethics of Information Hacks

The internet has given the computer age the ability to distribute information with ease. Facebook and twitter are venues for the general public to share information about themselves. There is information that users of such information distribution systems would like to keep a secret, for example personal details about their lives. The target of information hacks on people is information the subject of the attacks does not want the public to know. A common battle ground for information hacks is the target's cell phone where private messages, account details, emails, and images are often stored[13]. The privacy battles have been waged not only by the public but the government as well. Cases against privacy from the government are the rights of personal encryption data distribution (Bernstein v. US Department of Justice[14] and a probable cause needed to track people using cell phone data (USA v. Pen Register)[15]. {Release info to the public, Release of Truth, Data Protection Act...}

Examples of Information Hacks

{Wikileaks, FBI hacks...}

References

  1. The Mentor. The Hacker Manifesto. http://www.mithral.com/~beberg/manifesto.html.
  2. http://www.nytimes.com/1992/04/19/us/a-nationwide-computer-fraud-ring-is-broken-up.html
  3. http://www.nytimes.com/1992/07/07/nyregion/2d-jail-term-looms-for-man-who-plundered-a-foundation.html
  4. http://www.nytimes.com/1990/01/24/us/from-hacker-to-symbol.html?pagewanted=all&src=pm
  5. Chapter 1 of Levy, Steven. Hackers. Sebastopol, Calif.: O'Reilly Media, 2010.
  6. John Arquilla textbook pg 134
  7. http://www.bbc.co.uk/news/world-us-canada-11858637
  8. http://www.zdnet.com/blog/security/richard-clarke-china-has-hacked-every-major-us-company/11125
  9. http://abcnews.go.com/blogs/technology/2011/10/sony-playstation-network-hacked-again-closes-93000-accounts/
  10. textbook pg 134
  11. www.pcmag.com/article2/0,2817,2383018,00.asp
  12. bits.blogs.nytimes.com/2012/04/24/nissan-is-latest-company-to-get-hacked/
  13. http://www.nytimes.com/2011/06/08/world/europe/08london.html
  14. John Sullins textbook pg123
  15. John Sullins textbook pg123