Difference between revisions of "Ethics in Hacking"

From SI410
Jump to: navigation, search
Line 5: Line 5:
  
 
==Hackers==
 
==Hackers==
The word hacking, as of the late 20th and early 21st century, brings together notions of cyber-criminality or mischievous internet activity. As a verb, the word in realm of technology refers to:<ref>http://www.merriam-webster.com/dictionary/hacking</ref>
+
The word hacking, as of the late 20th and early 21st century, brings together notions of cyber-criminality or mischievous internet activity. As a verb, the word in realm of technology refers to:<ref>[http://www.merriam-webster.com/dictionary/hacking merriam-webster Definition: Hacking]</ref>
 
*a. to write computer programs for enjoyment.
 
*a. to write computer programs for enjoyment.
 
*b. to gain access to a computer illegally.
 
*b. to gain access to a computer illegally.
  
"Yes, I am a criminal. My crime is that of curiosity" <ref>The Mentor. The Hacker Manifesto. http://www.mithral.com/~beberg/manifesto.html.</ref>. Written by someone called The Mentor, "The Hacker Manifesto" was written to be an essay against criminal accusations to [[hackers]]. By The Mentor's definition, a hacker was a curious person about information. But by the definition of the public media of the 1990's, hackers were cyber criminals who stole information and caused public mischief<ref>http://www.nytimes.com/1992/04/19/us/a-nationwide-computer-fraud-ring-is-broken-up.html</ref><ref>http://www.nytimes.com/1992/07/07/nyregion/2d-jail-term-looms-for-man-who-plundered-a-foundation.html</ref><ref>http://www.nytimes.com/1990/01/24/us/from-hacker-to-symbol.html?pagewanted=all&src=pm</ref>. According to the 1960s MIT's Tech Model Railroad Club, hackers were a bunch of pranksters who enjoyed programming<ref> Chapter 1 of Levy, Steven. Hackers. Sebastopol, Calif.: O'Reilly Media, 2010.</ref>. The linking details between the concept of hackers were computers and the digital era.
+
"Yes, I am a criminal. My crime is that of curiosity" <ref>The Mentor. The Hacker Manifesto. [http://www.mithral.com/~beberg/manifesto.html www.mithral.com]</ref>. Written by someone called The Mentor, "The Hacker Manifesto" was written to be an essay against criminal accusations to [[hackers]]. By The Mentor's definition, a hacker was a curious person about information. But by the definition of the public media of the 1990's, hackers were cyber criminals who stole information and caused public mischief<ref>http://www.nytimes.com/1992/04/19/us/a-nationwide-computer-fraud-ring-is-broken-up.html</ref><ref>http://www.nytimes.com/1992/07/07/nyregion/2d-jail-term-looms-for-man-who-plundered-a-foundation.html</ref><ref>http://www.nytimes.com/1990/01/24/us/from-hacker-to-symbol.html?pagewanted=all&src=pm</ref>. According to the 1960s MIT's Tech Model Railroad Club, hackers were a bunch of pranksters who enjoyed programming<ref> Chapter 1 of Levy, Steven. Hackers. Sebastopol, Calif.: O'Reilly Media, 2010.</ref>. The linking details between the concept of hackers were computers and the digital era.
  
 
[[File:Anonymous-hacking-Julian--008.jpg‎|thumb|300px|right|Supporter of Anonymous protests in London Photograph: Mike Kemp/In Pictures/Corbis]]
 
[[File:Anonymous-hacking-Julian--008.jpg‎|thumb|300px|right|Supporter of Anonymous protests in London Photograph: Mike Kemp/In Pictures/Corbis]]

Revision as of 13:54, 11 December 2012

"Ethics in Hacking" explores ethical questions and topics concerned with the pair hacking and electronics. The act of hacking is above an array ethical issues such as privacy concerns, the question of acceptable cyberwarfare, how cyber criminal activity should be handled by the legal system, and the rights to full use of purchased goods.


Passwords can be retrieved by analyzing through packets of sent data through a network

Hackers

The word hacking, as of the late 20th and early 21st century, brings together notions of cyber-criminality or mischievous internet activity. As a verb, the word in realm of technology refers to:[1]

  • a. to write computer programs for enjoyment.
  • b. to gain access to a computer illegally.

"Yes, I am a criminal. My crime is that of curiosity" [2]. Written by someone called The Mentor, "The Hacker Manifesto" was written to be an essay against criminal accusations to hackers. By The Mentor's definition, a hacker was a curious person about information. But by the definition of the public media of the 1990's, hackers were cyber criminals who stole information and caused public mischief[3][4][5]. According to the 1960s MIT's Tech Model Railroad Club, hackers were a bunch of pranksters who enjoyed programming[6]. The linking details between the concept of hackers were computers and the digital era.

Supporter of Anonymous protests in London Photograph: Mike Kemp/In Pictures/Corbis

Cyber Attacks

Cyber attacks are conscious decisions to get unauthorized access to a computer system. Usually they are "cyberspace-based forms of strategic attack, designed to cause costly, crippling disruptions"[7]. The attacks are also done to steal information such as social security numbers, bank accounts, and private data.

Ethics of Cyber Attacks

The ethical grounds for a cyber attack should be based on warfare. The attacks are criminal by nature. Since computer information is not tangible like food, there isn't a necessity for such cyber crime. The role of war in the cyber attack can vary. There are wars on private information like Wikileaks[8], wars against countries known as cyber warfare [9], or even personal wars against large corporations like the multiple attacks on Sony[10]. John Arquilla stated that "war and terror have grown more 'thinkable' and ethically acceptable due to the rise of disruptive, cyberspace-based means of attack"[11]. Cyber crime is a form of warfare and repeated exposure understandably makes physical warfare a more acceptable concept.

Examples of Cyber Attacks

Anonymous (group), a group of hackers against censorship of information attacked Sony websites in response to the persecution of fellow hackers who reverse engineered some of the Playstation 3 technology. Anonymous sent a warning to Sony declaring the attack because of the infringement of "free speech and Internet freedom"[12]. Sony was forced to shutdown their Playstation 3 network in order to repair the damages and fix the network. Shortly after the network was back online, LulzSec hacked Sony's photography website[13]. During the same month as the Sony hacks by Anonymous, Nissan systems were attacked by unknown hackers seeking further access to their networks. The hackers stole usernames and passwords from their databases and left a cold trace for authorities. [14]

Wikileaks is a website that releases confidential government documents without consent.

Information Hacks

Hacks for information seek to uncover the unknown. The subjects of such hacks range from celebrities to government's databases. Because of these vulnerabilities, private data encryption software was developed to conceal and protect data transmitted over the internet. The altogether driving concepts of these hacks are privacy and what pieces of information should not be open to the general public.

Ethics of Information Hacks

The internet has given the computer age the ability to distribute information with ease. Facebook and Twitter are venues for the general public to share information about themselves. There is information that users of Social Networking Services would like to keep a secret, for example personal details about their lives. A common battle ground for information hacks is the target's cell phone where private messages, account details, emails, and images are often stored[15]. The privacy battles have been waged not only by the public but governments as well. Cases against privacy from the government are the rights of personal encryption data distribution (Bernstein v. US Department of Justice)[16] and a probable cause needed to track people using cell phone data (USA v. Pen Register)[17].

Examples of Information Hacks

Wikileaks supporters supply the website with leaked information in a variety of ways. One of those ways is through the hacking of emails, cellphones, and personal accounts of political officials such as Sarah Palin's email account[18]. Another case is when a Chinese hacker gained access to Indian Military information and Tibetan activist's personal accounts[19]

See Also

References

  1. merriam-webster Definition: Hacking
  2. The Mentor. The Hacker Manifesto. www.mithral.com
  3. http://www.nytimes.com/1992/04/19/us/a-nationwide-computer-fraud-ring-is-broken-up.html
  4. http://www.nytimes.com/1992/07/07/nyregion/2d-jail-term-looms-for-man-who-plundered-a-foundation.html
  5. http://www.nytimes.com/1990/01/24/us/from-hacker-to-symbol.html?pagewanted=all&src=pm
  6. Chapter 1 of Levy, Steven. Hackers. Sebastopol, Calif.: O'Reilly Media, 2010.
  7. Floridi, Luciano, ed. The Cambridge Handbook of Information and Computer Ethics. Cambridge, UK: Cambridge UP, 2010. Print. pg 134
  8. http://www.bbc.co.uk/news/world-us-canada-11858637
  9. http://www.zdnet.com/blog/security/richard-clarke-china-has-hacked-every-major-us-company/11125
  10. http://abcnews.go.com/blogs/technology/2011/10/sony-playstation-network-hacked-again-closes-93000-accounts/
  11. Floridi, Luciano, ed. The Cambridge Handbook of Information and Computer Ethics. Cambridge, UK: Cambridge UP, 2010. Print. pg 134
  12. http://www.pcmag.com/article2/0,2817,2383018,00.asp
  13. http://www.guardian.co.uk/technology/2012/aug/29/lulzsec-hacker-arrest-sony-attack
  14. bits.blogs.nytimes.com/2012/04/24/nissan-is-latest-company-to-get-hacked/
  15. http://www.nytimes.com/2011/06/08/world/europe/08london.html
  16. Floridi, Luciano, ed. The Cambridge Handbook of Information and Computer Ethics. Cambridge, UK: Cambridge UP, 2010. Print. pg 123
  17. Floridi, Luciano, ed. The Cambridge Handbook of Information and Computer Ethics. Cambridge, UK: Cambridge UP, 2010. Print. pg 123
  18. http://topics.nytimes.com/top/reference/timestopics/organizations/w/wikileaks/index.html
  19. http://www.nytimes.com/2012/03/30/technology/hacking-in-asia-is-linked-to-chinese-ex-graduate-student.html?pagewanted=all&_r=0

(back to index)