Ethics in Hacking

From SI410
Revision as of 19:13, 13 December 2012 by Akriesbe (Talk | contribs)

Jump to: navigation, search
Back • ↑Topics • ↑Categories


"Ethics in Hacking" explores ethical questions and topics concerned with the pair hacking and electronics. The act of hacking has an array ethical issues such as privacy concerns, the question of acceptable cyberwarfare, how cyber criminal activity should be handled by the legal system, and the rights to full use of purchased goods. Those who participate in any kind of hacking activity are called hackers. Hackers, whether in positive or negative context, constantly push the boundaries on ethical behavior over the internet raising new ethical concerns, redefine ethical standards, or reiterate unanswered questions.


Passwords can be retrieved by analyzing through packets of sent data through a network

Hackers

The word hacking, as of the late 20th and early 21st century, brings together notions of cyber-criminality or mischievous internet activity. As a verb, the word in realm of technology refers to:[1]

  • a. to write computer programs for enjoyment.
  • b. to gain access to a computer illegally.

"Yes, I am a criminal. My crime is that of curiosity" [2]. Written by Loyd Blankenship under the handle, "The Mentor," "The Hacker Manifesto" was written to be an essay against criminal accusations to hackers. By The Mentor's definition, a hacker was a curious person about information. But by the definition of the public media of the 1990's, hackers were cyber criminals who stole information and caused public mischief[3][4][5]. According to the 1960s Massachusetts Institute of Technology's Tech Model Railroad Club, hackers were a bunch of pranksters who enjoyed programming[6]. The linking details between the concept of hackers were computers and the digital era.

Supporter of Anonymous protests in London Photograph: Mike Kemp/In Pictures/Corbis

Cyber Attacks

Cyber attacks are conscious decisions to get unauthorized access to a computer system. Usually they are "cyberspace-based forms of strategic attack, designed to cause costly, crippling disruptions"[7]. The attacks are also done to steal information such as social security numbers, bank accounts, and other private data.

Ethics of Cyber Attacks

The ethical grounds for a cyber attack should be based on justified warfare. The attacks are criminal by nature as they either cause damage to another party or reveal sensitive information about another party. Since computer information is not tangible like food, there isn't a necessity for such cyber crime. The role of war in the cyber attack can vary. There are wars on private information like Wikileaks[8], wars against countries known as cyber warfare [9], or even personal wars against large corporations like the multiple attacks on Sony[10]. John Arquilla stated that "war and terror have grown more 'thinkable' and ethically acceptable due to the rise of disruptive, cyberspace-based means of attack"[11]. Cyber crime is a form of warfare and repeated exposure understandably makes physical warfare a more acceptable concept. Furthermore, as many civilian services are dependent on government computer networks, cyber warfare has the potential to cause more harm to civilians than previous warfare. Particularly civilians outside of combat zones.

Groups, like Anonymous, have also used such cyber attacks in ways in which they believe they are acting in a valiant manor for the common good, like a modern time Robin Hood. They create the notion that the end justifies the means, as they fight against acts and belief systems of governments and corporations that oppose their ethical compass. This can be seen in their threats and attacks to the Israeli and Syrian governement websites for the acts of regulating and blacking out the Internet to certain parts of the country, as the governments were trying to suppress communication of their actions or hinder the communications of the rebel forces.[12]

Examples of Cyber Attacks

Anonymous (group), a group of hackers against censorship of information attacked Sony websites in response to the persecution of fellow hackers who reverse engineered some of the Playstation 3 technology. Anonymous sent a warning to Sony declaring the attack because of the infringement of "free speech and Internet freedom"[13]. Sony was forced to shutdown their Playstation 3 network in order to repair the damages and fix the network. Shortly after the network was back online, LulzSec hacked Sony's photography website[14]. During the same month as the Sony hacks by Anonymous, Nissan systems were attacked by unknown hackers seeking further access to their networks. The hackers stole usernames and passwords from their databases and left a cold trace for authorities. [15] Recently the Anonymous hacking group carried out a series of direct denial of service attacks (better known as DDoS) against PayPal, MasterCard, Visa and other financial services corporations after their blockade on donations to the whistleblowing website WikiLeaks. [16]

Wikileaks is a website that releases confidential government documents without consent.

Information Hacks

Hacks for information seek to uncover the unknown. The subjects of such hacks range from celebrities to government's databases. Because of these vulnerabilities, private data encryption software was developed to conceal and protect data transmitted over the internet. The altogether driving concepts of these hacks are privacy and what pieces of information should not be open to the general public.

Ethics of Information Hacks

The internet has given the computer age the ability to distribute information with ease. Facebook and Twitter are venues for the general public to share information about themselves. There is information that users of Social Networking Services would like to keep a secret, such as personal details about their lives. A common battle ground for information hacks is the target's cell phone where private messages, account details, emails, and images are often stored[17]. The privacy battles have been waged not only by the public but governments as well. Cases against privacy from the government are the rights of personal encryption data distribution (Bernstein v. US Department of Justice)[18] and a probable cause needed to track people using cell phone data (USA v. Pen Register)[19].

Examples of Information Hacks

Wikileaks supporters supply the website with leaked information in a variety of ways. One of those ways is through the hacking of emails, cellphones, and personal accounts of political officials such as Sarah Palin's email account[20]. Another case is when a Chinese hacker gained access to Indian Military information and Tibetan activist's personal accounts[21]

See Also

References

  1. Merriam-Webster Definition: Hacking www.merriam-webster.com
  2. The Mentor. The Hacker Manifesto. www.mithral.com
  3. A Nationwide Computer-Fraud Ring Is Broken Up, 19 April 1992 www.nytimes.com
  4. 2d Jail Term Looms for Man Who Plundered a Foundation, Kathleen Teltsch, 7 July 1992 www.nytimes.com
  5. From Hacker to Symbol, John Markoff, 24 January 1990 www.nytimes.com
  6. Chapter 1 of Levy, Steven. Hackers. Sebastopol, Calif.: O'Reilly Media, 2010.
  7. Floridi, Luciano, ed. The Cambridge Handbook of Information and Computer Ethics. Cambridge, UK: Cambridge UP, 2010. Print. pg 134
  8. Wikileaks 'hacked ahead of secret US document release', 28 November 2010 www.bbc.co.uk
  9. Richard Clarke: China has hacked every major US company, Emil Protalinski, 27 March 2012 www.zdnet.com
  10. Sony PlayStation Network Hacked Again, Closes 93,000 Accounts, Ned Potter, 12 November 2011 abcnews.go.com
  11. Floridi, Luciano, ed. The Cambridge Handbook of Information and Computer Ethics. Cambridge, UK: Cambridge UP, 2010. Print. pg 134
  12. Timeline Of Anonymous And Affiliates Cyber Attacks huffingtonpost.com
  13. 'Anonymous' Attacks Sony in Support of PS3 Hackers, Sara Yin, 4 April 2011 www.pcmag.com
  14. LulzSec hacker arrested over Sony attack, Charles Arthur, 29 August 2012 www.guardian.co.uk
  15. bits.blogs.nytimes.com/2012/04/24/nissan-is-latest-company-to-get-hacked/
  16. 'Anonymous' hacker convicted over WikiLeaks revenge attack on PayPal, 7 December 2012 [1]
  17. British Tabloid Apologizes to Actress for Hacking, Sarah Lyall, 7 June 2012 www.nytimes.com
  18. Floridi, Luciano, ed. The Cambridge Handbook of Information and Computer Ethics. Cambridge, UK: Cambridge UP, 2010. Print. pg 123
  19. Floridi, Luciano, ed. The Cambridge Handbook of Information and Computer Ethics. Cambridge, UK: Cambridge UP, 2010. Print. pg 123
  20. WikiLeaks, Fareed Khan, 16 August 2012 topics.nytimes.com
  21. Case Based in China Puts a Face on Persistent Hacking, Nicole Perlroth 29 March 2012 www.nytimes.com
Back • ↑Top of Page