Reverse Engineering Ethical Analysis

Improved Essays
In this paper the writer will consider the moral and ethical implications of reverse engineering, competitive intelligence, and corporate espionage. This is a moral issue because it involves many facets and perspectives in which morality may be derived, justified, or altogether ill applied. Especially with respect to military projects in which corporate secretes may become important, and perhaps from a national security point of view, vital. This issue is relevant, especially in the in the modern age, because of the ease of access in which sensitive material may be gained. It must be noted that corporate espionage and reverse engineering knows no borders. The point of view being used in this analysis is the utilitarian perspective.
Sensitive documents are usually stored in a server, on a cloud, or on a personal computer. All of these can be hacked, or stolen by someone of an adequate skill level. Likewise, proprietary information can be gained from loop holes in existing law. For example law does not regulate or dictate gathering of trash via dumpster diving or simple spying. Many firms have participated in this
…show more content…
In 2002, there was an alleged leak of important information to a foreign intelligence service. Three people were apprehended in suspicion of leaking secret documents to Russian diplomats. Although Ericsson made the claim that no pertinent information was retrieved, the fallout of the situation suggest otherwise. Sweden expelled two Russian diplomats whom they considered to be directly linked to the espionage. Both Ericsson and the Swedish government are unwilling to disclose much further the details of the situation. As a repercussion the Russian government expelled two Swedish diplomats. Some see this as a return to ‘Cold War’ diplomacy by the Russians. One may now ask, what is the line for unethical information gathering by companies or

Related Documents

  • Decent Essays

    Hi Nadia, both my daughters are in radiology and I was in vascular ultrasound so your post was one I wanted to comment on. Specifically regarding the girl who felt uncomfortable answering if she was pregnant in front of her mother. I think the AART code of ethics number 5 addresses this situation. “The radiologic technologist assesses situations; exercises care, discretion, and judgment; assumes responsibility for professional decisions; and acts in the best interest of the patient” (AART standard of Ethics, 2015). The best interest of the patient at that moment was to understand her situation.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    In the case of the Cuban Missile Crisis, the NSA-CSS’s codebreakers and makers helped track Soviet intentions when the crisis threatened nuclear war. The NSA/CSS played a major role in the crisis by using Signals Intelligence and by gathering intelligence and providing it to the Central Intelligence Agency, the Department of Defense, and the executive branch before, during, and after the crisis. Not many of the United States Signals Reports have been declassified since the agency places concerns for its interpretation of “national security interests” above public discloser. But some of the reports from the Cuban Missile Crisis have been released so the people of the United States can gain a better understanding…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Personal Safety Dbq

    • 419 Words
    • 2 Pages

    Through careful research, and cautious examination of Documents A through F, we find that freedom is more important than personal safety. In Document…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The secret to success and sustainability of an entity or profession is the existence of rules and standards that ensure the high quality services and productivity. AHIMA Standards of Ethical Coding sets are based on the American Health Information Management Association's (AHIMA's) Code of Ethics. Both are playing an important role in determining the ethical principles and offering ethical guidelines. So AHIMA standards of ethical coding have a great impact not only on the health information management profession, but also on healthcare industry as a whole.…

    • 276 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ethics of Covert Operations In Chapter seventeen, Ethics of Covert Operations written by Loch K. Johnson, the author discusses the ethical values of covert operations and its guidelines. It is broken down into three sections: “Ladder of Escalation,” issues in covert operations, and guidelines for differentiating three operations, which are clandestine, counterintelligence, and covert. Each sections have their advantages and disadvantages when being used in intelligence operations. It also talks about concluding moral considerations to intelligence activities.…

    • 749 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Edward Snowden, the former subcontractor of the National Security Agency is a dishonorable traitor who threatened the welfare of The United States’ national security system. Through the works of prominent philosophers including, Ronald Dworkin, Thomas Hobbes, and Henry David Thoreau it provides an understanding of the importance of establishing a proper punishment while enforcing the prior precedent. These works are able to be applied to Edward Snowden’s case due to his avoidance of accepting the punishment for leaking classified information to the media. The information he revealed exposed the American government of participating in invasive surveillance practices against their own citizens. Snowden was charged under the Espionage Act, however,…

    • 1308 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In today’s society, technology plays a major role. With the increase in technology comes an apparent decrease in privacy. Ultimately, leading to the question of: when and under what circumstances should the government be able to access information encrypted on personal devices? Universal Law…

    • 534 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The utilitarian approach proves the ethical choice that produces the greatest excess of benefits over harm. Unsecured wireless networks are used daily by people across the World and it transmit a vast amount of information on systems that are easily intercept able from hackers. The unsecured wireless internet has caused an increase in the creation of virtual data doubles. This is someone whose identity is stolen and is now vulnerable. Many people do not realize that by using this connection allows you to have whatever you have searched open for view from almost anyone.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Fraud Under Section 1030

    • 674 Words
    • 3 Pages

    The CIA provides the clients with assurance of security services and guides policies for information security within an organization. When these three are compromised it results in reason consequences and it is punishable under the United States Justice Law. When there is loss of data, the availability of guaranteed reliable access to information by authorized people is nonexistent. Moreover, the integrity of the information whether it’s trustworthy or accurate after such intrusion requires verification and costs money to run certain forensic testing. Hence, when CIA is compromised such intruder must be punish severely for thousands of highly sensitive data is under…

    • 674 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In this paper the topics about ethics and privacy are going to be the main topics of discussion. Two businesses are going to be used in order to give examples about ethics and privacy. The bank Wells Fargo is going to be used to explained bad ethics and bad privacy. Wells Fargo has failed the code of ethics, and also violated their costumer’s privacy, because they used information that should have been used without the customer’s consent. The company Nike is going to be used to represent good ethics and good privacy, and what they do in order to be the amazing company they are today.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Over the past decade, the term fraud has been brought to the forefront of coding and billing practices. Upcoding, unbundling or billing for services that are not documented are serious concerns for practices and payers. In a release from the Centers for Medicaid and Medicare Services, it was revealed that up to 30% of claims paid contained errors. Almost half of these were due to insufficient documentation (Prophet & Hammen, 1998). Ethics plays a big role in every aspect of health care, especially in medical coding and billing.…

    • 1214 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In the hundred years since its entry into force, the Espionage Act of 1917 continues to raise debates about constitutionality and power of the government to limit speech. In answering my research questions, it revealed that defending free speech from the Espionage Act has led to scrutiny, defense, and interpretation beyond the original intent of the Act. The Supreme Court Cases outnumber, the Congressional amendments. Nevertheless, legal cases show the fight to protect the press and individuals First Amendment Rights. The evolution of judicial opinions shows the issue of separating political agenda from judicial interpretation.…

    • 328 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This has soured their relationship with political leaders of many countries. According to a credible newspaper, The Guardian, “Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted”. They learned this information from the documents uncovered by the whistleblower Edward Snowden. Many foreign officials were infuriated by this information and felt that the United States government has crossed a big line. There have been many exchange of word between the international diplomats over this issue.…

    • 1922 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Edward Snowden Crimes

    • 1758 Words
    • 8 Pages

    This information was used to investigate crimes that occurred within the United States and also to protect the freedoms of the internet. The actions of revealing this information by Snowden began debates and discussions about the legality and ethics of the tactics that the NSA uses, that has been discussed thoroughly since this event. These discussions also allowed not only citizens, but the government itself to learn more about how the NSA operates. The research done since the events in 2013 have produced notable results, but the ways the agency obtained these results are problematic to many. Although it is crucial for the NSA to fight foreign threats to national security, investigate domestic crime, and…

    • 1758 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Introduction This article, Building A “Backdoor” To The iPhone: An Ethical Dilemma, discusses Tim Cook, CEO of Apple, ethical dilemma to safeguard its customer’s trust and digital privacy or assist the U.S. government and the Federal Bureau of Investigation (FBI) to gain access to an iPhone device used by a terrorist to commit a heinous crime against society in the city of San Bernardino, California. In addition, evaluate methods in which managers with power and responsibilities characterized by Badaracco, an ethics professor at Harvard University, as the “dirty-hands problem” and the “right-versus-right” difficulties where “the moral dilemmas of management are, at bottom, clashes among different, conflicting moralities, among very different…

    • 1298 Words
    • 6 Pages
    Great Essays