Moral Complexity Of Hackers Essay

Improved Essays
Moral Complexity of Hackers Before taking this course, there was a simple understanding of the terms “black hats”, “grey hats”, and “black hats”; white hackers are good, grey hackers are a mix of good and bad, and black hats are evil. However I learned that these terms are more complicated; white hats work to sure up computer systems, grey hats shows system vulnerabilities, and black hats go after systems for personal gain (Conran 42). In addition, I had only heard of the term hacktivist once, much less was I able to define it and categorize it within the label, black hat. Yet, both these views and understanding have changed during this course. Contrary to my previous belief, the label does not mean that these sub-groups are always morally …show more content…
For instance, hacktivists have released bystander’s personal information as a means to punish and call attention to an issue. (Vamosi, “How Hacktivism Affects Us All”) Furthermore, they have attacked those who have not diminished their free speech, but simply oppose their personal views (Vamosi, “How Hacktivism Affects Us All”). Yet, the amount of damage which hacktivists create can vary with the types of attacks; as Dahan states, the attack could be web defacing or crashing the site, entirely (Dahan, “Hacking for the Homeland”). This becomes problematic for everyone when the damage, which the hacktivists cause, overshadows a positive objective. Unfortunately, different hackers see different moral boundaries in the attempt to achieve the end goal. Furthermore, this hacktivist stereotype is further fed if the hackers hold the view that Pierluigi mentions, “Those members [certain Anonymous members] that act just to refuse any social rules… profess themselves anarchists, they operate to destroy and create chaos” (“Anonymous Ethical code. Back to the origins”). No one can deny the immorality of certain actions done by activists, but some appear to be ignorant of the positive …show more content…
An important principle that applies to this issue is the belief that “…the purpose of morality is to make life better by increasing the amount of good things… and decreasing the amount of bad things” (Nathanson “Act and Rule Utilitarianism”). Through this, one can see how hacktivists are capable of both good and bad. When considering Anonymous’ attacks on ISIS (Anonymous attacks ISIS supporters online”, it could be justified in Utilitarianism since it is, as Mill states, “…to prevent harm to others” (qtd. in Hansson, 735). Action is not allowed simply because of the terrorists lack of morality however; it is only done because of the effect it has on others. Yet, the law also has a right to imprison certain hacktivists because of their effect on others. One could us the release of bystanders’ personal information (Vamosi, “How Hacktivism Affects Us All”) as a reason to go after similar hacktivists, due to the damage that they caused to other people. Unfortunately, some hacktivists infringe on others right of politics (Vamosi, “How Hactivisism Affects Us All”) when they seek to have a voice and encourage human rights and politics (Dahan, “Hacking for the Homeland”). Not only is this hypocritical, it also goes against Utilitarianism since Mill states that free speech is a right as long as it is not “…a positive instigation to some mischievous act” (Hansson

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Villains are an interesting bunch in that the same person can be seen as both minor/major, or helpful/dangerous. I guess the same could be said about heroes though. Chuck Klosterman, a best selling author, wrote an essay titled “Electric Funeral,” a chapter of I Wear the Black Hat: Grappling with Villains (Real and Imagined), which details villains of today-different types of technocrats. The three “villains” he mainly focuses on are Perez Hilton, Kim Dotcom, and Julian Assange, who each vary greatly on the spectrum of their acts. Hilton is a blogger who likes to post photoshopped pictures and articles, Dotcom created Megaupload, a website to post copyrighted material illegally, and Assange is the head creator of WikiLeaks.…

    • 1254 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    DESPITE HIPPA’S HITECH ACT, CYBERATTACKS CONTINUE TO RISE HIPPA’s HITECH Act and the Omnibus rule were enacted to prevent data breaches in healthcare; however, healthcare data breaches are on the rise. Since its enactment in 1996, several provisions have been incorporated into the original Health Information Profitability and Accountability Act (HIPAA), one of which is the Health Information Technology for Economic and Clinical Health Act (HITECH): In 2009, The U.S. Department of Health and Human Services (HHS) enacted the American Recovery and Reinvestment Act, which includes the HITECH Act. On March 26,2013, HHS enacted a final Omnibus rule to implement several provisions of the HITECH Act. These provisions aim to strengthen the confidentiality…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    In the article “Internet Trolls” by Lisa Selin Davis, she talks about people who spread negativity on the internet. According to her article, people leave nasty comments on the internet because they feel like they are alone and can hide behind the computer. Also, they want to get a reaction out of people and gain attention, so they say harsh, hurtful comments. She believes people don’t think before they type. These “trolls” can be categorized into many different groups including: hackers, catfishers, and cyberbullies.…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The use of Distributed Denial of Service against MasterCard and Visa has facilitated a societal mind shift to a culture that values individual freedom. Clay Shirky said, “Authoritarian governments stifle communication among their citizens because they fear, correctly, that a better-coordinated populace would constrain their ability to act without oversight. ” This may have once been the case, but in recent years, governments have changed their stance on Internet freedom, with impact from hacktivist groups such as Anonymous. In January 2010, US Secretary of State Hillary Clinton outlined how the government would promote Internet Freedom within the USA and abroad . Clinton described freedom to access information, freedom to produce public media, and the freedom to converse with others.…

    • 849 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Oppressive rule by a foreign power. Voting booths only visited by white men who choose their fellow white man for political office. Horrific, unsafe working conditions and long hours. Prolongation of agonizing wars. Segregated schools, malls, and neighborhoods.…

    • 799 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Anonymouss Are Ethical

    • 871 Words
    • 4 Pages

    In this paper, I will argue that the group Anonymous aren’t criminals and their actions are ethical. I will argue that this thesis is true from the utilitarianism view; they are hacking for the good of the people. Some examples I will include are Project Chanology, Hal Turner, and Operation DarkNet. I will also consider the opposing position that Anonymous are bad and unethical. I will argue that it is mistaken because of misknowledge of the operations and what Anonymous’ purpose is.…

    • 871 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    To ensure a non-authoritarian state, individuals must be given more freedom to enable each person to have an impact on any event. In the past, freedom promised by democratic governments have been hampered by the government’s own fear of its people. In fact, the FBI has numerous black marks against itself. This is a result of a few individuals that overstepped their boundaries.…

    • 1170 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Peace Over Terror Terrorism in any light is a gruesome subject to contemplate. Terrorism rises many concerns in different people and allows feelings of fear to overwhelm a person. As humans on this Earth, pondering the thought of whether terrorism is morally permissible as a society is imperative to know. From a Utilitarian point of view, terrorism is not permissible under many accounts of which include the Greatest Happiness Principle, Gandhi's and Martin Luther King Jr.'s perspective on nonviolence.…

    • 712 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Today’s modern technology has provided a new platform for activists to advance their cause in a public forum. According to the Oxford dictionary, “Hacktivism” is defined as the act of a computer hacker whose goal is to promote a social or political cause. Hacktivism is the modern online version of traditional protests, rallies, and marches. Hacktivism acts reflect the same historical acts of civil disobedience that occurred during the Civil Rights Movement. Civil disobedience is the refusal to obey a law that violates an individual right, it is a state of resistance.…

    • 143 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays

Related Topics