Moral Complexity Of Hackers Essay

Improved Essays
Moral Complexity of Hackers Before taking this course, there was a simple understanding of the terms “black hats”, “grey hats”, and “black hats”; white hackers are good, grey hackers are a mix of good and bad, and black hats are evil. However I learned that these terms are more complicated; white hats work to sure up computer systems, grey hats shows system vulnerabilities, and black hats go after systems for personal gain (Conran 42). In addition, I had only heard of the term hacktivist once, much less was I able to define it and categorize it within the label, black hat. Yet, both these views and understanding have changed during this course. Contrary to my previous belief, the label does not mean that these sub-groups are always morally …show more content…
For instance, hacktivists have released bystander’s personal information as a means to punish and call attention to an issue. (Vamosi, “How Hacktivism Affects Us All”) Furthermore, they have attacked those who have not diminished their free speech, but simply oppose their personal views (Vamosi, “How Hacktivism Affects Us All”). Yet, the amount of damage which hacktivists create can vary with the types of attacks; as Dahan states, the attack could be web defacing or crashing the site, entirely (Dahan, “Hacking for the Homeland”). This becomes problematic for everyone when the damage, which the hacktivists cause, overshadows a positive objective. Unfortunately, different hackers see different moral boundaries in the attempt to achieve the end goal. Furthermore, this hacktivist stereotype is further fed if the hackers hold the view that Pierluigi mentions, “Those members [certain Anonymous members] that act just to refuse any social rules… profess themselves anarchists, they operate to destroy and create chaos” (“Anonymous Ethical code. Back to the origins”). No one can deny the immorality of certain actions done by activists, but some appear to be ignorant of the positive …show more content…
An important principle that applies to this issue is the belief that “…the purpose of morality is to make life better by increasing the amount of good things… and decreasing the amount of bad things” (Nathanson “Act and Rule Utilitarianism”). Through this, one can see how hacktivists are capable of both good and bad. When considering Anonymous’ attacks on ISIS (Anonymous attacks ISIS supporters online”, it could be justified in Utilitarianism since it is, as Mill states, “…to prevent harm to others” (qtd. in Hansson, 735). Action is not allowed simply because of the terrorists lack of morality however; it is only done because of the effect it has on others. Yet, the law also has a right to imprison certain hacktivists because of their effect on others. One could us the release of bystanders’ personal information (Vamosi, “How Hacktivism Affects Us All”) as a reason to go after similar hacktivists, due to the damage that they caused to other people. Unfortunately, some hacktivists infringe on others right of politics (Vamosi, “How Hactivisism Affects Us All”) when they seek to have a voice and encourage human rights and politics (Dahan, “Hacking for the Homeland”). Not only is this hypocritical, it also goes against Utilitarianism since Mill states that free speech is a right as long as it is not “…a positive instigation to some mischievous act” (Hansson

Related Documents

  • Improved Essays

    Think like a Hacker, Defend like a Professional The theme of this article might sounds confusing due to the fact that most people will interpret the word “hacker” as a term used to refer to the malicious guys who always find ways to steal user information and financial details. We are not trying to give you any bad intentions about the actual meaning of “hacker” whatsoever. The original meaning is neutral and does not identify anyone as a bad person. Literally, any technology enthusiasts who enjoy analyzing technology and tricking the process to perform functions that is different from the original function can be referred to as a hacker. Of course, their goals might be different, which is the reason why hackers are categorized into three…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Hackers uses this collecteddata to find a way which will help them executing an attack on the Operating System, Installed Software, Open Ports, IP Addresses or user accounts. Hacker uses this accumulated informationfor gaining access to the system which is the third phase of ethical hacking. They do tedious amount of work to break the passwords and often utilizes tools like legion. Only gaining access to the system isn 't everything, but to maintain their access in it, they develops a different system paththrough which he can intrude the system as an anonymous. Thisanonymous hacker does its best toremove all the evidences of the system thats being hack, defy the intrusion detection alarms and thus avoid any form of legal actions against him.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    However, with such methods comes conflict and opposition. One controversial method of protest is “hacktivism”, a combination of the words “hacking” and “activism”. This term refers to the act of hacking or breaking into a computer system for a politically or socially motivated purpose. Many times, it is difficult for activists in small numbers to make a large impact or any impact at all, so some take to hacking in order to further their agenda and bring awareness to their cause. This includes taking down and blocking websites, or document dropping, which refers to releasing personal information of a target, usually business executives or political leaders.…

    • 1703 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    While it can lead to creativity, it can also lead to irrational acts and extreme misinterpretations as well as miscommunication between the people. Jihadists are a current example of such nonconformists with the negative connotation that Beatty perceives them as. They commit violent acts of terrorism but claim to be following the teachings of the Quran. In the novel, Beatty views all protesters as wicked individuals, looking to do harm and having the capacity to rebel with acts of savagery. If everyone thinks differently then the lasting results will not be peaceful.…

    • 1001 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The rise in technology in this era brought both benefits and problems to the world. One of the problems society is facing right now is cyberbullying. Cyberbullying is the act of bullying that occurs online. Cyberbullying has a very broad definition which leads to many people misinterpreting it and giving it their own definition. The misinterpretation of the term makes it appear much worse than it actually is and causes society to worry and be unnecessarily cautious.…

    • 1288 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Cyberbullying is hurtful and to do nothing about it is unacceptable. Despite that, there are the action plans set in place to stop cyberbullying. Are they doing too much or not enough? Suzanne Phillips the writer of “Cyberbullying is dangerous” believes to deal with the problem with more prevention and control. Tim Cushing the writer of “cyberbullying problem is overhyped” speaks of them doing too much and actually causing more harm than good.…

    • 775 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    People found guilty of the crime can be penalized strictly. It is a fact that one usually does a lot of downloading from different websites, thus a pirate is very susceptible to downloading a Trojan or spyware .If he is caught, and the company decides to press charges, this can lead to stiff fines and prison time. It is like you are taking the product of another person without prior permission or payment to the owner. Risky: Pirated software can be easily infected with serious computer viruses, which can damage the user's computer system. If we acquire a fake software, and it suddenly crashes, we will not be able to complain about the defective purchase as it's fake.…

    • 2800 Words
    • 12 Pages
    Great Essays
  • Improved Essays

    Defamation on social media should be sued because it spreads negativity to the society, trespasses someone’s privacy and destroys the future of someone. The first reason why legal action should be taken for defamation on social media is because it spreads negativity to the…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Terrorism cannot be defined by one uniform definition. There are many different circumstances the prevent this. Each terrorist group has their own set of ideals, customs, means and motives. The reason they carry out criminal acts is because they believe they have been wronged. In the eyes of the organization, the only thing that will fix the injustices brought upon the is a public display of violence.…

    • 1267 Words
    • 5 Pages
    Improved Essays

Related Topics