Moral Complexity Of Hackers Essay

Improved Essays
Moral Complexity of Hackers Before taking this course, there was a simple understanding of the terms “black hats”, “grey hats”, and “black hats”; white hackers are good, grey hackers are a mix of good and bad, and black hats are evil. However I learned that these terms are more complicated; white hats work to sure up computer systems, grey hats shows system vulnerabilities, and black hats go after systems for personal gain (Conran 42). In addition, I had only heard of the term hacktivist once, much less was I able to define it and categorize it within the label, black hat. Yet, both these views and understanding have changed during this course. Contrary to my previous belief, the label does not mean that these sub-groups are always morally …show more content…
For instance, hacktivists have released bystander’s personal information as a means to punish and call attention to an issue. (Vamosi, “How Hacktivism Affects Us All”) Furthermore, they have attacked those who have not diminished their free speech, but simply oppose their personal views (Vamosi, “How Hacktivism Affects Us All”). Yet, the amount of damage which hacktivists create can vary with the types of attacks; as Dahan states, the attack could be web defacing or crashing the site, entirely (Dahan, “Hacking for the Homeland”). This becomes problematic for everyone when the damage, which the hacktivists cause, overshadows a positive objective. Unfortunately, different hackers see different moral boundaries in the attempt to achieve the end goal. Furthermore, this hacktivist stereotype is further fed if the hackers hold the view that Pierluigi mentions, “Those members [certain Anonymous members] that act just to refuse any social rules… profess themselves anarchists, they operate to destroy and create chaos” (“Anonymous Ethical code. Back to the origins”). No one can deny the immorality of certain actions done by activists, but some appear to be ignorant of the positive …show more content…
An important principle that applies to this issue is the belief that “…the purpose of morality is to make life better by increasing the amount of good things… and decreasing the amount of bad things” (Nathanson “Act and Rule Utilitarianism”). Through this, one can see how hacktivists are capable of both good and bad. When considering Anonymous’ attacks on ISIS (Anonymous attacks ISIS supporters online”, it could be justified in Utilitarianism since it is, as Mill states, “…to prevent harm to others” (qtd. in Hansson, 735). Action is not allowed simply because of the terrorists lack of morality however; it is only done because of the effect it has on others. Yet, the law also has a right to imprison certain hacktivists because of their effect on others. One could us the release of bystanders’ personal information (Vamosi, “How Hacktivism Affects Us All”) as a reason to go after similar hacktivists, due to the damage that they caused to other people. Unfortunately, some hacktivists infringe on others right of politics (Vamosi, “How Hactivisism Affects Us All”) when they seek to have a voice and encourage human rights and politics (Dahan, “Hacking for the Homeland”). Not only is this hypocritical, it also goes against Utilitarianism since Mill states that free speech is a right as long as it is not “…a positive instigation to some mischievous act” (Hansson

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    Cybercriminals are people who carry out cybercrimes utilizing the web, a PC and the system to execute violations. 6. What sorts of Hackers are there? White-cap programmers: hacks to test your framework unprotected against demonstrate a point Dark cap programmers: hacks your framework to for illicit purposes Dim cap programmers: hacks for the sake of entertainment and to flaunt yet will offer their administrations 7.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hard to argue otherwise. Of particular consequence, however, hacktivism requires doing something ‘potentially illegal’ based on speculation or conjecture. As Anonymous ‘suspects’ certain Twitter users to be ISIS recruiting syndicates, they still must properly ‘identify’ the ‘target’. Yet hactivism is about demonstrating a political injustice to socially mobilise, and organise, public reception and reaction. The reactionary formations themselves reshape the popular mode of conception and shift sociopolitical lines empowering individuals to affect change.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the article “Internet Trolls” by Lisa Selin Davis, she talks about people who spread negativity on the internet. According to her article, people leave nasty comments on the internet because they feel like they are alone and can hide behind the computer. Also, they want to get a reaction out of people and gain attention, so they say harsh, hurtful comments. She believes people don’t think before they type. These “trolls” can be categorized into many different groups including: hackers, catfishers, and cyberbullies.…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    NSA employee Edward Snowden made headlines worldwide when he defied government confidentiality laws to protect everyday citizens from losing the privacy promised to them under the Fourth Amendment (The New Yorker, 2013). In both these instances, civil disobedience was able to do something that blatant violence never could: open an honest dialogue about the state of our…

    • 701 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Criminals and Terrorist have similarities in the way they plan to commit crimes yet, there poses a distinct difference in the act of motivation. Criminals are usually motivated by greed; whereas, Terrorist are motivated by religious and political ideologies, which encompasses short and long-term goals (Clarke, R.V. & Newman, G. R., 2008). Some of the key components that are considered by Criminals and Terrorist include, the target of choice, the method and tools required to perform the act, and opportunity (Clarke, R.V. & Newman, G. R., 2008). Terrorism can come in many shapes, forms, and fashions; all of which are governed by the benefits of the act and the opportunity to attack. The degree and level of attack can pose damages that are far…

    • 775 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Peace Over Terror Terrorism in any light is a gruesome subject to contemplate. Terrorism rises many concerns in different people and allows feelings of fear to overwhelm a person. As humans on this Earth, pondering the thought of whether terrorism is morally permissible as a society is imperative to know. From a Utilitarian point of view, terrorism is not permissible under many accounts of which include the Greatest Happiness Principle, Gandhi's and Martin Luther King Jr.'s perspective on nonviolence.…

    • 712 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Today’s modern technology has provided a new platform for activists to advance their cause in a public forum. According to the Oxford dictionary, “Hacktivism” is defined as the act of a computer hacker whose goal is to promote a social or political cause. Hacktivism is the modern online version of traditional protests, rallies, and marches. Hacktivism acts reflect the same historical acts of civil disobedience that occurred during the Civil Rights Movement. Civil disobedience is the refusal to obey a law that violates an individual right, it is a state of resistance.…

    • 143 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The use of Distributed Denial of Service against MasterCard and Visa has facilitated a societal mind shift to a culture that values individual freedom. Clay Shirky said, “Authoritarian governments stifle communication among their citizens because they fear, correctly, that a better-coordinated populace would constrain their ability to act without oversight. ” This may have once been the case, but in recent years, governments have changed their stance on Internet freedom, with impact from hacktivist groups such as Anonymous. In January 2010, US Secretary of State Hillary Clinton outlined how the government would promote Internet Freedom within the USA and abroad . Clinton described freedom to access information, freedom to produce public media, and the freedom to converse with others.…

    • 849 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Include one (1) example for each crime in question to support your response. Terrorism and Political Theory Terrorism and Political Theory the use of violent acts to frighten the people in an area as a way of trying to achieve a political goal. Terrorist often apply extreme random acts of violence against innocent (e.g. attack on symbolic institutions, such as schools, churches, bombing of malls, and office buildings, and the killings of individuals that represent legitimate government such as soldiers, police officers, or political leaders), this is done to place fear in the general population. Ex: Digital crime: A video that was recorded and aired across digital and internet communication of the Jordanian pilot Lt. Muath al-Kasabeh being burned alive while trapped in a cage.…

    • 1361 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Villains are an interesting bunch in that the same person can be seen as both minor/major, or helpful/dangerous. I guess the same could be said about heroes though. Chuck Klosterman, a best selling author, wrote an essay titled “Electric Funeral,” a chapter of I Wear the Black Hat: Grappling with Villains (Real and Imagined), which details villains of today-different types of technocrats. The three “villains” he mainly focuses on are Perez Hilton, Kim Dotcom, and Julian Assange, who each vary greatly on the spectrum of their acts. Hilton is a blogger who likes to post photoshopped pictures and articles, Dotcom created Megaupload, a website to post copyrighted material illegally, and Assange is the head creator of WikiLeaks.…

    • 1254 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays

Related Topics