18
Hacker Ethics Hacker Ethics Kim Bissett Kim Bissett Sabrina Short Sabrina Short

Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General Freedom of Information The web is not physical; it couldn’t be interpreted as property,

Embed Size (px)

Citation preview

  • Hacker EthicsKim BissettSabrina Short

  • Hacker Ethic: In GeneralFreedom of InformationThe web is not physical; it couldnt be interpreted as property, so it can be accessed by the publicSecurity/PrivacyHackers do not want a real-life Big Brother society (from Orwells 1984). During the 80s, they discovered a major flaw in a credit firm, where the general public did not know that the firm was collecting their information

  • Hackers do have ethics!Hackers maintain a trust system; the subculture operates in a tight networkHackers are not entirely good, nor are they just as bad.Intentions are based on utilitarianism (Mills)

  • Boundaries in the Hacker EthicThey can target government and corporate systems, but not those of an individual or a nonprofit organization. The cause of the organization is key.

    The hackers should share information with others within the group. They cannot brag, expose their knowledge to the outside world, spy on users, or trash systems.

  • Kevin MitnickHacked into the NORAD system in the 1980sConvicted and sent into prison on two occasions (1988 and 1995)On the second time, Mitnick broke into an email system (not known if he was spying on it, which would violate the hacker ethics.)If he was caught the first time, Mitnick should have kept a lower profile.Hackers get exposed to the mainstream, mostly by the government, when they disregard the secrecy set forth by the hacker ethic.

  • Cyberactivism and HacktivismCyberactivism is a form of protest that alerts society of social problems, such as poverty, through listservs, virtual sit-ins, and creating websites to attract the attention of the public.The computer is proving to be a new medium for the 21st century.

  • Cyberactivism and Hacktivism 2Hacktivism is the intentional vandalism of websites that do not support or alert the attention of social problems.Such political clash can cause jeopardy in national identity.This is an extreme form of cyberactivism, therefore it is not practiced as much.New protest techniques used in the WTO Protests,Battle in Seattle, in 1999.

  • Kants PhilosophyGerman philosopher Immanuel Kant (1724-1804) determined by the action rather than the intent or outcome. moral ideal that action out weighs consequence. All actions should be guided by moral laws, and these laws are universal.

  • Duty is what counts!what we want is of no importance; duty is what counts. Hacking into systems to gain knowledge of the software or to point out flaws is wrong, even if no damage is done to the system. Breaking and Entering- if you break into someones house, but dont take anything or break anything you are still committing a crime.Taking away a persons sense of security.

  • information IS propertyAccording to United Kingdom, with the Criminal Damage Act of 1971.Offender in the UK was convicted of property damage even though the property was not tangible and the damage could only be determined by the machine. The Computer Misuse Act of 1990 unauthorized access data modification makes crimes easier to prosecute.

  • Public InformationSome information on the internet is made accessible to the public.but should not be destroyed or edited without authorization. Other information that is not purposefully made accessible Account numbers and personal information should not be sought after regardless of ones intentions.

  • International LegislationInternational groups like the United Nations and the Council of Europe are writing legislation that applies internationally.Three types of Cybercrime as using a computer as a:target- spreading virusestool- using a computer to commit traditional crimes such as credit card fraudaccessory- to store illegal or stolen information.

  • Freedom of SpeechHacktivism violates peoples first amendment rights of Freedom of Speech. instead create you own website or blog rather than editing the site of a political group. According to Kant: no ones rights should be taken at the expense of anothers because all of mankind is equal.

  • Hidden SubcultureHackers design this subculture and trust system so they dont get caught. keep a low profiledont brag about what you are doing to people outside of the networkdont narc on a fellow hacker if you are caughtWhy?hackers know what they are doing is wrong and they develop a system of cultural norms to avoid prosecution.

  • what do YOU think?Hacking into government systems to point out security flaws without harm to the system?Ethical?Not Ethical?

    Hacking into a home computer to point out security flaws?Ethical?Not Ethical?

  • what do YOU think?A graduate student specializing in computer security creates a website similar to Northwest Airlines to demonstrate that terrorists can make fake boarding passes.Ethical?Not ethical?

  • what do YOU think?A data collecting company claims to keep certain information private, such as SSN and account numbers. A hacker discovers that the company did not keep its promise. The private information is actually published on the report. The hacker makes his findings public in a news outlet.Ethical?Not ethical?

  • what do YOU think?Hacking into the website of a political candidate and editing information because you disagree with his position?Ethical?Not Ethical?