Is Hacktivism Morally Permissible?
In Himma’s terms, “hacktivism will be understood as involving unauthorized digital intrusions for the purpose of protesting some injustice or advancing some political agenda.” (Himma 14) An unauthorized digital intrusion is the manipulation of computers and networks belonging to someone else who in turn has their property rights violated. (Himma 1) Himma argues hacktivism is morally impermissible if and only if it harms innocent people or if the hacktivist stays anonymous in relation to the act, through three premises in Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? In this paper I am going to explore Himma’s argument and object to his premise that the amount of harm that is produced by an act of hacktivism depends on the moral nature of the attack and the moral standing of the victims. First Himma’s argues that, to determine if an act of hacktivism is morally justified depends on how much harm is done. Himma’s first premise shows that there is a possibility that some acts of hacktivism potentially can be morally permissible, but often acts labeled as hacktivism are not. For example, a harmful act of hacktivism that should not be considered morally permissible by Himma’s standard was when Sony experienced one of the most impactful hacktivist acts by LulzSec in April, 2011. LulzSec is an anarchist group that came up with an effective strategy of using social media and clever
Hacking has been perceived as a common act and scandal in news reporting. It involves widely accepted and ongoing controversy despite it reveals a variety of stories that are important and are behind the artificial facts. In the case of hacking in Dirty Politics, excerpts from private emails had been hacked from blogger Cameron Slater’s computer, which revealed some secrets and secret deals between Slater and some politicians in New Zealand. It therefore let the public know how Slater obtained and exposed some of the ‘big secrets’ of the left politicians, and doubt the objectivity of the blog and the direction of the voice. It argues that the hacking act was justifiable because exposing the activity they describe is in the public interest. This perspective is based on utilitarianism. However, the hacking issue in this case can be perceived differently via using different ethic concepts and approaches which depend on the standards used in different ethic concepts. Based on this understanding, the consequence of the hacking behaviour cannot be simply and solely used as an indicator to conclude this behaviour as morally right.
While we were having a discussion about hacking my ally happened to give a moral statement that Hacking is terrorism, since hackers obtain data illegally to cause violence thus all hackers should be decapitated like Osama Bin Laden since they are potentially able to cause world war III.
Our government would have everyone believe that these groups of Internet activists are terrorists. They use words like terrorists to incite public fear and make the public view these hackers as evil. The reason that governments do not like hacktivists is that hacktivists can access information that governments wanted to keep secret. One very well-known group of hacktivists is called Anonymous. Anonymous is a group that sets out to keep the government in check by using Internet. It’s highly unfortunate that groups like Anonymous have to wear a mask and hide their identity just to protest against what they believe is not right; the problem is some don’t see internet protesting this way. As one supporter states “….and ‘hackers’ are now ‘hacktivists,' presumed by wretched propagandists like Michael Moore to be committing acts of ‘patriotism’ rather than propagating wanton electronic vandalism, fraud, intimidation and theft” (Elmore). It is statements and ideas like this that make public protests such a dangerous activity. America is a republic, but in this republic everyone must agree with the ideals set down by politicians; if not, prison awaits
One would think that what happens online has little to no impact on the physical world and people’s daily lives. On the other hand, people you don’t know can’t harm you as well over the Internet, right? These questions are answered in, Expect Us where I talk about and elaborate upon the well-known online hacktivist collective, Anonymous. I wanted to have this paper really show the reader the impact that they have on the real world and what they stand for through various forms of imagery and explanation with all of the corruption going on right now, I thought this would be a good thing to talk about. I chose to show you the collective through the eyes of a current member who’s had an idea of what they do ever since he was a child. I find this important as the story goes on as the reader will see how even as he evolves from a child to adulthood, the idea sticks with him the entire
It is not a secret that some of the largest of United States events are skewed based upon media bias and general misinformation provided by the outlets. When a group of individuals uses their tools to create a blueprint for social change they use it as a call to arms for political and social activists to begin a non-physical clash with the oppressive force. This is exactly what Anonymous, a small organization of hacktivists fighting in the new medium, is all about. Hacktivism is defined as “ the nonviolent use for political ends of ‘illegal or legally ambiguous digital tools’ like website defacements, information theft, website parodies, DoS attacks, virtual sit-ins, and virtual sabotage”, which is exactly what Anon is doing (Hampson 514). They take lessons stemming
However, there is a significant portion of culprits aiming for secretive intellectual properties, much more than their Eastern European counterparts, whose goal is profit from toxic malwares (Kshetri 2013). Interestingly, Chinese intrinsic hackers hack for some noble causes such as patriotism, political and communal obligations (Kshetri 2013). Typical Chinese perpetrators are overwhelmingly males working individually. They are young amateurs, mostly 17 to 45 years old, with some still in junior high-school. They use toolkits, botnets predisposed online for petty crimes. Contrast to common belief, most don’t receive good education, usually high-school students, unemployed individuals, low-rank employees or manual workers. Group based cyber crimes, on the other hand, are more complicated. These groups are highly specialized, diversely scattered and horizontally organized. They are tailored to specific task-for-hire such as creating botnets or releasing Trojan malwares. Their members are located across China and work as equal with little to none hierarchical order. The interconnectedness and space-time boundlessness of cyber-world help them expand greatly, even passing through sovereign borders with one incident when Chinese hackers attacked the US conglomerate DuPont somewhere between 2009 and 2010. Due to the wild success of online frauds, many traditional criminal organizations have switched to Internet based operations. Some online groups go further and get backed up by legitimate corporates seeking extra profit under the table (Chan & Wang
Despite the numerous arrest and prosecutions of members of their networks, the hacktivists continued to be an integral internet activist within the international system.The state and other interested powers are keen to keep secrets of social injustice and hide the truth that may turn the masses against them. In this view, (Beck 3) observes that the widely supported legislative actions seeking to limit the operations and create a prosecution framework for hacktivists. On the same note,(Kelly) confirms that the despite the considerable use of the internet by individuals; it is still dominated by corporations. The internet is seen to provide a convenient meeting point for activists pushing for different interests to converge and come up with ways to fight against the government and influential businesses. Hacktivism provides a safe space for activists to breed and carry out their activities to the disadvantage of the state. As (Li 310) highlights, there are currently over forty statutes created for computer crimes. Principally, these legislations are
It can be argued that "hacktivist" group Anonymous can be considered to have adopted the typology of rebellion. Anonymous is "a large, decentralized group of individuals who share common interests and web haunts"¦They coordinate raids on forums"¦and ICQ chat rooms, among other venues" (Sharp). Anonymous' ideology can be found in their mission statement. The statement reads: We are an anonymous, decentralized movement which fights against censorship and copywrong" (Sharp). As such, Anonymous has continuously targeted organizations that aim to censor the distribution of digital
“We cannot defend ourselves with a weapon…but we can do this with their cars, homes, bars, brothels and everything else in their possession. It won’t be difficult; we all know who they are and where they are located.” Quoted from an Anonymous member. (Schiller, A.6.) Computer hacking began in the 1950s with an individual looking out for his own personal gains; like free phone calls for instance. The perception of hackers ever since has become very negative. Hacking has evolved over time, with many modern hackers following their own set of values that they believe are, arguably positive motives.
These types of hacktivist organizations believe that are performing acts of civil disobedience and exercising their right to free speech rather than vandalizing virtual private property. Yet, other hackers may engage in website defacement out of pure malice. Look at an example, a hacker may choose to break into a website's code and leave a message that indicates that the business affiliated with the page has closed its doors as a way to drive users away. Then the longer these messages stay up, the more people will see it and believe that this incorrect information is true and harming the website owners ("Website Monitoring & Server Monitoring Blog").
The resilient hacker-activist group Anonymous started out on an online based site for entertainment.Furthermore; the group began to establish more concrete goals towards political and social change. The team magnificently relies on and influences information technology to share and convey they are personal communicating to the whole web world. This paper will provide awareness on Anonymous 's ideas, interpret these ideas and gauge the potential profits and significances, and regard security concerns that have been of conflict. The group 's recently established main agenda is to promote free speech and share of information, fight censorship and fight absurd intellectual property restrictions.To helps shed light on what this group is about: “And this I believe: that the free, exploring the thoughts of the people is the most valued in the world in Nevertheless, We would fight for the freedom of the mind to take any course it desires, aimless. And this I must battle against any idea, religion, or government which limits or destroys the individual.
This paper discusses the liberties, ideologies, and effects of hacktivism. Hacktivism, is the combination of hacking and activism, and is where a hacker creates a technology-centered disturbance with a political or social motive. Unlawful hackers typically cause cyber damage for amusement, or monetary gain. While traditional hackers are perceived as criminals, hacktivists are a transgressive group. Cyberterrorism is the most extreme version of hacking, where the goal is to cause permanent damage. There are benefits to hacktivism such as, anyone can log on and share their opinion, regardless of their location or position. However, some forms of hacktivism may be closer to cyberterrorism, where there may be a malicious intent. Controversy
Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. This term has been around since the 1980s, but never has it been more prevalent than now. It seems that not a week can go by without one of these online incidents appearing on the news. With technology advancing, it raises the following question: Are hacktivists beneficial or detrimental to society? After a careful analysis of the pros and cons, one side of this question becomes increasing favorable. Hacktivism is a good thing for society.
Though the acts of both fraud and sabotage are seen as old concepts that span human history, this modern form of cyber criminalization has become a relatively new concept in that it
Hacking In the Business Society From history we can observer that "human society" is easily influenced, and often mislead. There is a near endless amount of examples for this, ranging from the Suicidal Sect leaders (David Koresh http://www.rickross.com/reference/waco/waco321.html ), to mad dictators, with aspirations of taking over the world. This human susceptibility of being easily mislead, is clearly apparent when dealing with the issue of "Hacking", and "Hacking In the Business Society". The movie industry has played a great role in misinforming society of who a hacker is, and what they can do.