18
Hacker Ethics Hacker Ethics Kim Bissett Kim Bissett Sabrina Short Sabrina Short

Hacker Ethics

  • Upload
    lajos

  • View
    79

  • Download
    5

Embed Size (px)

DESCRIPTION

Hacker Ethics. Kim Bissett Sabrina Short. Hacker Ethic: In General. Freedom of Information The web is not physical; it couldn’t be interpreted as property, so it can be accessed by the public Security/Privacy - PowerPoint PPT Presentation

Citation preview

Page 1: Hacker Ethics

Hacker EthicsHacker Ethics

Kim BissettKim BissettSabrina ShortSabrina Short

Page 2: Hacker Ethics

Hacker Ethic: In GeneralHacker Ethic: In General Freedom of InformationFreedom of Information

The web is not physical; it couldn’t be The web is not physical; it couldn’t be interpreted as property, so it can be accessed interpreted as property, so it can be accessed by the publicby the public

Security/PrivacySecurity/Privacy Hackers do not want a real-life Big Brother Hackers do not want a real-life Big Brother

society (from Orwell’s society (from Orwell’s 19841984). During the 80s, ). During the 80s, they discovered a major flaw in a credit firm, they discovered a major flaw in a credit firm, where the general public did not know that the where the general public did not know that the firm was collecting their informationfirm was collecting their information

Page 3: Hacker Ethics

Hackers do have ethics!Hackers do have ethics! Hackers maintain a Hackers maintain a

trust system; the trust system; the subculture operates in subculture operates in a tight networka tight network

Hackers are not Hackers are not entirely good, nor are entirely good, nor are they just as bad.they just as bad.

Intentions are based Intentions are based on utilitarianism on utilitarianism (Mills)(Mills)

Page 4: Hacker Ethics

Boundaries in the Hacker EthicBoundaries in the Hacker Ethic They can target government They can target government

and corporate systems, but not and corporate systems, but not those of an individual or a those of an individual or a nonprofit organization. The nonprofit organization. The cause of the organization is cause of the organization is key.key.

The hackers should share The hackers should share information with others within information with others within the group. They cannot brag, the group. They cannot brag, expose their knowledge to the expose their knowledge to the outside world, spy on users, or outside world, spy on users, or trash systems.trash systems.

Page 5: Hacker Ethics

Kevin MitnickKevin Mitnick Hacked into the NORAD system in the 1980sHacked into the NORAD system in the 1980s Convicted and sent into prison on two occasions Convicted and sent into prison on two occasions

(1988 and 1995)(1988 and 1995) On the second time, Mitnick broke into an email On the second time, Mitnick broke into an email

system (not known if he was spying on it, which system (not known if he was spying on it, which would violate the hacker ethics.)would violate the hacker ethics.)

If he was caught the first time, Mitnick should If he was caught the first time, Mitnick should have kept a lower profile.have kept a lower profile.

Hackers get exposed to the mainstream, mostly Hackers get exposed to the mainstream, mostly by the government, when they disregard the by the government, when they disregard the secrecy set forth by the hacker ethic.secrecy set forth by the hacker ethic.

Page 6: Hacker Ethics

Cyberactivism and HacktivismCyberactivism and Hacktivism

Cyberactivism is a form of protest that alerts society of Cyberactivism is a form of protest that alerts society of social problems, such as poverty, through listservs, social problems, such as poverty, through listservs, virtual sit-ins, and creating websites to attract the virtual sit-ins, and creating websites to attract the attention of the public.attention of the public.

The computer is proving to be a new medium for the 21The computer is proving to be a new medium for the 21stst century.century.

Page 7: Hacker Ethics

Cyberactivism and Hacktivism 2Cyberactivism and Hacktivism 2 Hacktivism is the intentional vandalism of Hacktivism is the intentional vandalism of

websites that do not support or alert the websites that do not support or alert the attention of social problems.attention of social problems.

Such political clash can cause jeopardy in Such political clash can cause jeopardy in national identity.national identity.

This is an extreme form of cyberactivism, This is an extreme form of cyberactivism, therefore it is not practiced as much.therefore it is not practiced as much.

New protest techniques used in the WTO New protest techniques used in the WTO Protests,Battle in Seattle, in 1999.Protests,Battle in Seattle, in 1999.

Page 8: Hacker Ethics

Kant’s PhilosophyKant’s PhilosophyGerman philosopher Immanuel Kant German philosopher Immanuel Kant (1724-1804) (1724-1804)

– determined by the action rather than determined by the action rather than the intent or outcome. the intent or outcome.

– moral ideal that action out weighs moral ideal that action out weighs consequence. consequence.

– All actions should be guided by moral All actions should be guided by moral laws, and these laws are universal.laws, and these laws are universal.

Page 9: Hacker Ethics

Duty is what counts!Duty is what counts!what we want is of no importance; what we want is of no importance; duty is what counts. duty is what counts.

– Hacking into systems to gain Hacking into systems to gain knowledge of the software or to point knowledge of the software or to point out flaws is wrong, even if no damage out flaws is wrong, even if no damage is done to the system. is done to the system.

Breaking and Entering- if you break Breaking and Entering- if you break into someone’s house, but don’t into someone’s house, but don’t take anything or break anything take anything or break anything you are still committing a crime.you are still committing a crime.

– Taking away a person’s sense of Taking away a person’s sense of security.security.

Page 10: Hacker Ethics

information IS propertyinformation IS propertyAccording to United Kingdom, with the According to United Kingdom, with the Criminal Damage Act of 1971.Criminal Damage Act of 1971.– Offender in the UK was convicted of property Offender in the UK was convicted of property

damage even though the property was not damage even though the property was not tangible and the damage could only be tangible and the damage could only be determined by the machine. determined by the machine.

The Computer Misuse Act of 1990 The Computer Misuse Act of 1990 – ““unauthorized access” unauthorized access” – ““data modification” data modification” – makes crimes easier to prosecute.makes crimes easier to prosecute.

Page 11: Hacker Ethics

Public InformationPublic InformationSome information on the internet is Some information on the internet is made accessible to the public.made accessible to the public.– but should not be destroyed or edited but should not be destroyed or edited

without authorization. without authorization. Other information that is not Other information that is not purposefully made accessiblepurposefully made accessible– Account numbers and personal Account numbers and personal

information should not be sought after information should not be sought after regardless of one’s intentions.regardless of one’s intentions.

Page 12: Hacker Ethics

International LegislationInternational LegislationInternational groups like the United International groups like the United Nations and the Council of Europe are Nations and the Council of Europe are writing legislation that applies writing legislation that applies internationally.internationally.Three types of Cybercrime as using a Three types of Cybercrime as using a computer as a:computer as a:

– target- spreading virusestarget- spreading viruses– tool- using a computer to commit traditional tool- using a computer to commit traditional

crimes crimes such as credit card fraudsuch as credit card fraud– accessory- to store illegal or stolen accessory- to store illegal or stolen

information. information.

Page 13: Hacker Ethics

Freedom of SpeechFreedom of SpeechHacktivism violates people’s first Hacktivism violates people’s first amendment rights of Freedom of amendment rights of Freedom of Speech. Speech.

– instead create you own website or blog instead create you own website or blog rather than editing the site of a rather than editing the site of a political group. political group.

According to Kant: no ones rights According to Kant: no ones rights should be taken at the expense of should be taken at the expense of another’s because all of mankind is another’s because all of mankind is equal.equal.

Page 14: Hacker Ethics

Hidden SubcultureHidden SubcultureHackers design this subculture and trust Hackers design this subculture and trust system so they don’t get caught. system so they don’t get caught. – keep a low profilekeep a low profile– don’t brag about what you are doing to people don’t brag about what you are doing to people

outside of the networkoutside of the network– don’t narc on a fellow hacker if you are caughtdon’t narc on a fellow hacker if you are caughtWhy?Why?– hackers know what they are doing is wrong hackers know what they are doing is wrong

and they develop a system of “cultural norms” and they develop a system of “cultural norms” to avoid prosecution.to avoid prosecution.

Page 15: Hacker Ethics

what do YOU think?what do YOU think? Hacking into government systems to point out Hacking into government systems to point out

security flaws without harm to the system?security flaws without harm to the system? Ethical?Ethical? Not Ethical?Not Ethical?

Hacking into a home computer to point out Hacking into a home computer to point out security flaws?security flaws? Ethical?Ethical? Not Ethical?Not Ethical?

Page 16: Hacker Ethics

what do YOU think?what do YOU think? A graduate student specializing in A graduate student specializing in

computer security creates a website computer security creates a website similar to Northwest Airlines to similar to Northwest Airlines to demonstrate that terrorists can make demonstrate that terrorists can make fake boarding passes.fake boarding passes. Ethical?Ethical? Not ethical?Not ethical?

Page 17: Hacker Ethics

what do YOU think?what do YOU think? A data collecting company claims to keep A data collecting company claims to keep

certain information private, such as SSN and certain information private, such as SSN and account numbers. A hacker discovers that the account numbers. A hacker discovers that the company did not keep its promise. The private company did not keep its promise. The private information is actually published on the report. information is actually published on the report. The hacker makes his findings public in a news The hacker makes his findings public in a news outlet.outlet. Ethical?Ethical? Not ethical?Not ethical?

Page 18: Hacker Ethics

what do YOU think?what do YOU think? Hacking into the website of a political Hacking into the website of a political

candidate and editing information candidate and editing information because you disagree with his position?because you disagree with his position? Ethical?Ethical? Not Ethical?Not Ethical?