Title: Brian Kim
1Brian Kim Carl Erdman
Hacker Ethics
2Hacker Ethics
Whether it is intentional or not, hackers are
using any means to achieve their ends.
Along with rapid progress of technology, the
existence of hackers and hacking can be
somewhat dangerous to the society in some
situations, but can also be useful in others. Is
hacking ethical based on the justification of
hackers intentions?
3Brief History of Hacker
- John Draper (Captain Crunch)
-
- The father of hackers
- Phone Phreaker
- Built Blue Box
- Esquire Magazine revealed his secret
- Secrets of the little blue box
4Brief History of Hacker
- Steve Wojinack
-
- Co-founder of Apple Computer
- One of Phone Phreaker
- Inspired by Draper
- Contributing greatly to the personal computer
revolution of the 1970s.
5Brief History of Hacker
- Kevin Mitnick
- Computer hacker
- 1988, From DEC, He copied the details of top
secret of software
- While he was under surveillance by FBI, he
wiretapped and intercepted FBIs communication
and ran away
- You cant catch me
- Built fake references, such as ID and his past
- Arrested at NC in 1995
6Pro-Hacking
In terms of the development and progress of
computer technology, hackers attribute various
and effective functions to the society.
Since hackers' intentions may be good or they can
be useful in finding holes in program or
security systems, their action can be justified,
and, thus, they are ethical.
7Hacker Ethic (Levy)
- Access to computers and anything which
might teach you something about the way the world
works should be unlimited and total. Always
yield to the Hands-On Imperative! - All information should be free
- Mistrust Authority Promote Decentralization
- Hackers should be judged by their hacking, not
bogus criteria such as degrees, age, race, or
position.
- You can create art and beauty on a computer.
- Computers can change your life for the better.
8Act Utilitarianism
-Greatest Happiness Principle -Do the positives o
utweigh the negatives? -Since hacking can have mo
re positives than negatives it is ethical.
9Examples
Hackers, 1995 -group of friends used hacking to c
lear their names and save the worlds
ecosystem Kevin Mitnick -FBIs Most Wanted Com
puter Criminal to a Top Computer Security Expert
-Hacking is a skill that could be used for
criminal purposes or legitimate purposes
DefCon -largest underground hacking convention
in world
10Examples (Cont.)
Hiring Ethical Hackers -effort to hire ethical ha
ckers to stop criminal hackers
EC-Council -certified ethical hackers
11Anti-Hacking
From the intentional release of private
information to breaking into a government or
corporation computer, hackers are just criminals
that are breaking the law. Since, their means
cannot be justified regardless of
their good intentions, achievements, or
contribution towards society, hackers are unethi
cal.
12What if
Someone broke into your room,
Read your diary, Messed up your room, Left messa
ge, And disappeared. I know your dirty LITTL
E secret. You cant catch me. How would you r
eact?
13How far they can hack?
- Access to Personal Information
- Hacking personal accounts
- Bank account, gaming account (gambling), e-mail,
Facebook,
- MySpace, or even your personal computer, etc.
- TJ MAXX
- 45.5 million personal
- information were exposed
- TJ Maxx News
-
14How far they can hack?
- 2. Access to Corporate information
-
- Stealing Customers information
- New RD industry spy
- Vladmir Levin
- Russian Hacker
- Hacked Citibanks computers
- Took out 10 million dollars
15How far they can hack?
- 3. National level
- Threatening American Democracy
- Electrical Voting Machine
- Markus Hess
- A West German Hacker
- Hacked into U.S. Military
- Collected information for KGB
They can hack more than you can imagine!!!
16Issues from Term projects
- DRM
- DVD? MP3? Come on Whos cracking it?
- Face Recognition
- Possibility of switching the personal
information
- Government Access to Private data
- Duh!! Kevin Mitnick created whole new identity
- Addiction
- Hackers are mostly addicted to their weapons
(computer)
- Workplace E-Monitoring
- A little bit of amusement for hackers?!
- Wiretapping
- And again Duh!! Kevin even intercepted FBIs
communication
- Virtual Office
- Nice plan! I think I should buy your companys
stock.
- Online communities
- Do you think Im your friend? Think Again!
17Good Luck with Final
Discussion
Any Questions? Comments?