Book contents
- Frontmatter
- Dedication
- Contents
- Introduction
- 1 Hacks, Hackers and Political Hacking
- 2 An Ethical Framework for Hacking Operations
- 3 Political Autonomy, the Arab Spring and Anonymous
- 4 Leaks: From Whistleblowing to Doxxing
- 5 Correcting the Failure of the State
- 6 Looking Back, Moving Forward
- Conclusion
- References
- Index
Conclusion
Published online by Cambridge University Press: 18 January 2024
- Frontmatter
- Dedication
- Contents
- Introduction
- 1 Hacks, Hackers and Political Hacking
- 2 An Ethical Framework for Hacking Operations
- 3 Political Autonomy, the Arab Spring and Anonymous
- 4 Leaks: From Whistleblowing to Doxxing
- 5 Correcting the Failure of the State
- 6 Looking Back, Moving Forward
- Conclusion
- References
- Index
Summary
The nature of political hacking represents a clear challenge to the legitimate use of political violence. It acts outside the traditional state infrastructures and mechanisms, and often against the state itself, which for many means that regardless of what good it brings it should be ethically discounted as an illegitimate actor threatening the social stability. Concerns over the ability of hackers to cause significant damage or harm to people's lives and the critical infrastructure of the political community do have some merit. They are a highly closeted, elite and unknown quantity; their branding is menacing and for those on the outside there does not seem to be any means of controlling what they do. Indeed, the state has a long-held dominance as the only legitimate actor to use violence for good reason, including protecting people from harm, arbitrating disagreements and facilitating that the correct quantum of impact is being delivered to the correct people. However, this is becoming increasingly challenged, not least because the state and its representatives have shown themselves to be a direct threat to people's vital interests. As such there can be an ethical space for political hacking when it acts to protect people from harm.
In order to make this determination, however, there is a need for an explicit and systematic ethical framework that can recognize the ethical value of political hacking. One which helps guide the hacker community with clearer fundamental ethical principles, as well as how these principles can then be manifested in various mechanisms for guiding ethical behaviour, highlighting to the rest of the political community when to leave the hackers alone, and how this might work through real-world illustrative examples.
It has therefore been argued that the state should not be the only actor to use political violence and that its own use is not inherently legitimate without qualification. Its value is drawn from the role it plays in representing and protecting the political community. When it fails in this role, either generally or in specific instances, then others can and should act – including hackers. Therefore, at its core, there is a value in protecting people from harm regardless of who it is that delivers that protection. This right to the defence of others means that hackers can use political violence against those who represent a sufficient level of threat.
- Type
- Chapter
- Information
- The Ethics of Hacking , pp. 123 - 125Publisher: Bristol University PressPrint publication year: 2023