Week 5 & 6

In response to cybercrime, there are instances when users would resort to hacking back just to 'catch' the criminal behind the plot. Though unethical, hacking back can be proved useful. It is like doing the wrong thing for a good reason or for the greater good. Some examples where hacking back can be used ethically are: Breaking in to delete stolen data, embedding malware in the attacker's computer for confidentiality etc. By definition, hacking back is an active cyber defense. Although defensive, it is naturally offensive due to its counter responses to attacks. Therefore, hacking back would not be possible if not provoked first. There are six arguments concerning the ethics of hacking back. However, I will only explain two of the six arguments. The first one is the Argument from Self-Defense. Before taking matters into your own hands, you should consider summoning law enforcement to deal with the situation, especially if using lethal force may be a necessary action. Self-defense by nature should only be used when the safety of the individual is in question. The concept of self-preservation somehow supports this argument by averting from potential danger and the discouraged use of lethal force to retaliate unless provoked or threatened. The next is the Argument from Attribution. Knowing the suspect ensures that you also know who to retaliate against. This prevents unnecessary collateral damage by affecting innocent parties that are somehow affiliated with the original target.

Comments

Popular Posts