Beruflich Dokumente
Kultur Dokumente
Februarv
and
INTERNET ETHICS
Berni Dwan
Introduction
The issues of hacking, software piracy and
copyright infringement on the Internet are really
inextricably bound, and, therefore, quite difficult
to prise apart and discuss as totally separate
entities.
Software
piracy actually
results in
copyright infringement and its perpetrators are
usually of the hacking variety. All three issues
come under the category of unethical. What can
be said is that hacking, although an ethically
undesirable pursuit, is practised for a mixture of
14
1995
innocent
and questionable
reasons;
the
intellectual challenge, admiration of peers, the
need to cause mayhem and destruction or illicitly
gain software
or data. Software piracy and
copyright
infringement
are more than likely
premeditated from the outset with the aim of
stealing programs and ideas for financial reward,
and what better outlet than the Internet with a
universal customer base.
How the hacker ethic changed
It all began innocently and energetically
in
MIT in the 1950s gained momentum
in the
196Os, moved to the West Coast in the 1970s and
turned bad in the 1980s. Now, on the eve of a new
millennium, we, as par-t of the computer using
community, are faced with outlaws riding on the
crest of the net with a posse of encryption
devices, antiseptic software and security experts
continually in hot pursuit.
So, how did hackers evolve from being nice
guys to being abhorred
by the Internet
community? Once upon a time in MIT, the title
hacker was bestowed only upon those who
excelled
in the art of clever
and elegant
programming; those who could write a beautiful
10 line program (preferably in machine code)
rather than a 20 liner in FORTRAN or PL/l (those
who used compilers were regarded as cheats!).
Hackers vied with each other to write the perfect
chess or space wars game on the early PDPs.
Information
was free. No passwords
were
required. Security was not an issue. Hackers
were invited to continually improve each others
programs, all for the common good and the
advancement of technical excellence. To further
encourage
exploration
and the free flow of
information, ARPA linked the computer systems
of various universities
and research centres
through
a communications
network.
This
ARPAnet would be the precursor of the Internet.
Clifford Stalls relentless pursuit of Markus
Hess, retold in The Cuckoos Egg, Pengos
Project Equaliser, the unsavoury
exploits of
Kevin Mitnick and Robert Morriss Internet worm
are by now classics, which have become part of
computer security folklore.
01995
February 1995
hackers
The
in breaking through
example
(UK)
last
year,
information
protective
VALERT-L
you
need
to circumvent
any
whereby
Government
formally
department
responsible
minutes
joined
after
the
the Internet,
the
their
system
improvements.
and
This
after going
University
actually
hacked
made
was an innocent
some
enough
is able
to hack
and somebody
Whose responsibility
acts on
is it? I dont
reported
for networked
computer
systems
in our
criminal proceedings,
the computer industry
might make use of their skills and expertise, citing
the example
Computer
01995
of the co-founder
Corporation
of the Apple
to
understanding
of computer
backup copy.
15
Computer
February
software
to protect
payments
and
functions.
deal
To correct errors
MacQueen 1994).
in the
program
(Bundy,
with
make
royalty
numerous
legal
to all reasonable
l
copyrights,
1995
everything?),
people
but interestingly,
or perhaps
company.
Such heavyweight
legitimizes
although
support somewhat
and
of XANADU,
of property
it is important to
has
Internet
16
of Hypertext,
would
have to be questioned
by the
01995
Februarv
1995
References
Bainbridge,
Law, Pitman.
Heroes
of the Computer
mainly by
as market
FRAUD PREVENTION
AND COMPUTER
SECURITY FOR
FINANCIAL
INSTITUTIONS - Part 1
summarized
two-part
overview
maximizing
report
provides
of current
thinking
computer
of
James Essinger
This special
security
hazards
wholesale
financial
corresponding
preventive
facing
institutions
measures.
of the main
retail
and
and
in
and
implementing
unless
01995
Elsevier
damage.
Science
Ltd
17