One of the leading news ahead of the US Presidential elections on 3rd November 2020 was this one:
„Donald Trump’s Twitter account was allegedly hacked last week after a Dutch researcher correctly guessed the president’s password: “maga2020!”, Dutch media reported. Victor Gevers, a security expert, had access to Trump’s direct messages, could post tweets in his name and change his profile, De Volkskrant newspaper reported. Gevers – who previously managed to log into Trump’s account in 2016 – apparently gained access by guessing Trump’s password. He tried “maga2020!” on his fifth attempt and it worked. Maga stands for Trump’s oft used campaign slogan Make America Great Again. “I expected to be blocked after four failed attempts. Or at least would
be asked to provide additional information,” Gevers told De Volkskrant.
Allegedly gaining access to Trump’s Twitter meant Gevers was suddenly able to connect with 87 million users – the number of Trump’s followers – and according to De Volkskrant’s story, it sent him into a bit of a panic.
“So, he tries to warn others. Trump’s campaign team, his family. He sends messages via Twitter asking if someone will call Trump’s attention to the fact that his Twitter account is not safe. He tags the CIA, the White House, the FBI, Twitter themselves. No response,” the paper reported. A day later, Gevers noticed that two-step verification had been activated on Trump’s account, he noted. Two days later, the Secret Service got in touch. According to De Volkskrant, they thanked him for bringing the security problem to their attention.“ (source: theguardian.com)
What Victor Gevers did was an act of the so-called “white hacking” also known as “ethical hacking”. His purpose was not to steal any data or cause turmoil but to give warning on the security issues of the Twitter account of the US President. He believes he should be given credit for protecting Trump from actual hacking and bigger damage. But should we?
Students are divided into two teams:
Team 1: Associates of Victor Gevers. You believe his act did Trump a favour. You strongly back his actions and are convinced that white hacking is the right thing to do when it comes to the greater good. Identifying a security weakness helped take preventive measures to avoid malicious hacking attempts at a later stage. This was a morally good act.
Team 2: Associates of President Trump. You condemn the action of Victor Gevers. What he did was a crime and he should be prosecuted. You believe that there is no such thing as ethical hacking when there is no consent on the part of the affected person. This deed was not only a breach of security but also an invasion of privacy. It is immoral.
The two teams have the task to present their positions and take part in a debate on ethical hacking. Make a presentation including different scenarios on what would be the consequences of such actions. What would happen if a malicious hacker gained access to the President’s account? Was Trump really protected by being publicly exposed to vulnerability? Did Victor Gevers have the right to check on the security of this account or is it the task of the President’s team to make sure there is no breach of his security of any
kind? Discuss the benefits but also the potential threat of such morally controversial actions.
Read this article https://www.businessmagazinegainesville.com/when-ishacking-ethical/ and watch this video https://www.youtube.com/watch?v=XLvPpirlmEs.
Is it possible to divide clearly and unambiguously the hackers into being “black” and “white”? Are black-hat hackers the bad guys and white-hat hackers the good guys? Do you find differences in the motives that drive them? Do you spot any controversies?
Kantian Theory: https://www.csus.edu/indiv/g/gaskilld/ethics/kantian%20ethics.htm
Utilitarianism: https://en.wikipedia.org/wiki/Utilitarianism
Aristotelian ethics: https://en.wikipedia.org/wiki/Aristotelian_ethics
Moral absolutism: https://en.wikipedia.org/wiki/Moral_absolutism
The Egoistic Approach: https://en.wikipedia.org/wiki/Ethical_egoism
The Common Good Approach: https://en.wikipedia.org/wiki/Common_good
Which theory is closest to your mindset? Why?
They represent a decentralized international activist/hacktivist collective/movement that is widely known for its various cyber attacks against several governments, government institutions and government agencies, corporations, etc. Supporters have called the group “freedom fighters” and digital Robin Hoods while critics have described them as “cyber-terrorists”. In recent times they have supported WikiLeaks, the Occupy movements as well as the Black Lives Matter marches. What type of hackers do you think the Anonymous are? Black or white? Good or bad? Do they impose any danger to society or do they act purely in the interest of society? Watch the following video to see the most famous cyber-attacks performed by the movement: https://www.youtube.com/watch?v=ZDjOd5C7P5I What do you think about them? Were they morally right to intervene in these cases? What are the consequences of their actions? Would you call the people affected by their initiatives “victims”?
Find out more about it here: https://en.wikipedia.org/wiki/Hacktivism. Do you think hacktivists serve to protect free speech, human rights and freedom of information or do they perform a form of civil disobedience just for the sake of it? Do hacktivists strike any controversies? Do they provoke a public debate? Is hacktivism a force for good or evil? Do you find ethics in their actions?
To learn more about white and black hacking click on the following links:
https://www.theguardian.com/us-news/2020/oct/22/trump-twitter-hacked-dutch-researcher-password
https://www.businessmagazinegainesville.com/when-is-hacking-ethical/
https://staysafeonline.org/blog/how-can-ethical-hacking-be-ethical/
https://www.eccouncil.org/ethical-hacking/
https://www.youtube.com/watch?v=XLvPpirlmEs
https://hub.packtpub.com/10-times-ethical-hackers-spotted-a-software-vulnerability-and-averted-a-crisis/
To learn more about different moral theories you can use the following resources:
https://www.csus.edu/indiv/g/gaskilld/ethics/kantian%20ethics.htm
https://en.wikipedia.org/wiki/Utilitarianism
https://en.wikipedia.org/wiki/Aristotelian_ethics
https://en.wikipedia.org/wiki/Moral_absolutism
https://greatergood.berkeley.edu/article/item/right_and_wrong_in_the_real_world
https://www.brown.edu/academics/science-and-technology-studies/framework-making-ethical-decisions
https://plato.stanford.edu/entries/egoism/#EthiEgoi
https://en.wikipedia.org/wiki/Ethical_egoism
https://en.wikipedia.org/wiki/Common_good
To understand better the Anonymous, you can check out the following links:
https://en.wikipedia.org/wiki/Anonymous_(group)
https://computer.howstuffworks.com/anonymous.htm
More on hacktivism is available here:
https://www.securitymagazine.com/articles/87362-the-very-real-threat-of-the-new-hactivism
https://www.difesaesicurezza.com/en/cyber-en/hactivism-as-fashion-has-ended-its-returning-to-origins/
https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-hacktivism/
Upon completing this web quest students will become aware of the infinite number of morally controversial actions we face on a daily basis. They should be able to make their own opinion on topical issues such as the endeavours for justice of the Anonymous and other related hacktivist formations. By exploring in detail the motives behind such actions and the consequences they lead to, students will develop their critical and analytical thinking. In addition to that, students will become aware of various moral theories and will be able to analyse actions and events from their perspective.
Learning outcomes
Skills:
The European Commission’s support for the production of this publication does not constitute an endorsement of the contents, which reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
t: +357 2466 40 40
f: +357 2465 00 90
e: scool.it@scool-it.eu
The European Commission’s support for the production of this publication does not constitute an endorsement of the contents, which reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
t: +357 2466 40 40
f: +357 2465 00 90
e: scool.it@scool-it.eu
The European Commission’s support for the production of this publication does not constitute an endorsement of the contents, which reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
t: +357 2466 40 40
f: +357 2465 00 90
e: scool.it@scool-it.eu
©2019 sCOOL-IT. All Rights Reserved.
Designed & Developed by PCX Management