Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-p9bg8 Total loading time: 0 Render date: 2024-12-24T18:22:16.603Z Has data issue: false hasContentIssue false

Conclusion

Published online by Cambridge University Press:  18 January 2024

Ross W. Bellaby
Affiliation:
University of Sheffield
Get access

Summary

The nature of political hacking represents a clear challenge to the legitimate use of political violence. It acts outside the traditional state infrastructures and mechanisms, and often against the state itself, which for many means that regardless of what good it brings it should be ethically discounted as an illegitimate actor threatening the social stability. Concerns over the ability of hackers to cause significant damage or harm to people's lives and the critical infrastructure of the political community do have some merit. They are a highly closeted, elite and unknown quantity; their branding is menacing and for those on the outside there does not seem to be any means of controlling what they do. Indeed, the state has a long-held dominance as the only legitimate actor to use violence for good reason, including protecting people from harm, arbitrating disagreements and facilitating that the correct quantum of impact is being delivered to the correct people. However, this is becoming increasingly challenged, not least because the state and its representatives have shown themselves to be a direct threat to people's vital interests. As such there can be an ethical space for political hacking when it acts to protect people from harm.

In order to make this determination, however, there is a need for an explicit and systematic ethical framework that can recognize the ethical value of political hacking. One which helps guide the hacker community with clearer fundamental ethical principles, as well as how these principles can then be manifested in various mechanisms for guiding ethical behaviour, highlighting to the rest of the political community when to leave the hackers alone, and how this might work through real-world illustrative examples.

It has therefore been argued that the state should not be the only actor to use political violence and that its own use is not inherently legitimate without qualification. Its value is drawn from the role it plays in representing and protecting the political community. When it fails in this role, either generally or in specific instances, then others can and should act – including hackers. Therefore, at its core, there is a value in protecting people from harm regardless of who it is that delivers that protection. This right to the defence of others means that hackers can use political violence against those who represent a sufficient level of threat.

Type
Chapter
Information
The Ethics of Hacking , pp. 123 - 125
Publisher: Bristol University Press
Print publication year: 2023

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Conclusion
  • Ross W. Bellaby, University of Sheffield
  • Book: The Ethics of Hacking
  • Online publication: 18 January 2024
  • Chapter DOI: https://doi.org/10.46692/9781529231847.008
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Conclusion
  • Ross W. Bellaby, University of Sheffield
  • Book: The Ethics of Hacking
  • Online publication: 18 January 2024
  • Chapter DOI: https://doi.org/10.46692/9781529231847.008
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Conclusion
  • Ross W. Bellaby, University of Sheffield
  • Book: The Ethics of Hacking
  • Online publication: 18 January 2024
  • Chapter DOI: https://doi.org/10.46692/9781529231847.008
Available formats
×