Professional Documents
Culture Documents
Ethical Perspectives On Hacktivism: The Roles and Actions of Hacker Activist Groups
Ethical Perspectives On Hacktivism: The Roles and Actions of Hacker Activist Groups
Montenegro, Kyla R.
PSC22
Anonymous hackers are an organized group of political activists who often engage in
hacktivism. Anonymous hackers first came together on 4chan, a private internet chat room.
“Anons,“ as Anonymous hackers are known, frequently conceal their faces in public with Guy
Fawkes masks. Their group participation is straightforward but requires masking their identities
online as well. If a member’s identity is revealed, they lose their membership (Anonymous
Hackers Definition - Glossary | NordVPN, 2023). Some people say that Anonymous is not an
organization, it is an idea or a decentralized and non-hierarchical movement. Hence, it is a loose
international movement of digital activists known for cyberattacks against governments,
corporations, and organizations. This ideology is represented through the elements of their logo.
The central feature is the suit without a head signifying that there is no leader or figurehead within
the group. The question mark in the logo highlights the main theme of anonymity. It suggests that
anyone, especially people who share the same philosophy as them, can be a part of the movement.
Lastly, their famous motto is “We are Anonymous. We are Legion. We do not forgive. We do not
forget. Expect us.”. It encapsulates the essence of the movement and conveys the identity, mission,
their role in the internet and activism. The first phrase “We are Anonymous” means that they can
operate without revealing their personal identities. Their decentralized nature and their belief in
collective power are evident in the phrase “We are legion”. Next the warning phrase, “We do not
forgive. We do not forget.” speaks the stance of the movement on justice and accountability. As
a concluding phrase, “Expect Us” is a declaration of intent and their continuous presence in the
digital realm.
LulzSec
A hacker group was quickly gained for audacious cyber-attacks and an irreverent attitude
was formed in early 2010. The name of the group was derived from the internet slang “Lulz”, the
derivative of “LOL or laugh out loud” meaning for laugh and security which is what hackers like
to compromise. Similar to Anonymous, they are loose and decentralized. Given this fact, LulzSec
was created by Anonymous members who sought to create a different identity focused more on
mischief. On the other hand, the actions of LulzSec had a positive impact on the fields of
cybersecurity and hacktivism. They were able to raise awareness about critical security
vulnerabilities and highlighted the importance of data privacy. By 2011, the arrest of the members
leads to the downfall of the LulzSec.
On March 27, 2016, Anonymous Philippines hacked the website of the Commission on
Elections. It wants COMELEC to implement the security features of vote-counting machines
(VCMs), previously known as precinct count optical scan (PCOS) machines. “We request the
implementation of the security features of the PCOS machines,” the hackers said. “Commission
on Elections, we are watching!” (Comelec Website Hacked a Month before Polls, 2016). The
warning from Anonymous Philippines was shown around 11:30 pm on Sunday on the hacked
COMELEC website. The website of the poll body was still operational at around 8 or 9 p.m. on
the same day. As of Monday, March 28 in the early morning, the website has been restored.
Nevertheless, LulzSec launched an attack shortly after, gained access to the poll body's data, and
made it available to the public online. The Facebook post of LulzSec Pilipinas showed three
mirrors' links to an index file that can be downloaded with the caption, “A great lol to Commission
on Elections, here’s your whoooooole database.”. This appears to be the first major open leak of
elections-related data by a hacker group in the Philippines. The data exposed not only includes
publicly available information, but also voter data, voter registration data, and databases relevant
to the functionality of the website (Jr, 2016). In defense, COMELEC said that the data leaks have
algorithms to decrypt. However, there is still a fact that these government agencies got hacked. It
is a flaw in cybersecurity, which could be a deeper and broader problem in the future. These
agencies hold important data, data that contains personal information of the Filipinos. In a nutshell,
this attack became a lesson to improve their system and impose resilient cybersecurity.
III. ETHICAL ANALYSIS
Morality of Hacktivism: Is it wrong?
In order to determine if hacktivism is wrong, this paper will use different ethical
perspectives such as consequentialism, deontological ethics, and virtue ethics.
IV. RECOMMENDATION
Based on the paper and conclusion, the researcher formulated recommendations to create
a balanced approach towards hacktivism. In order to benefit from its positive impacts while
lessening its risk. Hence, it is recommended to increase public awareness about data privacy
through education by integrated data privacy and cybersecurity education into school curriculums
and through campaigns. Additionally, to work on a community that is well-informed about
cybersecurity. Technology companies also plays a vital role in strengthening cybersecurity as they
capable to provide user friendly privacy tools. For legislative sector, it is important to have
cybersecurity laws that define what is malicious hacking activities, ethical hacking or hacktivism
and its legal consequences. Lastly, some hacktivists may create a code of conduct (even unwritten),
to set principles and guidelines that guide their actions and behaviors.
V. CONCLUSION
In conclusion, to determine the morality of hacktivism is complex and varies on the
perspectives. It considers the targets, means, intentions and its outcomes. Hacktivism is viewed as
a powerful tool for promoting transparency, accountability, and freedom of information in the
digital age. This perspective sees hacktivism as a form of activism that allows individuals or groups
to express dissent, draw attention to important issues, and push for change. From this standpoint,
hacktivism represents a response to perceived injustices or wrongdoings, providing a means for
marginalized voices to be heard. Examples include hacktivist actions that expose corporate
misconduct, government abuses, or human rights injustices. Such actions can serve as essential
checks in the digital space, promoting open dialogue and democratic values. However, the
opposing view considers hacktivism a form of cybercrime. Critics argue that regardless of the
motives behind it, hacking is illegal and infringes upon individuals’ or organizations’ right to
privacy (Hacktivism | Imperva, n.d.).
VI. MESSAGE TO YOUR PROFESSOR
Thank you for being an incredible mentor. I enjoyed the subjects and the class. I appreciate
your considerations during the entire semester. Thank you for teaching us and sharing your
experiences, advice, jokes, and stories. Indeed, it is learning beyond the book.
In relation to this paper, I am aware of your expertise in cybersecurity and national defense.
I strive to present a well-researched paper that will also pique my interest in computer literacy,
specifically cybersecurity. Therefore, your feedback regarding the paper will be respected.
Additionally, I am considering taking graduate studies related to computer literacy. I would
greatly appreciate any guidance or advice you can provide regarding potential graduate programs
or research opportunities in computer literacy and cybersecurity. Your expertise and mentorship
would be valuable as I navigate my academic journey.
Again, thank you for your time and dedication to your students!
- Kyla Montenegro
REFERENCES:
IBM. (n.d.). What is cyber hacking? | IBM. Www.ibm.com. https://www.ibm.com/topics/cyber-
hacking
Brooks, E. (2023, August 15). What is Activism: Definition, Types, Role, Examples, Importance.
Liberties.eu. https://www.liberties.eu/en/stories/activism/44871
What is Hacktivism | Types, Ethics, History & Examples | Imperva. (n.d.). Learning Center.
https://www.imperva.com/learn/application-
security/hacktivism/#:~:text=The%20roots%20of%20hacktivism%20can
security/hacktivism/