diff options
Diffstat (limited to 'updates')
-rw-r--r-- | updates/2013/hacken-fressen-und-moral.en.md | 54 |
1 files changed, 54 insertions, 0 deletions
diff --git a/updates/2013/hacken-fressen-und-moral.en.md b/updates/2013/hacken-fressen-und-moral.en.md new file mode 100644 index 00000000..4fcfcbef --- /dev/null +++ b/updates/2013/hacken-fressen-und-moral.en.md | |||
@@ -0,0 +1,54 @@ | |||
1 | title: Hacking, a full stomach, and ethics | ||
2 | date: 2013-09-11 13:37:00 | ||
3 | updated: 2013-09-15 17:20:57 | ||
4 | author: erdgeist | ||
5 | tags: update, hackerethik, hacken | ||
6 | |||
7 | In a pre-print of an interview from the next issue of the club magazine "Die Datenschleuder", the Chaos Computer Club (CCC) tells the story of a hacker whose software was sold to several governments in the Middle East (among others) that used it to spy on the opposing political forces. To which means and ends should hackers use their talents? In today's world, is it still possible to ignore what happens with the results of one's own drive to hack, research and tinker? | ||
8 | |||
9 | <!-- TEASER_END --> | ||
10 | |||
11 | At its previous congress, the 29C3, the CCC posed the rhetorical | ||
12 | question whether the consequences of our actions are "not my | ||
13 | department". They had a reason to do so. In an increasing fashion, | ||
14 | governments, the military, and intelligence agencies regard networks and | ||
15 | digital devices as a field of conflict which may very well escalate to a | ||
16 | war. That is why highly specialized experts in the area of IT security | ||
17 | must face the question what they do with their talents, and for whom | ||
18 | they decide to work. | ||
19 | |||
20 | Could it be that hackers who want to survive have no choice but to | ||
21 | profit from the ongoing militarization of the digital world and rent | ||
22 | their talents out to the highest bidder? | ||
23 | |||
24 | Immediately before the 32nd anniversary of the CCC's founding, the | ||
25 | editors of "Die Datenschleuder" were offered an interview by a dropout | ||
26 | from one of those shady businesses that have recently come under heavy | ||
27 | critique. Now that it has become unfashionable to ship surveillance | ||
28 | equipment to countries that have a rather economical relationship to | ||
29 | human rights, glimpses into the dark side of IT security research get | ||
30 | more common. However, this interview is the first time we are really | ||
31 | able to shed a little light on how easy it is to slip on the wrong side | ||
32 | of the tracks, but also that this way is not necessarily a one way | ||
33 | street. | ||
34 | |||
35 | The story of this hacker, which we have [documented here as a | ||
36 | pre-print](http://ds.ccc.de/097/ds097-ausstieg-gewissen.pdf "Die Datenschleuder 097 – Letzter Ausstieg Gewissen"), | ||
37 | vividly describes how working in this area of IT resembles a walk along | ||
38 | a razor's edge, and how easy it is to lose one's way and act contrary to | ||
39 | one's own moral standards without even noticing it. | ||
40 | |||
41 | It also tells about the immense efforts that need to be undertaken to | ||
42 | regain a clean consciousness. It may be necessary to end friendships, | ||
43 | take financial and social risks for oneself, one's friends and one's | ||
44 | family and accept inconvenient truths – and draw consequences. | ||
45 | |||
46 | But it is also a story full of hope that ends – for now – with a | ||
47 | successful middle sized company with bright perspectives for the future | ||
48 | that is not dependent on customers with a shady or military background. | ||
49 | |||
50 | Therefore, the story is a wake up call for all those who have ever found | ||
51 | themselves in a similar situation and think they have to choose between | ||
52 | their conscience and their social and financial commitments. There is a | ||
53 | life after dropping out of the field of surveillance and digital assault | ||
54 | – and it is better than before. | ||