HK = [ Faqs ] [ Archive ] [ Community ] [ Map ] [ Search ] [ Link ] = HK
[ Newsletter ] [ MailingList ] [ Blog ] [ Updates ] [ News ]
     
 
Torna al EthiK-H-Menu

AGENTS OF A HOSTILE POWER - HACKING ETHICS by unknown
==

It is worth remembering that, although we do not cause damage to the systems we hack, what we do is still illegal. Our main aim is to satisfy our desire to hack and this co-exists with our aim of helping the system administrator secure his system against possible future attacks by the sort cyber-vandals who have managed to give hackers a bad name, by crashing systems, violating people's privacy and generally causing trouble. The closest we come to this sort of thing is when the machine we hack is a web server, in which case, we will often leave our "calling card" - a small image of an ace of spades - at the bottom of the page, linked to a hidden page with information about AoHP. One of our primary aims is to dispel the myth perpetuated by the media that all hackers are bad. Our name comes from an interview given by John Austen, then the Detective Inspector in charge of Scotland Yard's Computer Crime Unit, who expressed fears that "Gullible young hackers could be taken advantage of by agents of a hostile power." One of our aims is to influence gullible young hackers who might otherwise fall into the trap of hacking into some serious site using some script they've downloaded from the Net that exploits some bug that allows them root access, boasting about it online or to their friends and getting busted by the FBI and touted as a major threat to national security.

We feel that we define ethical hacking and we would like to think that a system administrator, when asked "If you were going to be hacked - didn't have a choice in the matter - who would you prefer to be hacked by?", would reply "The Agents of a Hostile Power."

More and more, we are seeing hackers being captured and claiming that they did not intend to cause harm to the systems they had hacked and that they were only doing it for the challenge and so on. To these people, we would say this: If this is true, then adopt our policies of not altering the system by installing backdoors and of only using true hacking techniques - ie. avoiding password sniffers. Most importantly, alert the system administrator to the fact that his systems security is flawed, and let him know what steps he needs to take to fix this. Only then can you claim that your intentions were honourable or ethical as opposed to malicious.

We know that what we do is illegal and, if any of us were to be captured, we would accept this fact, admit that we knew what we were doing was wrong, and face the music. For us, hacking is an intellectual challenge, not something to boast about to our peers (particularly as none of us are teenagers).Hacking isn't about impressing our friends. We don't want fame. We're ethical hackers and although it may sound corny, we have our honour and our code.

That's all we need.

==
[ Top ]

Released By DaMe`
Visits [1321417]