The three cases under examination in this paper are “ A Case Study on Stuxnet and Flame Malware,” “ WikiLeaks: Case Study for Cyberwar?” and “ the Case Study of Industrial Espionage through Social Engineering.” The three cases span around the theme of politics. They all transpired towards the period when Congressional elections were approaching in the United States. During this period, foreign hackers were able to access private and confidential information about candidates and private corporations, and expose it with an aim to taint the candidate’s political image and use of industrial espionage to destroy private corporations. Therefore, establishing ethical parameters will play a crucial role to maintain the safety, the confidentiality of the candidate’s information, and the world’s economy. My objective in this case study is to examine how issues presented in the three cases relate to contemporary events, discuss the ethical standard(s) that should be employed for each of the issues raised and elucidate why the standard(s) chosen to fit the issues.
A Case Study on Stuxnet and Flame Malware
The case of Stuxnet and Flame Malware evaluate the different ways malware can be incorporated into a single or multiple computer systems with the intention of using it to hack and spread viruses. Most recently, the New York Times reported that the Israeli discovered that hackers of Russian origin were using Stuxnet as a cyberweapon to get access to United States Secrets. The Israeli officials hacked into Kaspersky; a program designed to detect viruses and malware and discovered the activities by the Russian Intelligence operatives. The hacking by Russian intelligence operative has great repercussions for the United States. Since the issue is not entirely a domestic matter, employing conventional ethical standards proves both ineffective and impractical. Different cultures deal with the issue differently. I believe that there exists amoralism when it comes to dealing with other cultures ethical views and the action to take against them. Some cultural views may be inspired by politics or sometimes axiology biased. In the case then Consequentialistic and Deontologistic ethical methods can be applied. As a government, we should approach the matter in a diplomatic form and then necessary sanctions applied to those found guilty. If the matter is not approached diplomatically, it may escalate and lead to even full-scale military intervention.
Delegate your assignment to our experts and they will do the rest.
WikiLeaks: Case Study for Cyberwar?
As the Russia hacks prove difficult combating, so is the WikiLeaks. It is a cyber attack that has released volumes of classified information to the public. The WikiLeaks case was and is still controversial with the major concern being if it is ethical to disseminate private and confidential information to the general public. According to WikiLeaks, they are exercising the right of passing information to the public since they believe that the public has the right to know what the government and private corporations are up to. The issue here is the ethical dilemma as to whether to release confidential information to the public or not. By opting to release such information publicly, WikiLeaks causes massive disruptions in the said states which may lead to both economic and political upsets. I believe that the use of Consequentialistic ethical standards when dealing with WikiLeaks is appropriate. Also, I believe that it is ethical for Julian Assange, the CEO of WikiLeaks be extradited to the concerned states to face charges for his cyber crimes. In my opinion, it is ethically right for his extradition since most of the States looking for Assange have laws that stipulate the illegality of invasion of personal information.
Case Study of Industrial Espionage through Social Engineering
Established companies are always faced with the risk of illegal access to confidential information. The case study of industrial espionage through social engineering elaborates the consequences that companies may face if they don’t guard their information properly. The case elucidates both legal and illegal channels of obtaining information. Moreover, it outlines ways by which a company can protect its confidential information from malicious unauthorized access. Recent WikiLeaks release is one of the best examples of a contemporary event that relates to the case. WikiLeaks released thousands of confidential documents entailing sophisticated software tools and techniques that the C.I.A employs to break into SMART televisions, Smartphones, and computers. The tools also would tap into Skype conversations and record the information exchanged. I think the WikiLeaks hack is a form of Industrial Espionage through Social Engineering since the information was obtained without the help of an insider. In its defense, Wikileaks said it was mobilizing the C.I.A’s worldwide secret hacking plan, its amassed malware store and other forms of cyber-weapons targeting several European and American companies’ products such as Samsung TV’s, Microsoft Windows, Google’s Android, and Apple’s iPhone aiming to turn them into covert microphones. The ethical dilemma here is whether WikiLeaks did this to coerce or inform the public on actions of the government. I believe that the acts released by WikiLeaks should be approached from a Consequentialistic ethical approach view such that the government can answer for its actions. On the other hand, WikiLeaks release of company information results to massive loss of revenue and competitive advantage which may result in the company shutting down and its employees losing their jobs. Since there will always be some “need to know “ information and that should be kept confidential, the unethical dissemination of information should never be tolerated, and Wikileaks should face the consequences.
References
Dennis, D. (2010). Wikileaks: Case study for cyberwar? Infosec Island. Retrieved from http://www.infosecisland.com/blogview/10254-WikiLeaks-Case-Study-for- Cyberwar.html
Morton, K. & Grace, D. (2012). A case study on stuxnet and flame malware. Retrieved from http://vixra.org/pdf/1209.0040v1.pdf.
Winkler, I. (1999). Case study of industrial espionage through social engineering. Retrieved from https://new.social-engineer.org/wiki/archives/PenetrationTesters/Pentest-Winkler.html .