Investigating Kevin Mitnick And Computer Hacking Philosophy Essay

The main character of this case study Kevin Mitnick is known to be an expert

For many reasons the human race could be called a blessing. Great advanced in technology, medicine and even the fact we are the most sophisticated species on the planet. Are we a gift to planet Earth, or far from it? With cast amounts of pollution and destruction of the planet, not to mention unthinkable acts of violence and hate that has been going on since the beginning of time. Are we really as sophisticated and important as we have led ourselves to believe? Are we any better than any other creature because we are more technologically advanced? Is the human race a blessing?

Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Find out more

Humans have destroyed and endangered more species on our planet than any other species or group, with our continuous pollution and lack of respect for out own environment. One area of the world affected by our careless habits is our coastlines and the marine habitats that vast amounts of species rely on. These particular areas of the world are being destroyed because humans don’t seem to care as long as they make a couple of dollars in the process. Oil spills like the one in the Prince William Sound on the coast of Alaska and Hawaiian sea turtles and their many troubles with humans are just some examples of human carelessness and the consequences that the environment, particularly marine wildlife incur, which often are fatal.

I chose this particular subject because I find the ocean and it’s unique and rare inhabitants to be interesting. Every coastline has its one unique species and no two areas are the same. I wanted to learn more about how humans are destroying the habitats of these unique creatures. I found that all species are in someway being threatened by human dominance and carelessness. From the common flounder or sea star you can find when you walk across the beach to a rare fish like the coelacanth (prehistoric fish that was believed to be extinct until one was caught off the coat of Madagascar by a local commercial fisherman until in the 1950’s). The ocean can be a calm and loving but can easily turn into a vicious killer within seconds. All of these things are what I find so interesting about the ocean. I wanted to find out why people can continue to destroy it even though they know the effect of their actions. I guess some people are ignorant and just don’t care if they destroy the things that make our environment so beautiful.

One example of our careless destruction of our environment is the Exxon Valdez oil spill off the coast of Alaska in 1989. The Prince William Sound still shows signs of the oil spill tem years later. Most species have recovered since the spill, but many are still suffering. The Harbor Seal and herring are just two who are vital to the survival of all the species in the area. Herring are the main source of food for many species in the area, including humans. (Mitchell, p.98) “The ecosystem is gradually recovering from the spill,” says Molly McCammon, an Executive director of the Exxon Valdez Oil Spill Trustee Council, “but it will never be the same as it was twenty years ago.” The Exxon Valdez Oil Spill Trustee Council was founded to oversee the use of nine hundred million dollars to the area by the government after settling with the Exxon Company for one billion dollars in criminal and civil damages. One serious problem in the aftermath of Exxon Valdez is the decline of herring. (The table shows the chave in populations of Prince William Sound before and after the Exxon Valdez spill.)

Even more disturbing than the fact herring aren’t recovering as well as other species like them is the fact they were on the decline before the accident. This was a major issue because herring are the center of the ecosystem in the Sound. Many biologists now believe that over fishing of the herring has contributed to their decline. The Pacific Herring is just one species of the area, but if you see how important that one species is to the ecosystem of the Alaskan coast than you begin to see how important all species are to their particular habitats. This is just one example, but if you take a species out of its environment, then a chain reaction would occur, hurting the species around it.

Another species that biologists are beginning to study wit the money received from the Exxon Valdez settlement is the Alaskan Salmon. The oil spill has left the Alaskan Salmon on the decline until recently, but still the species is reeling. “The last two years have been extremely positive for the Alaskan Salmon population,” stated one Alaskan biologists. But her concerns were more focused on the salmon offspring, which had been effected by the spill. Fry, as seen in the left vial, were damaged by the oil. The fry still come in contact with oil when oil pockets seep into some intertidal spawning streams. “These pockets are like mines,” says Jeffrey Short, a scientist with the National Marine Fisheries Service. Scientist discovered the oil caused genetic defects in salmon. Many species in the Prince William Sound are still recovering from the spill. This is just one spill and you can see the devastation it has made upon its ecosystem. This has been called one of the worst oil spills in history. But you can imagine there has been numerous spills that are almost as areas might never fully recover from the spill on their ecosystem. The devastation of an oil spill is just one of many causes of marine destruction that humans are guilty of. Many other species suffer from damaged habitats.

Another example of humans destroying their environment and the unique species that live there is Hawaiian Sea turtles. The turtles are becoming endangered because of loss of habitat. The overwhelming presence of humans in the turtle’s habitat is making is harder for turtles to find areas where they can lay their eggs. The loss of nesting sites if hurting the reproduction of sea turtles because unpopulated beaches are becoming harder to find. Sea turtles have an affinity for certain beaches and when they cannot lay their eggs there they have to find new areas which can take time. Other reasons why the turtles are being threatened are pollution of the ocean and netting. Pollution in the form of debris is killing turtles. They can ingest the plastic debris and it makes it hard to get the nourishment needed from the food they eat. Netting is another killer of turtles. Fishing nets set out by commercial fisherman are a definite killer of sea turtles in the Hawaiian Islands. ( Erosion of beaches also hurts the sea turtle population. The lack of beach force turtles to lay their eggs in a smaller area. When humans try to stop or reduce erosion it disturbs the turtles even more. Sea walls, canals, jetties, and sandbagging are all things that are used by humans to stop erosion, but they are hurting the turtles more than they are helping them. They need dry land in order to lay their eggs and these structures are deducing land even further. Fibropapilloma Tumors are a serious threat and are beginning to show up on turtles in Hawaii and other areas with large numbers of sea turtles. They were first seen in turtles around 1930, but it wasn’t until 1980 that the tumors began to show up in epidemic proportions. The green turtles were the only known species to have the tumors, but it has recently been discovered in other turtle species. The most effected areas of the world are Hawaii, Florida, and Australia. (

All of these threats to turtle population are hurting their hopes of survival. But people out to help the sea turtles such as Denise Parker who works with a marine turtle program in Honolulu, Hawaii, have worked hard and the population of marine sea turtles has actually been on the rise in recent years. The turtle’s population is coming up from endangered and threatened to a safe number, but that isn’t far enough for many who care about the turtles. They continue to help increase the population because they know they would begin to decline again if they didn’t have any help. Many groups such as the Marine Turtles Research Program and the National Marine Fisheries Service are helping to restore the turtles in Hawaii. There are also many individuals whose work with the sea turtles have helped in preserving them and their natural environment. One of these people is Ken Nichols. Nichols is a supporter of turtles and he is trying to make the people aware of the environment in the Hawaiian Islands. He feels that the most important thing we can do is conserve the wilderness and beaches from expansion. We need to educate people about the turtles especially children. When asked about how we can save the environment and the habitat of turtles as well as other species Nichols said, “This is obviously a difficult task as the human population continues to grow, which means we are constantly expanding into wild areas which support bio-diversity of all types. I believe the greatest task is education of children and more efficient use of the existing areas we are using.”

These two ideas, are good examples of how the human race destroys the environment around them. We continue to hurt our wildlife, but there are people out there to fight against the pollution and destruction caused by large corporations and businesses. The Endangered Species Act of 1973 has helped tremendously in the battle for survival of species like the turtles in Hawaii as well as other threatened and endangered species of out planet. ( This act prohibits the further destruction or death of the species. By the Endangered Species Act, citizens of the United States are prohibited from taking an endangered or threatened species, declared by the U.S. Fish and Wilidlife Service, from its environment whether on United States’ soil or in its waters. Punishment if caught breaking the lwas instead in this act are as follows; 25,000 dollars if caught violating the rules listed above, 12,000 forknowingly participating in the importing or exporting of such species. Any person who otherwise violates any provision of this Act, or any regulation, permit, or certificate issued hereunder, may be assessed a civil penalty by the Secretary of not more than $500 for each such violation. (

Although this act is a great step towards the restoration of threatened and endangered species many feel the act isn’t worth the money. A proposed amendment to the Endangered Species Act threatened many aspects of the project. The proposed “amendment” was an attempt to undermine the project of funding and political support. The amendment to section 403 of the Endangered Species Act would literally wipe out many of the endangered species protected by this bill. “The sea turtles of Hawaii wouldn’t stand a chance if the amendment would have passed,” said supporters of the Endangered Species Act and endangered species around the world, “We can’t just let them take back what we have worked so hard for.” Shrimp nets alone kill 55,000 turtles a year in the Hawaiian Islands. ( If the Endangered Species Act is undermined where will these endangered species turn? Some senators who support the amendments to undermine the act are back in congress for a second term and many feel the amendments to the Endangered Species Act will be brought up again and re-voted. (http://www, Senator Slade Gorton was one supporter of the bill to undermine the Endangered Species Act.

Are these accusations of inhumanity and lack of care for nature completely true about Senator Gorton? On Senator Gorton’s web site (, he shows his compassion for nature. A letter thanking him for his help on saving trees and several streams in his home state of Washington from the Sierra club was one such article bringing up questions of whether he was so bad. Others seem to think otherwise, but it is hard to tell without actually knowing him or all his work.

Find out how can help you!

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

View our services

Many other laws and acts have been implemented to stop the decline in population of many endangered and threatened species. One it the Marine Mammal Act, which protects the many species in our oceans. The Clean Water and Clean Air acts were also adopted to help protect these endangered species from human threats. One example of how humans have hurt many different species of animals is pesticides, especially the pesticide DDT, which was used in World War II to keep insects away from soldiers. After the war, the pesticide was brought back to the United States and used very carelessly. DDT seeped into the streams and contaminated almost every species that ate fish or other animals that had been infected with DDT. From the contaminated fish the pesticide went up the food chain and began killing off the bald eagles. After the substance DDT was nationally banned in 1973 the bald eagle has begun to make a comeback like most of the other species affected by our carelessness. (Discovery, “The Bald Eagle”). Just because the Bald Eagle is the symbol of our country does that mean we have more of an obligation to protect it than the sea turtles?

Hopefully we will be able to stop the amendments one more time, but if they are made what will happen to the animals that depend on it? We have the obligations to protect these animals. We have placed them in this situation and it is our fault many of these species are endangered today. We cannot continue to let them slip away if we can do something about it.

Many organizations are trying to keep these laws in place. Others who feel that our money should go to more worthy causes, even though we personally are responsible for the decline in many species. I think we need to support the laws that are in effect as of right now and try to get better funding for the organizations that are already in place. We don’t need new laws, we need to support and help fund the ones we already have. The U.S. Fish and Wildlife Service is one of the big organizations that helps protect the endangered species as well as helping to educate and fund other small organizations that can do their part as well.

It may not be easy to get funding for programs like the U.S. Fish and Wildlife Service, but we can achieve this goal if we work hard. A good example of how we can help to preserve our endangered wildlife is we can implement a tax that will provide money to these programs. We can add a tax to companies who contribute to the destruction of our environment. For example, if a company produces pollution they should be forced to pay a tax. We can place a standard tax for all companies and corporations who do this or we can base the amount owed by the amount of pollution or amount of destruction caused by the corporation on the environment. For companies that we are unable to tell how much exactly contribute to the destruction of the environment, we can require a base sum. A starting base sum could be five hundred dollars a year for all the companies who contribute to the destroying of the Earth. We can assemble a committee of U.S. Fish and Wildlife agents to assess the amount of pollution a company produces and then a fitting cost for that pollution.

It might take a little while to put this proposal into effect. If we anticipated the slow advancement of passing the law in congress it would take six or seven years to implement this law. It wouldn’t take a lot of money, but definitely some money would be required. It would take several thousand to advertise if it wasn’t donated by a company who felt strongly about the issue at hand. I would think an estimate of about $500,00-60,000 dollars would easily cover the expenses of advertising, salaries for workers and any other expenses. Donations and fundraisers would be used to accumulate enough money to get the support of the people.

When I discussed my proposal with my friend, she felt that it was a good idea and that the organizations like the U.S. Fish and Wildlife Service need the money to study and set up programs to save endangered species and these programs need money. She felt it would be hard to get the bill passed because congressmen have ties with big corporations that pollute and they wouldn’t have to pay fees. So most likely the proposal would be stopped. Although she didn’t see the bill being passed she said that if we accumulate enough money to advertise and get the support of the people, congressmen would be forced to vote for the bill or they might not be reelected. If she has strong feelings about this subject, I’m sure the majority of this society is concerned about the environment and about our future.

We need to try and get funds for programs and organizations that help endangered and threatened species. Many organizations rely on donations and money from supporters. We need to find ways to get more money for these programs and the proposal of taxes on companies who pollute is just one possibility.

Everyone contributes to the destruction of the environment and we all have to do our part to help the species we are killing off. Species like the Pacific Salmon, who were threatened by the Exxon Valdez oil spill of 1989. As well as other species like the sea turtles in Hawaii who were on the verge of extinction until a recent turn around because of help from organizations and individuals. Individuals who take the burden upon their shoulders and make it their business to make up for all the people who could care less what happens to their environment. We need to protect our environment form the people who seek to destroy it for money and success. I think the beauty of the ocean is worth saving. Every creature and every unique species is a creature worth saving. We don’t have the right to kill those who aren’t as smart or sophisticated as us. They have just as mush right to the Earth as we do. We don’t have the right to over fish herring in Alaska or cut down all the trees in rain forests just for money and the profit these resources create.


in computer technology. The main theme of this case study is how he uses his expertise to exploit the utilization of his field. The case study explains how Kevin goes against the key ethical behaviors by misusing his skills causing disturbance to privacy and also immense security problems. Hence from the perspective of three ethical theories namely, consequence based, duty based and the character based ethical theories, the actions of Kevin are analyzed in this coursework.

Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Find out more

The following part of the course work then aims at analyzing the role of an engineer with regard to hacking. It explains the limitations that an engineer is bound by and also how an engineer has to make use of his skills keeping in mind the interests of public. The role of an engineer becomes more significant as the engineering and technological segments have rapid advancements and improvements. The advancements and improvements can be of the entities associated with these segments in terms of quality and quantity. One of the reasons for this rapid development is the dependency of the world on communication. Though there are fast advancements the contrary part is that, these advancements can be ethical or unethical.

One of the classic examples for this is cyber space, on which even the case study is based on. Due to high demand for communication, rapid developments are made in the field of internet and networking which gives easy path for the hackers to produce consequences that can be catastrophic for an entire section of society or thousands of people. This problem of technology having the capacity of both good and ill (i.e. ethical or unethical) has been called the dual use dilemma [2]. The dual-use dilemma arises as a consequence of the fact that the same piece of scientific research sometimes has the potential to be used for harm as well as for good. The below sections evaluate the different ethical issues which the case study presents with respect to the three different ethical theories.

1.1 About the case study:

The case study illustrates how Kevin utilizes his skills for several illegal works which raises the question of ethical issues. Most of Mitnick’s actions show that he has performed hacking only for challenges or sometimes to take revenge on people. None of his actions illustrate that he was greedy about financial gain but he has had a very long history of computer misuse.

When he was a teenager he learnt to hack the public school district’s computer system and also he had hacked into a telephone company’s computer system and altered the phone bills. When he was punished for this offense he hacked into the company’s system again and disconnected the probation officer’s phone line. He also stole software from the companies by hacking and also changed his conviction records in the police computer files. He made use of companies’ networks to make free long distance phone calls and also tried to plant a false story against a company which refused to offer him a job.

Mitnick had even hacked into computers of North American Air Defence Command (NORAD) in Colorado Springs. NORAD was a warning system which could detect missile attacks directed towards United States. Damages made by hacking into such systems can have catastrophic effects on a very large geographic area [1]. But however the biggest blunder which Mitnick committed was breaking into the San Diego Supercomputer Centre which led to his arrest.

1.2 About Hacking:

Computer hacking is broadly defined as intentionally accesses a computer without authorization or exceeds authorized access. Also various states and federal laws govern computer hacking [3]. Usually people who engage in computer hacking activities are known as Hackers. Computer hacking can be ethical or unethical based on the scenario, how the hackers skills are being used. If a hacker is employed by a company to find flaws in the company’s security system by trying to hack to the companies system then the hacking is ethical since the hacker has been employed by the company themselves. This kind of ethical computer hacking helps to prevent identity theft and many other computer crimes. The skills which the hackers have can be used in a constructional way for developments of technology. An example for this is, Dennis Ritchie and Ken Thompson who were previously hackers developed the UNIX operating system [4].

In [1] the hacker code of ethics from Levy [2001] provides an illustration of origin of hacking. The origin of hacking trails back to gaining access to the computers which were faulty to set the problem right which were common in those computers. All the information of the computers was required by the hackers to analyze, identify and fix the problem. This initiated the drift for hacking computers which are now being misused. This case study shows how Mitnick misused hacking.

2. Consequence Based Ethical Theories:

In this segment all the ethical issues are analyzed based on the perspective of Consequence based ethical theories. According to Consequence based theories [5] a person’s action is said to be morally right if the best attainable consequences are obtained in the situation or if the best attainable consequences are obtained if everyone performs the action in that sort of situation. What makes it right or wrong is just the goodness or badness of the consequences of action. These theories are often known as utilitarian theories because these theories usually involve the notion of utility in producing good consequences.

In [1] a moral system is described to be informal where as co-existing by respecting each other’s moral value is found in a society. Hence one should not go beyond the moral limits which can create dreadful consequences for the others in the society. For example, a person playing music for him with very soft sound would not affect others but if he plays the music very loudly then that can become noise to the rest of his neighbors and disturb them. Similarly in this case study as well, Mitnick though he does not hack computers for financial gain, he trespasses the privacy of other people in the society.

Several consequences raised because of Mitnick’s action have given a harsh blow to the privacy and security of the people in the society. Though in some cases Mitnick hacked the company’s database to take revenge on the companies or just as a challenge, the personal information about the customers which are stored in the company’s database was intruded and exposed which was a major security breach. Hence Mitnick’s actions which in turn created some consequences had adverse effects on the society.

One of Mitnick’s major action which could have had a large impact on the society was he had planted a false story against a company which had refused to offer him a job. But fortunately this false story was sensed before it reached the society and it was terminated. If this false story had reached the society then it would have created a negative impression for the employees and the investors of the company against the company. In terms of consequences, the recent development of internet and the search engines can give way to easy spread of information and also easy access to databases worldwide. These can in turn give way to disasters which are caused by criminal and terrorist activities.

Tavani in [2] also gives us another feature of consequence based theory which is explained by Moore. Moore explains which values are essential for the survival of the society. Those values are happiness, life and autonomy. Moore also says that, for an individual to attain these core values, a proper balance has to be maintained in the society. If the individual’s actions disturb any one of these values then it creates an imbalance in the society and hence directly affecting to loss of any of these three core values which in turn creates several problems.

Even in countries where individualism is given more importance, Mitnick’s actions are considered to be not morally correct. When we consider his hacking scenarios, it goes against his own (or an individual’s) moral boundary. A responsible citizen of a society has his own moral duties towards the society in order to co-exist with the other citizens in the society which Mitnick did not fulfill. His actions like hacking into a company’s database to make long distance calls, planting false story against a company and using false identity for getting driver’s license could have had severe effects on the society. As an individual Mitnick failed to distinguish between the good and bad, also he failed to judge what consequences his actions could create for him as well as the society. Hence we can conclude that Mitnick has gone against his ethical principles with respect to Consequence based theories.

Another consequence based theory is Utilitarianism. This philosophy of utilitarianism was developed by John Stuart Mill (1806-1873) as stated in [2]. The theory of utilitarianism [6] states that “the belief that the right act in any situation is the one that produce the best overall outcome which gives equal consideration on everyone’s interest”. The utilitarian approach [7] assumes that the utility principle can be expressed as “the greatest good of the greatest number” should be the basis for determining the property entitlements. Utilitarian theories can be divided into 2 types. They are

Act Utilitarian theory

Rule Utilitarian theory

2.1 Act utilitarianism:

According to Act utilitarianism, any consequences produced due to an action performed, which in turn does the greatest good to great number of people then such an action is said to be ethically correct [1]. In order to define the right act, we have to first find the entire alternative act for that situation and also the net utility function for them [5]. From the entire acts, the act which has the greater net utility can be defined as the right act. To do any of these other alternatives would be wrong because to do any of them would not be to maximize the balance of positive over negative value in the world, and a person’s duty is always to do that which has such maximization as its consequence. Sometimes the Act utilitarianism can be known as Situation ethics.

According to act utilitarianism, hacking (unethical hacking- without the permission of the owner) is morally incorrect. Hacking only gives personal gain to the hacker while it destroys the privacy and data of the entire society and also destroys the entire security system set up by the company. Hence hacking cannot be a permissible act in act utilitarianism theory.

In the case study, we can see many incidents of Mitnick hacking into different databases for different missions. Once he hacked into a company’s network to make long distance calls and deceived the company of its bills. He also planted a false story of the financial conditions of a company which refused to offer him a job which made the company suffer huge losses. He also hacked into the security system of United States which was designed to detect missile attacks directed towards the country. The first two acts had adverse effects only on those companies but the third act had an impact on a whole country which had a very huge population. These actions of Mitnick made only Mitnick happy while the rest of the society had a negative impact which was very much against act utilitarianism. Hence we can again conclude that Mitnick had gone against the ethical principles with respect to Act Utilitarianism.

2.2 Rule Utilitarianism:

Rule Utilitarianism [8] is the view that rightness or wrongness of an action is to be judged by the goodness and badness of the consequences of a rule that everyone should perform the action in like circumstances. This theory usually tells us how to act in a particular situation by simply framing a rule rather than thinking which action would create the best consequence for that particular situation. These rules have to be determined by retrospective calculation of which possible rules have the greatest net utility. Following the rules may seem right but sometimes it may not give the best consequence. Act Utilitarians use situation-by-situation calculations which are rejected by the rule utilitarians. This situation-by-situation may not precisely predict the consequences of the actions and also they are not very reliable and efficient.

When we try to apply rule utilitarianism to the case study, then we can observe again that Mitnick has gone against many rules and policies of the society. He tried to have false identity for himself for the driver’s license and also posed as a police officer to get the driver’s license information which was very much against the rules made by the society. Also Mitnick tried to hack into a company’s network to make free long distance calls again trying to trespass others property without their permission. All of these acts show that Mitnick had gone against the rules and also the consequences of those actions had only negative impact on the society. Hence we can again conclude that Mitnick had gone against the ethical principles with respect to Rule Utilitarianism.

One of the main disadvantages of Consequence based theory is that it does not give importance to an individual’s feelings or the minority people. Hence there are many critics against utilitarianism and consequence based theory. Immanuel Kant argues against consequence based theories and says that importance has to be given to duty performed by the individual instead of the consequences which arise due to their actions.

3. Duty based Ethical theories:

Constitution of every country prescribes that it is the foremost duty of every citizen of that country to respect the laws and regulations of the country. In a similar way, it is the duty of every citizen to respect the other fellow citizens and also the confidentiality and privacy of other entities has to be protected as specified by the law of the country.

Duty based ethics are concerned with what people do and not with the consequences of their actions [9]. Duty based ethics is also known as Deontological ethics. The word ‘Deontological’ comes from the Greek word deon, which means ‘duty’. These theories are sometimes called as nonconsequentialist as we cannot justify an action if it is going to produce good consequences or not [10].

Immanuel Kant (1724-1804) who was one of the greatest philosophers of all time standardizes deontology as categorical imperative. This system is based on two essential principles namely:



Universality implies that the rules and regulations implies to every person on this universe. Hence everybody has to follow the rules and going against the rules would imply that the person is unethical. Impartiality implies that the law is for everyone irrespective of the caste, religion or race. According to impartiality there should be zero distinction between all humans. It also states that everyone should treat others as equal and also abide by oneness.

Find out how can help you!

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

View our services

In this case study Mitnick tries to have unauthorized access a company’s database which has so many people’s information, which is against the law of the country. By not fulfilling his duties and going against the law of the country, Mitnick is unethical with respect to the universality principle of deontology. Mitnick also tries to take revenge on a company which did not offer him a job by planting a false story about the company. From this false story the company had to suffer huge losses. These actions show that Mitnick never treated everyone equally. He distinguished between the common man and the people whom he hated. This action of Mitnick again shows that he was unethical with respect to the impartiality principle of deontology.

From the above actions of Mitnick, we can again conclude that Mitnick had gone against the ethical principles with respect to Deontological ethics.

Duty based ethical theories is also not completely accepted by everyone and there are critics for the same. In [11] a practice has been explained in which each other’s duties are respected and it is known as contradictory beliefs. Because of this it leads to many conflicts and confusion. Also another critic by name Ross argues that if two duties conflict with each other, there can be confusions in the prioritization of both duties which are equally important. Hence another theory has been made which gives more importance to moral virtues based on character.

4. Character Based Ethical Theories:

Character based ethical theory can also be known as virtue ethical theory which judges a person by his character rather than the person’s action or the consequences that occur from the action [12]. In this theory, to judge various situations ethically the character of a person plays a very important role. The character of the person influences the decision taken. A person is said to have good character if he posses good moral values such as love, kindness, honesty, courage and affection. Hence to take good ethical judgments one should have the right traits. The evolution of Character based theory evolved since the time of Aristotle. This theory was the reigning theory for ethical thinking during the ancient and medieval periods. The virtue theory contrasts with Consequentialism, which gives more importance to consequences which occur from the actions, and also Deontology which gives more importance to the rules and laws made rather than the outcome of the action.

In character based ethical theory, an individual is fully aware of his duties towards the society and he can decide whether he wants to be a responsible citizen or not. The reaction between talent and character of an individual is the main constraint for the emergence of character ethics. An individual can master the subjects in his area and reach a very high level due to his talents but it the method how the individual will utilize the talent. He can make good use of it or a bad use. In other words the individual can create things which are constructive for the society or he can even create things which may be destructive for the society.

In the case study, character based ethical theory seems to be more appropriate to discuss the actions of Mitnick. We see that Mitnick is very well versed with computers i.e., has good talent to handle computers. Also he shines well in the field of cyber communication as well. Mitnick could have used his talents to do something best or constructive for the society but instead he chose to use his talents for his own benefits and to fulfill his desires. All the actions of Mitnick in the case study show that Mitnick did have good character. A person with good character will try to help in welfare of the society keeping in mind everyone’s interest but a person who is morally wrong will only create a havoc in the society. Similarly Mitnick also did not do anything for the society but instead he created many more problems to many people in the society. Again even in this theory it proves that Mitnick was unethical from the point of Character based ethical theory.

5. Prosecution of Kevin Mitnick:

To make a decision, all the ethical theories and their principles contribute some significant characteristics. Even though all the ethical theories try to validate themselves and also try to follow the ethical principles they will have some flaws and failings. On the other hand, all the ethical theories can be combined and used to provide the most ethically correct answer for the scenario. For example, if a person breaks speed limit rule, then a utilitarian will use the caustic theory and say if only somebody is hurt due to over speeding then the person has committed a mistake but a deontologist and rule utilitarian will say that the person has gone against the rule and hence he is wrong. Hence in this way combining the ethical theories we can get variety of ways to analyze a problem and provide the most ethically correct solution.

In the case study we studied all actions of Mitnick and its outcome, applied all the three ethical theories to his actions to conclude what Mitnick did was ethically correct or wrong and also the prosecution of Mitnick. As we have discussed all the three ethical theories above, we see that one or the other actions of Mitnick is wrong with respect to all the three ethical theories from which we can conclude that he was ethically wrong. Mitnick did not care about his society or the consequences that the society has to face because of his actions. He never treated everyone equally and had the characteristic of taking revenge. He also went against the laws of the society. He did not possess the noble virtues when he committed the cyber crimes. Hence Mitnick was ethically wrong.

A piece of article is extracted from the United Nations Organization which is regarded as the world governing body. This law holds good for all the hackers irrespective of the country they commit the crime including Mitnick.

The Universal Declaration of the human rights, United Nations [13] states that:

“Article 3

Everyone has the right to life, liberty and security of person.”

“Article 12

No one shall be subjected to arbitrary interference with his privacy, family,

home or correspondence, nor to attacks upon his honour and reputation.

Everyone has the right to the protection of the law against such interference or


From the above stated laws and also the evidence obtained from Tsutomu Shimomura (the last hacking of Mitnick before his arrest), it clearly shows that Mitnick had gone against law and requires to be punished. In order to support this decision we have also discussed the three ethical theories which are again against Mitnick and proved that his actions were ethically wrong. Hence the FBI was correct in attempting to capture and prosecute Mitnick.

5.1 Conclusion:

The case study gives us a clear image about Mitnick and his actions in the world of computers. In order to justify what Mitnick did was ethically right or wrong; we studied all the three ethical theories and applied the same to the case study. By doing so we could conclude that Mitnick’s action was ethically wrong. This case study also throws light on crimes happening in the cyber world. It also alerts us that if proper precaution is not taken in stopping such crimes then it could lead to terrible conditions. Hence appropriate steps have to be taken to reduce cyber crime and to make the society safer. Another stimulating fact in the case study is Mitnick is punished for only 22 months and then kept under probation for 3 years after which he is free to use the computer and internet as he chooses. Is the 3 year probation period enough to reform Mitnick? Also is there any monitoring made on Mitnick after he is completely released? It also raises a question as to how long the hackers should be monitored.

6. Role of an Engineer with regard to Hacking:

As seen in Tavani [1], the engineer has the unique expertise of studying the theoretical aspects and implementing his knowledge in a practical manner. Engineers have extra ordinary talent to transform the given piece of work into a final product which can be used. To ensure success in both business and profession, good reputation is required. An ethical approach to work is consistent with this as it encompasses competence, integrity and the personal and professional values that support it [14]. The engineer’s ongoing stand with the engineering community and the clients is enhanced by these values. The engineer has to keep in mind the below features while he creates the product according to the requirements of his clients. The features are:

Protection of life and safeguarding people

Professionalism, integrity and competence

Commitment to community well-being

Sustainable management and care for the environment

Sustaining engineering knowledge

Hacking as defined earlier is an intentional access to a computer without authorization or exceeds authorized access. The individual who performs this action is called a hacker. Earlier hackers were the individuals who were employed by a company to hack the security of that company to check how strong it is. This was ethical but now hacking is used mostly to gain access to unauthorized information which is against the privacy of the individuals.

In Tavani [1] it explains that hardware professionals design the system while application engineers analyzes the product with respect to its application and the software engineers are concerned only with development of the software for the product. The engineers who design this product from the start to the end should also be capable of finding the loopholes of the product as well which can give way to hacking and also they should be well aware of the consequences. From the above discussion of the case study we can see how damage hacking can cause on the individual and also the society, how it could tamper the privacy of the individuals. In order to stop these engineers should design much stronger system. Also a team of engineers can be set up to reduce the cyber crime rate and also have more strict laws and fines against the individuals who commit cyber crimes. In the given case study Kevin who was a computer security consultant used his skills to gain illegal access to many companies and changed many information. He misused his skills for his own benefit and to take revenge. Hence the role of an engineer plays a very important role in hacking. An engineer should develop technologies which are beneficial to the society as well they should be fault proof, should not have any loopholes for hackers to access the data.

The Association of Computing (ACM) and the Institution of Electrical and Electronics Engineers (IEEE) together have recommended eight principles [15] which the engineers have to abide by in order to make the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. The engineers should adhere to these principles to maintain the health, safety and welfare of the public. Hence it becomes the moral duty of an engineer to protect the society against hacking which exploits the welfare of the society.

6.1 Conclusion:

Computer hacking and the effects of hacking on the society is studied in detail with respect to three ethical theories in this coursework. Then the role of engineer with regard to hacking and its effects on the society is discussed in detail. From the above discussion we can wrap up by concluding engineering and welfare of society goes hand in hand. Hence the engineer has the prime responsibility in maintaining the welfare of the society.


Most Used Categories

With Our Resume Writing Help, You Will Land Your Dream Job
Resume Writing Service, Resume101
Trust your assignments to an essay writing service with the fastest delivery time and fully original content.
Essay Writing Service, EssayPro
Nowadays, the PaperHelp website is a place where you can easily find fast and effective solutions to virtually all academic needs
Universal Writing Solution, PaperHelp
Professional Custom
Professional Custom Essay Writing Services
In need of qualified essay help online or professional assistance with your research paper?
Browsing the web for a reliable custom writing service to give you a hand with college assignment?
Out of time and require quick and moreover effective support with your term paper or dissertation?