Whoracle said:
Googooguru said:
So if some random person breaks into your house, and you come home to them sitting on your couch watching cable and eating your Snickers that's OK... as long as they did it to show you that your alarm system is actually poorly designed and that they need to change your locks ..its perfectly acceptable that they violated your privacy and Rights.. it was for your own good anyways.
Seriously? Yes, indeed.
If you can break into my house, I'd rather have it that you wait for me, don't do any harm and inform me on my state of security.
And, to put your argument in perspective:
If I ran a bank, and someone just walked in and grabbed some bags o' money which he dumps on my desk the next morning to show me how piss poor my security assets are, I'd rather thank them, too.
After all, this money is my business asset, so I'd rather have it secured.
Same goes for online companies. Their data is their biggest asset. And most of the time they do jack shit in securing it.
Cool time for some Logic .. i recognise i was not clear enough in my original limited posting and so offer the below thesis.. sorry for the long post btw
Why are people so easily taken in with the fact that reprehensible conduct can be masked by euphemistic language ie: The term "hacker" does not have the same negative connotations that "criminal" does, and as such it is useful when attempting to justify or make more palatable, certain Criminal behaviors such as Violating the rights of Consumers and Corporations. We have idolized and misrepresented "hackers" Moral Disengagement and as such have given hackers permission to engage in moral ambiguity on our perceived behalf without Self Censure.. and that my friends is a land mine..
To Quote "People do not usually engage in reprehensible conduct unless they have justified to themselves the rightness of their actions.The process of moral justification allows for the detrimental conduct to be made personally and socially acceptable by portraying it in the service of valued social or moral purposes" (Bandura et. al., 1996; Bandura, 1990).. and so the first act.. the magician comes on Stage to our ignorant applause and pulls the Wool over our eyes with "valued social or moral purposes" everything is done in our own interests we are told... we wont harm you the individual we only want to draw attention to (insert corporation name here)notice the trick of dehumanization, be quick or you will miss it.
The recap tricks on display are :
1)that information should be freely available to everyone (Chantler, 1996; Taylor, 1997). We Cheer because we know that everyone is Morally and intellectually capable of digesting and reacting rationally to freedom of information oh wait... no they are not.. ok next point
2)that they never intentionally damage any files, and that besides companies have or should have backups of their data and systems(Chantler, 1996; Parker, 1998).The crowd goes wild ... phew at least we know when they are publishing our user info online its in its complete and original state i would hate for my personal email to be missing a few characters and so miss out on some quality viagra spam
3)"hackers" dehumanize the victim and refer to them in terms such as multi-national corporations, or just networks and systems. (Chantler, 1996; Parker, 1998). oh those evil corporations ... wait if there were so evil why did i give them all my personal details.. oh damn flummoxed again im one of there customers and am being affected by these actions

(sad face)
(Please note They usually do not comment on the impact to the end users and system administrators, the cost to potential consumers, or the long term effects of there actions. In contrast Consequences are routinely misconstrued)
4)Attribution of blame to the victim .The majority of research which have used interviews, and self-report surveys, quote the hacker subjects as blaming the system administrators or programmers for lax security, and stating the victims deserved to be attacked (Chantler, 1996; Parker, 1998).
Applause yeah they were asking for it with the way the dress and the fact that didnt carry pepper spray ..Sorry no thats something else..
And yet here we sit justifying the dissociative practices of "hacking" a process that operates by distorting the relationship between the agent's actions and the effects of the actions.
Now the Meta question at play: Is the community support of Hackers an outlet for our own displacement of responsibility and are the "hackers" unknowingly misrepresenting our displacement of responsibility as supporting and justify their self serving personal actions while misconstruing there actions as being moral Justified, due to misinterpreted Moral feedback ?.. arghhh my brain
Please remember that With displacement of responsibility, individuals view their actions as arising from social pressures and are, therefore, not responsible for their actions . Self-censure is reduced because the individual is no longer an actual agent of their actions and as such The action can also be ascribed to compelling circumstances and therefore not a personal decision. ie: Anonymous (light bulb moment for me i tell ya)
Manslaughter can be described as violence without moral restraint.. do we applaud it NO
Should we applaud Moral disengagement NO... Beware the monster you create it WILL bite the hand that feeds
Good Link for further reading is listed below

ishonest Deed,Clear Conscience, Self Preservation Through Moral Disengagement and Motivated Forgetting. While it is not in reference to "hackers" it offers some insightful reading into how we manipulate ourselves and allow others to manipulate us through Disassociation of Consequences, Dehumanization and the processes of Moral Justification
http://harvard.academia.edu/LisaShu/Papers/216416/Dishonest_Deed_Clear_Conscience_Self-Preservation_Through_Moral_Disengagement_and_Motivated_Forgetting