Hacking Is it a Political Act

Introduction
Hacking refers to reconfiguration or re-programming of a system so that it can function in ways that are not expected by the owner. Others view hacking as modification of programs or devices to provide access to features and utilities that are otherwise unavailable (Sderberg, 2007). Irrespective of the minor differences in the definitions, cases of hacking are on the increase. Hacking for purposes of expressing views have also increased with major corporations and trade blocks being the key targets. The existence of the phrase political hacking emphasizes the notion that hacking is viewed as an avenue for expressing views. Hacking is a political act irrespective of the ultimate goals.

Discussion
Computer scientists categorize hackers as white, grey and black hat hackers. This categorization is based on their intent when seeking access to a network or a system. Black hat hackers are viewed as evil hackers whose intent is to cause damage and engage in criminal activities for instance funds transfer and access of confidential information. White hat hackers are perceived as hackers with noble intents whose main interest is revealing weakness of a system so that it can be corrected by the administrators. Gray hat hackers have both noble and evil intentions.

The internet is a medium that can be used effectively to share ideas and disseminate information faster. Furthermore, the internet provides an effective platform for searching and addressing issues relating to public policy. The existence of blogs and social networking sites provide multiple opportunities for people to share views on activities on their ecology. These are among some of the factors that have led to the internet being referred to as a great boon for democracy. A review of the mass media and other information avenues reveals that they have over the years been used for political purposes (Schofield, 2006). It is therefore expected that the internet as a mass media can be used for political purposes. However, this does not explain how hackings is a political tool though it raises awareness on the use of the internet and other new technologies for political reasons. It is noteworthy that involvement of the public sphere into the public structure results in a different definitions of deliberative political activity. This implies that entitlements cannot be automatically analyzed with reference to the governed and the governing (van den Hoven,  Weckert, 2008). Moreover, democratic politics plays an important role in mediating interaction between civil societies and political institutions. It is thus evident that neither top-down nor bottom-up strategies to global politics can stand on their own (Schofield, 2006). A review of hacking in information and internet technology reveals  that it has played an important role in the development that have been made in browser and internet technology. Hackers have highlighted technological flaws that have been analyzed and corrective measures developed. Basing decisions on hackers actions essentially shows that hackers are essential in political processes on issues pertaining to web security and internet transactions. Any action that has a political bearing on the decisions that are made by software developers is a political act thus hacking can be viewed as a political act.

State oriented public spheres display different characteristics. Even though there are cases where citizens do not have a direct influence on decisions, there are certain normative powers that they can use (van den Hoven,  Weckert, 2008). In a case where political authority has strayed outside the available mechanisms to exercise democracy, contestatory sovereignty of the demos can be used to create awareness on different views (van den Hoven,  Weckert, 2008). Public demonstrations, strikes and go slows are some of the avenues that are traditionally used to disrupt activities and create awareness on the need for inclusion of others views in making changes. Such strategies are common in cases where the institutions that exercise authority are unresponsive (van den Hoven,  Weckert, 2008). However, with change in technology it is likely that the contestatory sovereignty strategies may also embrace technology. There are reported cases of hackers jamming website and internet pathways with denial of service attacks so as to create awareness on their differential views and need for corrective action. In such cases, hacking is used as a tool for demonstration and creating awareness on the need for inclusion of varied viewpoints which is essential. Such corrective demos do not necessarily have to be within the defined protocols (van den Hoven,  Weckert, 2008). This is true for hacking, strikes and go slows that are often outlawed by organizations though they play a role in consensus building between different stakeholders.

 Information technology is a field defined by polarized views on whether information is public or private. The existence of open source and commercial software is testament to the differences that exist in opinion between different parties involved in shaping developments in information technology. It is noteworthy that the activities of both open source and commercial software developers play roles in shaping development in IT. Interaction between commercial and open source software developers is vital in improving the quality of software though this is impeded by copyright laws and polarized view on use of information availability for profit (Sderberg, 2007). Hackers provide a conduit for interaction between commercial and open source software developers and in so doing they develop a technological environment that is open to new ideas. The current notion that technology is changing fast and organizations have to upgrade their information systems to keep in touch with new threats is partly a result of the activities of hackers (Sderberg, 2007). Thus hackers play a role in creating an environment that is appreciative of the nature of information technology thus objective decisions and developments.

Computer scientists have categorized hackers with reference to the factors that motivate their involvement in hacking. In any political process involving many stakeholders, there are varied interests and motivation for engagement. The strategy used in any political process depends on the level of organization and available facilitators which is the case in hacking. The outcomes in hacking differ though they are dependent on the initial motivation for engagement. In a political process, the outcome is seldom predetermined and is affected by various internal variables. The technology used by a company, the expertise displayed by a hacker and the tools at his disposal are some of the factors that may influence the outcome in hacking. Evidently, there is an alignment between procedures in political processes and in hacking.

Conclusion
Hacking plays an important role in shaping development in computer technology through influencing decision making by organizations and software developers. Additionally, hacking can be used as a tool for creating awareness on differential views thus facilitating the adoption of democratic political processes. This implies that hacking can be used to change the views held by managers regarding organizational issues. Moreover, hacking can be used to create awareness on changes in technology. Lastly, hacking is a process that displays similar procedural requirements and outcomes as political processes. Evidently, hacking is a process that may affect decisions and share the same procedural requirement as a political process. This is only possible if hacking is a political process.

0 comments:

Post a Comment