Home
/
RELIGION & LIBERTY ONLINE
/
Stewardship and Information Technology
Stewardship and Information Technology
Nov 5, 2025 2:06 PM

I usually feel sorry when I see the latest news about promise, hacks, or identity theft. Though I feel for the victims, I also think about the individuals carrying out the act. Society rightly looks down on such behavior, especially if the victims are everyday people.

What about when a high profile organization or government is hacked? What if an organization of questionable reputation is targeted? The online group Anonymous often aims at high profile targets with their hacks, DDoS attacks and other planned invasions. By making the decision promise organizations, even questionable ones, Anonymous assumes responsibility for its actions. Individuals that are a part of this online group hide their real identity mit acts that are illegal.

Growing up, I believe most young people interested puting are aware that there is a “wrong path.” As in, property damage and theft are wrong. This path includes learning how to break into different types puter systems to seek information or modify a system’s behavior, typically for reasons advantageous to the hacker. Anyone that is involved with technology knows this path exists. Luckily, most of us are taught to respect others’ property, even if that property is digital. What’s more, this activity undermines the rule of law and the ability of people to freely create wealth (see Acton’s Core Principles).

Computer programming is an important craft. It’s simple to learn a little programming, but as you advance in skill the tasks e easier to perform. Whether it is building a website, puter application, or a small game, many people obtain enjoyment out of building unique and useful tools and products. However, the same skills can be used to make an application that tricks people, steals their information or prevents puter from functioning properly. Individuals who make these keyloggers, trojans and worms typically do so out of greed or hate.

People break puter networks or systems with malicious intent are called black hat hackers. As you might expect, there are also white hat hackers. White hats break puter networks and systems too, but instead of taking advantage of the system’s weakness, they notify the owner of the system about the vulnerability so they may fix the problem. Computer security is a classic case of good versus evil. You might even call it one of those moral issues that are clearly black and white.

What stops black hats from ing white hats? Unfortunately, if there were no black hats there would also be no need for white hats. Most white hats start out as black hats since learning the craft requires knowledge of breaking into systems. White hats make a legitimate living through consulting and by working in organizations to ensure systems are secure. They (hopefully) have a strong sense of right, especially if they start out as a white hat.

Even if you don’t know someone who works puter security, it’s likely that your favorite IT person deals with security on a daily basis. The IT professional that the white hat informs must secure their system promise, which requires knowledge of how hackers break in. System owners are stewards of activity and information they manage. They have the same access that hackers have to information stored puters they work with. Their job is to protect that information as well as ensuring its proper use within the system.

If the system administrator fails at their job, unsuspecting individuals using the system lose something. It might be privacy, financial information, their puter’s security or even their identity. Black hats and hackers like the ones from Anonymous abuse gaps in security for their own amusement, personal reasons and notoriety. They lack basic concepts of morality and are especially void of respect for any IT professional or individuals on the receiving end of their attack.

Comments
Welcome to mreligion comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
RELIGION & LIBERTY ONLINE
Venezuela: Latin America’s socialist nightmare
Last year, four out of 10 Venezuelans had property or money stolen. Hardly surprising since Venezuela was the least secure out of 144 nations, according to the most recent Gallup Law and Order Index. Chaos in Venezuela is creating a power vacuum, pulling regional and global powers into the South American country. Brazil has long attempted to e the regional leader and to guide other South American countries into prosperity, but has failed to properly respond to the socialist threat....
Radio Free Acton: Discussion on the morality of free trade; Upstream on the letters of Russell Kirk
On this episode of Radio Free Acton, Tyler Groenendal, Foundation Relations Coordinator at Acton, speaks with Michael J. Clark, Professor of Economics at Hillsdale College, on the morality and importance of free trade. Then, on the Upstream segment, Bruce Edward Walker talks to Jim Person, author of the bookImaginative Conservatism: The Letters of Russell Kirk, about who Russell Kirk is and why he is still important today. Check out these additional resources on this week’s podcast topics: Read “Trump’s Tariffs...
The Solow Model and the steady state
Note: This is post #82 in a weekly video series on basic economics. In the previous two videos in this series we’ve looked at a simplified Solow model. On one end of the model is input, and on the other end, we get output. What do we do with that output? Either we can consume it or we can save it, says Alex Tabarrok of Marginal Revolution University. This saved output can then be re-invested as physical capital, which grows...
How a virtual central bank may have created the Bitcoin bubble
Imagine if you could own pany that had the ability to print money—literally to create the equivalent of U.S. dollars out of thin air. Here’s how it could work: pany prints it own form of currency and sends it to another firm where the newly created pseudo-money is used to purchase assets. Because of supply and demand (and a bit of investor speculation), the buying drives up the asset’s price. After the price has risen, pany then sells the asset...
Daniel Hannan explains why the EU is a hive of corruption
Two paths confront someone faced with an unwanted reality: reform or denial. With a report set to expose persistently high levels of corruption among its member states, the EU chose the latter option, its critics say. EU member states, programs, practices, institutions, and leaders stand accused of everything from bribery to larceny, from rigging the bidding process to influence peddling. Years ago, the mitted to report on, and reform, such practices. Instead, the EU chose to scupper the report. “In...
If work is our ‘modern religion,’ leisure is not the cure
Americans are known forworking longer hours and taking less vacation time than their counterparts in the industrialized world. In response, many are quick to decry this fact as evidence of age-old desperation and newfound decadence. If people are working long and hard, there must be problem.But is this the only possible explanation? For Benjamin Hunnicutt, professor of leisure studies at the University of Iowa, the answer is a simple and resounding “yes.” Work has e a “modern religion,” he writes,...
North Korea and the Trump-Kim summit: Don’t ignore human rights
The changes in U.S.-North Korean relations over the past year have been drastic enough to give any casual observer whiplash: North Korean dictator Kim Jong Un and President Donald Trump have gone from openly exchanging threats of nuclear war to agreeing to the first ever meeting between a North Korean head of state and a sitting U.S. president, set to be held Tuesday in Singapore. While the progression from threats of war to overtures of peace and possible denuclearization should...
How Germany handles teacher strikes
As the U.S. school year wound to a close, teachers unions waged statewide strikes in West Virginia, Arizona, and Oklahoma, and inspired associated teacher strikes in Colorado, Kentucky, and North Carolina. The walkouts, celebrated by the media as the “Red State Revolt,” received adulatory media coverage despite keeping millions of children out of school for bined total of more than a month. From across the Atlantic, the social democracy of Germany offered a much different response to teacher strikes. This...
5 Facts about North Korea’s Kim dynasty
President Trump will begin a historic summit tomorrow with the North Korean dictator Kim Jong Un. Here are five facts you should know about the Kim family, the secretive autocratic regime that has ruled North Korea for more than sixty years. (Note: To avoid confusion, I’ve labeled each of the Kim dictators with a numeric designation: Kim Il-sung, the grandfather, as K1; Kim Jong-il, the son, as K2; and Kim Jong-un, the grandson and current dictator, as K3.) 1. Following...
Edmund Burke: Philosopher for classical education
“While classical education has exploded in recent decades, this movement of diverse schools lacks a philosophical figure who centers the goals of classical education,” says Josh Herring in this week’s Acton Commentary. “Edmund Burke could fill that need.” Burke was a minority figure in his own day, speaking truth in opposition to those who praised the revolution. Classical education is also a minority movement in the Western world today. While writing about his own world at the turn towards modernity...
Related Classification
Copyright 2023-2025 - www.mreligion.com All Rights Reserved