, 10 tweets, 9 min read Read on Twitter
I agree w @winstonpeters that it is unwise to ignore how the National Party got the information from the Treasury.

What it comes down to is what constitutes hacking?
This is very important in this day and age.
If a burglar deliberately searched repeatedly for where a key might be hidden, and checked all the windows and doors; then, finding an opening broke into a house and took something - would that be a crime, or just a bit of fun?😏

Who’d be the bad guy -the burglar or home owner?
If someone incidentally comes across something on the internet, that is a totally different thing from acting like a burglar and deliberately seeking to break into a computer system to access data.

Didn’t Nicky Hager’s book Dirty Politics referred to hacking by Nat henchmen?
Hacking systems for corp or political gain is not hactivism.
A number of years ago I wrote a blog post suggesting a classification of hacking - based on motivation & outcome.

NZ Treasury was like a homeowner who left the window open
It was unwise, but the burglar was the villain
What constitutes #hactivism very much depends on the motive and consequences of the hacker.
#Hacker Category 1 - Test Hackers

(My apologies for the format. This is a back up. My blog went down Google’s history black hole when I forgot the login to renew it. Interestingly Big Brother Google even deleted access to the published posts.)
#Hacker Category 2 - Hactivists
Just because someone says they are a hacktivist, it does not necessarily mean they are. Motive really matters. Hacktivists hack in the public interest. But this reason does not necessarily go down well in court (which tend to favour those hacked).
#Hacker Category 3 - Criminal Hackers
This includes those who hack for financial, political or other gain, or hack to maliciously damage systems or to obtain information to weaponise against people or orgs etc for gain for themselves or gain for those for whom the hacking is done
#Hacker Category 4 - Espionage Hacking

This is hacking done by or for govts.
Govts that spy/hack on their own people or others generally consider this good form, while hypocritically criticise others for doing it.

Hacking is part of Big Brother think and 1984 style surveillance
#Hacker Category 5 - Cyber-terrorism

This activity may be carried out by or for governments, or by or for others. It is the most dangerous form of hacking - and should not be allowed.
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to ThreeMonkeys AndMe
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!