1

The 'condemning the condemners' neutralization technique

This is one article of a multi-part series on Sykes and Matza's Techniques of Neutralization (See: https://en.wikipedia.org/wiki/Techniques_of_neutralization):

Part 1: https://www.orangecyberdefense.com/global/blog/do-ransomware...

Part 2: https://www.orangecyberdefense.com/global/blog/research/refr...

Part 3: https://www.orangecyberdefense.com/global/blog/research/nobl...

Part 4 (this submission): https://www.orangecyberdefense.com/global/blog/research/leve...

Part 5: https://www.orangecyberdefense.com/global/blog/research/neut...

Part 6: https://www.orangecyberdefense.com/global/blog/research/we-a...