Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama

advertisement
Ethics and Computer Security
Phillip G. Bradford
Computer Science
University of Alabama
Outline


Ethics
Data, Computers, and Networks

Ciphers in War & Peace





Caesar
Turing
ITAR --- Computer Security as `military weapons’
Very `Strong’ Computer Security
Has the Game Changed?


Economic Applications
Human Rights Applications
Objectives

Philosophical and Historical Perspective


Keeping Data Secure


Why keep computers secure?
`Bad’ People using Computer Security


Understanding the Foundations
Who’s side am I on, anyway?
It is not all about War!

Examples from Humanistic Applications
Ethics

Rules, standards, principles:



Who is to say what is `right’ ?
What information about you is on
Computer?


Govern `right’ conduct
What standards do you expect?
Privacy Rights In Different Countries
Ethics

Free, Capitalist Societies and Ethics


Freedom of speech, association, …
Freedom of the press


Must be able to demonstrate `some truth’
Technology has been an enabler here!



Printing Press
TV, Radio
The Internet!
Sword and Plow-share

All technology is a double-edge sword


Applications can be good or bad
Almost every Technological Advance



Is intended to do Good
Unfortunately, high ethical standards are
not universal
Further, what is ethical can be subjective
Sword and Plow-share

Albert Einstein:


“Concern for man himself must always
constitute the chief objective of all
technological effort”
So that: “the results of our scientific
thinking may be a blessing to mankind,
and not a curse”
Algorithms and Secret Codes

Julius Caesar


Credited with the Caesar cipher
Encryption Algorithm


“2001” by Kubrick
Computer named HAL

Shift-by-one:



HI
AB
LM
Computers and Secret Codes

Alan M. Turing

Famous Mathematician/Computer Scientist


Team Cracked the “Nazi Enigma”


Computer Science’s Turing Award
Helped Allies Win the War
Used electro-mechanical computers

Towards general Universal stored program
computer
Much Stronger Ciphers Today

1970s “Bad News” in Computer
Science:


Some classes of problems seem very hard
to solve!
1970s-1980s: Reframe “Bad News” to
“Good News” for Computer Security!

Use seemingly very hard problems to hide
secrets!
An Example `Hard’ Problem

Towers of Hanoi

Start Configuration
A
B
C
An Example `Hard’ Problem

Rules



Move Only One Disk at a Time!
Smaller Disks Must Be on Top!
Final Configuration Desired:
A
B
C
An Example `Hard’ Problem

What `Algorithm’ Can We Use?
A
B
C
A
B
C
A
B
C
An Example `Hard’ Problem

More of the `algorithm’
A
B
C
A
B
C
A
B
C
An Example `Hard’ Problem

Finally:
A
B
C
An Example `Hard’ Problem

What about 4 Disks?
A
A
B
B
C
C
How Much MORE work than for 3 Disks?
The ITAR Controversy

ITAR & Related Laws


Good Intent to Restrict Export


Restrict Strong Ciphers to the US, Canada
& Allies
Bad Economic Consequences


International Traffic in Arms Regulations
Put US software sales at a disadvantage
Other Consequences?
Computers in Society

How do Human Rights Groups use
Computer Security?

Justice Brandeis:


"Sunlight is the best disinfectant."
Getting detailed information Out


Using Laptops and Cellular
Videotape
Computers in Society

What does Encryption Do Here?




Hide the data (testimony) from Rights
Violators Until it is safely stored
Hide the identities of those whom testify
Hide the Enablers helping people fight for
Human Rights
Allow Secret Transmission of Data
Computers in Society

Documenting Human Rights Abuses




Gain Understanding of Scale, types, …
Present detailed facts to United Nations, …
Prepare for intervention
De-motivate Rights Abusers

Presents the possibility of the real history
existing!
Computers in Society

The International Center for Human
Rights Research and partners

5,000 Human Rights Violation Testimonies




Between 1994 and 1995
No paper trail
Easy analysis of data
Extremely strong Ciphers!
Computers in Society

Unfortunate data to gather


Does not diminish its importance
Forensic Analysis of Data




Very sensitive data
Time sensitive, need speed
Storing, understanding and analyzing data
Successful long-term Intervention requires
(deep) Understanding
Computers in Society

Haiti between 1993 and 1994

Political Murders Peak At Certain Times


High Coordination of Political Terror



Document and Chronicle
Must be Government Sponsored
Police and underground criminals coordinated
Likely explanation:

Terrorize people and aid workers to reject calls
for US intervention
Conclusions

Computers & Information About us

Need Computer Security!




Many Ethical Issues Arise with Computer
Security
Good and Bad Uses
Many `Hard’ Ciphers Exist
We can use Computer Security for Many
Good things

Let’s Keep it that way!
Download