Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama Outline Ethics Data, Computers, and Networks Ciphers in War & Peace Caesar Turing ITAR --- Computer Security as `military weapons’ Very `Strong’ Computer Security Has the Game Changed? Economic Applications Human Rights Applications Objectives Philosophical and Historical Perspective Keeping Data Secure Why keep computers secure? `Bad’ People using Computer Security Understanding the Foundations Who’s side am I on, anyway? It is not all about War! Examples from Humanistic Applications Ethics Rules, standards, principles: Who is to say what is `right’ ? What information about you is on Computer? Govern `right’ conduct What standards do you expect? Privacy Rights In Different Countries Ethics Free, Capitalist Societies and Ethics Freedom of speech, association, … Freedom of the press Must be able to demonstrate `some truth’ Technology has been an enabler here! Printing Press TV, Radio The Internet! Sword and Plow-share All technology is a double-edge sword Applications can be good or bad Almost every Technological Advance Is intended to do Good Unfortunately, high ethical standards are not universal Further, what is ethical can be subjective Sword and Plow-share Albert Einstein: “Concern for man himself must always constitute the chief objective of all technological effort” So that: “the results of our scientific thinking may be a blessing to mankind, and not a curse” Algorithms and Secret Codes Julius Caesar Credited with the Caesar cipher Encryption Algorithm “2001” by Kubrick Computer named HAL Shift-by-one: HI AB LM Computers and Secret Codes Alan M. Turing Famous Mathematician/Computer Scientist Team Cracked the “Nazi Enigma” Computer Science’s Turing Award Helped Allies Win the War Used electro-mechanical computers Towards general Universal stored program computer Much Stronger Ciphers Today 1970s “Bad News” in Computer Science: Some classes of problems seem very hard to solve! 1970s-1980s: Reframe “Bad News” to “Good News” for Computer Security! Use seemingly very hard problems to hide secrets! An Example `Hard’ Problem Towers of Hanoi Start Configuration A B C An Example `Hard’ Problem Rules Move Only One Disk at a Time! Smaller Disks Must Be on Top! Final Configuration Desired: A B C An Example `Hard’ Problem What `Algorithm’ Can We Use? A B C A B C A B C An Example `Hard’ Problem More of the `algorithm’ A B C A B C A B C An Example `Hard’ Problem Finally: A B C An Example `Hard’ Problem What about 4 Disks? A A B B C C How Much MORE work than for 3 Disks? The ITAR Controversy ITAR & Related Laws Good Intent to Restrict Export Restrict Strong Ciphers to the US, Canada & Allies Bad Economic Consequences International Traffic in Arms Regulations Put US software sales at a disadvantage Other Consequences? Computers in Society How do Human Rights Groups use Computer Security? Justice Brandeis: "Sunlight is the best disinfectant." Getting detailed information Out Using Laptops and Cellular Videotape Computers in Society What does Encryption Do Here? Hide the data (testimony) from Rights Violators Until it is safely stored Hide the identities of those whom testify Hide the Enablers helping people fight for Human Rights Allow Secret Transmission of Data Computers in Society Documenting Human Rights Abuses Gain Understanding of Scale, types, … Present detailed facts to United Nations, … Prepare for intervention De-motivate Rights Abusers Presents the possibility of the real history existing! Computers in Society The International Center for Human Rights Research and partners 5,000 Human Rights Violation Testimonies Between 1994 and 1995 No paper trail Easy analysis of data Extremely strong Ciphers! Computers in Society Unfortunate data to gather Does not diminish its importance Forensic Analysis of Data Very sensitive data Time sensitive, need speed Storing, understanding and analyzing data Successful long-term Intervention requires (deep) Understanding Computers in Society Haiti between 1993 and 1994 Political Murders Peak At Certain Times High Coordination of Political Terror Document and Chronicle Must be Government Sponsored Police and underground criminals coordinated Likely explanation: Terrorize people and aid workers to reject calls for US intervention Conclusions Computers & Information About us Need Computer Security! Many Ethical Issues Arise with Computer Security Good and Bad Uses Many `Hard’ Ciphers Exist We can use Computer Security for Many Good things Let’s Keep it that way!