Alec Stratton EncryptAuto Neg

advertisement
Alec Stratton
SCFI 2013
Negative Case
Value: Morality
Value Criterion: Autonomy
Autonomy is necessary for morality, autonomy gives us the power to self
determine morals
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
A major attraction of the concept of autonomy is that it helps to establish moral independence. Not
only does it entail that, as an individual, I am to be treated by others as a moral end rather than a
moral means, it also requires that they allow me to pursue my own moral goods. Autonomy can thus
be understood as the basis for moral enfranchisement, establishing my standing as an equal in the
community and my liberty to pursue my own ends. In the context of medicine, it is a value that has served to establish the
rights of patients over physicians, and the right to be spared the paternalistic interventions of those who think they understand my welfare
better than I do. The
purpose of autonomy is to make me my own moral master. But if autonomy may serve me in
some fundamental ways, what would it be like to live in a community for which autonomy was the central value? What kind of a medical
practice might emerge with patient autonomy as the sole goal? Let me try to answer that question by first reviewing some of the benefits of
giving moral priority to autonomy. Among them are a recognition of the rights of individuals and of their personal dignity; the erection of a
powerful bulwark against moral and political despotism; a becoming humility about the sources or certainty of moral claims and demands;
and a foundation for the protection of unpopular people and causes against majoritarian domination. Those are powerful benefits, to be
meddled with only at our peril. Nonetheless, I believe that if autonomy is made the moral goal of a society, or of medical care within that
society, then we are equally at peril in our common life together.
Analysis: So what?
Removing autonomy makes moral action by US citizens impossible.
Autonomy is valuable because it allows moral actions to take place. By removing autonomy from United
States citizens, the United States essentially eliminates all possibly of moral action taken in the united
states. This is inherently immoral, because the action of removing autonomy destroys the possibility of
countless other moral actions.
Alec Stratton
SCFI 2013
Contention 1: Lack of Privacy Impacts Autonomy
In a world with spying we damage autonomy.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
So widespread intuitions support the principle of just cause for Domestic Government Spying. Let us
turn to the¶ consequentialist case for just cause. The sophisticated consequentialist, I suggested in the¶
introduction, would endorse a simple set of principles for DGS. But which principles would¶ she
endorse? She obviously could not endorse a principle permitting all DGS, since the con-¶ sequences
would be dire. If government agents were always at liberty to spy, people could¶ not develop stable expectations about where,
when, and by whom they are being observed¶ without expending considerable resources on countermeasures, nor could they conceal their¶
personal information. People's enjoyment of goods requiring even a modicum of privacy¶ would rapidly diminish. People's autonomy
would be gravely threatened, since the pressures¶ to conform to social norms would be virtually
unchecked. The liberal democratic culture of¶ free thought, free speech, and free action would be
stifled.¶ Further, the benefits of such a permissive policy would be minimal. Some grave harms¶ might
be prevented. But permitting all spying is more likely to lead to ineffective and even¶ harmful spying.
Spying for political gain and to protect bureaucratic turfs, for example,¶ would likely be rampant.
Privacy is needed in order to retain autonomy
DANIEL J.
SOLOVE, 2002, Assistant Professor, Seton Hall Law School, DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH
AMENDMENT PRIVACY, http://www-bcf.usc.edu/~usclrev/pdf/075502.pdf
government information-gathering can severely constrain democracy and individual selfdetermination. Paul Schwartz illustrates this with his theory of “constitutive privacy.”99 According to Schwartz, privacy is essential
to both individuals and communities: “[C]onstitutive privacy seeks to create boundaries about
personal information to help the individual and define terms of life within the community.”100 As a form
of regulation of information flow, privacy shapes “the extent to which certain actions or expressions of identity
are encouraged or discouraged.”101 Schwartz contends that extensive government oversight over an
individual’s activities can “corrupt individual decision making about the elements of one’s identity.”
Further, inadequate protection of privacy threatens deliberative democracy by inhibiting people from
engaging in democratic activities. This can occur unintentionally; even if government entities are not
attempting to engage in social control, their activities can have collateral effects that harm democracy
and self-determination.
Invasions of privacy causes loss of autonomy, human dignity
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
This line of argument is supported by a further set of responses that people
might have¶ to learn how their government
regulates domestic spying. When principles unfairly or¶ unequally target certain groups, they can
demean, humiliate, and disrespect members of¶ those groups when they become public. Principles
can also have these effects if they signal¶ to people their chosen pursuits are unworthy, shameful, or
depraved. People's self-respect¶ often depends on the existence of spaces for action free from
Alec Stratton
SCFI 2013
government intrusion. Further,¶ when citizens worry that they are under covert observation by their
government, there are a¶ range of activities that can become less enjoyable because they are less
private. Finally, when¶ citizens suspect that the government spies on them, they may lose trust in their government¶ and its institutions
Contention 2: Digital Surveillance doesn’t stop terrorists
The US surveillance progams aren’t effective at stopping terrorists-they can’t gain access to
their covert communications.
Bershidsky, Leonid. Staff Editor. Jun 23, 2013. U.S. Surveillance Is Not Aimed at Terrorists.
http://www.bloomberg.com/news/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html.
Accessed 7/16/2013.
“People
who radicalise under the influence of jihadist websites often go through a number of stages,” the Dutch
report said. “Their virtual activities increasingly shift to the invisible Web, their security awareness increases and their activities
become more conspiratorial.” ¶ Radicals who initially stand out on the “surface” Web quickly meet people, online or offline, who
drag them deeper into the Web underground. “For many, finally finding the jihadist core forums feels like a warm bath after
their virtual wanderings,” the report said. ¶ When information filters to the surface Web from the core forums, it’s
often by accident. Organizations such as al-Qaeda use the forums to distribute propaganda videos, which careless participants or their
friends might post on social networks or YouTube. ¶ Communication on the core forums is often encrypted. In 2012, a
French court found nuclear physicist Adlene Hicheur guilty of, among other things, conspiring to commit an act of terror for distributing and
using software called Asrar al-Mujahideen, or Mujahideen Secrets. The program employed various cutting-edge encryption methods,
including variable stealth ciphers and RSA 2,048-bit keys. ¶ The NSA’s Prism, according to a classified PowerPoint
presentation published by the Guardian, provides access to the systems of Microsoft Corp. (and therefore Skype), Facebook Inc., Google, Apple
Inc. and other U.S. Internet giants. Either these companies have provided “master keys” to decrypt their traffic - - which they deny -- or the NSA
complete access to these servers brings U.S. authorities no closer to the
core forums. These must be infiltrated by more traditional intelligence means, such as using agents posing as jihadists
or by informants within terrorist organizations. ¶ Similarly, monitoring phone calls is hardly the way to catch terrorists.
They’re generally not dumb enough to use Verizon. Granted, Russia’s special services managed to kill Chechen separatist
leader Dzhokhar Dudayev with a missile that homed in on his satellite-phone signal. That was in 1996. Modern-day terrorists are
generally more aware of the available technology. ¶ At best, the recent revelations concerning Prism and
has somehow found other means. Even
telephone surveillance might deter potential recruits to terrorist causes from using the most visible parts of the
Internet. Beyond that, the government’s efforts are much more dangerous to civil liberties than they
are to al-Qaeda and other organizations like it.
Encrypted communications are practically impossible to crack
Ou, Geore. 2006 (Network engineer. “Is encryption really crackable?”. 30 Apr. Accessed 17 July 13.
http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204)
The problem is compounded by the fact that much of the misinformation out there actually sounds somewhat believable and many people just
don't know what to believe. So to settle this once and for all, let's look at the facts. One of the things that make these myths plausible is the fact
that "128-bit" WEP encryption used in 802.11 Wireless LANs is so pathetically weak. The inside scoop is that WEP was designed during the late
90s during a time when USA export laws were extremely tight. Fearing 802.11 devices would be banned by US export laws, good encryption
algorithms were deliberately passed up by the 802.11 group in favor of a weaker one. The WEP algorithm was fundamentally flawed and the
Alec Stratton
SCFI 2013
802.11 standards body knew full well that it wasn't a strong encryption algorithm when they selected it. However, WEP's glaring weaknesses
are not characteristic of any properly implemented symmetric encryption algorithms used in SSL or VPN implementations. To give you an idea
of how good something like DES is, DES
is 30 years old and no one has found any weakness or shortcut for cracking it yet
though it can be brute forced. Brute force techniques are considered impractical because modern encryption
algorithms are 128 to 256 bits long.¶ Further propelling the myth that encryption is worthless is that I often hear people saying
that they heard that a 512 bit RSA key was broken. The truth of the matter is that 512 bit (and recently even 660 bit) RSA keys have been
broken by the University of Bonn in Germany but that is has absolutely nothing to do with the type of encryption that's used for ordinary bulk
encryption. Furthermore, RSA's inventors were well aware of the fact that it takes a much larger key to be secure which is why typical
implementations are at a minimum 768 bits and can easily go up to 2048 bits and beyond. To give you an idea what it takes to
break an
RSA 1620 bit key, you would need a computer with 120 Terabytes of memory before you can even
think about attempting it and the memory requirement virtually rules out massively distributed
cracking methods. Some may ask why use RSA keys when it's many orders of magnitude slower and requires so many more bits to be
secure, the reason is that RSA encryption has the special property of being able to do secure key exchanges in plain sight of an adversary who is
trying to break in but still remain safe. For this reason, RSA keys are strictly used for the initial phases of a secure communication session for the
purpose of Authentication (where one entity proves who they are) and for secure key exchanges (used for bulk symmetric encryption). Once
the initial transaction is complete, the key that was exchanged during the initial RSA phase can now be used for SSL or VPN bulk encryption with
algorithms like RC5, 3DES, or AES.¶ The last big factor in encryption myths and bit size inflation is salesmen and marketers because bigger
numbers always sound nicer. I've had salesmen come in to my office and try to tell me that RSA or AES encryption was worthless and that I
should be using their product which uses some kind of 1000 bit wonder-crypto solution. All it takes is one company to try and out do their
competitors and pitch their products using 4096-bit RSA and the next company will come along and pitch 16384-bit RSA keys in their product.
Many IT consultants will shy away from quoting smaller bit sizes because they're afraid to be out done by their competitors. ¶ Ah, but what
about the dreaded massively distributed cracking brute force method for attacking something like 128 bit RC5 encryption? There
are
massive zombie farms of infected computers throughout the world and some may have gotten as big as 1 million
infected computers. What if that entire army was unleashed upon the commonly used 128 bit RC5
encryption? Surprisingly, the answer is not much. For the sake of argument, let's say we unleash 4.3 billion computers
for the purpose of distributed cracking. This means that it would be 4.3 billion or 2 to the 32 times faster than a single
computer. This means we could simply take 2 to the 128 combinations for 128-bit encryption and divide
it by 2 to the 32 which means that 2 to the 96 bits are left. With 96 bits left, it's still 4.3 billion times
stronger than 64 bit encryption. 64 bit encryption happens to be the world record for the biggest RC5
bit key cracked in 2002 which took nearly 5 years to achieve for a massive distributed attack. ¶ Now that
we know that the distributed attacks will only shave off a few bits, what about Moore's law which historically meant that computers roughly
doubled in speed every 18 months? That means in 48 years we can shave another 32 bits off the encryption armor which means 5 trillion future
computers might get lucky in 5 years to find the key for RC5 128-bit encryption. But with 256-bit AES encryption, that moves the date out
another 192 years before computers are predicted to be fast enough to even attempt a massively distributed attack. To
give you an
idea how big 256 bits is, it's roughly equal to the number of atoms in the universe!¶ Once some of these basic
facts on encryption become clear, "is encryption crackable" isn't the right question because the real question is "when can it be cracked and will
it matter then". This is just like Bank safes which are rated by the time it takes an attacker to crack it open and never sold as "uncrackable".
Encryption strength and the number of bits used are selected based on how many decades the data needs to be kept safe. For a secure ECommerce transaction, the data being transmitted is moot after a few decades which is why 128-bit encryption is perfectly suitable since it's
considered unbreakable for the next few decades. For top secret classified data that needs to remain secret for the next 100 years, the
Government uses NIST certified 256-bit AES encryption. So
the next time someone tells you that encryption is
crackable, ask him if he'll be around on this earth to see it demonstrated.
Alec Stratton
Analysis:
SCFI 2013
Because of the fact that violations of privacy make moral action by those observed
impossible, prioritizing national security over privacy directly links into destroying all semblance or
moral action in the entirety of the United States.
Download