CS 305 Social, Ethical, and Legal Implications of Computing Chapter 3 WWW to Wireless Communication Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng 1 Syllabus Spam Electronic Mail Why Spam? How Done? Spam and Ethics CAN Spam Class Exercise Solutions to Spam World-Wide Web Censorship Freedom of Expression Discussions in Class 2 Spam SPAM? No: Spam! Spam is not an acronym Spam is unsolicited bulk information sent indiscriminately Possibly derived as a second meaning of derided product: Spam from Hormel Corp. known as SPiced hAM Spam is one of email’s not so desired side-effects SPIT is Spam over Internet Telephony In 2000 Spam accounted for 8% of all email In 2003 Spam accounted for 40% of all email In 2009 Spam accounted for 90% of all email In 2011 Spam is estimated to account for ~7 Trillion emails In my last year working at Intel, I received ~200 emails a day on average; a week of vacation turned into an email disaster; I treated some like SPAM: Delete! Delete! Delete! 3 Electronic Mail outgoing message queue user mailbox Three major components: user agents mail servers Simple Mail Transfer Protocol: SMTP user agent mail server SMTP User Agent SMTP a.k.a. “mail reader” composing, editing, reading mail messages mail server e.g., Eudora, Outlook, elm, Mozilla Thunderbird outgoing, incoming messages stored on server user agent 4 SMTP user agent user agent mail server user agent user agent Electronic Mail: Mail Servers Mail Servers user agent mailbox contains incoming messages for user mail server message queue of outgoing (to be sent) mail messages SMTP e.g. sendmail, postfix, Exchange SMTP SMTP protocol Between mail servers to send email messages Mail servers are both clients and servers mail server user agent 5 SMTP user agent user agent mail server user agent user agent Electronic Mail: SMTP [RFC 821] Uses Transmission Control Protocol (TCP) to reliably transfer message from client to server, port 25 User agent to sending server (sometimes) Sending server to receiving server (always) Command-Response interaction commands: composing, reading, sending, sending with acknowledgment, replying, replying to all … response: status code and phrase 6 Alice emails Bob 4) SMTP client sends Alice’s message over the TCP connection 5) Bob’s mail server places the message in Bob’s mailbox 6) Bob invokes his user agent to read message 7) More complex scenarios with ACK possible 1) Alice uses UA to compose message, “to” bob@someschool.edu 2) Alice’s UA sends message to her mail server; message placed in message queue 3) Client side of SMTP opens TCP connection with Bob’s mail server 1 user agent 2 mail server 3 mail server 4 7 5 6 user agent Spam Today By the end of 2011, the majority of all email received is unwanted Unwanted email can mean Informative for our genuine interests, and thus be enjoyed A bother, since the subject is not of interest Some topics even can be strongly offensive First level protection: Have tools to re-direct spam to junk mail boxes Error-prone, and places some good mail into junk boxes Happened to this instructor with this CS class’s homework; but also due to computer change: MS->Apple How do we achieve real protection? Through laws? Then they need enforcement By tools? They need to be strongly refined spammers will find ways around the tools, and around the laws 8 Why Spam? Let’s say I want to send an advertisement to 1,000,000 “targeted” people To send by regular bulk mail, this will cost ~$200-300 k To send by email, it will cost ~$1 k, i.e. the cost to buy a list of email addresses from an Internet company email addresses harvested from web sites, mailing lists, chat rooms, and newsgroups, then sold to Spammers Dictionary attacks trying lots of plausible address combinations keeping the ones not bouncing back Thus putting added strain (bandwidth) to the network 9 How Done? Run their own server farms for sending Spam Typically located off-shore Use ISPs that do not care about Spam Less effective now with proliferation of blacklists With efforts to shut down rogue ISPs Locate open mail proxies and bounce Spam through them Less effective Use networks of compromised machines (botnets) Single, most popular use for a botnet Monetization of botnet to send Spam drives malware effort Some steps taken to prevent (i.e. ISPs allowing direct port 25 access only to their own mail servers) 10 How Done? Definition: Phishing is fraudulent acquisition of sensitive (e.g. confidential) information thru internet Phishing accounts Trick legitimate user to give up username/password Send as the user (reputation hijacking) to avoid blacklisting based on IP addresses Creating bogus webmail accounts Rely on good reputation of popular webmail services such as Gmail and Yahoo! Mail, to avoid blacklisting based on IP addresses 11 Spam and Ethics Kantian evaluation of Spam Act guided by moral principles that can at the same time be used as base for a universal code of law A simple legal way of saying this: Act in good faith! However, every simple phrase invites mis-interpreters! Another way of saying this: Act so that you treat yourself as well as others as ends in themselves; never purely as means to another end Scenario: Suppose I have a great new product I wish to advertise. I send an unsolicited email to a large group of people knowing that only a tiny fraction is interested Is that ethical under Kant’s CI? Students discuss in class 7/17/2012 12 Spam and Ethics Act Utilitarian evaluation of Spam An action is right (or wrong) to the extent that it increases (or decreases) the total happiness of the affected parties. Scenario: A product that costs $10 to make, is sold for $25, purchasers value at $30 (i.e. their derived happiness) 100 million bulk messages being sent costs lost time and bandwidth for those, who receive it and are not interested As a result each of those has $0.01 of unhappiness (time wasted) 10,000 customers purchase product and get full happiness Is that ethical under Act Utilitarianism? Students discuss … and compute amount of satisfaction, here AKA happiness 13 Spam and Ethics Rule Utilitarian evaluation of Spam We should adopt moral rules which, if followed by everyone, will lead to greatest increase in overall happiness Scenario: Products being advertised, where only a small fraction of targets is known to be interested What if only 1% of all small businesses in the US email you 1 Spam advertisement per year? There are 24,000,000 small businesses in America 1% => 240,000 emails per year 240,000 / 365 = 657 emails per day for each person You are one of these persons! Do you feel happy about 657 unwanted emails every day? Is sending Spam ethical under Rule Utilitarianism? Students discuss … and assess overall happiness again! 14 Spam and Ethics Social Contract Theory evaluation of Spam Morality is the set of rules, governing how people are to treat one another, rules that rational people will agree to accept, for their mutual benefit, on the condition that others follow those rules as well Right to free speech as applied to mass communication Is sending Spam ethical under Social Contract Theory? Students discuss … also think of enforcement! And why we have Spam in our current society? 15 CAN Spam of 2003 Federal Law Controlling Assault of Non-Solicited Pornography & Marketing Largely unenforced Difficult, time-consuming, and resource intensive to track the sources of Spam Some successes Greco (2/2004), Goodin (1/2006) JumpStart (3/2006) $900k judgment But largely ignored Spam 75% of all messages in 2006, more AND larger percentage today in 2012 0.27% of Spam was compliant with guidelines for Spam Divides email into 3 categories; Spam should adhere to guidelines of these 3 categories, to be: 1. Transactional, 2. commercial, 3. unsolicited advertisement 16 CAN Spam 1. Transactional Sender and receiver have an established business or personal relationship Header, sender, and organization must be correct Can’t disguise identity of the sender from which message was sent 2. Commercial Commercial email messages to which user has consented to receive Same as above and must provide option to remove from list Mechanism to opt-out must include an Internet based method i.e. not an 800 number of the kind: “Your call is important to us!” Unsubscribe must be effective almost immediately, not in weeks Must contain the postal address of sender 3. Unsolicited Advertisement Must meet requirements of category 1 and 2 and: Must include clear and conspicuous evidence that the message is an advertisement 17 CAN Spam Critics call this the “You can” Spam Act You get one free shot at a user’s Inbox Does not prevent sending of Spam, but forces such messages into complying with defined rules Unsolicited messages must comply with all 3 types of rules Unsubscribe compliance Visible, operable opt-out (unsubscribe) mechanism for all types of messages with requests honored within 10 days Content compliance Accurate “From:” lines with relevant “Subject:” lines Legitimate physical address of publisher/advertiser If applicable, a label is present for adult content Sending behavior compliance No sending through open relays –i.e. server that blindly pass on/through email messages No sending via harvested email No deceiving, false headers 18 CAN Spam Exemptions Religious messages Political messages Content that complies with lawful marketing mechanisms National security messages Transactional or relationship messages from companies to existing customers Overrides state law Rushed passage to supercede a tougher California law Prohibits recipients from suing senders directly!! Penalties Misdemeanor to send with falsified header 19 CAN Spam Problems with the “opt out” provision in CAN Spam? For illegal email sender, your opting out means they know you exist; so they can and will send you more email May unsubscribe you, and send Spam from a different entity! Time provisions on length of unsubscription Allowable delay in unsubscription Create many LLCs to keep user receiving Spam?? What about a legitimate company? Is there a potential problem with opting out? Can they then sell your email address to another company? Is your email address your possession or theirs to use? What about non-US Spammers? 20 Class Exercise Step 1: Select a discussion leader in class room! How do you suggest to solve the problem of Spam in an ethical manner? Students propose a practical, legal method of curbing Spam, in a way that the Internet remains usable! Discuss Pros Discuss Cons Enforceable? Would this be an improvement over current situation? 21 Solutions to Spam 1. Require explicit opt-in to email lists 2. Require labeling of email advertising, e.g. “AAA subscription” in the subject line 3. Add a cost to every email that is sent 4. Ban all unsolicited email 5. 1991 – Telephone consumer protection act, included a provision against junk faxes 6. Provide fast method of unsubscribing: not 10 days! Do you see problems with these methods? All? Any? 22 Ethics & World-Wide Web 23 World-Wide Web Invented by Timothy Berners-Lee Proposed 1989, published 1991 Co-invented with Robert Cailliau Ref: http://en.wikipedia.org/wiki/Tim_Berners-Lee Hypertext system that is Decentralized Uniquely addressable (via URLs) Ubiquitous, internet based Applications E-commerce Social networks Content creation (wikis, blogs) News, Advertise Distance learning Pay taxes, shop at Amazon, Gamble, … 24 WWW & Censorship Should the Internet be filtered/censored? In our times, access to the internet is tightly controlled in some countries: e.g. North Korea, Cuba, China, Myanmar In others the content is tightly controlled, e.g.: Saudi Arabia (centralized control center in Riyadh blocks pornography, gambling, and sites offensive to Islam, government, royal family) China’s Great Firewall (human censors who perform similar functions) Special interesting cases of censorship: Germany: » Bans neo-Nazi web sites » Bans message denying Holocaust; denial illegal in 16 EU countries USA: » Controls pornography (Children’s Internet Protection Act) 25 Censorship During History Direct censorship Since the 4th century, the Catholic Church banned reading and possession of certain books List of books named Index, short for “Index Librorum Prohibitorum” List officially maintained by the Vatican, later by those cardinals who were “Inquisition Officials” Maintained until the mid 20th century --NOT a typo!! http://en.wikipedia.org/wiki/Index_Librorum_Prohibitorum During history: State execution, Church control, University responsibility for “Index” enforcement Catholic church did not have the executive arm in most countries to enforce that all books on “Index” be collected and burnt Was the duty of catholic states, delegated generally to the universities Last issue of “Index” was in the 1960s! Seriously, the 20th century! Today the Caßtholic church has no such official list Autocratic states like Saudi Arabia, North Korea, Myanmar, etc. today maintain similar prohibited lists of select Internet sites 26 Censorship Direct censorship Government information monopoly enables censorship Government controls all means of communication e.g. Soviet television stations, radio, etc. Hard to do with Internet; but being attempted! Prepublication review Sensitive classified documents must go through process to become declassified and publishable Licensing and registration Controlling who gets access (i.e. television stations being granted electromagnetic spectrum in exchange for something) Note that “selling frequencies” is a huge source of tax/income potential Self censorship Suppressing information as a means to an end CNN suppressed negative government info in Iraq to retain its office in Baghdad Voluntary rating systems so users can avoid certain content What is “voluntary?” 27 Practical Censorship Issues Many-to-many communication Prevents governments from controlling the content Gutenberg’s printing press invention raised difficulty of controlling books Note: printing was known in China before Gutenberg Dynamic New web sites opened and content continuously published New site-names created and deleted constantly Size Millions of sites, numerous pieces of information, mirror sites See WikiLeaks: shows Department of State content: ¼ million files, 1 event Global Limited authority for any government to restrict activities around the world Many countries have server farms; impossible to shut all down! Identity Difficult to distinguish children from adults, criminals from bona-fide users 28 Censorship & Ethics Where does censorship leave “freedom of expression”? Kant Censorship is clearly a backwards step Prevents people from getting information they need to make their own decisions John Stuart Mill, 1806 – 1873, British philosopher: None of us is infallible and knows the whole truth. Censorship may be silencing the voice of truth Majority opinion is not necessarily the whole truth Must allow others to express their opinions to get a better sense of truth Majority opinion must be tested and validated. Otherwise it is prejudice 29 Censorship & Ethics Is censorship of books, films, internet, posters practiced in the USA? Aside from limiting a.) pornography at internet sites, b.) offensive language, and c.) libel, there seems to be no censorship; see freedom of expression below! 30 Freedom of Expression Mill’s Principle of Harm The only ground on which intervention is justified is to prevent harm to others; the individual’s own good is not a sufficient condition Students: How does this apply to drug users who destroy themselves? How applicable to people, who wish to commit suicide? What ethical framework does Mill’s principle follow? Explains positions of most western democratic governments with regard to pornography Adults viewing hurt mostly themselves by doing so. as opposed to harming others But, what is your position, regarding the creators and publishers of pornography? Do they hurt themselves? Others? Note exception for children 31 Freedom of Expression in US Not an absolute right in eyes of the US Supreme Court See Supreme Court Justice Clarence Thomas’ dissentions Right is balanced against the public good Abuse of such freedom when harming the public can be punishable Libel, reckless or calculated lies, slander, misrepresentation, perjury, false advertising, obscenity and profanity, solicitation of crime, and personal abuse Example: Cigarette advertising on television How many cigarette ads have you seen recently? Ethical argument for why it should not be allowed: Student opinons? 32 FCC v. Pacifica Foundation Radio broadcast of George Carlin’s performance “Filthy Words” in 1973, preceded by warning of sensitive language A man had heard “filthy words” on car radio while driving with his young son; he complained to FCC FCC informed Pacifica Foundation: further complaints would lead to sanctions Pacifica sued FCC, but FCC won in a 5/4 Supreme Court decision of 1978 Note: limitations only for public radio and TV, not for cable and other subscriber programs Ref: http://en.wikipedia.org/wiki/Seven_dirty_words 33 FCC vs. Pacifica Foundation Broadcast media are uniquely pervasive and invasive Indecent material broadcast into privacy of homes People can turn it on-off at any time, making the warning ineffective Damage is done as soon as it is heard, i.e. can not undo its harm by turning off devices retroactively Uniquely accessible to children Can restrict access in bookstores and movie theaters Time of day is an important consideration, however, for broadcast radio/television Students debate and exercise: Ethics analysis! Kant’s CI, Act U., Rule U., Social Contract 34 Censorship and Children Child Internet Protection Act (CIPA) Government requirement for installing anti-pornography filters before receiving federal funds for Internet access Argument for: Libraries do already abstain from offering X-rated magazines or movies So they should not be obliged to filter Internet pornography Argument against: Filters restrict freedom of speech Upheld by U.S. Supreme Court in 2003 It is not the role and function of libraries to provide a public forum for free speech; can be exercised elsewhere 35 Is CIPA Ethical? Kantian evaluation of protecting children from harm using filters Assumption is that some non-pornographic web pages are filtered Filters treat creators of non-offensive, blocked pages as a means to the end for restricting children’s access to pornographic materials Act utilitarian evaluation Up to each of us Enacting CIPA results in fewer children being exposed Some legitimate sites will be filtered accidentally Stigma, discomfort for legitimate users getting sites unfiltered Social contract theory evaluation Private viewing of pornography does not make social living impossible Public libraries offer arguments on both sides (assumption is that filters block some useful sites) 36 Catch Chat-Room Predators Police sting operations to lure pedophiles Ethical? Kantian analysis Is the will leading to the sting action OK? Yes and no: Overall goal is good; but that is not of prime interest to CI Deceptiveness is always wrong to a Kantian! Utilitarian analysis Result is public benefit (OK to harm one pedophile so society benefits) Publicity may deter other pedophiles What is the impact on chat rooms as an effective medium for communication if one knows one is being “watched”? Social contract theory analysis Misrepresentation by pedophile should be punished Police are also misrepresenting themselves Not a clear cut argument under Social Contract theory 37 Discussions Suppose 99% of all email from country X is Spam Discuss the ethics behind blacklisting all email from country X: Kantian Act Utilitarianism Rule Utilitarianism Social Contract 38 Discussions Definition MMORPG: Massively Multiplayer Online RolePlaying Game Discuss the ethics behind a rule in China, mandating a time-limit for playing MMORPGs. Is this law moral? What would the judgment depend upon? Kantian Act Utilitarianism Rule Utilitarianism Social contract theory 39 Discussions Discuss the ethics of posting photos on-line without the permission of those who appear in them Are there situations when it would be unethical? If so, what are they? Kantian Act Utilitarianism Rule Utilitarianism Social contract theory 40 References Spam: http://www.etymonline.com/index.php?search=spam&searchmode=none File Transfer Protocol: http://tools.ietf.org/html/rfc821 SMTP: http://www.smtp2go.com/articles/smtp-protocol.html Mill’s utilitarianism: http://en.wikipedia.org/wiki/John_Stuart_Mill Clarence Thomas supreme court dissentions: http://blog.beliefnet.com/watchwomanonthewall/2011/06/court-rulesagainst-parents-justice-thomas%E2%80%99-dissent-protects-children-bysteve-birn.html MMORGPG: http://en.wikipedia.org/wiki/Massively_multiplayer_online_roleplaying_game FCC vs. Pacifica: http://www.bc.edu/bc_org/avp/cas/comm/free_speech/pacifica.html Phishing at Microsoft: http://www.microsoft.com/security/resources/phishing-whatis.aspx Phishtank: http://www.phishtank.com/what_is_phishing.php Index of Prohibited books: http://www.aloha.net/~mikesch/ILP-1559.htm Holocaust denial: http://www.jewishvirtuallibrary.org/jsource/Holocaust/denial.html 41