Outline Ethics Data, Computers, and Networks
Ciphers in War & Peace Caesar Turing ITAR --- Computer Security as `military weapons’
Very `Strong’ Computer Security Has the Game Changed?
Economic Applications Human Rights Applications
Objectives Philosophical and Historical Perspective
Understanding the Foundations Keeping Data Secure
Why keep computers secure? `Bad’ People using Computer Security
Who’s side am I on, anyway? It is not all about War!
Examples from Humanistic Applications
Ethics
Rules, standards, principles: Govern `right’ conduct
Who is to say what is `right’ ? What information about you is on
Computer? What standards do you expect?
Privacy Rights In Different Countries
Ethics
Free, Capitalist Societies and Ethics Freedom of speech, association, … Freedom of the press
Must be able to demonstrate `some truth’ Technology has been an enabler here!
Printing Press TV, Radio The Internet!
Sword and Plow-share
All technology is a double-edge sword Applications can be good or bad
Almost every Technological Advance Is intended to do Good Unfortunately, high ethical standards are
not universal Further, what is ethical can be subjective
Sword and Plow-share
Albert Einstein: “Concern for man himself must
always constitute the chief objective of all technological effort”
So that: “the results of our scientific thinking may be a blessing to mankind, and not a curse”
Algorithms and Secret Codes Julius Caesar
Credited with the Caesar cipher Encryption Algorithm
“2001” by Kubrick Computer named HAL
Shift-by-one: H I A B L M
Computers and Secret Codes
Alan M. Turing Famous Mathematician/Computer
Scientist Computer Science’s Turing Award
Team Cracked the “Nazi Enigma” Helped Allies Win the War
Used electro-mechanical computers Towards general Universal stored
program computer
Much Stronger Ciphers Today
1970s “Bad News” in Computer Science: Some classes of problems seem very
hard to solve! 1970s-1980s: Reframe “Bad News”
to “Good News” for Computer Security! Use seemingly very hard problems to
hide secrets!
An Example `Hard’ Problem
Rules Move Only One Disk at a Time! Smaller Disks Must Be on Top!
Final Configuration Desired:
A B C
The ITAR Controversy ITAR & Related Laws
International Traffic in Arms Regulations Good Intent to Restrict Export
Restrict Strong Ciphers to the US, Canada & Allies
Bad Economic Consequences Put US software sales at a disadvantage
Other Consequences?
Computers in Society
How do Human Rights Groups use Computer Security? Justice Brandeis:
"Sunlight is the best disinfectant."
Getting detailed information Out Using Laptops and Cellular Videotape
Computers in Society
What does Encryption Do Here? Hide the data (testimony) from Rights
Violators Until it is safely stored Hide the identities of those whom
testify Hide the Enablers helping people fight
for Human Rights Allow Secret Transmission of Data
Computers in Society
Documenting Human Rights Abuses Gain Understanding of Scale, types, … Present detailed facts to United
Nations, … Prepare for intervention De-motivate Rights Abusers
Presents the possibility of the real history existing!
Computers in Society
The International Center for Human Rights Research and partners 5,000 Human Rights Violation
Testimonies Between 1994 and 1995
No paper trail Easy analysis of data Extremely strong Ciphers!
Computers in Society Unfortunate data to gather
Does not diminish its importance Forensic Analysis of Data
Very sensitive data Time sensitive, need speed Storing, understanding and analyzing
data Successful long-term Intervention
requires (deep) Understanding
Computers in Society Haiti between 1993 and 1994
Political Murders Peak At Certain Times Document and Chronicle
High Coordination of Political Terror Must be Government Sponsored Police and underground criminals
coordinated Likely explanation:
Terrorize people and aid workers to reject calls for US intervention
Top Related