The Price of Freedom
Download
Report
Transcript The Price of Freedom
The Price of Freedom
Martyn Thomas
Technology raises ethical
issues
"Everywhere we remain unfree and
chained to technology, whether we
passionately affirm or deny it. But we
are delivered over to it in the worst
way when we regard it as something
neutral."
Martin Heidegger, "The Question of Technology"
Vorträge und Aufsätze, 1954.
An Unprecedented
Technology
The cost of computer processing falls 90% every six
years.
The cost of storage falls >90% every 9 years
(accelerating).
The cost of telecommunications falls >90% every six
years.
These changes are revolutionary
Relative costs fall dramatically
The unthinkable becomes commonplace in 20 years
Even experts find it hard to imagine the
consequences
Information Technology,
1939
The Hollerith Machine
Produced by DEHOMAG, a
subsidiary of IBM, and used
for the 1939 German census
and hence the Jewish
Registry. This was one of the
mechanisms through which
the Nazis were able to track
the Jewish populations and
accumulate information
regarding the "success" of
the Genocide
http://www.iath.virginia.edu/holocaust/infotech.html
Willy Heidinger (speaking about
the Hollerith Machine)
We are recording the individual characteristics of every single member
of the nation onto a little card....We are proud that we can contribute to
such a task, a task that provides the physician of our German body
politic with the material [he needs] for his examination, so that our
physician can determine whether, from the standpoint of the nation's
health, the data thus arrived at correlate in a harmonious, that is,
healthy, relationship -- or whether diseased conditions must be cured
by corrective interventions....We have firm confidence in our physician
and will follow his orders blindly, for we know that he will lead our
nation toward a great future. Heil to our German people and their
leader!
Source: "Festrede des Grunders, Generaldirektor Willy Heidinger," in
Denkschrift zur Einweihung der neuen Arbeitsstatte der Deutschen Hollerith
Maschinen Gesellschaft m.b.H. in Berlin, Lichterfelde am 8. Januar 1934
Further info: http://www.austhink.org/monk/DEHOMAG.doc
Hollerith data card for Buchenwald
prisoner Symcho Dymant.
http://www.ushmm.org/uia-cgi/uia_doc/photos/5262?hr=null
Your professional duty to
the public
To use your special expertise to protect
the public interest and human rights
safety-critical systems
we build systems whose safety we cannot assure
even heroic testing will not prove <10-5 pfh
we are asked for 10-9 pfh, so we use judgement:
when I hear the words ‘engineering judgement ‘, I
know they are just making up numbers.
Richard Feynman.
security and privacy...
The Importance of
Computer Security
To protect personal privacy
To protect national or business secrets
To allow confidential electronic transactions
e.g. solicitors, doctors
To prevent fraud
credit cards, on-line share trading, banking,
business-to-business
To prevent vandalism and sabotage
viruses/worms, Trojans
Security depends on identity.
Identification,
and what can go wrong
Who are you?
Identity theft
What system are you interacting with?
System impersonation
Is this transaction authentic?
Fraud, viruses and Trojans, electronic money,
electronic voting...
All typically depend on public key cryptography
Identity Theft
22-year-old San Diego college student Jessica Smith had
her car stolen with her handbag inside. Although the
car and bag were recovered, someone stole her identity.
She nearly got fired from her new job when a
background check showed that "she" had outstanding
warrants for prostitution. She was unable to obtain
credit, phone service or even to rent an apartment. She
obtained judicial documents explaining that her identity
had been stolen; nevertheless, she has been hauled into
police stations to be fingerprinted to prove that she is
indeed the person authorised to carry those documents.
Source: LA Times, 16 January 2000
Identity Theft
Increasingly common around the world.
http://www.consumer.gov/idtheft/
http://www.usdoj.gov/criminal/fraud/idtheft.html
a UK government site is being set up this year
Used by criminals and terrorists
Ironically, made easier by the introduction
of identity cards or universal ID numbers
US Social Security Number
biometric enrolment problems
System Impersonation
A cigarette machine was installed in a public
arcade, with payment by credit card and PIN.
The PIN was not checked, but the card stripe
and PIN were transmitted to a nearby
workshop, where the cards were reproduced
and used to withdraw cash up to the card
limit.
Imitation ATMs have been used for the same
purposes, which is why many now carry
warning signs. Be sceptical of new systems.
An aside about the latest plans to
combat credit card fraud losses
Credit card companies are introducing
PINs instead of signatures. Chip and PIN
A major effect is to shift the burden of
proof for responsibility for fraudulent
transactions from the banks to the
customer.
Before, if the signature didn’t match, they
refunded the charge. Now, they assume
you used the PIN or gave it to someone.
An ethical dilemma:
Cryptography
Public Key cryptography provides a way of
concealing data, and of securing
transactions, signing them and preventing
them from being altered.
It depends on:
technology that allows pairs of related keys
to be made, where if either key is used to
encrypt, only the other can be used to
decrypt, yet knowledge of one key does not
permit the other to be calculated.
Security through
Cryptography
Also depends on:
assurance that the secret key remains secret.
Some trusted means of establishing the
authenticity of a particular public key.
See http://www.pki-page.org/
Used, for example, for digital signatures.
Cryptography is a Good
Thing:
it allows citizens to communicate privately if
they wish
it allows doctors and lawyers to exchange
confidential information electronically
it allows the creation of digital signatures that
can have legal force
it protects against fraud, Trojan attacks and
impersonation.
Cryptography may be
a Bad Thing:
If it is used by criminals to conceal
criminal conspiracy
If it inhibits the legitimate surveillance of
suspects by intelligence services
If it increases the cost of necessary
policing
… or if it introduces an infrastructure that
actually reduces privacy.
An Ethical Dilemma
Do you have any right to privacy, or does
the public concern that you might be a
paedophile or terrorist overrule all other
considerations?
An example of UK law: RIP
Regulates who may intercept and why.
Allows authorities to demand decryption keys.
You must hand over the key, or face 2 years in prison
You may be instructed to keep the demand secret, or
face 5 years in prison.
ISPs must maintain an interception capability
Irish ISP’s in contrast, are prohibited from
interception, by their national law.
Reasons for Interception
(a) in the interests of national security;
(b) for the purpose of preventing or detecting crime or of preventing disorder;
(c) in the interests of the economic well-being of the United Kingdom;
(d) in the interests of public safety;
(e) for the purpose of protecting public health;
(f) for the purpose of assessing or collecting any tax, duty, levy or other
imposition, contribution or charge payable to a government department;
(g) for the purpose, in an emergency, of preventing death or injury or any
damage to a person's physical or mental health, or of mitigating any injury
or damage to a person's physical or mental health; or
(h) for any purpose (not falling within paragraphs (a) to (g)) which is
specified for the purposes of this subsection by an order made by the
Secretary of State.
Who may intercept?
(a) a police force;
(b) the National Criminal Intelligence Service;
(c) the National Crime Squad;
(d) the Commissioners of Customs and Excise and their department;
(e) any of the intelligence services;
(f) any such public authority not falling within paragraphs (a) to (e)
as may be specified for the purposes of this subsection by an order
made by the Secretary of State.
International Policies
The only countries with laws explicitly forcing disclosure
of keys are the UK, India and Singapore
[Encryption is otherwise banned or restricted in
Belarus, Brunei, China, Iran, Iraq, Kazakhstan,
Mongolia, Myanmar (Burma), Pakistan,
Russian Federation, Saudi Arabia, Tunisia,
Turkmenistan, Uzbekistan, Vietnam].
Source: EPIC’s International Survey of Encryption Policy 2000, via www.fipr.org
Related UK Issues:
at least 4,285,000 CCTV cameras have been
installed in the UK, some with facial recognition,
many with number-plate recognition.
1000 UK cities have CCTV: <10 in the USA
Echelon: most electronic communications are
scanned, decrypted if necessary, and recorded.
Wherever you go on the internet, or use a cellphone, or any electronic card, or your car, you
leave a visible trail that can be obtained by
public authorities and others.
As computer professionals:
Do you believe that a nationwide ID card
system can be introduced without
problems of forgeries, false acceptance
and false rejection?
Do you believe the ID database can be
made secure from hacking?
Do you believe that electronic voting
systems are secure against deliberate
election fraud?
Summary
Our technology is already so advanced, and is
developing so rapidly, that expert knowledge is
needed to understand its impact on society.
Professionalism carries a responsibility to act
ethically and to inform democratic debate
Ethical issues rarely have easy solutions. It is
important that there is continual, informed,
public debate about the sort of society we want
to create.
It is not sufficient to trust Governments to
act in the interests of all their citizens