You are on page 1of 21

HISTORY & OVERVIEW Plus some denition and Admin stuff

Intro: Idea of Subject


Self: MU 20+ years (taught at MUIC before the Old Building was built) Before: ISU, LUT, Policeman 10+ years Thailand: 1987 - MSW, Rangsit, MU (Science), EGEE Move to BKK 1989 Database for about 21 years until Jan this year (Post revised) Last 7 years eXtensions (software, hardware, IT, Tech, Book reviews, Opinion Opinion includes: attempt to write internet law, Echelon AMITIAE (around 10 items per week - around 300) Own site, now around one item a day.

Some of the areas: METHODS AND TOOLS OF ANALYSIS DATA MINING PUBLIC POLICY PROFESSIONAL AND ETHICAL RESPONSIBILITIES RISKS AND LIABILITIES INTELLECTUAL PROPERTIES PRIVACY AND CIVIL LIBERTIES COMPUTER CRIME ECONOMIC ISSUES FOR COMPUTER ENGINEERING

It does strike me as I look through the list that some shifting and merging is going on and some of these ideas will overlap.
Email and Photographs
Identication purposes (marking).

Form of Class
Discussion Several topics to examine Some cross-fertilization of ideas I CANNOT TEACH YOU WHAT TO THINK OR HOW TO THINK: YOU MUST MAKE DECISIONS FOR YOURSELVES (BASED ON INFORMATION). TIME/DATE?

Exams
There are no exams Presentation Groups (3/4?) Laws related to computer use and users PowerPoint (or Keynote if you are smart) Not internet downloads I can do that myself probably already seen the information Equal effort

Final Paper Analysis of E&M class with input from student points of view Assess the class

Ethics
Moral

ethics. The moral correctness of specied conduct: the ethics of euthanasia.

principles that govern a person's or group's behavior: Judeo-Christian

a set of moral principles, esp. ones relating to or afrming a specied group, eld, or form of conduct.

Morals

Concerned with the principles of right and wrong behavior and the goodness or badness of human character Concerned with or derived from the code of interpersonal behavior that is considered right or acceptable in a particular society.

Holding or manifesting high principles for proper conduct. A person's standards of behavior or beliefs concerning what is and is not acceptable for them to do.
Question: Is breaking into a computer ethically or morally justied?
IMAGE Computers and breaking in are linked from the very beginnings. One time pad ENIGMA War time Encryption Code-breaking Alan Turing

1936 published
On Computable Numbers, with an application to the Entscheidungsproblem.
Bletchley Park

Bombes Colossus
METHODS AND TOOLS OF ANALYSIS Files metadata Looked briey at the metadata contained in an image. Closer analysis. Look also at les/search - Spotlight -- show all rene search Command + 1 Note contents of information panel Permissions Change permissions via the OS or Unix User Group All rwx rwx rwx

111 111 111

777 rwx rw- rw111 110 110 766 CHMOD FILENAME 777 Be careful . I know a man in Phuket (when he breaks his computer he ies up to see me and pays me too). Decided that he did not like the idea of HD accessed by everyone

SYSTEM (root) WHEEL: "a user account with a wheel bit, a system setting that provides

additional special system privileges that empower a user to execute restricted commands that ordinary user accounts cannot access"
Everyone

mv graham_1.png .graham_1.png mv .graham_1.png graham_1.png Basics: ls switches rm dir

Forensic analysis SubRosaSoft Mac tools As CE is getting some Mac mini computers, it may be that there will be an expansion

of the ability to anlayse Macs used in criminal ventures. Forensic analysis - law enforcement only ANALYSIS/RECOVERY OF DELETED ITEMS/EXAMINATION OF OVERWRITTEN DATA. What does DELETE do? Federal standard x 7 Erase disk Erase - write zeroes (retrievable) Erase - write zeroes x 7 (Fed standard) Erase - write zeroes x 35 no chance of any recovery

We talked about meta data before and I want to touch on a couple of other points, particularly concerning images: Watermarking Ownership of images - Twitter (Agence France Presse and Washington Post) Orphan images UK/USA

Steganography - here there is a real ethical problem here.

File Salvage http://www.subrosasoft.com/OSXSoftware/index.php? main_page=product_info&products_id=1

OS X Applications/Packages

Data Mining So with les there is a considerable amount of residual data. As we use the internet, or otherwise go about their lives, we leave a trail of data: name, address, phone, purchasing information, credit card details. Every time we make a transaction or interact with some service, there is a data shadow of where we have been and what we have done.

Companies use this information to look for trends, customer types, purchase histories. Good and bad -- when I have made expensive purchases (camera/computer) Visa phones me to make sure. This is why credit card theft is traced when large purchases are made, but hard when the thief makes small purchases.

One of the reasons Apple had a ght with publishers over apps concerned the use of customer data. Note Google + and private proles which are to be deleted after Sunday (31 Jul). Google wants online data public -- money and selling your information.

Internet dog (try iPad) -- check iPad Location data (Apple, Google, Microsoft)

RISKS AND LIABILITIES Malware Phishing mail messages spurious sites

News International hacking phones voicemail passwords

COMPUTER CRIME

Breaking in government systems

company systems private computers

PRIVACY AND CIVIL LIBERTIES

Spying on individuals/groups Security or prying Echelon Control is power Information is power

News International hacking phones voicemail passwords

A newspaper is like an intelligence organisation. However while a government organisation US - FBI, CIA, Secret Service, UK - MI5 (Secret Service), MI6 (or Secret Intelligence Service), Special Branch) et al has the purpose to gather intelligence to protect, advise, and catch criminal offenders A news organisation has its main purpose as nding out for publication which sells newspapers and makes advertisers happy. The same applies to online news: advertising hits are the main importance, so scary/shock headlines drive readers to the pages and make money. How?

Justice Brandeis: 1928

Whenever a telephone line is tapped, the privacy of persons at both ends of the line is invaded, and all conversations between them, on any subject, and although proper, condential, and

privileged, may be overheard. Moreover, the tapping of one man's telephone line involved the tapping of the telephone of every other person whom he may call, or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire tapping.
geo/s 16 satellites undersea cables

UKUSA United States, the United Kingdom, Canada, Australia, and New Zealand
PUBLIC POLICY Time for student presentations (one week or two)?

Different countries, different policies Control (politicians do not understand?) UK legislation Labour Tory hypocrisy

UN - Internet Access as a right

free speech economics Echelon (later)

USSR - Chernobyl China - Train (and others) N. Korea

PROFESSIONAL AND ETHICAL RESPONSIBILITIES Code Safe Software security breaking in sending data back (calling home) keyloggers Stuxnet

RISKS AND LIABILITIES Malware Phishing mail messages spurious sites

End of presentation last week was Spyware: Justied? If installed by Trojan mechanism or similar, probably not. Installed by parent? - I have doubts Over 13 let them nd out Under 13 greater risk Biggest risk - contacts - leading to physical meetings (et al - photo sharing)

Spyware for crime (e.g. keyloggers) location trackers (on a car - illegal unless by warrant) Web-cam Death of student in the US when roommate spied on a meeting and shared video Sex on cam - (5555 - but these are private moments) Spreading virus/worms/Trojans - wrong? To combat criminals, could this be justied? In times of war, could this be justied The US is not at war (only thinks it is) Stuxnet (and other related malware) - backring

News International hacking phones voicemail passwords

COMPUTER CRIME

Breaking in government systems company systems private computers

PRIVACY AND CIVIL LIBERTIES

Spying on individuals/groups Security or prying Echelon Control is power Information is power

News International hacking phones voicemail passwords A newspaper is like an intelligence organisation. However while a government organisation US - FBI, CIA, Secret Service, UK - MI5 (Secret Service), MI6 (or Secret Intelligence Service), Special Branch) et al has the purpose to gather intelligence to protect, advise, and catch criminal offenders A news organisation has its main purpose as nding out for publication which sells newspapers and makes advertisers happy. The same applies to online news:

advertising hits are the main importance, so scary/shock headlines drive readers to the pages and make money. How?

Justice Brandeis: 1928

Whenever a telephone line is tapped, the privacy of persons at both ends of the line is invaded, and all conversations between them, on any subject, and although proper, condential, and privileged, may be overheard. Moreover, the tapping of one man's telephone line involved the tapping of the telephone of every other person whom he may call, or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire tapping.

US - FBI, CIA, Secret Service, UK - MI5 (Secret Service), MI6 (or Secret Intelligence Service), Special Branch) et al Israel - MOSSAD Every country has its own securioty services and the jobs that they do depend on the governments, so for example the East German STASI was an instrument of oppression as the Gestapo had been for the Nazis in WW2.

has the purpose to gather intelligence to protect, advise, and catch criminal offenders. Do they go too far Let me start with some movies. it is said that Art mirrors life and sometimes Hollywood does a pretty good job of predicting. We could bring in the 1927 movie Metropolis, by Fritz Lang made in Germany as a dystopian society as well as Things

to Come from 1936. I have two shots from that movie which I rst saw in about 1962 and again a couple of weeks ago. based on a book by HG Well, some things were stunningly accurate and not just the technology:

Wells 1 Wells 2 In 1948 George Orwell wrote a book called 1984 in which he predicted a soviet style state with the middle classes under constant surveillance but the proletariat free but limited. He got it wrong (it was a warning) in many ways but the surveillance aspect is coming true. A rather good version of this was done in 1984 with Richard Burton and John Hurt and another version, called Brazil by Terry Gilliam and some of the Monty Python team was put out in 1985. Lots of movies before and since have taken up the ideas of government surveillance but I was reminded of this last Saturday when I saw again the Will Smith, Gene Hackman and Jon Voight movie, Enemy of the State. In this those with power seek to control and eliminate those who get in their way and use all the tech means at their disposal to track them down. So where are we now?

Defense Advanced Research Projects Agency


This agency is responsible for many of the toys we might want to use and also came up with the idea of linking universities and military establishments electronically so that they would still be able to carry out research and communicate in time of nuclear war. We now call this the internet. DARPA MP4

================================================= Government secrets 30 years/100 years: Kew Whistleblowers - some courts say these are necessary. Some governments go ballistic.

All governments tell lies. The justication for the Iraq war was based on false and massaged information

concerning WMD (The Green Line - Mat Damon) and in Iraq there were some major breaches of human rights, such as Abu Ghraib, while the US still runs the detention center on the part of Cuba that is has (Guantanamo Bay) where there are no rights as we know them. The trial process has been slow and courts not subject to normal rules. The problem is that with modern systems we know more about these and more quickly but such lies are not restricted to the USA. In recent times become more aware of what is called the whistleblower - people who release information about countries or companies that should be secret but are so serious - in some cases os criminal - that some courts and laws protect the people releasing the information. Governments use methods like individual document numbering to identify any such leaks, but once the information is out, the damage is done. It is often more about protecting those in charge than the population. http://www.globalresearch.ca/we-must-not-fail-wikileaks-whistleblower-bradleymanning/5325285 http://www.techdirt.com/articles/20130312/13325322300/recording-bradleymannings-statement-court-leaked.shtml http://news.cnet.com/8301-13578_3-57573707-38/meet-the-corporate-enemies-ofthe-internet-for-2013/?part=rss&subj=news&tag=title http://www.techdirt.com/articles/20130308/13380622263/9th-circuit-appealscourt-4th-amendment-applies-border-also-password-protected-les-shouldnt-arousesuspicion.shtml http://www.techdirt.com/articles/20130308/13380622263/9th-circuit-appealscourt-4th-amendment-applies-border-also-password-protected-les-shouldnt-arousesuspicion.shtml http://www.h-online.com/security/news/item/Spanish-police-arrest-suspecteddeveloper-of-BKA-trojan-1803788.html http://www.h-online.com/security/news/item/Three-arrests-over-police-ransomwarein-Staffordshire-1769145.html http://news.cnet.com/8301-1009_3-57440553-83/notorious-bredolab-virus-creator-issentenced-to-prison/ http://news.cnet.com/8301-1009_3-57565535-83/3-charged-in-malware-schemetargeting-bank-accounts/ http://www.guardian.co.uk/uk/2013/jan/27/google-legal-action-secret-iphone-tracking

Wikileaks and Bradley Manning -

he leaked the documents to Wikileaks because he saw serious problems in US foreign policy. Problems which are as serious as they can be: war crimes, criminal behavior at the highest levels up to Secretary of State Clinton, unethical behavior and bullying of other nations.

While the US wants to put him away (as a soldier he comes under different sets of rules) and also Julian Assange who is holed up in London in an embassy that

has given him sanctuary as Sweden wants to extradite him on a rape case. This may be a pretense to get him to a place where he can be taken to the US and put on trial.

geo/s

16 satellites undersea cables

UKUSA United States, the United Kingdom, Canada, Australia, and New Zealand
Echelon (later)

PUBLIC POLICY

UN - Internet Access as a right

free speech economics

USSR - Chernobyl China - Train (and others) N. Korea

PROFESSIONAL AND ETHICAL RESPONSIBILITIES Code Safe Software security breaking in sending data back (calling home) keyloggers Stuxnet

INTELLECTUAL PROPERTIES

I am going to discuss some things that apply directly to you. Most of the ideas we have looked at so far will (much of the time) affect you indirectly. This stuff is going to affect you if you write your own software:

Tradem Trademark Copyright Patents

Trademark - some sign that identies products


Examples might include the Apple (cherry bite) logo,

Internet Explorer e, and the name of the product itself, such as Colgate or Dell. Think of local examples such as BTS

Or DTAC

I have a host of these that I use to link with articles about the companies. In some ways this may not be legal, but it seems to be accepted practice either by way of screenshot or downloadable image. Apple for example has a massive collection of downloadable stuff that I can use as long as I acknowledge the source: it is a tradeoff and we both win. The difference comes when someone puts that trademark on a product that is not made by the company although the student who puts an Apple logo on an HP computer is not going to get into trouble, the Chinese company that produces fake iPods or iPhones with the Apple logo is, and the courts usually back the big company. Not always. For example, the iPad name in China, the iPhone name in Brazil and the iFone service in Mexico. However in these cases, cash makes a wonderful lubricant.

Copyright is ownership of a piece of work.

I have mentioned before how sites in Vietnam and Russia rip off my photos; and a couple of years ago there were several sites (I found one in California) that just copy the whole article and images, and post it as their own content, sometimes without even a link to the original. Some sites provide a genuine service, and those who copy a couple of paragraphs then link to the original are helpful. There is some debate about the level of text that should be included and some sites, most notably The Hufngton Post are criticised, but their point that they provide exposure for an article that would not otherwise have wide readership, may be valid. No hits does not put jam on the table however. Copyright can apply to several media. As well as the written word, there are photographs, works or Art; and music and videos. The last two have caused many problems in recent years as the RIAA (Recording Industry Association of America ) and MPAA (Motion Picture Association of

America) have tried to protect the failing industries -

falling disk sales and fewer people visiting cinemas - with increases in digital downloads. Even now there is legislation being introduced to force IPs to block users who share les and some people have faced really high bills for sharing. The problem that faces the industry is the same that faced the software industry: why should I pay 3,000 baht when a disk is only 25 baht.

You may also think of the relationship of copyright and plagiarism: instead of printing it and pretending it is yours, you copy it, put it into a paper and tell the teacher it is yours. Cite your references, use references to support your ideas. The amount of outside information should never outweigh your own ideas.

The problem could be one that you have to face: in the class we have discussed the morals/ethics of downloading copies of Adobe Photoshop. Easy enough for you to say now that you cannot afford it; but I ask you to look at your clothes, your watch, your phone and your car. I also suggest you think to the future for the time that you create that great example of software - the killer app, the better mousetrap - and have someone at Phantip sell it for 30 baht on a disk.

Patents
A proof of ownership of a particular idea. Some ideas are stages in the development of a product, some are a product itself. They are issued by a country. Some patents do not apply in some countries. IN 2007 when Steve Jobs announced the iPhone, he caused a great laugh when he said, "And boy have we patented it." There are over 200 patents that apply although some are in dispute. If you create a product that leaps over the opposition, that is a commercial advantage that you want to maintain. Edison for example patented many devices and ideas, including the electric light bulb (1880)

To be honest I borrowed this from The US National Archives http://www.archives.gov/ historical-docs/document.html?doc=11&title.raw=Thomas%20Edison's%20Patent %20Application%20for%20the%20Light%20Bulb

The earliest patent I can nd that appears to bel in use today (there is a God) is for

Coffey's continuous column still. that was led in 1822 Originally used for whisky, it can also be used for rum, gin, vodka and other spirits. Back to the iPhone. One of the patents was for "The Pinch" which most commentators thought was novel and useful. It was disapplowed last year and Apple have to re-apply, but in the meantime, both Microsoft and Samsung

have submitted patents for a pinch and zoom technology. Companies may not le patents in all countries, so a company like Apple would le in US, EU and China (perhapsKorea too to be safe)

ECONOMIC ISSUES FOR COMPUTER ENGINEERING Trademark/copyright Contract Payment Income Taxation Income VAT International liabilities

Final Paper: Exam is scheduled for next Wednesday if we were having one, so I want the paper two days later: Friday That will give me the weekend to cry over the papers and give all the Fs I want.

You might also like