Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help...

26
Ethical Issues

Transcript of Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help...

Page 2: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Teaching Hacking

Is it ethical to teaching hacking skills in a university?

Does this teach necessary skills for defenders?Or does it teach skills only necessary for attackers?How should one teach ethics in such a course?

Ethical Issues 2 / 9

Page 3: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Teaching Hacking

Is it ethical to teaching hacking skills in a university?Does this teach necessary skills for defenders?Or does it teach skills only necessary for attackers?

How should one teach ethics in such a course?

Ethical Issues 2 / 9

Page 4: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Teaching Hacking

Is it ethical to teaching hacking skills in a university?Does this teach necessary skills for defenders?Or does it teach skills only necessary for attackers?How should one teach ethics in such a course?

Ethical Issues 2 / 9

Page 5: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Government Hacking

Should governments be allowed to hack criminal suspects’ computers,assuming a valid warrant?Should governments be allowed to insist that software vendors insert backdoors of some sort?Does your answer change if the back door is overt?

If you’re asked, should you do it?What if the government has explicit legal backing for their request?

What if the request comes from your boss?

Ethical Issues 3 / 9

Page 6: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Government Hacking

Should governments be allowed to hack criminal suspects’ computers,assuming a valid warrant?Should governments be allowed to insist that software vendors insert backdoors of some sort?Does your answer change if the back door is overt?If you’re asked, should you do it?

What if the government has explicit legal backing for their request?

What if the request comes from your boss?

Ethical Issues 3 / 9

Page 7: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Government Hacking

Should governments be allowed to hack criminal suspects’ computers,assuming a valid warrant?Should governments be allowed to insist that software vendors insert backdoors of some sort?Does your answer change if the back door is overt?If you’re asked, should you do it?

What if the government has explicit legal backing for their request?

What if the request comes from your boss?

Ethical Issues 3 / 9

Page 8: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Government Hacking

Should governments be allowed to hack criminal suspects’ computers,assuming a valid warrant?Should governments be allowed to insist that software vendors insert backdoors of some sort?Does your answer change if the back door is overt?If you’re asked, should you do it?

What if the government has explicit legal backing for their request?

What if the request comes from your boss?

Ethical Issues 3 / 9

Page 9: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Encryption

Should there be government-only back doors in encryption systems?

Should suspected criminals be allowed to hide their data?What if the “government-only” proviso couldn’t be implemented?What if the choice is between

1 Back doors in encryption systems?2 Back doors in software?3 Government hacking?

Ethical Issues 4 / 9

Page 10: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Encryption

Should there be government-only back doors in encryption systems?Should suspected criminals be allowed to hide their data?

What if the “government-only” proviso couldn’t be implemented?What if the choice is between

1 Back doors in encryption systems?2 Back doors in software?3 Government hacking?

Ethical Issues 4 / 9

Page 11: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Encryption

Should there be government-only back doors in encryption systems?Should suspected criminals be allowed to hide their data?What if the “government-only” proviso couldn’t be implemented?

What if the choice is between1 Back doors in encryption systems?2 Back doors in software?3 Government hacking?

Ethical Issues 4 / 9

Page 12: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Encryption

Should there be government-only back doors in encryption systems?Should suspected criminals be allowed to hide their data?What if the “government-only” proviso couldn’t be implemented?What if the choice is between

1 Back doors in encryption systems?2 Back doors in software?3 Government hacking?

Ethical Issues 4 / 9

Page 13: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Monitoring

Is it proper to monitor other people’s Internet traffic and computer use tosee if they’ve been hacked?

What about just the metadata and not the content?Who should be allowed to do this? Governments? ISPs? Employers?Software vendors?

Should you build such abilities into your applications?

If consent is sought, would it really be voluntary?

Ethical Issues 5 / 9

Page 14: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Monitoring

Is it proper to monitor other people’s Internet traffic and computer use tosee if they’ve been hacked?

What about just the metadata and not the content?Who should be allowed to do this? Governments? ISPs? Employers?Software vendors?

Should you build such abilities into your applications?

If consent is sought, would it really be voluntary?

Ethical Issues 5 / 9

Page 15: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Monitoring

Is it proper to monitor other people’s Internet traffic and computer use tosee if they’ve been hacked?

What about just the metadata and not the content?Who should be allowed to do this? Governments? ISPs? Employers?Software vendors?

Should you build such abilities into your applications?

If consent is sought, would it really be voluntary?

Ethical Issues 5 / 9

Page 16: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Ransomware

Is it ethical to pay to get your files back?Or does that encourage more such attacks?

What if lives are at stake?What if it’s only money?

Ethical Issues 6 / 9

Page 17: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Ransomware

Is it ethical to pay to get your files back?Or does that encourage more such attacks?What if lives are at stake?

What if it’s only money?

Ethical Issues 6 / 9

Page 18: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Ransomware

Is it ethical to pay to get your files back?Or does that encourage more such attacks?What if lives are at stake?What if it’s only money?

Ethical Issues 6 / 9

Page 19: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Hack-Back

By whom? Governments? Victims? Vendors? Vigilantes?What is an acceptable goal?

Botnet takeover for neutralization?Disinfect machines?Gather evidence?Deter attackers?

What if attribution isn’t certain? What if innocent victims’ computers areused to launch the attack you’re responding to?

Ethical Issues 7 / 9

Page 20: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Hack-Back

By whom? Governments? Victims? Vendors? Vigilantes?What is an acceptable goal?

Botnet takeover for neutralization?Disinfect machines?Gather evidence?Deter attackers?

What if attribution isn’t certain? What if innocent victims’ computers areused to launch the attack you’re responding to?

Ethical Issues 7 / 9

Page 21: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Vulnerability Disclosure

Should researchers disclose vulnerabilities publicly?Should they wait a few months, to let patches be developed anddeployed?

Is Google’s Project Zero ethical?

Does it give them an unfair advantage?

Does it help defenders look for indications of compromise?Or does it teach attackers what to do?Should “bug bounty” programs, where vendors reward researchers whofind holes, include non-disclosure agreements (NDAs)?

Ethical Issues 8 / 9

Page 22: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Vulnerability Disclosure

Should researchers disclose vulnerabilities publicly?Should they wait a few months, to let patches be developed anddeployed?

Is Google’s Project Zero ethical?

Does it give them an unfair advantage?

Does it help defenders look for indications of compromise?Or does it teach attackers what to do?Should “bug bounty” programs, where vendors reward researchers whofind holes, include non-disclosure agreements (NDAs)?

Ethical Issues 8 / 9

Page 23: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Vulnerability Disclosure

Should researchers disclose vulnerabilities publicly?Should they wait a few months, to let patches be developed anddeployed?

Is Google’s Project Zero ethical?

Does it give them an unfair advantage?

Does it help defenders look for indications of compromise?Or does it teach attackers what to do?Should “bug bounty” programs, where vendors reward researchers whofind holes, include non-disclosure agreements (NDAs)?

Ethical Issues 8 / 9

Page 24: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Vulnerability Disclosure

Should researchers disclose vulnerabilities publicly?Should they wait a few months, to let patches be developed anddeployed?

Is Google’s Project Zero ethical?

Does it give them an unfair advantage?

Does it help defenders look for indications of compromise?Or does it teach attackers what to do?

Should “bug bounty” programs, where vendors reward researchers whofind holes, include non-disclosure agreements (NDAs)?

Ethical Issues 8 / 9

Page 25: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Vulnerability Disclosure

Should researchers disclose vulnerabilities publicly?Should they wait a few months, to let patches be developed anddeployed?

Is Google’s Project Zero ethical?

Does it give them an unfair advantage?

Does it help defenders look for indications of compromise?Or does it teach attackers what to do?Should “bug bounty” programs, where vendors reward researchers whofind holes, include non-disclosure agreements (NDAs)?

Ethical Issues 8 / 9

Page 26: Ethical Issues - Columbia Universitysmb/classes/f20/l_ethics.pdf · 2019. 10. 12. · Does it help defenders look for indications of compromise? Or does it teach attackers what to

Questions?

(Eastern towhee, Central Park, October 12, 2019)