CS575 - Software Design SDI: A Violation of Professional Responsibility A presentation by: Rong Gu Cincy Francis Amitkumar Dhameja.

Slides:



Advertisements
Similar presentations
Time Management By Zahira Gonzalez.
Advertisements

EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
Is Same-Sex Marriage Wrong?
How does the First Amendment Protect Free Expression?
Intrapersonal Conflict
W5HH Principle As applied to Software Projects
Introduction to Ethics Lecture 9 The Challenge of Cultural Relativism By David Kelsey.
1 “Star Wars” Revisited A Case Study In Ethics and Safety-Critical Software Professor Kevin W. Bowyer University of Notre Dame Copyright, Kevin W. Bowyer,
Stockholder vs Stakeholder Two different Views about the purpose and aims of business.
1 An Overview of Computer Security computer security.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 An Introduction to Software Engineering.
Preserving the ABM Treaty Written By: Sidney D. Drell; Philip J. Farley; David Holloway International Security, Vol. 9, No. 2. (Autumn, 1984), pp
Prototyping. CS351 - Software Engineering (AY2004)2 Scenario Customer: “We would like the word processor to check the spelling of what is typed in. We.
SDI: A Violation of Professional Responsibility David Parnas Presented by Andres Ramirez.
Software Engineering Code Of Ethics And Professional Practice
Soft. Eng. II, Spr. 2002Dr Driss Kettani, from I. Sommerville1 CSC-3325: Chapter 9 Title : Reliability Reading: I. Sommerville, Chap. 16, 17 and 18.
Frequently asked questions about software engineering
Lecture 1.
Software Engineering Lecture No:12. Lecture # 7
Numerous people feared that the thoughts were the more nuclear weapons a country had the more power they had.
Computational Thinking Related Efforts. CS Principles – Big Ideas  Computing is a creative human activity that engenders innovation and promotes exploration.
1 “Star Wars” Revisited A Case Study In Ethics and Safety-Critical Software Professor Kevin Bowyer University of Notre Dame Copyright, Kevin W. Bowyer,
thinking hats Six of Prepared by Eman A. Al Abdullah ©
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 24 Slide 1 Critical Systems Validation 1.
Campaigning jef training days June definition campaign = an operation or series of operations energetically pursued to accomplish a purpose.
Section 2: Science as a Process
Chapter 1- Introduction
1 Agile is Dumb. 2 Look at Moodle List of Essays Get in groups of 4-5 Divide and read the readings in the category “agile is dumb” – About 20 minutes.
Evaluation of Safety Critical Software -- David L. Parnas, -- A. John van Schouwen, -- Shu Po Kwan -- June 1990 Presented By Zhuojing Li.
3- System modelling An architectural model presents an abstract view of the sub-systems making up a system May include major information flows between.
APUSH - Spiconardi HEATING UP THE COLD WAR. SPUTNIK The first artificial earth satellite launched in 1957 by the Soviet Union The United States re-evaluated.
1 An Introduction to Software Engineering. 2 Objectives l To introduce software engineering and to explain its importance l To set out the answers to.
Testing -- Part II. Testing The role of testing is to: w Locate errors that can then be fixed to produce a more reliable product w Design tests that systematically.
Teams Dale W. Bomberger D.ED. ACSW Community Services Group
Highlights – Digital Literacy. An operating system (OS) is the most important program that runs on your computer. Every general-purpose computer must.
Proposal Writing Communication 2. Proposals. What is a Proposal? A proposal is a written report that seeks to persuade the reader to accept a suggested.
LEVEL 3 I can identify differences and similarities or changes in different scientific ideas. I can suggest solutions to problems and build models to.
How to Read Research Papers? Xiao Qin Department of Computer Science and Software Engineering Auburn University
Software Engineering Saeed Akhtar The University of Lahore Lecture 6 Originally shared for: mashhoood.webs.com.
Introduction to Ethics Lecture 9 The Challenge of Cultural Relativism By David Kelsey.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development 3.
LABORATORY MANAGEMENT The Administrative Process.
Logic. What is logic? Logic (from the Ancient Greek: λογική, logike) is the use and study of valid reasoning. The study of logic features most prominently.
Strategic Defense Imitative.  In 1979, the Cold War was still raging between the United States and the USSR  Both countries had a large number of nuclear.
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
Introduction to Earth Science Section 2 Section 2: Science as a Process Preview Key Ideas Behavior of Natural Systems Scientific Methods Scientific Measurements.
Agents that Reduce Work and Information Overload and Beyond Intelligent Interfaces Presented by Maulik Oza Department of Information and Computer Science.
CPSR-MIT Debate Michael Dertouzos, moderator David Parnas, against SDI (Joseph Weizenbaum, against) Charles Seitz, for SDI (Danny Cohen, for)
Chapter 1: Fundamental of Testing Systems Testing & Evaluation (MNN1063)
Csci5233 computer security & integrity 1 An Overview of Computer Security.
1 Overheads from Parnas’ Presentation The next slides are transcribed versions of (most of) the transparencies in Parnas’ presentation.
Can North Korea Build More Nuclear Weapons?. A North Korean People’s Army naval unit tests a new type of anti-ship cruise missile in this undated photo.
Software Engineering Chapter 1- Introduction. Topics covered  Professional software development  What is meant by software engineering.  Software engineering.
Figures – Chapter 1. Figure 1.1 Frequently asked questions about software engineering QuestionAnswer What is software?Computer programs and associated.
Chapter 1- Introduction Lecture 1. Topics covered  Professional software development  What is meant by software engineering.  Software engineering.
©Ian Sommerville 2000Dependability Slide 1 Chapter 16 Dependability.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 An Introduction to Software Engineering.
OCTAVE By Matt White. OCTAVE  OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a risk-based strategic assessment and planning.
Chapter 9 Introduction to the t Statistic
CompSci 280 S Introduction to Software Development
Shouldn’t we have started with this?!?
An Introduction to Software Engineering
Chapter 1- Introduction
Introduction Edited by Enas Naffar using the following textbooks: - A concise introduction to Software Engineering - Software Engineering for students-
Chapter 1- Introduction
Frequently asked questions about software engineering
Cuban Missile Crisis.
Introduction Edited by Enas Naffar using the following textbooks: - A concise introduction to Software Engineering - Software Engineering for students-
SDI: A Violation of Professional Responsibility
Presentation transcript:

CS575 - Software Design SDI: A Violation of Professional Responsibility A presentation by: Rong Gu Cincy Francis Amitkumar Dhameja

CS575 - Software Design SDI: A Violation of Professional Responsibility Contents: 1. SDI – An Overview 2. Parnas & SDI 3. The Role of Computers 4. The Decision to Act 5. Some Critical Issues 6. Broader Questions 7. Parnas’ Advice 8. Questions 9. Our Opinion

CS575 - Software Design SDI - An Overview Strategic Defense Initiative:  A U.S. government program responsible for research and development of a space-based system to defend the nation from attack by strategic ballistic missiles  Popularly referred to as “Star Wars”  Announced by President Ronald Reagan in a speech in March of 1983

CS575 - Software Design SDI - An Overview Strategic Defense Initiative:  Administered by the Strategic Defense Initiative Organization (renamed Ballistic Missile Defense Organization, 1993)  Under Department of Defense, assisted by NASA

CS575 - Software Design SDI - An Overview SDI Aims:  To develop a network of satellites carrying sensors, weapons and computers  To detect ICBMs and intercept them in mid-air  To free us from the fear of nuclear weapons, and make nuclear strategic missiles impotent and obsolete

CS575 - Software Design SDI - An Overview “Some say it will bring war to the heavens. But its purpose is to deter war in the heavens and on earth. Now some say the research would be expensive. Perhaps, but it could save millions of lives, indeed, humanity itself.” - President Ronald Reagan

CS575 - Software Design SDI – A Software Classification Four Classes of Usage 1. Man-rated: Software so important and critical that lives may depend on it. Examples: SDI, ATC, Medical device software 2. Enterprise-rated: Software critical to the uninterrupted operation of an enterprise. Examples: ATMs, Web-commerce software.

CS575 - Software Design SDI – A Software Classification Four Classes of Usage 3. Good-enough: Business software not critical but maybe used frequently. Examples: Personal productivity applications, much client & single user software 4. Don’t-care: Non-critical, business or personal entertainment software. Examples: Games, seldom used utilities

CS575 - Software Design Parnas & SDI Parnas’ Involvement in SDI :  Approached by the SDIO in May of 1985  $1000/day SDIO Panel on Computing in Support of Battle Management  Resigned 2 months later

CS575 - Software Design Parnas & SDI Professional Responsibility: A professional  Is responsible for his own actions and cannot rely on any external authority to make his decisions for him  Cannot ignore ethical and moral issues  Must make sure that he is solving the real problem, not simply providing short-term satisfaction to his supervisor  Shouldn’t hesitate to “blow the whistle”

CS575 - Software Design Parnas & SDI Parnas’ Early Doubts:  Whether any such system could meet the requirements  Possible conflict of interests  Whether such a system would be trustworthy  Would it be useful to build a system we did not trust

CS575 - Software Design Parnas & SDI Why trustworthiness is essential: If the system is not trustworthy  US will not abandon deterrence and nuclear missiles  Seeing both a “shield” and missiles, USSR would feel impelled to improve its offensive forces  US not trusting its defense, would join in, in the arms race  Result – a more dangerous world, instead of a safer one

CS575 - Software Design The Role of Computers Computers must:  Process and analyze vast amounts of data produced by the sensors  Detect missile firings, determine source, compute trajectories  Discriminate between warheads and decoys  Aim and fire the weapons Software is the glue that holds the system together, if software is not trustworthy, the system isn’t either!

CS575 - Software Design The Role of Computers Limits of Software Technology:  Lack of validation methods mean we cannot expect a real program to work properly the first time it’s used  Tests/simulations fail to uncover all serious problems  Reliability & trustworthiness – only through extensive use.

CS575 - Software Design Why Software for SDI is Difficult  Based on assumptions about target and decoy characteristics controlled by attacker  Espionage could render it worthless, so could overloading  Dependence on communicating computers in satellites makes it vulnerable

CS575 - Software Design  A satellite will require data from other satellites to assist in tracking, discrimination & countering noise  Realistic testing of hardware & software through “practice” nuclear wars impossible  MUST WORK THE FIRST TIME Why Software for SDI is Difficult

CS575 - Software Design The Decision to Act Some reasons Parnas got in support of SDI:  Research money would advance the state of computer science!  The money was going to be spent anyway and Parnas should help to see it well spent!  There could be 100,000 errors in the software and it would still work properly!

CS575 - Software Design The Decision to Act Some reasons Parnas got in support of SDI:  There was no fundamental law of computer science that said the problem could not be solved!  Parnas – and other SDI critics – are demanding perfection!

CS575 - Software Design The Decision to Act Parnas Resigns…  Found no scientist who disagreed with his conclusions  Every reply argued with statements other than those Parnas had published  “Taking money allocated for a shield against nuclear missiles, while knowing that such a shield was impossible, seemed like fraud to me” – Parnas

CS575 - Software Design Some Critical Issues The “90%” Distraction  3 layers, each 90% effective – overall leakage is less than 1% as effectiveness multiplies Parnas reveals  90% figure picked for illustration  Assumes performance of each layer is independent of others  Percentage???

CS575 - Software Design The “Loose Coordination” Distraction (Eastport Group, Dec. 1985)  Phase I architectures – excessively tight coordination between “battle stations”  Software difficulties could be overcome with loose coordination  New Phase I studies be started Some Critical Issues

CS575 - Software Design The “Loose Coordination” Distraction Parnas Argues  Loose coordination???  Loose coordination – reduced communication between stations  Later sections discuss need for extensive communication – Inconsistency Critical Issues

CS575 - Software Design Eastport Group’s Unstated Assumptions  Battle stations do not need data from other satellites to perform their functions  False!!!  Data from other satellites is essential for accurate tracking and discrimination between warheads & decoys Critical Issues

CS575 - Software Design Eastport Group’s Unstated Assumptions  An simple battle station is a small software project that will not run into software difficulties described before  False!!!  Each battle station is unlikely to work, impossible to test, impossible to trust Critical Issues

CS575 - Software Design Eastport Group’s Unstated Assumptions  The only interaction between the stations is by explicit communication  False!!!  Communication through weapons, sensors and through shared targets. Weapons, destruction of targets creates noise. Critical Issues

CS575 - Software Design Eastport Group’s Unstated Assumptions  A collection of communicating systems differs in fundamental ways from a single system  False!!!  A collection of communication programs is mathematically equivalent to a single program. In practice, distribution makes the problem harder, not easier Critical Issues

CS575 - Software Design Some Critical Issues 1985 CPSR-MIT Debate: 1985 CPSR-MIT Debate: David Parnas, Joseph Weinazenbaum (Against SDI) v.s. Charles Seitz, Danny Cohen (In favor of SDI)

CS575 - Software Design Some Critical Issues Parnas’ arguments:  Specifications cannot be known in advance  Realistic testing is essentially impossible  Hard real-time deadlines do not allow repair during use  No foreseeable advance in software tech changes this  Therefore – It is not possible to construct SDI software that you could trust to work

CS575 - Software Design Some Critical Issues Steitz’s arguments:  The current objective of SDI is to conduct the vigorous research necessary to build a defense system  Such a system can be written using conventional software techniques coupled with radical hardware architecture  This will greatly aid in the testing, simulation and modification of SDI

CS575 - Software Design Some Data on SDI TOP 10 SDI contractors :($Thousand) Source: Council on Economic Priorities 1987

CS575 - Software Design Some Data on SDI Distribution of requested SDI funding in major research areas in FY1985:($ Million) Source: Waller et al. 1986: 15

CS575 - Software Design Broader Questions  Is SDIO sponsored work of good quality?  Phase I studies – Eastport vs. SDIO contractors/evaluators  Big promises, low quality  Bypasses scientific review processes, no real scientific contribution

CS575 - Software Design Broader Questions  Do those who take SDIO funds really disagree with Parnas?  Remember the reasons Parnas got in support of SDI?  The blind led by those with their eyes shut  Often people indulge in unprofessional behavior just to not displease the customer

CS575 - Software Design Broader Questions  The role of academic institutions  Institutional pressures in favor of accepting research funds from any source  A researcher judged on his ability to attract funds  DoD is a major administrator of research funds – consequently many institutions are working on SDIO

CS575 - Software Design Broader Questions  Should we pursue SDI for other reasons? Parnas says  “Good research stands on its own merits; poor research must masquerade as something else”  “Over funded research is like heroin, it leads to addiction, weakens the mind, and leads to prostitution” – Prof. Janusz Makowski

CS575 - Software Design Parnas’ Advices Determine participation in defense projects by:  Considering effectiveness of project  Prioritizing legitimate defense interests of the country  Emphasizing individual responsibility

CS575 - Software Design Our Opinion Is SDI really impossible???  As our technologies evolve the system becomes more realistic  Present systems show some signs of success  Reliability/trustworthiness can be achieved through testing  Testing can be done via computer simulations (e.g. Nuclear Tests are no longer necessary)  Changes in hardware (Sensors, weapon delivery systems, etc.) can compensate for no advances in Software technology  Better algorithms should be developed to counter noise, detect decoys, etc.  “SDI is the way to go” – Amit, Cincy, Rong

CS575 - Software Design Questions