Written By KEVIN J. O’BRIEN Published: December 28, 2009 By The New York Times A Report by Michael Abdullah.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Ethics in a Computing Culture
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Computer Security and Penetration Testing
1 MD5 Cracking One way hash. Used in online passwords and file verification.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
Ethics in a Computing Culture
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Cyber Law & Islamic Ethics
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
PRESENTATION START.
Information Age In Which We Live Session 2. Introduction Knowledge is Power What you don’t know will hurt you Business are using information to reel in.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
THREATS TO MOBILE NETWORK SECURITY
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Computer Ethics.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Professor Peter Swire The Privacy Project.
9 Section D: Professional Ethics  Ethics Basics  IT Ethics  Ethical Decision Making  Whistleblowing Chapter 9: The Computer Industry: History, Careers,
 What is conflict of interest and how can it be avoided  What factors should be considered when determining a “ fair wage “
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Computer Forensics Principles and Practices
By Alex Oliver D IGITAL A CCESS Digital access is the ability for people places of the world to access digital technology. People in all societies should.
Types of Electronic Infection
Encryption, continued Public Key encryption and Digital Signatures.
Backdoors: How Will Government Agencies Adapt to Cybersecurity on the Internet? Professor Peter Swire Ohio State University Internet Law Scholars WIP New.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Security CS Introduction to Operating Systems.
Ryan B Lauren C Luisa C Joey F.  Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
ONE® Pages Training Presentation North York General Hospital.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Cryptography & Security
Network security threats
Year 10 ICT ECDL/ICDL IT Security.
The Art of Deception.
Faculty of Science IT Department By Raz Dara MA.
Ethical Hacking.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Computer Ethics.
Computer Security By: Muhammed Anwar.
Operating Systems Concepts
Chapter Goals Define cryptography
Secure Diffie-Hellman Algorithm
Chapter 15: Making Decisions about Computers, Information, and Society
Presentation transcript:

Written By KEVIN J. O’BRIEN Published: December 28, 2009 By The New York Times A Report by Michael Abdullah

Actors: Karsten Nohl – German Computer Engineer, Security Expert: Cracked GSM Code and published it. GSM Association-Industry group in London responsible for the original GSM algorithm. 80% of Cell Phone Users- who could be affected by potential hacking of their encrypted messages, and have personal or professional privacy issues. Situation: A German security expert in Berlin recently broke the GSM encryption code. Not only did he break the code, he then published it on the internet. The code book he published could possibly allow hackers to decrypt cell phone messages and convert steal private information. Currently GSM is used in 80% of cell phones.

Ethical Dilemma: In cracking the GSM code, Karstern broke no law of the country he was in. He has never used the information to listen to a call, nor does he himself distribute the code book publicly. He says his concern was for security reasons, to show a fault in the security of the GSM algorithm. However, his actions have made it possible for anyone who gets the code book to potentially decrypt and listen a cell phone call. Is it ethically acceptable, to act inside of the law, while creating a venue for malicious users to act outside of the law?

Analysis of the Means: However, we must not judge whether an act is ethical by the ends alone. The means by which he went about this process of decoding and publishing his findings. He began by brute force algorithms to decode and compile a record of all of the possible codes, forming a complete copy of the GSM code book. This in and of itself may not be considered unethical, by the fact that a mans private endeavors especially in a field of expertise may delve into the weaknesses of a system for ethical reasons. The problem arises when he chose to publish the information publicly, instead of dealing with the GSM association privately on the matter allowing them time to upgrade and prepare their algorithm for added security. Analysis of the Ends: The end result if a complex ethical issue. While he has created a venue for malicious users to listen in to mobile phone calls, which by no means is ethically praiseworthy, he has also presented a glaring issue with the most popular cell phone encryption code. While some may demonize this act, there is some benefit to this. By making it public he prevented future hackers from breaking the code and privately stealing calls, now that this is a public issue, officials can take measures to update and improve the existing algorithms, and prepare for malicious users who might try to listen in on calls. Therefore, the ends seem to denote that there is likely more good to come of this than evil.

Conclusion: In conclusion, I believe that Mr. Nohl’s motivation may have been for increased security for mobile phone users. However, he went about accomplishing this goal in an unethical way. Publicly publishing this code book, is the digital equivalent of legitimately selling a gun to a man you know is going to use it to rob a gas station. Mr. Nohl is an intelligent man and should know this code book can and will be used to steal and listen to innocent people’s conversations. In fact this is the reason he published it publically, to use this fear as pressure to force the officials of cell phone companies to act. While there needs to be more advanced security implemented in cell phones, his act remains selfish and unethical.