SDI: A Violation of Professional Responsibility David Parnas Presented by Andres Ramirez.

Slides:



Advertisements
Similar presentations
Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Advertisements

EECE499 Computers and Nuclear Energy Electrical and Computer Eng Howard University Dr. Charles Kim Fall 2013 Webpage:
Phil 160 Kant.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
1 Design by Contract Building Reliable Software. 2 Software Correctness Correctness is a relative notion  A program is correct with respect to its specification.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
CS575 - Software Design SDI: A Violation of Professional Responsibility A presentation by: Rong Gu Cincy Francis Amitkumar Dhameja.
Lecturer: Sebastian Coope Ashton Building, Room G.18 COMP 201 web-page: Lecture.
1 An Overview of Computer Security computer security.
CSCD 555 Research Methods for Computer Science
Software Engineering Code Of Ethics And Professional Practice
Soft. Eng. II, Spr. 2002Dr Driss Kettani, from I. Sommerville1 CSC-3325: Chapter 9 Title : Reliability Reading: I. Sommerville, Chap. 16, 17 and 18.
Lecture 11 Reliability and Security in IT infrastructure.
Business, Accounting and Personal Ethics. Sources Used Trevino, Linda, Gary Weaver, David Gibson, and Barbara Ley Toffler, “Managing Ethics and Legal.
Questions from a patient or carer perspective
General Equilibrium Analysis A Technological Advance: The Electronic Calculator Market Adjustment to Changes in Demand Formal Proof of a General Competitive.
1 “Star Wars” Revisited A Case Study In Ethics and Safety-Critical Software Professor Kevin Bowyer University of Notre Dame Copyright, Kevin W. Bowyer,
Introduction to Network Defense
1 of 22 General Equilibrium and the Efficiency of Perfect Competition General Equilibrium Analysis Allocative Efficiency and Competitive Equilibrium The.
4 Chapter Business Ethics and Social Responsibility pp
Achieving Better Reliability With Software Reliability Engineering Russel D’Souza Russel D’Souza.
Evaluation of Safety Critical Software -- David L. Parnas, -- A. John van Schouwen, -- Shu Po Kwan -- June 1990 Presented By Zhuojing Li.
What is Enterprise Architecture?
1 Today Null and alternative hypotheses 1- and 2-tailed tests Regions of rejection Sampling distributions The Central Limit Theorem Standard errors z-tests.
Principles of Entrepreneurship
Marketing Ethics and Social Responsibility
1 OM2, Supplementary Ch. D Simulation ©2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Architectural Design l Establishing the overall structure of a software system.
CS 110: Introduction to Computer Science Frequently asked questions about a CS major and CS career.
1 Psych 5500/6500 The t Test for a Single Group Mean (Part 4): Power Fall, 2008.
Lecture 7: Requirements Engineering
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Architectural Design l Establishing the overall structure of a software system.
From Quality Control to Quality Assurance…and Beyond Alan Page Microsoft.
What is Failure. “an IS system is some combination of hardware, communication technology and software designed to handle information related to one or.
ICT IGCSE.  Introducing or changing a system needs careful planning  Why?
COMP 208/214/215/216 – Lecture 8 Demonstrations and Portfolios.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS Instructor Ms. Arwa Binsaleh.
Business Ethics & Social Responsibility
For Your Consideration… What would you do?. Ethics Is this most people’s perception of a salesman?
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Leadership By: Nick Meress. What is a leader? Being a leader comes from how you were born and raised. It doesn’t mean you might be the president of the.
1 Overheads from Parnas’ Presentation The next slides are transcribed versions of (most of) the transparencies in Parnas’ presentation.
Paul L. Schumann, Ph.D. Professor of Management MGMT 305: Business Ethics Fundamentals 1© 2008 by Paul L. Schumann. All rights reserved.
Connectsions 2015 SDM Panel ED McGrady CNA 3003 Washington Blvd. Arlington VA
Business ethics and social responsibility
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Can North Korea Build More Nuclear Weapons?. A North Korean People’s Army naval unit tests a new type of anti-ship cruise missile in this undated photo.
OHT 1.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 The uniqueness of software quality assurance The environments for which.
Observing the Current System Benefits Can see how the system actually works in practice Can ask people to explain what they are doing – to gain a clear.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Planning and Organizing Chapter 13. The Planning Function Planning for a business should stem from the company’s Business Plan – The business plan sets.
©Copyright Copper Services 2012 Vendor Relationships Keys to Successful Communication Dete Waehner Manager of Vendor Partnerships, Copper Services Connecting.
What makes a leader? A leader is a person who directs or who is in charge of others. Leadership is a blend of talents, qualities and skills that a leader.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Chapter 5:Architectural Design l Establishing the overall structure of a software.
Debugging Intermittent Issues
Evaluating Existing Systems
Software Testing An Introduction.
Debugging Intermittent Issues
Evaluating Existing Systems
12 General Equilibrium and the Efficiency of Perfect Competition
MIGRATING TO NEW TECHNOLOGY
How to describe your problem to a pc technician. Are you looking for PC technician near me? Ok, so you have decided that you are not able to repair the.
SDI: A Violation of Professional Responsibility
What do Samples Tell Us Variability and Bias.
CS-480b Network Security Dick Steflik
Presentation transcript:

SDI: A Violation of Professional Responsibility David Parnas Presented by Andres Ramirez

Roadmap SDI Professional Responsibility Conflicts of Interests Discussions between SDI & Parnas Advice Open Questions

What is SDI? Strategic Defense Initiative. Star Wars Program R&D on CS problems in space-based defense systems. Parnas served for 2 months Daily paycheck of $1000!! SDI PanelReaganParnas

More Details on SDI Free us from nuclear weapons… Somehow make nuclear strategic missiles impotent and obsolete. The plan? Network of satellites carrying sensors, weapons & computers to detect and intercept ICBM’s.

Nature of Star Wars Emphasis on sensors & weapons … usually ignored the computer limitations associated with these. Vast amounts of raw data to be processed. Detect missile firings Determine source of the attack Compute attacking trajectories Discriminate decoys from real targets Aim & fire weapons. “Software is he glue that holds such systems together.”

Limits on Software Technology Testing & correctness. Hardware vs. Software “Testing can show the presence of bugs, never their absence.” - Dijkstra. Unrealistic to expect a real program to work properly the first time it is really used. Extensive use under actual operating conditions.

More SDI Difficulties Software based on assumptions about targets and decoy characteristics. Could be exploited. High reliability requires redundancy in satellite communications Unusually expensive Quite vulnerable

SDI Reliability, is it even possible? Only IF failures of individual components are statistically independent. Are they retarded? In a coordinated attack this is NOT the case. Overload a system… Decoys consume resources. Ignore or fail. --> Catastrophic.

SDI… yet more difficulties. Missile tracking Transfers from one satellite to the next Requires data passing. Distributed Real-Time Database. Impossible when network components are unreliable. … expect unreliability during a real battle. Damaged stations.

Issue of Testing Impossible. Would require “practice” nuclear wars? Partly damaged satellites? Difference between this and other weapon systems: “No opportunity to modify the software during of after its first battle.”

Professional Responsibility 1.I am responsible for my own actions and cannot rely on any external authority to make decisions for me. 2.I cannot ignore ethical and moral issues. Determine whether task is beneficial to society. 3.I must make sure I am solving the real problem, not just some short-term satisfaction.

Initial Views Similar posture to Einstein’s: “To hold a ‘no arms’ policy would be to place the world at the mercy of its worst enemies.” Neither arms race nor nuclear weapons are consistent with this view.

Someone say “Funds”? Conflict of interest? Parnas had a project within the U.S. Navy that could benefit from the SDI funding. The panel was actually full of these conflicts of interest.

The Panel Begins Presentations were done poorly. Technical terms not defined. Numbers generated without evidence. Ignored the “big picture” Everyone had a “pet” project.

Notion of Trustworthiness U.S.A? No full trust, then arms race won’t stop. U.S.S.R? Assume its ‘effective’, improve its offensive forces. U.S.A? Build more nuclear weapons in order to compensate. *Creates a worse scenario than it was before*

Parnas Questions the Panel No one disagreed. Continue the program. Advance the state of Computer Science.

Reaction…

SDI’s “damage control” “100,000 errors and would still work properly.” … yeah, which ones? “No fundamental law claiming it could not be done.” Issue is with trust, not building it. “Demanding perfection.” Just being able to trust it… that is, no major flaws.

90% Distraction Three layers, each 90% effective, then the overall leakage would be < 1%: No basis whatsoever for the 90% figure. Assumes performance of each layer is independent… (there are many links) Statistically makes no sense Only works for describing a random process.

“Loose Coordination” Distraction Eastport group report: SDI could be trustworthy if each battle station functioned autonomously Reduce communication between stations. Some issues No definition of terms. No structure is described. Plenty of contradictions.

Three claims from Eastport 1.It decomposes the program into a set of smaller programs. Each one can be built and tested. 2.Battle stations would be autonomous. Some degree of independence. 3.Testing individual stations “possible” Infer behavior of the whole system.

Assumptions by Eastport 1.Stations do not need data from other satellites. 2.These “smaller” station programs won’t run into the same previous problems. 3.Explicit communication between stations. 4.Collection of communicating systems differs from a single system.

FALSE 1.Data from other satellites HAS to be used. 2.Impossible to test in actual operating conditions… thus still no trust. 3.Weapons might affect sensors. a)Isolation is not the same as a grid test. 4.Distributed systems are harder than centralized systems.

Questions from Parnas Why fund SDI? Panel is trivializing problems such that: Projects seem doable. Funds keep coming in. SDI is creating a false sense of security Society has no clue of what is going on. SDI professionals know this.

Questions from Parnas What should be the role of academic institutions? Professor tenure? Speak freely. Institutional pressures. Fund us or die.

Should SDI be pursued? State the following very clear: An effective shield is unlikely, and a trustworthy one impossible. Do not use SDI as an excuse to fund technological advances in Computer Science.

Episode VII, Bush Strikes Back Funding in the U.S.A. in % $137 billion. $54.8 billion does not go into weapons & STS -3.3% 3rd year decrease. Pentagon $74.1 billions $63 billion for weapons.

Open Questions After 9/11 funding has been significantly diverted to weapons & defense research. As graduate students desperately seeking funds, would you take anything that came in? Assume its unrealistic, over-hyped, likely to fail.

Open Questions “Customer does not know what he actually wants… we do.” Obviously this happens in industry… but We are in a bind. Need contracts and payments Customers don’t always like to be treated as if they don’t know what they are talking about. Superiors don’t care about customers.