How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.

Slides:



Advertisements
Similar presentations
ALTERNATIVE METHODS OF DISPUTE RESOLUTION (ADR)
Advertisements

Ethics and Social Responsibility CHAPTER 5. Copyright © 2008 by South-Western, a division of Thomson Learning. All rights reserved. 2 Learning Objectives.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
Vote Hacking Kenny Denmark - October For an upcoming election, Washington D.C. was preparing a system to allow some voters to send in their ballots.
Basic Ethics. Is it Ethical Hire a recent College Graduate and then tell them due to financial constraints that no longer needed? Monitor employees use.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
Andrew DePriest 4/12/2011 CSCE 390 – 001 Professional Issues in Computer Science and Engineering (Article found in the March 14, 2011 edition of ACM TechNews,
The Threat of Cyber War The Issue of Cyber Security.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
Computational Thinking William C. Ridgeway 4/17/2011 CSCE 390 Professional Issues in Computer Science and Engineering.
Garrett DeBruin CSCE390 Professional Issues In Computer Science feb/feb html#
By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Net Neutrality COMP 380 Presentation Alex Cook Prince Yabani.
What you talk 'in bout?. Net Neutrality prevents Internet providers from blocking, speeding up or slowing down Web content based on its source, ownership.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
Understand your role 1 Standard.
What you talk 'in bout?. For instance, AT&T decided to get into the Radio business in They used the station WEAF and its affiliates as an experimental.
Network neutrality is the idea that all internet traffic should be treated equally. It does not matter who is downloading and what is being downloaded.
What is Ethics? Ethics is concerned with: n The values and guidelines by which we live, and how they are justified n Standards of right and wrong n Identification.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
A’Lexus Williams CSC 104 Final Exam Part 1. Societal Topics Weeks 7 & 8 Internet Regulation-is basically restricting or controlling access to certain.
Chapter 4 Ethics, Law, Business. I. Ethics and Values Why Study Ethics? What is Ethics? Value Systems and Moral Beliefs 6 Influences That Shape Value.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
By Alex Oliver D IGITAL A CCESS Digital access is the ability for people places of the world to access digital technology. People in all societies should.
Jessica Lavoie CSC 101 November 27, Societal Topics Weeks 7 and 8 Internet Regulation Internet regulation is restricting or controlling access to.
ICS424 Computer and Professional Ethics Aj. Thoranin Intarajak.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
Our Freedoms – Expression: Speech and Information.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Special Railways Phase III Proposed approach to regulatory changes Jakarta 16 May 2011.
Fight For Your Rights! By: AJ Campbell.
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
AP GOVERNMENT Foundations of Government. What is Government? Set of institutions that establish public policy Many different types and characteristics.
Human Resource Management Lecture-38. Summary of Lecture-37.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2004 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Ethics.
Ethics Wednesday, 10th Week. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop.
Influences on the Government Interest Groups – Lobbyists 1000s in Canada, top examples include: Greenpeace, Amnesty International, the Canadian Heart &
Information Systems Unit 3.
Issues in New Media: Net Neutrality. What is “net neutrality?” What is Net Neutrality? (Video)(Video) Net Neutrality (Video)(Video) Save the Internet!
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
Established standards of care given with respect and consideration, regardless of race, age, or payment source. Information about your illness, possible.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
F Designed to give you knowledge and application of: Section A: Business organisational structure, governance & management A1. The business organisation.
Archie B. Carroll Ann K. Buchholtz
What is Ethics? Ethics: A code of moral principles used to set standards of “good” and “bad” Ethical Behavior: What is accepted as good and right according.
UN vs the Internet Summary
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Ethical Management 7-3 Goals Justify the need for ethical management.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
International business ethics
CSCE 390 Professional Issues in Computer Science and Engineering Ch
American Political Culture and Beliefs
WikiLeaks avoids shutdown as supporters go on the offensive
CHAPTER 3: ETHICS AND CORPORATE SOCIAL RESPONSIBILITY
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CS-480b Network Security Dick Steflik
Presentation transcript:

How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch for Internet”. New York Times. February 15, The New York Times Company. - ALEX PASTERNACK. “Egypt, Net Neutrality, and the Ethics of Internet Suicide”. Motherboard.tv. January 30, Motherboard-IPTV LLC.

Article Summary On 02/14/11, Former Egyptian President Mubarak nearly shutdown the internet throughout all of Egypt. The shutdown was done in a matter of minutes and lasted approximately 5 days. The move was seen as shocking to many technological experts. The internet is well known for its robustness and accessibility. Egypt managed to accomplish this by withdrawing over 3,500 BGP routes. This heavily affected nearly every ISP (and every ISP customer) in Egypt. Most of the routes are connected to a very limited number of international portals that are tightly controlled by the Government. These portals are connected to servers hosted by companies such as Google and Yahoo. In turn, this caused many domestic network problems since these servers were hosted in a different country.

8-Step Decision Making Process 1) The ethical issue lies with the government having the power to restrict internet access to not only its own people, but to outside people as well. 2) The two primary stakeholders are the (former) Egyptian government and the Egyptian people. The Egyptian government's desired outcome was to suppress communication between citizens who desired to overthrow the Egyptian government. The Egyptian people's desired outcome was to be able to communicate freely and embrace their right to access the Internet. 3) The 1 st extreme solution would be to cut off all access to the internet (which is what was nearly accomplished). The 2 nd extreme solution is to allow free, unrestricted access to the internet. A “compromise” solution would be to allow access to most sites, but to restrict others. The best-case outcome for either party would be their respective extreme solution, and the worst-case outcome would be the opposite extreme solution. I would be perfectly fine with the worst- case outcome for the Egyptian Government, and I would refuse to tolerate the worst-case outcome for the Egyptian People.

8-Step Decision Making Process 4) Not only would I permit everyone to use the solution I chose, I would encourage everyone to chose it. I believe it is the right of the individual to access the Internet if they so chose and use it as a means of communication between other individuals. This is regardless of any intent. 5) I believe this solution is natural, as most people naturally desire freedom. This solution may be viewed as a little excessive (hate speech, dangerous information, etc.), but ultimately it is the policy adapted by most countries in the world. 6) This solution would likely illicit a majority agreement that it is the most efficient means to an end. I believe sharing knowledge easily and quickly will produce the greatest good for the greatest number of people. 7) I am definitely committed to this solution within my own conscience. I was raised on the belief of embracing your own personal freedom as a citizen of the United States, and this is a decision I embraced without outside influence. 8) Idealism seemed to play the greatest role in my solution. While I am mostly a realist at heart, I believe the sharing of information should be uninhibited by outside influences such as a government entity.

ACM Code The action of cutting off the internet to the majority of the Egyptian people harmed human well-being as it prevented the people from acting against oppression. It also failed to respect the opinion of the people and instead only acted in the interest of the government. The government did not take any precaution to not discriminate against its own people and did not treat them fairly. Legally, this did not violate many laws as the action was performed by the governing entity itself. Due to the totalitarian nature of the government, they had no “contract” to honor with the people. However, this obviously violated section 2.7 of the code as this action did the exact opposite of sharing technical knowledge. Nearly the entire 3 rd section of the ACM Code was violated in the government's action. They failed to serve public interest, degraded the quality of life in for its citizens, enforced unestablished rules of organizational computer resources, and failed to support policies that protected the dignity of the users. While the Egyptian government has no relation to ACM, they would have likely had any relationship with the organization terminated after their actions. This is especially true since the government no longer exists and was overthrown by the people they failed to serve.