diff options
author | elioat <elioat@tilde.institute> | 2023-08-23 07:52:19 -0400 |
---|---|---|
committer | elioat <elioat@tilde.institute> | 2023-08-23 07:52:19 -0400 |
commit | 562a9a52d599d9a05f871404050968a5fd282640 (patch) | |
tree | 7d3305c1252c043bfe246ccc7deff0056aa6b5ab /js/games/nluqo.github.io/~bh/hackers.html | |
parent | 5d012c6c011a9dedf7d0a098e456206244eb5a0f (diff) | |
download | tour-562a9a52d599d9a05f871404050968a5fd282640.tar.gz |
*
Diffstat (limited to 'js/games/nluqo.github.io/~bh/hackers.html')
-rw-r--r-- | js/games/nluqo.github.io/~bh/hackers.html | 417 |
1 files changed, 417 insertions, 0 deletions
diff --git a/js/games/nluqo.github.io/~bh/hackers.html b/js/games/nluqo.github.io/~bh/hackers.html new file mode 100644 index 0000000..a2348fd --- /dev/null +++ b/js/games/nluqo.github.io/~bh/hackers.html @@ -0,0 +1,417 @@ +<HTML> +<HEAD> +<TITLE>Computer Hacking and Ethics</TITLE> +</HEAD> +<BODY> +<H1>Computer Hacking and Ethics</H1> +<CITE>Brian Harvey<BR>University of California, Berkeley</CITE> + +<P>[A slightly different version of this paper was written for the +``Panel on Hacking'' held by the Association for Computing Machinery in +April, 1985. Thanks to Batya Friedman, Donn Parker, and Carter Sanders for +their comments on early drafts.] + +<BLOCKQUOTE> +<P>[Neal Patrick] said he and his friends, who named +themselves the ``414s'' after the Milwaukee area code, did not +intend to do any damage and did not realize they were doing +anything unethical or illegal. In fact, when asked [at a +Congressional subcommittee hearing] at what point he questioned +the ethics of his actions, he answered, ``Once the FBI knocked +on the door.'' + +<P>-- "`Common Sense' Urged on Computer Break-Ins," +26 Sept 83; Copyright 1983 New York Times News Service +</BLOCKQUOTE> + + +<P>It's no secret that a mature sense of ethics is something a person +develops over time. Parents are supposed to exercise authority over their +children because the children are not expected to know how to make certain +decisions for themselves. We have a juvenile court system separate from the +adult criminal court system because we believe that a young person is not +<EM>capable</EM> of criminal intent in the same sense that an adult is +capable of it. + +<P>Within this century, the obvious idea that the ethical sense +of an adolescent isn't the same as that of an adult has become the +focus of scientific research. Psychologists have entered a field +once left to philosophers: moral development. The best-known attempt +to formalize this development is probably the six-stage theory of +Harvard psychologist Lawrence Kohlberg. Here is his description of +Stage 3, the Interpersonal Concordance or ``Good Boy-Nice Girl'' Orientation: + +<BLOCKQUOTE> +<P>Good behavior is that which pleases or helps +others and is approved by them. There is much conformity +to stereotypical images of what is majority or ``natural'' behavior. +Behavior is frequently judged by intention--the judgment ``he +means well'' becomes important for the first time. One earns +approval by being ``nice.'' [Kohlberg, p. 18] +</BLOCKQUOTE> + +<P>Is Neal Patrick at this third stage of moral development? He seems +to judge his own actions in terms of intention. From the perspective +of the stage theory, we can see this as an improvement over ``Our mistake +was to get caught'' or ``What have those computer companies done for +me,'' responses that would be typical of the earlier stages. + +<P>I don't mean to give too much weight to the specifics of the third stage. +It's not scientifically valid to assign Patrick to a developmental stage on +the basis of one quoted sentence. Also, not every researcher accepts +Kohlberg's stages. But the important point is that Patrick is +<EM>roughly</EM> at the stage of moral development appropriate to his age. He is +not some new kind of monster spawned by computer technology; he's a kid with +all the strengths and weaknesses we expect from kids in other situations. + +<P>Compare a bunch of adolescents breaking into a computer system +with another bunch of kids hot-wiring a car for a joyride. The latter +would probably argue, with complete sincerity, that they were doing +no harm, because the owner of the car recovered his property afterward. +They didn't keep or sell it. It's a ``naughty'' prank to borrow someone's +property in that way, but not really serious. + +<P>These hypothetical car thieves would be wrong, of course, in +making that argument. They might lack the sensitivity needed to give +weight to the victim's feelings of manipulation, of fear, of anger. +They may not understand how the experience of such a random attack +can leave a person feeling a profound loss of order and safety in +the world--the feeling that leads half our population to hail Bernhard +Goetz as a hero to be emulated. Some adolescents don't have the empathy +to see beyond the issue of loss of property. Some may show empathy +in certain situations but not in others. + +<P>The point is that the computer raises no new issue, ethical or +pragmatic. The password hacker who says ``we aren't hurting anything +by looking around'' is exactly analogous to the joyrider saying ``we +aren't stealing the car permanently.'' + +<P>(The two cases need not seem analogous to an adolescent. There +may be many computer abusers who would never break into a car for +a joyride, but who don't understand that breaking into a computer +account raises the same ethical issues. But the analogy still holds +for us as adults.) + +<P>The professional car thief and the teenaged joyrider are both social +problems, but they're <EM>different</EM> problems. To confuse the two--to +treat the teenager like a career criminal--would be a disastrously +self-fulfilling prophecy. + +<P>In the context of computer systems, there is a similar dichotomy. There are +some career criminals who steal by electronic means. This small group poses +a large problem for society, but it's not a new one. Thieves are thieves. +Just as banks use special armored cars, they must also develop special +armored computer systems. But the rest of us don't use armored cars for +routine transportation, and we don't need armored computer systems for +routine communication either. (Of course there is a large middle ground +between heavy security and no security at all. My purpose here is not to +decide exactly what security measures are appropriate for any particular +computer system. Instead, I just want to make it clear that, while in this +paper I'm not trying to address the problem of professional criminals, I'm +not trying to deny that there is such a problem either.) + +<P>There is also a middle ground between the young person who happens to break +unimportant rules in the innocent exercise of intellectual curiosity and the +hardened criminal. Consider the hypothetical case of a young man whose +girlfriend moves to Australia for a year, and so he builds himself a blue +box (a device used to place long distance telephone calls without paying for +them) and uses it to chat with her for an hour every other day. This is not +intellectual curiosity, nor is it a deliberate, long-term choice of a life +of crime. Instead, this hypothetical adolescent, probably normally honest, +has stepped over a line without really noticing it, because his mind is +focused on something else. It would be inappropriate, I think, to pat him +on the head and tell him how clever he is, and equally inappropriate to +throw him in prison. What we must do is call his attention to the +inconsistency between his activities and, most likely, his own moral +standards. + +<H2>Two Models for Moral Direction</H2> + +<P>What to do about it? Saying that the problems of computer ethics +are like other ethical problems doesn't solve them. Many approaches +are possible. We are starting to hear among computer experts the +same debates we've heard for centuries among criminologists: prevention, +deterrence, retribution, cure? + +<P>Among all the possible approaches, it may be instructive to consider +two strongly opposed ones: first, control of the technology, and second, +moral training. As examples of these approaches, compare the registration +of automobiles with instruction in karate. + +<P>Automobile registration is certainly a good idea in helping the +police control professional crime. As thieves have learned to steal +cars for their parts, rather than to sell whole, the technology of +registration has had to grow more sophisticated: we now see serial +numbers on each major component, not just on the door frame. But +registration doesn't help against joyriders. + +<P>Other technological security measures can help. Steering column +locks have made joyriding harder, but not impossible. Many adolescents +are expert locksmiths, not because they're dishonest but because locks +and keys pose a technical challenge much like that of passwords in +a computer system. Also, increased security has made the consequences +of juvenile car theft more serious, because the easiest way to defeat +a steering column lock is to destroy it by brute force. + +<P>The example of karate instruction shows a very different approach +to the problem of adolescent moral limitations. Instead of using +technology to limit the power of young people, this second approach +deliberately empowers them. Skill in karate is a deadly weapon; to +give that weapon to a young person is an affirmation of trust rather +than suspicion. + +<P>Why do karate classes for kids work? Why don't they lead to +an epidemic of juvenile murders? This paper can't present a definitive +answer. But I want to suggest some possibilities and use them to draw +analogies for computer education. + +<P>One probable reason is that every person responds to his or her +situation. If I know you're trusting me with something important, +I'll try to live up to your trust. If I sense that you consider me +untrustworthy, I may decide that I might as well live up to your low +expectations. + +<P>Another vital reason, though, is that the technical instruction +in karate techniques is part of a larger initiation into a certain +culture and its rules. Karate schools don't begin by telling novices, +``Here's how to kill someone.'' They begin with simple, less dangerous +techniques; the criteria for advancement include <EM>control</EM> and +self-discipline as well as knowledge of particular moves. Instructors +emphasize that karate is an art that should not be abused. Students learn +to demonstrate punches and kicks without injury by stopping just short of +contact with the opponent's body. + +<H2>Empowerment in Computer Education</H2> + +<P>How can we <EM>teach</EM> young computer enthusiasts to be responsible +members of the electronic community, without defining them as criminals? +The analogy of karate instruction suggests that the answer is to combine +ethical training with real empowerment. To turn this broad slogan +into a practical program requires several changes in our approach +to educational computing and to computing in general. + +<BLOCKQUOTE> +<P>Growth, like any ongoing function, requires adequate +objects in the environment to meet the needs and capacities +of the growing child, boy, youth, and young man, until he +can better choose and make his own environment. It is not +a ``psychological'' question of poor influences and bad attitudes, +but an objective question of real opportunities for worthwhile +experience.... Thwarted, or starved, in the important objects +proper to young capacities, the boys and young men naturally +find or invent deviant objects for themselves; this is the +beautiful shaping power of our human nature. Their choices +and inventions are rarely charming, usually stupid, and often +disastrous; we cannot expect average kids to deviate with +genius. [Goodman, pp. 12-13] +</BLOCKQUOTE> + +<P>Paul Goodman was discussing traditional juvenile delinquents, not +password hackers. But the problem is fundamentally the same. How +can we provide a worthwhile culture for young computer enthusiasts +to grow into? + +<P><STRONG>1. Serious adult models.</STRONG> In karate instruction, discipline +is not only for novices. The adult instructors follow the same discipline +themselves. The ethical principles taught to beginners are taken +seriously in the adult community. As a result, young students don't +see the discipline of karate as an arbitrary imposition on them; they +see it as part of what it means to be a full member of the community. + +<P>In the computer culture, adults rarely take seriously the idea of belonging +to a community. The social ideal is the self-serving entrepreneur. Our +heros are the ones who become millionaires by doing a slick marketing job on +yet another spreadsheet program. (When my high school programming students +discovered that I actually knew how to program a computer, many of them +decided I was crazy. Why should anyone want to teach when he could make +more money programming?) In this context, why should any young person +listen to our moral lecturing? + +<P>Fundamentally what is needed is personal action by each individual +computer professional. But we can act as a society to +encourage this individual commitment. We can urge our colleagues +to devote part of their time to <EM>pro bono publico</EM> activities, like +other professionals. We can give special public recognition to computer +professionals who choose a life of disinterested public service over +the quest for personal gain. Some corporations allow their employees +paid sabbatical leave for public service work; we should encourage +this policy. + +<P><STRONG>2. Access to real power.</STRONG> Another important part of the karate +analogy is that there are not two kinds of karate, one for adults +and one for kids. What beginners learn may be elementary, but it's +a start down the same road traveled by experts. The community into +which young karate students are welcomed is the real, adult community. +That's not how things work with computers. How many adult computer +scientists put up with CP/M, BASIC, and floppy disks? The technology +available to most young people is not a simpler version of what experts +use; it's a completely separate, more arcane, fundamentally less powerful +medium. That medium--the programming languages, the file storage, +the editing tools, and so on--is simply inadequate to challenging +intellectual work. + +<P>The community of computer professionals has come to take for +granted easy access to electronic communication with colleagues anywhere +in the world. Those of us lucky enough to be on the Arpanet have +instantaneous communication supported by taxpayers. Even the less +fortunate who communicate over dialup networks like uucp, though, +have the cost of their mail supported by computing facilities other +than their own; the general agreement among even competing private +businesses to forward one another's mail is a remarkable example of +disinterested cooperation. Some of this mail traffic is serious business. +But some of it is also ``junk mail'' like sf-lovers (for science fiction +enthusiasts) and human-nets. Is it surprising that young computer +enthusiasts want a slice of the pie too? + +<P>Adolescents are excluded not only from access to equipment but +also from access to ideas. The password hackers' preoccupation with +magic words and magic numbers is harmful to <EM>themselves</EM> as well as +to the rest of us; it's an intellectual dead end that gives them no +real insight into computer science. They learn a bag of isolated +tricks rather than powerful ideas that extend to solving other kinds +of problems. Instead of just telling them what's forbidden, we would +do better to show them the path to our own understanding of algorithms, +formal theory of computation, and so on. We all know you can't program +well in BASIC; why do we allow manufacturers to inflict it on children? + +<P>To take positive steps toward this goal requires action on two fronts, +access to technology and access to ideas. The latter requires training high +school teachers who are themselves qualified computer programmers. In the +long run, this means paying teachers salaries competitive with industry +standards. That's a matter for government action. Another approach may be +to promote active cooperation between university computer science +departments and high schools. Perhaps college faculty and graduate students +could contribute some of their time to the local high schools. (This is not +a new idea; outside experts are donating time to secondary schools to help +teach other areas of science. Such partnership brings its own problems, +because both the goals and the techniques of college teaching are different +from those of high school teaching. Still, this collaboration has sometimes +been fruitful.) + +<P>The problem of access to equipment is economically more difficult, +but it's getting easier. The availability of 32-bit microprocessors +means that serious computational power should be affordable in the +near future. Equipment manufacturers should +take the high school market seriously, as an investment in future +technical workers. Another approach is for interested educators to +establish regional computing centers for adolescents, not part of +a particular school, where kids can come on their own time. Economies +of scale may allow such centers to provide state-of-the-art equipment +that a single high school couldn't justify economically. + +<P><STRONG>3. Apprenticeship: challenging problems and access to expertise.</STRONG> +The karate student is given not only access to a body of knowledge, +but also the personal attention of a master in the field. The instructor +is responsible for the moral development of his students as well as +their technical skill. He steers them in the direction of challenges +appropriate to each one's progress, and his own expertise is available +to help the learner. + +<P>For many years, the MIT Artificial Intelligence Laboratory ran a computer +system with no passwords and no file protection at all. (It was pressure +from their Defense Department funding agency, not internal needs, that +forced them to implement a password scheme.) Even now, the laboratory has a +liberal ``tourist'' policy: anyone can have an account, provided that +someone at the laboratory is willing to be his or her mentor. The +philosophy behind this policy is that most ``malicious'' computer abuse is +the result of ignorance, misunderstanding, and thoughtlessness, rather than +truly malign intent. With a particular person responsible for each new +user, tourists learn to share the values of the community. They are taught +that the vulnerability of MIT's system is a price researchers pay willingly +for the open exchange of information that that vulnerability allows. +Treated as legitimate members of the community, even young tourists quickly +learn to act responsibly toward the group. + +<P>Not every computer facility can be expected to share the vision +of MIT-AI. Certainly the computers that control the missiles and +the banking transactions should not be so open to visitors. But a +typical large company has several computers, not all equally sensitive. +Many could allow access to young people in their communities in the +evenings, especially if some of their professional staff members are +interested in serving as volunteer mentors. It's the mentor/apprentice +relationship that makes all the difference. Just giving a kid an +account on your machine may be asking for trouble, but making a friend +of the kid is a good investment. + +<P>In particular, universities often treat their undergraduate student users +like irresponsible children. Undergraduates are generally second-class +citizens, with limited access to the school's computing resources, including +human resources (faculty). Universities should allow undergraduates to +function as true members of serious research teams, as graduate students +do. This policy would provide both access to faculty mentors and +challenging, useful tasks. + +<P>For secondary schools, the issue is partly one of curriculum. Too many +teenagers are taught (not only in the schools but also in the magazines) +that true computer expertise means knowing what number to <CODE>POKE</CODE> +into what address in order to change the color of the screen on some brand +of microcomputer. Such learning is not intellectually challenging. It does +not lead to a feeling of fruitful apprenticeship. + +<P><STRONG>4. A safe arena for moral experimentation.</STRONG> The +beginning karate student might be afraid to try his or her skill with a +fellow student, lest he or she injure or be injured. But it's safe to fight +a match with a black belt instructor. ``I won't hurt you,'' says the +instructor, ``and I won't let you hurt me.'' To allow for safe sparring +between students, classes begin with half-speed motions and no body contact +allowed. Later they may progress to rules that allow light body contact but +no contact to the opponent's head. These rules allow students to feel safe +as they experiment and develop their skills. + +<P>Young people have a similar need for safety in moral experimentation. +One of the reasons for the appeal of role-playing games like Dungeons +and Dragons is that a player can say ``I'm going to be a thief,'' or +``I'm going to be evil,'' trying on these roles without actually harming +anyone. Similarly, a good school should be a place where students +feel safe, a kind of ``ethics laboratory.'' + +<P>Neal Patrick's first exposure to an ethical dilemma should not +have involved the FBI. He should have confronted the issue of information +privacy while using a computer system in his school. He could have +learned how his antisocial acts hurt and angered the legitimate users +of the system, without risking really serious trouble for himself +or for anyone else. For one thing, it's hard for a young person to +understand the chain of reasoning from the abstract corporate owner +of a computer system to the actual human beings whose lives are affected +when that system breaks down. It's easier to understand the issues +when the users are one's friends and classmates, and the social effects +of malicious password hacking are immediately apparent. + +<P>(None of this is meant to excuse Patrick or the other 414s. +Neither ignorance of the law nor misunderstanding the ethical issues +is accepted in our culture as an excuse for lawbreaking. But I am not +writing for a court of law meeting to settle Patrick's guilt or innocence. +The question for us is how, as a society, we can act to make the next +generation of teenagers less likely to paint themselves into this +particular corner.) + +<P>As a practical matter, what's needed to build an ethics laboratory +for computing students has already been recommended in another context: +adequate computing power to support a user community, as opposed to +a bunch of isolated, independent microcomputer users. Whether this +means timesharing or a network of personal computers with a shared +file server is a technical question beyond the scope of this paper. +But sharing is essential. The ethical issues of a living community +don't arise in the context of isolated individuals using microcomputers +separately with no communication among them. (If we do not fill this need, +we leave a void that in practice is filled by ``pirate'' bulletin boards +that build a sort of outlaw community around illegal computing activities.) + +<H2>Appendix A: <A HREF="hacker.html">What is a Hacker?</A></H2> + +<H2>Appendix B: <A HREF="lsrhs.html">A Case Study</A></H2> + +<H2>References</H2> + +<P>Goodman, Paul. <CITE>Growing Up Absurd</CITE>. New York: Random House, 1960. + +<P>Kohlberg, Lawrence. <CITE>Essays on Moral Development, volume 1: The +Philosophy of Moral Development<CITE>. New York: Harper & Row, 1981. + + + +<P><ADDRESS> +<A HREF="index.html"><CODE>www.cs.berkeley.edu/~bh</CODE></A> +</ADDRESS> +</BODY> +</HTML> |