Week 9 Lecture 1 (2).pptx
Document Details
Uploaded by UnmatchedLight
Northern College
Full Transcript
ETHICAL ISSUES IN Computer crimes & Artificial Intelligence Week 9, Miss Amanda Paananen, BU 1173 Today’s AGENDA Review (Kahoots) Part One: Computer Crimes (con’t) Social and Ethical Consequences Artificial Intelligence PART ONE COMPUTER CRIMES (CONTINUED) Terminology: VIRUS •Word origin: Lati...
ETHICAL ISSUES IN Computer crimes & Artificial Intelligence Week 9, Miss Amanda Paananen, BU 1173 Today’s AGENDA Review (Kahoots) Part One: Computer Crimes (con’t) Social and Ethical Consequences Artificial Intelligence PART ONE COMPUTER CRIMES (CONTINUED) Terminology: VIRUS •Word origin: Latin = poison. •Biological Virus: a foreign agent injecting itself into a living body, feeding on it to grow, multiply, and spread. As the body weakens and loses its ability to fight foreign invaders and eventually succumbs to the virus if not treated. •Computer Virus: a self-propagating computer program designed to alter or destroy a computer system’s resources. It attaches itself to software, grows, reproduces many times, and spreads in the new environment. It spreads by attacking major system resources including data and sometimes hardware, weakening the capacity of these resources to perform the needed functions, and eventually bringing the system down Terminology: HACKING • A computer attack technique that utilizes the internetworking between computers and communication devices. • As long as computers are not interconnected in a network, hacking cannot take place. History of Computer Crimes The period between 1980 and 2001 saw sharp growth in reported incidents of computer attacks. Two factors have contributed to this phenomenal growth: • the growth of the Internet • the massive news coverage of virus incidents. History of Compute r Crimes: mid1980s 414-Club (San Francisco) • The 414-Club was the first national news-making hacker group. • The group named their group 414 after the area code of San Francisco they were in. • They started a series of computer intrusion attacks via a Stanford University computer which they used to spread the attack across the country. • From that small but history-making attack, other headline-making attacks from Australia, Germany, Argentina, and the USA followed. History of Computer Crimes: 1984-1987 •1984: I2600: The Hacker Quarterly, a hacker magazine, was launched, •1985: the electronic hacking magazine Phrack was founded. •1986: the US Congress passed the Computer Fraud and Abuse Act. Hacker activities that had only been in the USA started to spread worldwide. •1987: the Italian hacker community launched Decoder magazine, similar to the US 2600: Hacker Quarterly History of Computer Crimes: 1988 •A Cornell university graduate student created a computer virus that crashed 6,000 computers and effectively shut down the Internet for 2 days History of Computer Crimes: 1991 • The 1990s saw heightened hacking activities and serious computer network near meltdowns. • The 1991 expectation of the “Michelangelo” virus which was expected to crash computers on March 6, 1992, the artist’s 517th birthday, but which passed without incident.. History of Computer Crimes 1999-2001 •1999: President Bill Clinton announced a $1.46 billion initiative to improve government computer security. •2000: The costliest and most powerful computer network attacks. It included “Mel-lisa,”“Love Bug,”“Killer Resume,” and a number of devastating distributed denial of service attacks. •2001: the elusive “Code Red” virus was released. TERMINOLOGY: A computer crime investigator • Investigates a number of crimes that range from recovering file systems on computers that have been hacked or damaged, to investigating crimes against children. • Recover data from computers that can be used in prosecuting crimes. Places to look for digital evidence on a computer system: • Deleted Files • Hidden Files • Slack Space • Bad Blocks • Steganography Utilities • Compressed and Coded Files • Encrypted Files • Password Protected Files Deleted Files • Files on a computer that have been deleted can often be recovered manually • This is most possible with Windows based systems • In Windows, when a document or file is deleted, it is actually still on the computer’s hard drive – it’s just listed as a document that should not be displayed to the user • This means that it still exists, and can be found and relocated to somewhere where it can be viewed Hidden Files • One of the most difficult types of files to try and find • Special software exists that can hide files from a computer’s own operating system! • It is very difficult to identify if there are hidden files of this type on a computer, and if so, where they may be • Operating systems are also designed to hide files and file names from the users, who often don’t have the necessary computer knowledge to manage those files properly on their own • For this type of hidden file, there is usually a simple method of exposing all operating system files to the user Slack Space • An allocated, but unused space on a computer disc • In Windows systems, all files are allotted a certain amount of space, even if the file is smaller than that space • This creates ‘slack space’, which can be used to hide other files • However, there is software that can be used to analyze slack space and what it contains Bad Blocks • A bad track is an area of a hard disk that is considered not reliable for data storage • For this reason, bad tracks are not visible to users • A skilled computer technologist can also designate areas of a disk as a bad track, whether or not the section of the disk is actually usable or not • It would be possible to designate a working track as bad, and then use it store files that can’t easily be seen Steganography Utilities • The art of hiding information in ways that prevent its detection • It’s an ancient craft that has existed in some form or another since the 15th century • Examples have included hidden messages in artwork, invisible ink used in documents, cyphers, Morse Code, etc. • In today’s day and age it is used as the premise for hiding digital messages Compressed & Coded Files • Data/files can be hidden by compressing or coding them • Coding involves substituting characters for other characters based on a chosen system • Compressing data is a way of reducing the size of a document or file, so that the properties of the file appear differently then the actual content • Documents that have been coded or compressed, can be decoded or decompressed if a user can decipher the method used to do so Encrypted & PROTECTED Files •Encrypted Files • Files or data can be encrypted, so that the information can be found, but not readable in its original form • However, encrypted files can be decrypted as well, using software and other decryption techniques/codes •Password Protected Files • All data and files can be password protected • Password can be guessed WHY IS IT IMPORTANT TO LOOK FOR, AND FIND, DIGITAL EVIDENCE OF A COMPUTER CRIME? • Once digital evidence has been found, and it has been proven to be authentic, it can be used in a court of law to show that someone has committed a computer crime! Terminology: DIGITAL FORENSICS •Digital forensics examiners investigate an intrusion, gather evidence of a crime and uncover fraud by analyzing computer storage devices, network servers and other types of digital media to track down hackers. •Digital forensics investigation is the process of identifying, extracting, preserving, and documenting computer evidence through digital tools to produce evidence used in the court of law. Popular Case Studies in Digital Forensics: THE CRAIGSLIST KILLER •Craigslist is a well-known website where individuals can buy or sell goods and services.. • On April 14, 2009, a New York woman, Julissa Brisman was found murdered in an upscale hotel in Boston. •There was additionally a report of an assault on another woman who was robbed at gunpoint. Both women had posted an ad on Craigslist. •This is how Craigslist killer, 23-year-old, Philip Markoff, had found his intended victims. •On the night of the crimes, they had each made an appointment to meet a man named “Andy M.” •Investigators were able to trace emails sent between the victims and Markoff and discovered the IP address of the postings, which led them to Markoff after submitting subpoenas for IP address ownership information.. Surveillance video from the hotel captured a young man in a black leather jacket and a New York Yankees baseball cap entering and exiting the hotel around the time of Brisman’s murder. •Once law enforcement discovered the killer’s name, they turned to Facebook for research and discovered he was engaged to a woman named Megan McAllister. •Police staked-out the couple’s apartment and waited for Markoff. •He was arrested on April 20, six days after the murder and died after his fourth attempt at committing suicide in prison. Popular Case Studies in Digital Forensics: THE CRAIGSLIST KILLER Part Two Social and Ethical Consequences 1. Psychological Effects. These depend on the attack motive and may result in long psychological effects such as hate. Psychological effects may lead to individual reclusion and increasing isolation. Such trends may lead to dangerous and costly repercussions on the individual, corporations, and the society as a whole. 2. Moral Decay. There is a moral imperative in all our actions. When human actions, whether bad or good, become so frequent, they create a level of familiarity that leads to acceptance as normal. This type of acceptance of actions formerly viewed as immoral and bad by society is moral decay. There are numerous e-attacks that can cause moral decay. In fact, because of the recent spree of DDoS and e-mail attacks, one wonders whether people performing these acts seriously consider them as immoral and illegal anymore! 3. Loss of Privacy. After headline-making e-attacks that wreaked havoc on global computers systems, there is a resurgence in the need for quick solutions to the problem that seems to have hit home. Many businesses are responding with patches, filters, intrusion detection (ID) tools, and a whole list of other solutions. 4. Trust. Along with privacy lost, trust is lost. Individuals once attacked lose trust in a person, group, company, or anything else believed to be the source of the attack or believed to be unable to stop the attack. E-attacks, together with draconian solutions, cause us to lose trust in individuals and businesses, especially businesses hit either by e-attacks or trying to forcibly stop attacks. Such customer loss of trust in a business is disastrous for that business. Most importantly, it is a loss of the society’s innocence. PART THREE Artificial Intelligence TERMINOLOGY: Artificial Intelligence • a field of learning that emulates human intelligence • an area of computer science that emphasizes the creation of intelligent machines that work and react like humans • Weak AI, also known as narrow AI, is an AI system that is designed and trained for a particular task • Strong AI, also known as artificial general intelligence, is an AI system with generalized human cognitive abilities. When presented with an unfamiliar task, a strong AI system is able to find a solution without human intervention To sum it up…. Naïve Algorithm s Machin e Learnin g Deep Reinforcemen t Learning Current, Common Uses of A.I. • Siri • Apple’s version of a digital, personal assistant • Voice-activated computer that you can interact with • Uses machine-learning technology to get smarter and better able to predict and understand our questions and requests • Alexa • Has the ability to decipher speech from anywhere in the room it is installed • https://www.youtube.com/watch?v=VcN1saEa07A Tesla • A vehicle production company that makes cars that have predictive capabilities and selfdriving features • The software used to run the cars is constantly updated through ‘over-the-air’ updates Amazon.com • Predicts what we’re interested in purchasing based on our on-line behavior • The company has also announced its plan to try and be able to predict what we need so well, that they will ship it to us before we even know we need/want it Netflix • Uses predictive technology to assess our reactions to what we watch, and translate that into suggestions for other things to watch Sophia the Robot! • The most up-to-date and advanced form of Artificial Intelligence that exists today • Created by a humanoid robotics company called Hanson Robotics, based in Hong Kong • She was first ‘born’ (activated) in 2016, and is the first robot in the world to be given citizenship status (she is a citizen of Saudi Arabia) • She makes public appearances, can converse on pre-determined topics, and is capable of making over 50 different facial expressions • Her form of Artificial Intelligence uses visual data processing, facial and voice recognition • https://www.youtube.com/watch?v=Ml9v3wHLuWI OK, But what is consciousness? Artificial Intelligence & Ethics • Artificially intelligent machines are considered to be autonomous – they do not necessarily have the same moral obligations as humans • However, we continue to embody artificial intelligence with characteristics that are more and more ‘humanistic’ • Therefore, at what point do human ethics apply to robots with artificial intelligence? When do these beings gain human rights and freedoms, as well as moral obligations? Let’s Discuss! Is it morally fair to construct objects with artificial intelligence? Can an AI robot be moral? Does a personal AI or humanlike robot have rights? Is it fair for a robot to gain citizenship status of a country? If a robot can get citizenship status of a country, do they gain the rights and freedoms of other citizens of that country? Are they obligated to abide by the laws of other citizens? The general consensus: Common arguments supporting AI: • Some AI developers believe the technology could create new jobs and careers – similar to when the US moved from an agriculturebased industry to a manufacturing-based industry • AI could be used to fight cybercrime and defend us online • Could improve health care for humans – more accurate diagnosis and faster lab processing • Increase auto-safety and decrease traffic • Revolutionize the agriculture industry • Because we can! Common arguments against AI: • Lack of safeguards in place to ensure the control of ‘runaway’ computer systems • Lack of information regarding the limit of the intelligence that could be achieved by artificially intelligent computers – could they surpass the most intelligent human being? • Computers taking over in the workplace reduces the responsibility and accountability of the average human worker • Computers currently don’t have any privacy limits for those they serve • Does total information = total control • There is already a lot of reluctance in society towards to automated objects, ie. Tesla’s self-driven vehicle • AI systems run on programs, which can be altered by humans for their purposes The Data is Limited, but… SOURCE: https://www.opb.org/article/2022 /06/15/nearly-400-car-crashes-in- Do Robots Deserve Rights? What if Machines Become Conscious? Week 9: Required Readings •Textbook: Kizza, J. M. (2017). Ethical and social issues in the information age. 6th Edition. ISBN 978-3-319-70712-9 •Chapter 10 Kizza, References IMAGES https://pixabay.com/ https://www.freepik.com / wikipedia.com psychologytoday.com PPT adapted from: Kizza, Chapter 10 https://en.wikipedia.org/wiki/ Ashley_Madison_data_breach https://www.csoonline.com/article/2130877/thebiggest-data-breaches-of-the-21st-century.html