Tuesday, March 29, 2016

Net Neutrality

               As summarized by The Verge, net neutrality is the idea that internet service providers (ISPs) cannot charge customers different rates to receive different network performance and priority. For example, AT&T cannot charge Netflix higher rates because they push much greater amounts of data through AT&T’s (and others’) network. The Verge explains that:
The order focuses on three specific rules for internet service: no blocking, no throttling, and no paid prioritization. ‘A person engaged in the provision of broadband internet access service, insofar as such person is so engaged, shall not impair or degrade lawful internet traffic on the basis of internet content, application, or service, or use of a non-harmful device, subject to reasonable network management,’”
When the FCC mentions “paid prioritization,” they are referring to the practice of configuring the network to favor certain traffic based on how much was paid for that traffic or how much its speedy transmission might benefit the network provider. According to the Electronic Frontier Foundation, “the FCC produced rules that we could support… We want the internet to live up to its promise, fostering innovation, creativity, and freedom. We don’t want regulations that will turn ISPs into gatekeepers, making special deals… and inhibiting new competition, innovation, and expression.”
                Basically, The Verge, the EFF, the Reddit community, and millions of other entities and individuals argue for net neutrality because they believe that the internet should be an open and unencumbered medium for the transmission of ideas, knowledge, and entertainment. Supporters of net neutrality suggest that prioritization, throttling, and suppression of certain packets traveling through a network will result in the loss of the freedom of ideas and data which is so critical to their vision of the internet. Detractors of net neutrality, including the woefully misguided Forbes contributor Jeffrey Dorfman, suggest that net neutrality flies in the face of free-market capitalist economics. Dorfman gives this analogy: “This is a bad idea for the same reason that only having vanilla ice cream for sale is a bad idea: some people want, and are willing to pay for, something different.” Although I too am a staunch supporter of the free market, Dorfman’s argument makes absolutely no sense to me. Just because content creators and consumers might be willing to pay for better and faster transmission of data doesn’t mean that ISPs should make this an available feature.

It has become increasingly clear in the last decade that computing is becoming a utility commodity, much as the same as electric power, natural gas, or water. Electric companies aren’t allowed to charge certain people higher rates because they draw more current from the grid, nor are they allowed to charge (x) dollars for 120 volt service and (x*2) dollars for 240 volt service. Rather, electric companies simply charge customers a single rate based on how much power they draw from the grid. Users of electricity know that as long as they pay this one rate, they will receive the electric power they need. Similarly, water providers are not allowed to charge higher rates for “more pure water.” This would be an abomination as it would directly and negatively impact the health of people with fewer means. If net neutrality didn’t exist, the sound operation of the economy would be in jeopardy. Modern free-market economics assumes that consumers behave at least somewhat rationally. Central to consumers’ rationality is their reasonable access to all potential information before making consumption decisions. Net neutrality protects reasonable access to all potential information. Clearly, since computing is becoming a public utility and since it allows sound operation of the economy, net neutrality is necessary. The internet is indeed a public service and fair access should be a basic right. 

Wednesday, March 23, 2016

Project #3

Click here to view a letter to Congress regarding encryption.

Reflections:

Is encryption a fundamental right? Should citizens of the US be allowed to have a technology that completely locks out the government?

Insofar as privacy is a fundamental right, encryption is also a right. As I pointed out in my letter to Congress, encryption is both a human and a legal right. It's easy to demonstrate that the Fifth Amendment proves that encryption is a legal right. It's a bit more difficult to prove that encryption is a human right. The proof lies in the fact that a lack of encryption would very likely lead to human suffering, as I explain in the letter. Anything which, when lacking, leads to human suffering is a human right. Consequently, US citizens should be guaranteed encryption. As the Declaration of Independence stated, "all... are endowed... with certain unalienable rights, that among these are life, liberty, and the pursuit of happiness." Removal of encryption would go against all three supposedly-inalienable rights since unprotected data could lead to loss of life, suspension by law enforcement of certain freedoms, and financial or other personal loss: a removal of happiness.


How important of an issue is encryption to you? Does it affect who you support politically? financially? socially? Should it?

Encryption is important to me not from an ideological standpoint, but from a legal and logical perspective. The U.S. Constitution very clearly grants American citizens various rights, the maintenance of which, in the modern digital age, necessitates encryption. Politicians who are anti-encryption will generally not receive my support in the future, as encryption will be central to my career in the finance industry where secure data and trade secrets are very important. It seems reasonable to expect politicians to support encryption since so many people's lives and careers depend on it, as I've explained above and in the letter.


In the struggle between national security and personal privacy, who will win? Are you resigned to a particular future or will you fight for it?

It's unfortunate that the 21st century has been defined by issues of "national security." Regrettably, the political climate is one in which it is easier to see politicians moving away from encryption rather than towards it. I wouldn't be surprised to see a bill not unlike the fictitious one I laid out appear within the next few years. The question will be whether my predictions of significant personal and financial loss due to the lack of encryption will actually come true. If they do, it will be incumbent upon politicians to reinstate encryption immediately. Ideally, however, politicians will recognize that it's very close to, if not actually, illegal to remove encryption from consumer and corporate electronics in the first place. I'd be willing to fight for a world which includes encryption, and I'm sure my future employers will be willing to bring their resources to bear in the fight as well.  

Monday, March 21, 2016

The DMCA and Circumvention

In 1998 when Bill Clinton signed the Digital Millennium Copyright Act into law, he both created and destroyed critical features of the internet. The Act’s safe-harbor provisions enabled social media, blogs, and other crowd-sourced websites to flourish. At the same time, news outlets and internet advocates including Slate, the Electronic Frontier Foundation (EFF), Wired, and The New York Times claim that the law’s anti-circumvention statutes have done serious harm to the open flow of information, ideas, and creativity the internet originally stood to offer. In particular, the DMCA has this to say about circumvention: “no person shall circumvent a technological measure that effectively controls access to a work protected under [a given] title.” (per Wired) In English, this means that no individual hacker, company, or consumer may attempt to break into protected media for (almost) any reason. This provision was originally installed to protect DVDs from being copied into bootleg versions. Many people take umbrage with the statute, for varying reasons. The Atlantic argues that the law “threatens to make archivists criminals if they try to preserve our society’s artifacts for future generations” while the EFF rightly points out that the law makes it “legally risky” to engage in reverse engineering of copyrighted software.
The computer science field, both academic and industrial, finds it particularly difficult to come to grips with the dubious nature of reverse engineering. Except for purposes of determining interoperability, (even that can be questionable) reverse engineering is made illegal by the DMCA. Furthermore, the law has enabled companies to place digital locks on their code, preventing external tampering. In my opinion, the concept of software licenses and DRM schemes is absurd. If developers and filmmakers expect their code and films to be treated by the judicial system in the same manner as books or physical artwork, they provide to the public said code and films in the same manner. Books do not contain DRM software, nor are they only procurable under a license and “terms of service” agreement. Paintings do not require signature of a legal document just to complete the purchase transaction. Yet, paintings and books still receive copyright protection under the law. Developers and filmmakers must cease using DRM software and forcing customers into strange legal covenants just to acquire the software or other piece of media. Honestly, DRM is just companies being lazy and unwilling to face the open market. When someone purchases a book, he or she also purchases the rights to do whatever he or she wants with that specific copy: highlight in it, rip pages, read it to a child, or even burn it. The only thing a person cannot do is reprint the book and sell it as their own. Similar practices should apply to software and movies. However, in this case, the rights which should come with purchase would include reverse-engineering if not being done directly for profit and translation into new formats (i.e. burning mixtapes from iTunes purchases). Generally, software and media producers should not be allowed to remove the free nature of both people and markets.

In the same spirit, it should be considered ethical for people to build workarounds for DRM software, so long as they have no profiteering or malicious intent in doing so. If software and other digital media were to be sold in truly discrete, license-free forms, the ethics of reverse engineering, DRM circumvention, and phone unlocking would become clear: let the property owner do with his or her property as he or she pleases. Until these ethical questions can truly be resolved, however, property and copyright laws pertaining to digital media must be completely rewritten and creators of said media must be forced to face competition.

Tuesday, March 1, 2016

Online Advertising

     Without going into too much detail, I must admit that online advertising is what pays my college tuition, in an indirect sort of way. Consequently, my ethical response to online advertising is likely a bit more biased toward acceptance than most other people. At its core, online advertising is the result of companies cleverly making use of the data available to them. On the level, such behavior is in no way ethically reprehensible. The standard methods companies use to gather their data, i.e. page-view tracking, purchase history, social media analysis, etc. are all legitimate (this post will refer to them as reasonably-public) methods because they gather data which the subject knowingly and willingly makes public. Any post on social media should, in my opinion, be fair game for usage by a third party. Additionally, page-views and purchase history are all conscious decisions which the subject generally knows have the potential to be observed by a third party and thus become reasonably-public data. When the subject makes these decisions, it is on her to make her peace with that fact. (I would, however, like to see a beefed-up Incognito Mode become a better option for those who truly cannot fathom the idea of their browsing being observed.)
     The New York Times and The Guardian both chronicle cases of legitimate data collection. Target makes use of customer’s conscious and public decisions to great effect. Facebook collects social media data which is, by definition, public. (Social media? Come on…) Even the cases where lenders and recruiters collect data on their customers, as decried by the Kaspersky blog, is legitimate. In a society in which every company has the obligation to perform well for customers and shareholders alike, all potential competitive advantages which can be legitimately and legally acquired should be considered and used.
     However, when data to be used for advertising is acquired illegally—whether through hacking, intimidation, or bribery—the data itself and the resulting analytics and company actions become ethically disagreeable. Illegally or illegitimately acquired data not only gives the company in question an unfair advantage in the marketplace, but it also puts the customer at a disadvantage. A person whose not-reasonably-public decisions, identity, and preferences are compromised must now work hard to (if possible) restore his or her identity and good reputation. Nor should that person be expected to be the vanguard of their own not-reasonably-public data. That responsibility lies with the companies who can mobilize large IT departments to protect financial secrets, matters of identity, and so forth. Individual people generally do not have the IT expertise or physical ability to fully protect their own not-reasonably-public data, and so that charge shifts to the other, generally more powerful, party.

     With the current (and most logical) precedent of companies each holding and owning the data they collect on their customers, it is incumbent on those companies to protect the data from hacking and leaking for two reasons. First, hacking or leaking of not-reasonably-public data breaches the necessary relationship built on trust between the company and the customer as described in the previous paragraph. Second, it removes the marketplace advantage the company might have had by owning the data. Within this second point lies my justification for why companies should be allowed to sell reasonably-public user data. A key component of the modern marketplace economy is the securitization and distribution of individual bits of data (stocks, bonds, mortgages, etc.) In my opinion, reasonably-public user data is just more data ready to be securitized. Therefore, companies should be allowed to package and sell user-data in a responsible, airtight manner when the purchaser can prove that it will use the data for legitimate ends. Additionally, if the government has a very legitimate need for the data and can provide a warrant or court order, they should be provided with the data (in most cases.) Overall, the major keys when dealing with user information and advertising are legitimate collection of reasonably-public data, mindful protection of that data, and sound market practices when dealing with the data.

Thursday, February 18, 2016

Project #2

To view a white paper detailing the gender and cultural diversity within the Notre Dame CSE Department, please click on this Google Drive link.

Reflection Question #1:

Frankly, very little about the demographics data is surprising to me. Notre Dame is predominantly white, so it would logically follow that the overwhelming majority of CSE students are white, as well. Additionally, the poor gender diversity within the tech industry is something the class has well documented. It makes sense that academia has a higher percentage of female students as academia is what is most likely to generate positive changes in diversity in industry.

What interested me most was the remarkable growth in the overall number of students in each successive graduating class. My brother, a sophomore CS major, is part of the biggest class in Department history. As an electrical engineering student, I've seen firsthand the flip-side of this trend: the EE Class of 2018 is one of the very smallest in the EE Department's history. Popular culture reveres technology and tech companies. My brother will freely admit that shows like Silicon Valley and movies like The Social Network directly influenced him to study computer science. It seems very plausible that he's not the only one of 126 CSE sophomores to have been inspired in this way. I'll be watching with a keen eye to see if the number of CSE students continues to swell in subsequent years as computers and their power become ever more ingrained in everyday American culture.

Reflection Question #2:

The heated discussion during class on 2/18 about whistleblowing and the image of the U.S. military was direct proof that increased diversity would be a great development for the CSE Department. On one hand, the mostly white, male ROTC members held the view that opacity and independence for the military are critically important. Most of the opposing views were given by either women or non-white students who had different, often more worldly perspectives. This discussion was possible only because of the diversity which already exists within the CSE student population. I can only imagine how much more invigorating the discussion would have been if there was more cultural and gender diversity, and consequent diversity of opinion, in the room.

Essentially, diversity ensures vivacity. Whether within a classroom, a sports team, or a multinational corporation, diversity enables wider perspective, greater wisdom, and better decision-making. However, acquisition of diversity isn't always easy. Contrived, "hokey" diversity initiatives are more likely to hurt people than to help them. Companies and universities must make genuine, compassionate efforts to increase diversity, rather than just try to drive their percentages higher without any regard for what those percentages actually mean. True success can only come when there is true diversity.

Sunday, February 14, 2016

The Challenger and Whistleblowing

               The root cause of the Challenger disaster was a failure in the sealing rings between the different segments in the rocket booster engine. Houston mission controllers referred to the event at the time as “obviously a major malfunction.” According to the New York Times, “A seal failed on a rocket booster, and the stream of hot gas released by it ignited an external fuel tank… the unusually cold temperatures may have worsened the problem.” Basically, a poorly designed piece of one of the white rocket boosters was ruined by the cold and consequently caused an explosion which killed seven astronauts and disintegrated one of the five operational space shuttles. The more morally important piece of the puzzle was that NASA had been warned by their contractor, Thiokol, that the cold weather would negatively impact the sealing rings, known as O-rings. Motherboard described the situation: “Thiokol described the risk of low temperatures to NASA managers from their headquarters in Utah, and urged NASA to postpone the launch. ‘It isn’t what they wanted to hear…’ Challenger was a go.”
                One of Thiokol’s employees, Roger Boisjoly, had been part of the task force assigned to support NASA’s rocket booster engines. Fully aware that the O-rings would not be able to handle the unusually cold launch temperatures, Boisjoly and his teammates pleaded with their managers to ask NASA to stop the launch. Their concerns were overridden, and the rest was history. Boisjoly took all of the documents he had access to and kept them protected from the government. The Whistleblower Support Fund described Boisjoly’s act of whistleblowing: “Boisjoly met secretly with an NPR reporter shortly after the shuttle disaster to provide information about the problems at [Thiokol].” Thiokol, NASA, and the U.S. government responded by blackballing Boisjoly and keeping him from ever working in the aeronautics industry again. An intense, and ultimately unsuccessful, legal battle ensued.

                Boisjoly did the right thing by blowing the whistle on Thiokol and NASA. Once lives were lost, his actions were necessary to force the involved parties to ultimately change their practices. If Boisjoly hadn’t exposed the unsound engineering decisions which had been made, there is no guarantee that either NASA or Thiokol would have designed a new type of O-ring which enabled safe shuttle flights for the next 17 years. Furthermore, the bad publicity would not have forced cultural changes within NASA which persisted until Columbia. Additionally, the terrible publicity caused great financial challenges for NASA and its contractors. In response, Thiokol fired Boisjoly. While they were financially justified in doing so, they had no moral grounds for doing so. Punishment of Boisjoly was unethical, especially since Thiokol management had acted incredibly unethically by brushing a known and catastrophic design flaw aside. Even though his life wasn’t ruined, he did endure much hardship at Thiokol’s hand. Ultimately, whistleblowing did much good in this situation. Until the Columbia astronauts lost their lives, the forcibly redesigned O-rings and altered business practices very likely saved several lives. Whistleblowing, although painful in the short-term, usually results in long-term benefits for the general public.

Monday, February 8, 2016

Diversity in the Tech Workplace

     The lack of diversity in most tech companies today is a large problem. While many other industries have largely overcome the diversity issue, the tech industry still has a long way to go. As Google’s hiring statistics show, the tech industry faces both racial and gender diversity issues. Only 17% of Google’s tech workers are women and only 1% are black or other non-Asian minorities. It seems to me that both types of diversity issues are consequences of flaws in American social culture. Furthermore, it seems evident that these shortcomings threaten to undermine the credibility of the tech industry, and perhaps the industry itself, as well.
     Several black members of the tech industry have voiced their concerns with the state of diversity in the industry. Former Twitter engineer Leslie Miley has said that Twitter is “so bad at it” when discussing diversity with CodeSwitch, despite the fact that Twitter is a very popular medium within the black community. Google employee and Medium contributor EricaJoy wrote that she “[stuck] out like a sore thumb… I’ve gotten passed over for roles I know I could not only perform in, but that I could excel in.” Clearly, when there’s a situation when any employee, not to mention a large group of employees, cannot produce to his or her full potential because of cultural resistance, the employer cannot produce at its full potential, either. Thus, it rapidly becomes clear that the entire tech industry is operating at a suboptimal level. Only a two-part change in culture can fix this. On one hand, Silicon Valley must expand its search parameters for new coders. The current rotation of target schools produce predominantly white developers. Schools like Howard produce predominantly black developers who do not lack in talent or willpower, as the Bloomberg feature pointed out. It would behoove companies in the Valley to give students like Professor Burge’s a closer look. On the other hand, companies have to seriously invest in diversifying their workforces. Although programs like the ones mentioned by CNN Money are important, tech companies must not only stress the importance of diversity to their current employees, but to prospective and new employees, as well. Change can only happen when there is complete buy-in from all levels of the company, from CEO to HR to the technical staff.
     Equally disappointing is the skewed gender distribution within the tech industry. Men dominate the industry. The reason is simple: women don’t feel welcome. For the last 60 years, the culture which predominates within the Valley, whether you call it “nerd culture,” “hacker culture,” “dev culture,” or any one of a myriad of labels, has been very masculine. Despite our common humanity, it is clear that there are general psychological differences between men and women. Stimuli and environments which men thrive in can be very tough for women to navigate. Even in childhood, this can be seen. My brother and I shared a room early on, and needless to say, it was very much our room. Dark colors, Legos, underwear, and sports memorabilia were always strewn about. My sisters had rooms which were bright, meticulously kept, and generally looked nice. It should come as no surprise that my sisters never entered my brother’s and my room when we were young kids. It seems to me that the tech industry today is similar to my childhood bedroom: a decidedly unfriendly place for women. As New York Times editorialists have pointed out, women “are afraid they won’t fit in.” The aggression of “nerdy strutting” and the prevalence of male-centric geek culture has been off-putting to women since the mid-80s, when coding ceased to be a job performed almost equally by men and women. Valley companies can increase the numbers of women in tech jobs by making those jobs more attractive to women. All they must do is remove the masculine aggression associated with Valley culture. Harvey Mudd College proved this was possible by making their computer science program less masculine and cut-throat. Once the number of women is comparable to the number of men in tech jobs, Silicon Valley will be able to produce at unprecedented levels.

     Ultimately, the key to solving issues of racial and gender diversity is removing the cultural resistance which prevails in the Valley (and on the Street, to a lesser extent) today.  Once the necessary changes are made, the tech industry will be able to operate with an efficiency and wealth of creativity never before imagined. Then, and only then, will the computing industry become the revolutionary force it claims to be.