The Wolf Crying Syndrome
As you can see from earlier comments on the types of
information being given out by the media, and other individuals, all of
the information making the rounds about viruses is not accurate. In the
past, anti-virus product developers have given some misleading
information to the media regarding the potential threat of viruses; they
have predicted scenarios close to Armegeddon when the facts dictated
otherwise [Gordon, 94]. Hopefully, we are past this state and the wolf crying
syndrome is a thing of the past.
Now, we come to the crux of the problem. The ethical dilemma. The Big
Question that we have to answer if we are to begin addressing The Big
Lies.
The question we must ask ourselves here is from whom do we want computer
users to get information about viruses, and what do we do about all of
the misinformation being circulated?
- Everyone has a right to listen to whomever they choose.
- The problem arises when the only sources, or the loudest
sources, of information are the incorrect or misleading ones.
- No source of information should be silenced.
Words are tools. Tools shape and build images. That is the point of
communication -- to communicate ideas. Some communicators need to build
strong cases, using not just facts, but appeal to the heart. There is
nothing wrong with word play or emotionalism in communication as long as
it is not dishonest. It is not wrong to talk about "what is right" or
"honourable". It is wrong to lie. Facts should be represented accurately
at all times. In the case of viruses, many people have ideas and
opinions; they have the right to their opinion, and to express their
opinion. They even have the right to convey misinformation in many
cases; We as responsible persons, have a responsibility to see that the
misinformation is balanced with correct information. Until now, the
"misinformation proponents" have not been only those with the loudest
voices"; in many cases they have been the only voices the general public has
had to listen to.
People have a right to listen to whomever they choose; they also have a
right to know the motives of the persons they are relying on for
information, whether that reliance is passive or active. One problem,
that of "new" participants in the public debate (sometimes old
participants using a new identity) can be addressed by questioning
motives. If a person is not a publicly known figure whose motives and
affiliations are well known to the general public, it is a duty to
question, respectfully, their qualifications and affiliations.
We must be willing to state our motives and affiliations as well, and to
question the motives of others. If someone is not willing to discuss
their reason and motivation for for a particular opinion, it is a duty to question that opinion.
Opinions however, are not facts. Many times misinformation is presented
as "fact", followed by "well, I am entitled to my opinion". There is a
difference. We must be careful to make the distinction, and to make
others aware of the distinction.
We should adhere to certain principles of ethical communication when
attempting to use information to cast light on "The Big Lie". We have an
obligation to seek out accurate information and make sure that the
information we distribute is as factual as possible; we need to be
accurate, fair, and just in our treatment of ideas and arguments; we
must be willing to submit private motivations to public scrutiny, and we
must be, finally, willing to tolerate dissent with respect. These four
principles, outlined by Karl Wallace in "An Ethical Basis of
Communication" [Wallace, 55] can help establish the facts about computer viruses in
the minds of the public.
We must be careful to not try to silence what we view as "the
opposition" but to engage in productive, public debate. By doing this we
can also possibly help teach those who honestly believe the Big Lie and
the little lies that grow from it. We have passed the time where we can deal
with the virus problem as passive bystanders dependent on software to solve
"the problem" for us. Let the facts speak for themselves.
Bibliography
- AAAS/NCLS. The Use and Abuse of Computer Networks: Ethical, Legal and
Technological Aspects, Preliminary Report. American Association for the
Advancement of Science - American Bar Association Section of Science and
Technology, National Conference. Beckman Science Institute. Irvine, California.
1994
- Bontchev, 94. Bontchev, Vesselin. Future Trends in Virus Writing. Proceedings, 6th Annual Virus Bulletin Conference. Jersey. 1994
- Castro, 91. Hey! Let's send a couple of billion to Wolfgang. Time
Magazine., v. 138. September 23, 1991
- Clark, 92. Clark, Don. Report in San Francisco Chronicle. March 1992
- Computerworld, 92-93. Computerworld.
- Ducklin, 94. Ducklin, Paul. Anti-virus education: Have we missed the boat?
Proceedings. 6th Annual Virus Bulletin Conference. Jersey. 1994.
-
Forester and Morrison, 94. Tom Forester and Perry Morrison. Computer
Ethics: Cautionary Tales and Ethical Dilemmas in Computing. MIT Press.
1994.
-
Gordon, 92. Gordon, Sara. Dedicated. Virus News International. 1992-93
-
Gordon, 93 Gordon, Sara. Inside the Mind of Dark Avenger. PC World,
UK. August 1993
-
Gordon, 93. Gordon, Sara. Virus Exchange BBS: A Legal Crime?.
Proceedings, AAAS/ABA/NCLS Conference "Legal, Ethical and Technological
Aspects of Computer and Network Use and Abuse". Beckman Science
Institute. Irvine, CA. 1993
-
Gordon, 94. Gordon, Sara. Technologically Enabled Crime: Shifting
Paradigms for the Year 2000. SEC 94, TC/11. Curacao, NA. 1994
-
IFIP, 94. Proceedings, IFIP 94/TC11 Conference. Curacao, NA. 1994
-
Jordan, Glenn. Electronic mail correspondence. 1994. Used with
permission.
-
Leslie, 92. David Leslie. in Software Engineering Notes, 92
-
McGaffey, 72. McGaffee, Ruth. Toward a More Realistic View of the
Judicial Process in Relation to Freedom of Speech. Free Speech
Yearbook, 1972. in Tedford, Makay and Jamison. 1987
-
Software Engineering Notes, 92. Nuclear Disaster Averted. Software
Engineering Notes, vol. 17., no. 2. April 1992
-
Peterson, 94. Peterson, Padgett. Private e-mail conversation. 1994. Used
with permission.
-
Readings for Speech Communication, 74. Spence v. Washington;. U.S. 405.
1974. Trustees of Indiana University. 1990.
-
Sandler, 94. Sandler, Corey. Virus, They Wrote. PC Computing.
September, 1994
-
Skulason, 94. Skulason, Fredrik. V-Forum Correspondence with xxxxxxx.
Comp.Virus Newsgroup, Usenet News. August 1994.
-
Slade, 92. Rob Slade. in Software Engineering Notes
-
Software Engineering Notes, 92. Software Engineering Notes;. pp 20-22. ACM
Sigsoft. April 1992.
-
Spence, 74. in Readings for Speech Communication, 74.
-
Tedford, Makay and Jamison, 87. Tedford, Thomas; Makay, John; and
Jamison, David. Perspectives on Freedom of Speech. Southern Illinois
University Press. 1987
-
Tinker v. Des Moines Community School District, 69. Tinker v. Des Moines
Independent Community School District. United States Reports, volume
393, page 503. 1969
-
United States v. O'Brien, 68. U. S. v. O'Brien. United States Reports,
volume 391. page 367. 1968
-
Virus Bulletin, 94. Virus Bulletin. August 1994
-
Virus Bulletin Proceedings. 6th Annual Virus Bulletin Conference.
Jersey. 1994
-
Virus Hits Hospital Computers;, Los Angeles Times, March 27, 1989
-
Virus News International, 93. News. S&S; International. 1993
-
Wallace, Karl. Karl Wallace. An Ethical Basis of Communication. in
Tedford, Makay and Jamison. From The Speech Teacher, 1955
-
About the Author
Sarah Gordon's work in various areas of IT Security can be found profiled in
various publications including the New York Times, Computer Security Journal
and Virus Bulletin. She is a frequent speaker at such diverse conferences
as those sponsored by NSA/NIST/NCSC and DEFCON. Recently appointed to the
Wildlist Board of Directors, she is actively involved in the development
of anti-virus software test criteria and methods. She may be reached as
[email protected]