"Star Wars" Revisited - ETHICSAND SAFETY-CRITICAL SOFTWARE Safety-critical software is a core topic

Page created by Kristen Jensen
 
CONTINUE READING
"Star Wars" Revisited - ETHICSAND SAFETY-CRITICAL SOFTWARE Safety-critical software is a core topic
FEATURE
                                             Kevin W. Bowyer

                “Star Wars” Revisited
             ETHICS AND SAFETY-CRITICAL SOFTWARE
       afety-critical software is a core topic

  S
       in courses on “ethics and computing”
       and “computers and society.” It is
       also a core topic in software engi-
       neering courses. In the 1980s, the
       U.S. Reagan-era Strategic Defense
  Initiative was the focus of a great deal of
  technical argument relating to design and
  testing of safety-critical software. Today,
  most students in the U.S. have no famil-
  iarity with the substance of these argu-
  ments. However, with U.S. presidents
  Clinton and Bush considering various
  versions of a national missile defense sys-
  tem, the topic has again become relevant
  and applicable to current events.

                                                   Fig. 1. U.S. President Ronald Reagan’s 1983 speech is the source
                                                   of high-level requirements for the “Star Wars” system.

   Work on this module began            CPSR-sponsored M.I.T. debate are      Technology and Society conference
under support of National Science       used with permission of the nation-   [20].
Foundation Undergraduate Facul-         al office of the Computing Profes-       The author is Schubmehl-Prein
ty Enhancement grant DUE-               sionals for Social Responsibility.    Department Chair in the Depart-
9752792 [16]. The video of Rea-         Portions of this paper were pre-      ment of Computer Science and
gan’s SDI speech was obtained           sented at the 2001 Frontiers in       Engineering, University of Notre
with the help of the Reagan presi-      Education conference and the          Dame, Notre Dame, IN 46556.
dential library. Video clips from the   2001 International Symposium on       Email: kwb@cse.nd.edu.

  IEEE Technology and Society Magazine, Spring 2002                           0278-0079/02/$10.00©2002IEEE            13
"Star Wars" Revisited - ETHICSAND SAFETY-CRITICAL SOFTWARE Safety-critical software is a core topic
M.I.T. debate and in      students to appreciate reliability-
                                                         various publications.     related concepts such as statistical

     The topic of a national missile                     Chuck Seitz, a member
                                                         of the SDI computing
                                                         panel who did not
                                                                                   independence of failures, but is
                                                                                   certainly not necessary in order to
                                                                                   understand the essence of the larg-

     defense system has again
                                                         resign, argued at the     er argument.
                                                         debate in favor of the       This course module can be
                                                         feasibility of SDI soft-  viewed as divided into five sections:
                                                                                            1) introduction to the

     become relevant.                                                                    basic SDI problem,
                                                                                            2) evaluation of Parnas’
                                                                                         argument that trustworthy
                                                                                         SDI software is not possible,
                                                                                            3) evaluation of Seitz’
           This article describes a                                                      argument that trustworthy
        curriculum module devel-                                                         SDI software is possible,
        oped around a Reagan-era                                                            4) connection to current
        SDI debate on the theme –                                                        ballistic missile defense
        “Star wars: can the comput-                                                      efforts, and
        ing requirements be met?”                                                           5) consideration of ethical
        This module may be appro-                                                        issues for computing profes-
        priate for use in ethics-relat-                                                  sionals working on such pro-
        ed or software-engineering- Fig. 2. Michael Dertouzos gives an SDI System jects.
        related courses taught in Overview at the M.I.T.-CPSR Debate.                       The first section of the
        undergraduate Information                                                        module should give students
        Systems, Information Technology, ware. Michael Dertouzos served as a basic understanding of the
        Computer Science, or Computer debate moderator. Joseph Weizen- requirements of an SDI system,
        Engineering programs. It should baum, who was not a member of and make it clear that this is an
        also be appropriate for use in the SDI panel, argued the con posi- extreme instance of safety-critical
        courses in general engineering tion along with Parnas. Danny software. The second and third
        ethics or technology and society.     Cohen, who served as chair of the sections present the arguments
                                              SDI panel, argued the pro position against and for the feasibility of
        THE REAGAN-ERA “STAR                  with Seitz.                          creating trustworthy software for
        WARS” DEFENSE PROGRAM                    The presentations at this debate, an SDI system. These sections
           The Reagan-era “Star Wars” in particular those of Parnas and contain the major technical sub-
        ballistic missile defense program Seitz, provide the core for develop- stance of the module from a com-
        generated a great deal of contro- ing a curriculum module that deals puting perspective. The purpose of
        versy. One aspect of this contro- with ethical issues involved in the the section on connecting the Rea-
        versy involved the design and test- creation of safety-critical software. gan-era arguments to current mis-
        ing of safety-critical software. In The module should be appropriate sile defense efforts is to assess the
        1985, the Computing Profession- for use in courses on software modern relevance of conclusions
        als for Social Responsibility engineering, ethical issues, social in the original argument. The pur-
        (CPSR) sponsored a debate, held impact of computing, or technolo- pose of the last section of the
        at M.I.T., on the question – Star gy and society. It has been suc- course is to explicitly consider
        Wars: Can the Computing cessfully used both in courses important ethical issues involved
        Requirements Be Met? Controver- aimed at first-year students who in this case study.
        sy on this particular point was are not yet (and may not become)              The content of each section of
        sparked by, among other things, computing majors, and in a senior- the module is outlined in more
        David Parnas’ resignation from the level “capstone” course for Com- detail below.
        Strategic Defense Initiative (SDI) puter Science and Engineering
        computing panel. Parnas argued majors. Some level of program- UNDERSTANDING THE
        that it was impossible, in principle, ming experience will of course CONTEXT OF THE SDI
        to create SDI software that would help students to appreciate the PROBLEM
        allow a useful level of trust in the complexities of software testing         The section of the module on
        system. He presented his argument and debugging. Some level of dis- understanding the SDI problem
        for this conclusion at the CPSR- crete math background should help incorporates a short video clip

14                                                                    IEEE Technology and Society Magazine, Spring 2002
"Star Wars" Revisited - ETHICSAND SAFETY-CRITICAL SOFTWARE Safety-critical software is a core topic
from President Ronald Reagan’s and the automated interpretation of sion, to identify the premises used
“Star Wars speech” (see Fig. 1) sensory data that may vary with to argue for this conclusion. Stu-
delivered in March of 1983 [1], the state of nature and the inten- dents should also develop a clear
and a clip from the 1985 CPSR- tions of an intelligent adversary.         idea of Parnas’ reasons why the
M.I.T. debate (see Fig. 2) in which                                       SDI computing problem is more
moderator Michael Dertouzos              Then-current thinking about the difficult than other complex com-
gives an overview of the SDI sce- SDI scenario and technology is puter systems. For example,
nario and requirements. Dertouzos well represented in the “Eastport launch of a space shuttle can be
outlines parameters of the SDI sce- Report” and an U.S. Office of delayed if computer and weather
nario, such as the size of the geo- Technology Assessment report conditions are not satisfactory,
graphic area to be monitored for an [22],[23]. Electronic copies
attack launch, the projected time of these government docu-
span of an attack, and the number ments are available on CD
of missiles, warheads and decoys with the video clips and
that might be involved.               PowerPoint for this curricu-
   The goal of this section of the lum module.                         The Reagan-era “Star Wars”
course is for students to work
through a general understanding of UNDERSTANDING
the issues in the systems analysis PARNAS’ ARGUMENT
and requirements specification           The purpose of this mod-
                                                                       ballistic missile defense
                                                                       program generated a great
stages of SDI software develop- ule of the course module is
ment. The PowerPoint material for the students to work
makes references to the waterfall through a summary of Par-
model of software develoment, not nas’ technical argument for
to endorse this model over other why it is not possible to cre-
models, but to focus students’ ate trustworthy SDI soft-               deal of controversy.
thinking on the problems inherent ware. This section of the
in specifying requirements for module incorporates a
such software.                        video clip of Parnas’ pre-
   It is important that students sentation (Fig. 3) and addi-
develop an apprecia-                                                           control of a nuclear power
tion for the extreme                                                           plant does not require defeat-
difficulty of the SDI                                                          ing the intentions of an intel-
computing problem.                                                             ligent adversary, and other
For instance, at one                                                           sophisticated weapons sys-
point Dertouzos men-                                                           tems are used many times and
tions that planners                                                            so can be debugged after ini-
envision that the SDI                                                          tial failures.
system will maintain                                                               Students may need some
“a consistent distrib-                                                         guidance in formalizing the
uted database” of the                                                          structure of Parnas’ argument.
missile tracking infor-                                                        His presentation does contain
mation. There is some                                                          a clear technical argument in
audible laughter from                                                          reponse to the topic defined
the audience at this                                                           for the debate – Star Wars:
point, because the Fig. 3. Parnas presents an argument that trustworthy can the computing require-
demands of “consis- SDI software is not possible in principle.                 ments be met? However, he
tent” and “distributed”                                                        also goes beyond this at times
are inherently contradictory at tional PowerPoint slides. Any of and suggests conclusions of larger
some level. This point may not be several papers by Parnas might be socio-political questions. Students
readily apparent to students as they used as references or handouts may be tempted to assert that he
watch the video. Therefore it may with this section (e.g., [2].) The argues for conclusions such as
be useful to explicitly point out the PowerPoint material includes “The United States should not pur-
difficulty involved in the real-time slides that ask students to identify sue SDI” or “Pursuing SDI will
nature of the problem, the distrib- the conclusion advanced by Par- make the United States weaker
uted communications and control, nas, and then, given the conclu- rather than stronger.” In fact he

  IEEE Technology and Society Magazine, Spring 2002                                                              15
does, but students should be able to should bring students to a state-        ignition key. This may provide an
     realize that these are not conclu- ment similar to – “It is not possible      opportunity for useful class discus-
     sions of the immediate computer to construct SDI software that                sion about what constitutes an
     systems engineering argument. could confidently be expected to                appropriate level of confidence
     Students should be encouraged to work correctly when needed.”                 and whether or how such confi-
     focus primarly on the                                                         dence might be measured. Other
     argument that relates to                                                      analogies can be offered similar to
     the technical issue of                                                        that of the car starting: for
     whether it is possible, in                                                    instance, the confidence you have
     principle, to create SDI                                                      that your computer system will
     software that could be                                                        correctly retrieve a file from disk
     considered trustworthy.                                                       when it is requested. Most exam-
     It is possible that some                                                      ples that students propose in class
     students will have pas-                                                       will likely not incorporate the
     sionately-held opinions                                                       complication of an intelligent ene-
     about peace, strong                                                           my. This point might be made by
     defense, or President                                                         suggesting a sports-related analo-
     Reagan’s legacy. Again,                                                       gy. For example, what is your lev-
     these are probably not                                                        el of confidence that the opposing
     appropriate as the                                                            team will not be able to score giv-
     immediate focus of class Fig. 4. Seitz presents an argument for the fea-      en that your team correctly exe-
     discussion.                 sibility of creating an SDI System.               cutes the defense it has planned
         Students find it easi-                                                    ahead of time? The point that Par-
     er to reach an appropriate summa-          The “confidently” qualifier is a   nas makes is that our confidence
     ry of Parnas’ argument if they are potential source of ambiguity.             that the software will work correct-
     first guided to a statement of the However, Parnas suggests that a            ly when needed is directly linked
     conclusion. Discussion of different pragmatic definition is the level of      to our assumptions about how an
     possible conclusion statements and confidence that you have that your         intelligent adversary will choose to
     how they relate to the debate topic car will start when you turn the          structure an attack.

     Fig. 5. Depiction of missile defense scenario from http://www.acq. osd/mil/bmdo/.

16                                                                  IEEE Technology and Society Magazine, Spring 2002
TABLE I
                 CATEGORIZATION    OF   COMPLEX SYSTEMS ACCORDING        TO    APPLICATION CONSTRAINTS

                        Property of the application that complicates design and testing
Computer                real-time      "signal-to-    uncontrolled  intelligent    starting              requires
System                  response       symbol"        sensor        adversary      conditions            coordinated
Application             requirements    sensor data   imaging       motivated to   controlled by         distributed
                                       processing     conditions    fool system    adversary             computing

Chess-playing           No               No              No             Yes               No             No
Telephone switching     Yes              No              No             No                No             Partially
Space shuttle           Yes              Yes             Yes            No                No             No
Nuclear power plant     Yes              Yes             Partially      No                No             No
Fighter jet             Yes              Yes             Yes            Yes               Partially      No
SDI                     Yes              Yes             Yes            Yes               Yes            Yes

    Once students have the conclu-      any confidence, because they            sonably efficient and correct com-
sion of the argument, they should       depend on the actions of an intelli-    pilers, c) “people with Dutch
be able to identify relevant premis-    gent adversary, and                     accents,” indicating Edsgar Dijk-
es that Parnas uses to argue for the       (2) The software cannot under-       stra, in the context of suggestions
conclusion. Important elements of       go any fully realistic testing,         that the problem with software is
the technical arugment have to do       because this would require realis-      that the software engineers are not
with the specifications being           tic sensor data reflecting the          talented enough, d) “Byzantine
unkown, there being no practical        (unkown) scenario for enemy             agreement,” a formalism of the
way to realistically test the soft-     attack, and                             problem in which N distributed
ware, and there being no time to           (3) There would be no time dur-      systems communicate to reach
debug the software in use. While        ing an attack to repair and re-         agreement among the correctly-
factors such as the number of pro-      install failing software (“no real-     working systems even when some
grammers required to work on the        time debugging”),
software and the estimated size of         Therefore: It is not pos-
the system may also be relevant,        sible to construct SDI soft-
Parnas explicitly asserts that his
argument is independent of the
                                        ware that could be confi-
                                        dently expected to work
                                                                         Parnas argued that it was
size of the software.                   correctly the first time it is
    As a result of analyzing the
material in this section, students
should be able to reach a summary
                                        needed.
                                           Parnas mentions a
                                        number of items during
                                                                         impossible, in principle, to
of Parnas’ technical argument sim-
ilar to the following. It would also
be within the spirit of Parnas’ pre-
                                        his presentation that
                                        should be defined for the
                                        class in order for them to
                                                                         create SDI software that would
sentation to give a one-premise         get the most out of his pre-
form of the argument. The state-
ment – “Since the specifications
                                        sentation. Among these
                                        are a) the acronym MAD,
                                                                         allow a useful level of trust
are inherently unkown, therefore it     standing for Mutual
is not possible to know whether
you have written the desired sys-
tem.” – would reasonably capture
                                        Assured Destruction, the
                                        cold-war strategy that says
                                        nuclear war is best
                                                                         in the system.
the essence of the argument.            deterred by having each
                                        side believe that it would
   Candidate Summary of Parnas’         result in mutual destruction, b)        fraction of the N systems may send
Argument –                              ADA, the programming language,          false messages, e) “Safeguard,”
   Since:                               in the context of it being an ambi-     referring to an early ballistic mis-
   (1) The specifications for the       tious software project that took a      sile defense system intended to
software cannot be known with           number of years to result in rea-       defend only selected sites neces-

  IEEE Technology and Society Magazine, Spring 2002                                                                    17
sary for the U.S. to launch a retal-   classify other complex systems             tion of entities in the data. The raw
      iatory strike, f) “Vietnam,” in the    according to these contstraints in         data might be a 2-D array of non-
      context of the weapons systems         order to find a good analogy. The          negative integers that form an
      used in that war, g) “someone          result might be something like that        image representing some property
      named Walker,” meaning a person        in Table I.                                such as heat, refelected light, or
      with Defense Department security                                                  distance from the sensor. The sym-
      clearance who is discovered to be      UNDERSTANDING SEITZ’                       bolic description might be some-
      a long-time spy for the enemy, and     ARGUMENT                                   thing like “missile centered at
      h) a reference to Fred Brooks, in          Similar to the section on Par-         location x,y”.
      the context of a person of distin-     nas’ argument, the point of this               The conclusion of Seitz’ argu-
      guished reputation in software         section is for the students to work        ment should be a statement to the
      engineering [21].                      out a critical-thinking summary of         effect that it is possible to con-
         Parnas also makes an argument       Seitz’ argument. Also similar to           struct reliable SDI software. The
                                                     the previous section, the          premises of the argument will have
                                                      material for this section         to do with hierarchical control
                                                      includes video of Seitz’ pre-     structures being well understood,

Students who have a strong a                          sentation (see Fig. 4), plus
                                                      supporting        PowerPoint
                                                      slides. The premises should
                                                                                        conceptual control structure that
                                                                                        coincides with physical control
                                                                                        structure being an advantage for

priori belief in the positive
                                                      represent technical bases         reliable implementation, and mod-
                                                      that Seitz uses to argue for      ularity being an advantage in
                                                      his conclusion. Seitz quotes      implementation and testing. It
                                                      from the SDIO computing           should be possible for students to

value of ballistic missile                            panel (from which Parnas
                                                      resigned and Seitz and
                                                                                        arrive at a summary of Seitz’ argu-
                                                                                        ment similar to the following:
                                                      Cohen did not) as part of his

defense may feel that their                           presentation.
                                                          One quote is: “The feasi-
                                                      bility of the battle manage-
                                                                                           Candidate Summary of Seitz’
                                                                                        Argument –
                                                                                           Since:

political beliefs are being
                                                      ment software and our abil-          (1) Hierarchical control struc-
                                                      ity to test, simulate, and        ture is natural and well under-
                                                      modify the system are very        stood, and
                                                      sensitive to the choice of           (2) Hierarchical organization

challenged.                                           system architecture. In par-
                                                      ticular, the feasibility of the
                                                                                        seems attractive both for the con-
                                                                                        ceptual flow of data abstraction,
                                                      battle management software        and the physical organization of
                                                      is much more sensitive to         the system, and
                                                      the system architecture than         (3) Hierarchical organization
      that the SDI computing require-        it is to the choice of software engi-      naturally leads to modularity,
      ments are, in effect, unique and       neering techniques.” From this it          which is an advantage for achiev-
      more difficult than those for any      seems clear that Seitz is arguing          ing reliable implementation,
      other complex system that might        that the problems can be solved               Therefore: It is possible to con-
      be selected for an analogy. At one     through an appropriate choice of           struct SDI software that could be
      point in the debate, Cohen men-        system architecture.                       confidently expected to work cor-
      tions the space shuttle as an exam-        As with Parnas’ presentation,          rectly the first time it is needed.
      ple of a system requiring large and    students may need some guidance
      complex       software.     Parnas’    to arrive at an appropriate summa-            With the arguments of the two
      response is that whereas NASA          ry of Seitz’ argument. Seitz uses          sides of the debate identified, stu-
      can delay a launch up until the last   relatively few terms in his presen-        dents should begin to have the
      second, the president cannot call      tation that will require definition        basis for developing their own
      up the (former) United Soviet          for the class. One concept that stu-       informed opinion on the issue.
      Socialist Republic (USSR) to           dents may not be familiar with is          Students can also be asked to
      delay a nuclear war. An interesting    the “signal to symbol” transition in       assess stylistic issues in the pre-
      class exercise would be to make a      processing sensor data. This refers        sentations, and how these factors
      list of constraints on the SDI com-    to the process of moving from raw          might influence the effect on a
      puting system and ask students to      sensor data to a symbolic descrip-         non-computing-literate audience.

18                                                                      IEEE Technology and Society Magazine, Spring 2002
For example, how does the use of         entists. This point can, and proba-     to achieve other perceived bene-
personal comment and sarcasm             bly should, be emphasized through       fits. This clearly illustrates how
affect the communication of tech-        a pre-class assignment described        there may be a distinction between
nical content? How does/would an         later.                                  the technical question and related
explicit premise-conclusion sum-             It also should be pointed out       political questions.
mary of the argument aid the audi-       that both Parnas and Seitz came to
ence’s understanding? And how            the debate already familiar with        RELATION TO CURRENT
does not responding explicitly to        the essence of the other person’s       MISSILE DEFENSE
an opponent’s asserted premises          argument. Parnas was presenting         SCENARIOS
affect credibility?                      arguments that he had already pub-          The point of this section of the
    At the end of analyzing the two      lished and that Seitz certainly         course is to relate the evaluation of
presentations, it will be clear to       would have known about. Similar-        Parnas’ and Seitz’ arguments to
most students that Parnas’ techni-       ly, Seitz was presenting arguments      current ballistic missile defense
cal argument is essentially correct      based on the published report of        plans. A recent special issue of
and is not refuted by Seitz’ argu-       the SDI computing committee. It is      IEEE Spectrum assesses the state
ment. One over-simplified charac-        not reasonable to think that either     of various U.S. missile defense
terization of the debate is that Par-    person was caught unaware by the        programs [4]. Overall, the web site
nas says “We can’t test it” and          other person’s argument.                of the DoD Ballistic Missile
Seitz then replies “We can build             A point that might merit explo-     Defense Office (BMDO) is an
it.” In this sense, the two presenta-    ration in courses on technology         excellent source of information
tions do not respond equally well        and society is that the narrow ques-    [6]. The is perhaps especially true
to the theme of the debate, “Star        tion of whether or not it is possible   because the envisioned scenarios
Wars: can the computing require-         to create trustworthy SDI software      for a missile defense system are
ments be met?” Seitz argues that         does not necessarily answer the         evolving over time. Information
we can build something that              general question of whether or not      from this site should be useful to
should be useful, but does not real-     it is worthwhile to attempt to con-     summarize the current official sce-
ly address the issue of how to test      struct an SDI system. Students          narios, plans, and status. An exam-
that it would meet requirements.         may find this point a bit paradoxi-     ple figure from this web site
Parnas argues that it doesn’t make       cal. However, one defense some-         appears in Fig. 5.
any difference what is built or how      times raised by supporters of the           The U.S. continues to spend
it is built, because there won’t be      Reagan legacy is that the Soviet        large amounts of money on missile
any means of testing that it meets       attempt to respond to the SDI pro-      defense. An editorial in Science
requirements.                            gram was an important contribut-        magazine in 2001 estimated cumu-
    For many people, the in-princi-      ing factor in the breakdown of the      lative U.S. expenditures on missile
ple nature of the point about the        Soviet Union [26]. That is, even if     defense at $100 billion, in current
specifications for the software          SDI did not or could not work, it       dollars [7].
being unknown is enough to carry         aided a larger objective of “defeat-        Missile defense is of course a
the argument by itself. The rather       ing” the Soviet Union. Similar          socially and politically controver-
clear-cut nature of this narrow          sorts of arguments were made in         sial topic. Numerous articles on
technical argument is a potential        2001 by President George Bush’s         missile defense are also available
pitfall for use of this material. Stu-   Secretary of Defense Donald             in the popular press (e.g., [9] “con”
dents who have a strong a priori         Rumsfeld. He expressed “that the        and [12] “pro”), and numerous
belief in the positive value of bal-     United States is likely to deploy       interest groups have web pages
listic missile defense may feel that     certain antiballistic missile sys-      with archives of press releases and
their political beliefs are being        tems before testing on them is          news reports on the topic.
challenged, or that the material has     completed” [24] and argued that             Reviewing the recent history of
somehow been unfairly presented.         “even if a missile defense system       U.S. ballistic missile defense
There are several points to consid-      does not work properly, it would        efforts can give valuable perspec-
er in this regard. One point is that     make an adversary think twice           tive on the feasibility of the goals
the purpose of the study is, in so       before launching a missile at the       of the Reagan-era program [3] –
far as possible, to discover the         United States” [25]. Thus the Bush      “In the last 15 years, the United
truth, and this may result in a chal-    administration appears willing to       States has conducted 20 hit-to-kill
lenge to a priori beliefs. A second      stipulate that the system may not       intercepts, for the BMD programs
point is that the two presenters,        work properly or well, but is will-     discussed here as well as in other
Parnas and Seitz, are both accom-        ing to undertake the expense of         tests. Six intercepts were success-
plished, word-class computer sci-        building a system anyway in order       ful; 13 of those intercepts were

   IEEE Technology and Society Magazine, Spring 2002                                                                     19
done within the last five years, and       location/size of the hypothesized      Whether or not this is truly a real-
     among them, three intercepts suc-          enemy. The Reagan-era SDI pro-         istic option will of course depend
     ceeded. ... no real attempts have          gram envisioned an attack of tens      on the particular assumptions
     been made to intercept uncoopera-          of thousands of missiles coming        made about the size and sophisti-
     tive targets — those that make use         from the area of the former USSR.      cation of the threat.
     of clutter, decoys, maneuver, anti-        Current thinking envisions an              Given that the majority of the
     simulation, and other counter mea-         “attack by a rogue state using a       class accepts the in-principle argu-
     sures. Nor have any tests attempted        handful of warheads outfitted with     ment made by Parnas, but then also
     to use a real battle management            relatively simple countermea-          believes that a missile defense sys-
     system that integrates data from a         sures” or “an accidental launch of     tem for current scenarios is feasi-
     diverse array of actual tracking           a few warheads by Russia or Chi-       ble, it makes sense to explore the
     sensors and directs an interceptor         na” [3]. This clearly reduces, to      differences between the scenarios.
     to a target.” An interesting assign-       some degree, the required com-         Students might be asked to rate the
     ment for students may be to gather         plexity of the ballistic missile       feasibility of constructing a missile
     information on the most recent             defense system. How this affects       defense system in various in-
     tests and to assess the level of real-     the conclusions of the Parnas-Seitz    between scenarios. For example,
     ism in the tests (clutter, decoys, ...).   debate is not entirely clear, and      what if the “rogue country” in cur-
         Students with any previous             provides an opportunity to pursue      rent scenarios could launch hun-
     software engineering course work           an interesting line of reasoning.      dreds, thousands, or tens of thou-
     should easily realize that the test-       When asked, most people will feel      sands of missiles? Or, what if the
     ing done to date does not begin to         that a successful SDI system for       enemy was able to launch the
     address the more difficult technical       the currently envisioned scenarios     attack from unknown points over a
     issues indentified in the Reagan-          is perhaps possible, or at least is    larger geographic area? The point
     era debate. Tests that use data from       not as clearly impossible as for the   of the exercise would be to isolate
     actual tracking sensors and that try       Reagan-era scenario.                   the factors of the scenario that
     to hit targets that employ simple             This feeling presents something     appear to most affect feasibility of
     counter-measures would be only             of a conflict, because Parnas          the system.
     the beginning of “realistic” testing.      explicitly made an “in principle”          A current whistle-blowing case
     Increased realism would include,           argument. When students accept         alleges fraud in the testing and
     for example, multiple targets that         Parnas’ argument for the Reagan-       development of software in recent
     create various loads and structures        era scenario, but feel that it might   missile defense efforts [19]. The
     of attack, varied weather condi-           be possible to construct a reliable    whistle-blower, Nira Schwartz,
     tions, and simulation of random            system for current scenarios, there    alleges that TRW knew that the per-
     and coordinated failures in the sys-       is a need to resolve the apparent      formance of its software to discrim-
     tem due to attack. A useful exer-          inconsistency. The resolution          inate warheads from decoys was far
     cise for students may be to ask            appears to lie in the perceived fea-   below what was reported to the gov-
     them to sketch a plan for several          sibility of “over-engineering” the     ernment. The allegations have been
     levels of increasingly realistic test-     system. By “over-engineering” we       investigated at several levels. One
     ing of SDI software. Real incidents        mean designing a system explicitly     Pentagon criminal investigator said
     from actual tests of missile defense       to have substantial over-capacity      that there is “absolute irrefutable
     technology can be used to empha-           relative to the size of the threat,    scientific proof that TRW’s discrim-
     size the difficulty involved. For          akin to the old engineering idea of    ination technology does not, cannot,
     example, in a 1997 test “the clouds        a “margin of safety” in the design.    and will not work” and that TRW
     had cleared but a software problem         With the Reagan-era scenario of        was “knowingly covering up its fail-
     caused the laser to recycle, or            tens of thousands of warheads and      ure” [19]. A team put together to
     unexpectedly lose power, during            hundreds of thousands of sophisti-     look at the allegations and the report
     the brief period in which the satel-       cated decoys, most people could        said that the TRW computer pro-
     lite was within range” [10].               not imagine over-engineering the       grams “were ‘well designed and
         It is important for students to        system to a degree that would pro-     work properly’ provided that the
     realize that the motivating scenario       vide confidence. With current          Pentagon does not have wrong
     for current missile defense efforts        more limited scenarios, it seems       information about what kinds of
     is not the same as for the Reagan-         easier for people to imagine that      warheads and decoys an enemy is
     era program. Potentially important         the system might be built with         using” [19]. In other words, if one
     differences include 1) the antici-         enough excess capacity to provide      assumes specifications for the war-
     pated size and sophistication of an        confidence that it would work in       heads and targets that an enemy will
     attack, and 2) the geographical            the presence of some failures.         use, and if this information turns out

20                                                                      IEEE Technology and Society Magazine, Spring 2002
to be correct, then the software        for whether a program will run            to get me to sign a letter),
should work. This rather clearly        into an infinite loop,                    Therefore: their letter does not
shows that one critical weakness is     Therefore: we should build a tool         mean anything.
unknown specifications – the same       that will check whether a program
weakness that Parnas emphasized         will run into an infinite loop.               There is one particularly telling
over fifteen years earlier!                                                       point here. It seems that the con-
    The coverage of this whistle-           The goal here sounds great, but       gressman’s argument uses a
blowing incident also provides          there is computer science theory          premise that the Nobel laureates’
excellent opportunities for critical-   that says it is impossible. Some          letter should not be taken seriously
thinking exercises. Congressman         software engineers might regard           because, by analogy, he signs let-
Curt Weldon of Pennsylvania pro-        the idea of constructing software         ters all the time that he does not
vides several quotes arguing for        to meet unknown specifications as         mean to be taken seriously. In any
the construction of a missile           similarly impossible. The pragmat-        case, again, the response does not
defense system. One of these is as      ic response is that some specifica-       address any of the issues of sub-
follows: “If we don’t build a new       tions will be assumed that will           stance. The analysis of these
aircraft carrier, we have older ones.   hopefully cover the real-world cas-       quotes may be more relevant to
If we don’t build a new fighter         es that arise.                            classes in technology and society
plane, we have older ones. If we            Congressman Weldon also               than to classes in software engi-
don’t build a new tank, we have         makes an analogy between critics of       neering, and should serve to
older ones. If we don’t build mis-      the President Kennedy’s program to        emphasize to students that the
sile defense, we have nothing”          land a person on the moon and cur-        political decision-making about
[19]. In premise-conclusion form,       rent-day critics of missile defense       missile defense is taking place in a
his argument appears to be:             [19]. The intent of the argument is       notable absence of any serious
                                        apparently to have people conclude        technical discussion.
Since:                                  that the SDI program would suc-               After covering the material in
We have existing but older forms of     ceed in the way that the program to       this section of the module, students
many weapons systems, and               land a man on the moon succeeded.         should understand how the current
We have no existing form of a mis-      The big missing element in this           national missile defense scenarios
sile defense system,                    analogy should be clear. The moon-        relate to the technical arguments
Therefore: we should build a mis-       landing program had to deal with          developed during the Reagan-era
sile defense system.                    problems presented by nature,             SDI debate. They should also
                                        whereas the missile defense pro-          appreciate the fact the much of the
    As is often the case, the argu-     gram has to deal with problems pre-       current political discussion about
ment loses some of its appeal sim-      sented by an intelligent enemy that       national missile defense is serious-
ply by being cast into explicit         is motivated to defeat the system.        ly lacking in consideration of tech-
premise-conclusion form. The            Again, this point relates back to the     nical feasibility.
argument does not address cost          issue of unknown specifications.
tradeoff issues such as whether it          Another quote from Congress-          RELATION TO CODES OF
would be better to have a missile       man Weldon came in response to a          ETHICS
defense system or newer versions        letter signed by Nobel Laureates             Discussion of this case study
of other weapons systems (or other      arguing against development of            should include consideration of
security-enhancing      measures).      missile defense. Weldon’s comment         ethical issues that confront com-
More fundamentally, it also does        was: “Well, I don’t know any of           puting professionals working on
not address the issue of whether it     them that’s come to Congress or to        such projects, with explicit refer-
is even possible to construct a reli-   me. I’ve not seen one of their faces.     ence to the different professional
able missile defense system. For        I mean, you know, it’s easy to get        codes of ethics. Students should be
students that would understand the      anyone to sign a letter. I sign letters   asked to evaluate the ethical issues
halting problem, the following          all the time” [19]. In premise-con-       relative to the professional codes of
might be offered for discussion as      clusion form, the argument appears        ethics, and project what they might
a possibly analogous argument:          to be:                                    do in various situations. Among the
                                                                                  many questions that students might
Since:                                  Since:                                    be asked to address are:
We have existing but older forms of     I have not talked to them face-to-           1) Was Parnas right in resigning
many software development tools,        face, and                                 his $1000/day consulting position
and                                     They have only written a letter, and      to “blow the whistle” on the SDI
We have no existing tool to check       I sign letters all the time (it is easy   program?

  IEEE Technology and Society Magazine, Spring 2002                                                                       21
2) Is it ethical today to accept              obligation to my fellow                   software engineers shall, as
          work on national ballistic missile                members and the profession                appropriate:... [1.3] Approve
          defense systems, or, more general-                I shall: ... Cooperate with               software only if they have a
          ly, on systems that you believe can-              others in achieving under-                well-founded belief that it is
          not possibly work as advertised?                  standing and in identifying               safe, meets specifications,
              3) Assume that you believe it is              problems.”                                passes appropriate tests, and
          ethical to work on national ballistic                                                       does not diminish quality of
          missile defense systems, and that               Relevant elements of the Asso-              life, diminish privacy or
          you are a manager at a company               ciation for Computing Machinery                harm the environment. The
          doing such work – how should you             (ACM) code of ethics include                   ultimate effect of the work
          treat an employee who believes               (numbers identify specific sections            should be to the public good.
          that it is ethically wrong to work on        and items of the full code [15]):              ... [1.4] Disclose to appropri-
          such systems?                                                                               ate persons or authorities
              4) How should you, as a profes-               “As an ACM computing pro-                 any actual or potential dan-
          sional, respond to a non-comput-                  fessional I will... [2.5] Give            ger to the user, the public, or
          ing-literate person who asks you if               comprehensive and thorough                the environment, that they
          a national ballistic missile defense              evaluations of computer sys-              reasonably believe to be
          system is possible?                               tems and their impacts,                   associated with software or
                                                            including analysis of possible            related documents.
             The various codes of ethics for                risks. … [2.7] Improve pub-
          the computing professions offer                   lic understanding of comput-              “Software engineers shall act
          some fairly clear guidance on such                ing and its consequences.                 in a manner that is in the best
          questions. Relevant items of the                                                            interests of their client and
          Association of Information Tech-                  “As an ACM member and an                  employer, consistent with
          nology Professionals’ (AITP) stan-                organizational leader, I                  the public interest. In partic-
          dards of conduct [5], [15] that stu-              will... [3.4] Ensure that users           ular, software engineers
          dents should consider include the                 and those who will be affect-             shall, as appropriate: ... [2.6]
          following:                                        ed by a computing system                  Identify, document, collect
                                                            have their needs clearly                  evidence and report to the
             “In recognition of my oblig-                   articulated     during      the           client or the employer
             ation to society I shall: ...                  assessment and design of                  promptly if, in their opinion,
             Use my skill and knowledge                     requirements. Later the sys-              a project is likely to fail, to
             to inform the public in all                    tem must be validated to                  prove too expensive, to vio-
             areas of my expertise. ... To                  meet requirements.”                       late intellectual property law,
             the best of my ability, insure                                                           or otherwise to be problem-
             that the products of my work                 Relevant elements of the                    atic.
             are used in a socially respon-            ACM/IEEE-Computer            Society
             sible way. ... Never misrep-              (CS) Software Engineering Code of              “Software engineers shall
             resent or withhold informa-               Ethics include the following (num-             ensure that their products
             tion that is germane to a                 bers identify specific sections and            and related modifications
             problem or situation of pub-              items of the full code [15], [17]):            meet the highest profession-
             lic concern nor will I allow                                                             al standards possible. In par-
             any such known information                     “Software engineers shall                 ticular, software engineers
             to remain unchallenged.                        act consistently with the                 shall, as appropriate: ... [3.2]
                 In recognition of my                       public interest. In particular,           Ensure proper and achiev-

                                                               TABLE II
                              TOPIC   AND     LENGTH   OF   VIDEO CLIPS USED      IN THE   PRESENTATION

 President Reagan’s call for SDI program                         0:42      Charles Seitz’ argument for feasibility             16:38

 Michael Dertouzos’ overview of SDI                              6:01      David Parnas’ rebuttal                                5:35

 David Parnas’ argument against feasibility                    22:13       Charles Seitz’ rebuttal                               2:31

22                                                                                IEEE Technology and Society Magazine, Spring 2002
able goals and objectives for        becomes complex. How does the           students perform a web search to
   any project on which they            technically-oriented individual take    write short biographical sketches on
   work or propose. ... [3.7]           into account that public policy con-    Parnas, Seitz, and Dertouzos. At a
   Strive to fully understand the       siderations could outweigh techni-      minimum, they should discover
   specifications for software          cal conclusions? Is it reasonable to    such things as that Seitz invented
   on which they work. ... [3.8]        work on a project that is technical-    the “Cosmic Cube” parallel com-
   Ensure that specifications           ly impossible but that is a political   puting architecture that gave rise to
   for software on which they           priority for society? How can one       commercial systems marketed by
   work have been well docu-            assure that the political decision      Intel and Ncube, and that Parnas
   mented, satisfy the users            was made with full knowledge of         was the leader of the Naval
   requirements and have the            the technical impossibility?            Research Lab’s “Software Cost
   appropriate approvals. ...                                                   Reduction” project (dealing with
   [3.10] Ensure adequate test-         USE OF THIS MODULE IN                   software technology in aircraft
   ing, debugging, and review           TEACHING                                weapons systems) prior to joining
   of software and related doc-             This curriculum module is           the SDI computing panel. It is valu-
   uments on which they work.           packaged as a PowerPoint presen-        able for students to see the accom-
                                        tation that incorporates several        plishments of such people, and con-
   “Software engineering man-           mpeg video clips, as outlined in the    sider how the backgrounds of the
   agers and leaders shall sub-         table below. (See Table II.) The        debate participants qualify them to
   scribe to and promote an eth-        complete original debate video ran      offer expert opinions on the subject.
   ical approach to the                 over two hours, and so only the         Another possible pre-class exercise
   management of software               most relevant and useful portions       is for students to go to the BMDO
   development and mainte-              have been digitized and extracted       web site and prepare a one-page
   nance. In particular, those          for use in this module. The debate      summary of the current national
   managing or leading soft-            presentations by Weizenbaum and         missile defense scenario. Yet anoth-
   ware engineers shall, as             Cohen are not included. Since           er possibility is to have the students
   appropriate: ... [5.12] Not          these were the second presentation      use Nexis or do a web search to
   punish anyone for express-           for each side of the issue, they nat-   locate information on the three to
   ing ethical concerns about a         urally do not cover as much new         five most recent tests of missile
   project.”                            material. The questions from the        defense system components. If the
                                        debate audience are also not            whistle-blowing aspects of the inci-
   “Software engineers shall be         included, as the pace of this portion   dent will be emphasized, then it
   fair to and supportive of their      of the original video is rather slow.   will be helpful if they do some
   colleagues. In particular,               The complete module could           background reading ahead of time
   software engineers shall, as         easily take three 50-minute class       (e.g., [15, ch. 7] and a selected
   appropriate: ... [7.5] Give a        periods, or two 75-minute class         worksheet from that chapter).
   fair hearing to the opinions,        periods. With extended discussion
   concerns, or complaints of a         time and/or in-class active learning    One 50-minute class, plus
   colleague.”                          exercises, covering the complete        homework assignment.
                                        module might take an additional             It should be possible to success-
   Students should be encouraged        class period or two. On the other       fully use a portion of the materials
to consider how they would hope to      hand, with judicious selection of       to provide an overview of essential
respond to the ethical issues           material and use of class time, the     issues in testing safety-critical
when/if they face them in their         core issues might be covered in as      software in one 50-minute class.
career, and to evaluate their antici-   little as one 50-minute class peri-     The class presentation would use
pated responses in the context of       od. Suggestions for using the mod-      about 20 PowerPoint slides, plus
the codes of ethics. Answers will       ule in different formats are sum-       the video clips of Reagan, Der-
not be easy for some questions. For     marized below.                          touzos, and Parnas. The total time
example, the ACM/IEEE-CS Code                                                   of the three video clips is about 30
of Ethics requires software engi-       Pre-class exercises.                    minutes. This leaves just enough
neers to “act consistently with the        Students will get the most out of    time to introduce the ballistic mis-
public interest.” However, if we        the module if they complete a pre-      sile defense problem, present the
recognize that the overall “public      class assignment that gets them         software life cycle as an organiz-
interest” incorporates both techni-     thinking about the issues. Several      ing framework, and orient the stu-
cal and political considerations,       different possible pre-class assign-    dents to analyze Parnas’ argument
then individual decision-making         ments are useful. One is to have the    as a homework assignment.

   IEEE Technology and Society Magazine, Spring 2002                                                                     23
The 50-minute period would be       sion-making involved.                   of the argument, as made by Seitz,
     organized into three segments. The         The next segment of the class        is not covered. However, Parnas
     first segment would be about 10         would be about 30 minutes in            advances an in-principle argument
     minutes in length. It would begin       length. The main portion of this is     that should stand or fall on its own
     with a series of a half dozen slides    spent watching the video clip of        merits. Also, Seitz does not direct-
     that support giving a basic defini-     Parnas’ presentation. This prepares     ly address the premises advanced
     tion of ballistic missile defense,      the students for a homework             by Parnas. Thus while additional
     and reminding students of the           assignment to diagram, in premise-      time will certainly improve stu-
     activities in the system analysis       conclusion form, Parnas’ argu-          dents’ understanding of the prob-
     and requirements analysis phases        ment. To get the students oriented      lem, it should still be useful to cov-
     of the traditional software life        for this analysis, it is useful to      er the essentials of Parnas’
     cycle. It would then move to            walk through identifying the con-       argument in one 50-minute class.
     watching the video clip of Presi-       clusion of the argument with them.
     dent Reagan’s call for the SDI pro-     The homework assignment for the         One 75-minute class, plus
     gram. Based on the video clip, stu-     students, then, is to identify the      homework assignment.
     dents are asked to formulate a          premises used to support this tech-         Several options are available for
     high-level statement of SDI system      nical conclusion. Students should       covering this module in one 75-
     requirements. Several students can      be able to identify a sequence of       minute class. One possibility is to
     be called on for a suggested            three to five technical premises,       not present any additional material
     requirements statement. The sup-        and to give some indication of          from the PowerPoint and video
     porting powerpoint material notes       their own belief in the truth of each   clips, but to use the additional time
     that a requirements statement           premise. The PowerPoint material        for an active-learning style exer-
     might focus on either of two parts      includes transcribed versions of        cise that focuses on analyzing Par-
     of Reagan’s speech. Parnas focus-       some of the overheads in Parnas’        nas’ argument. After watching Par-
     es on the part where Reagan says:       presentation. If desired, these can     nas’ presentation and guiding the
     “I call upon the scientific commu-      be printed and given to students as     students to the conclusion of his
     nity to give us the means of ren-       a handout for use in the homework       technical argument, allow a short
     dering these nuclear weapons            assignment. The           homework      time (three to five minutes) for stu-
     impotent and obsolete.” Alterna-        assignment can be handed in and         dents to individually identify the
     tively, Seitz focuses more on the       graded according to how many and        premises supporting this conclu-
     part where Reagan says – “I am          how well the main premises are          sion. Then call on some students to
     directing a long-term R&D pro-          identified. At a minimum, students      give one of their premises and
     gram to begin to eliminate the          should be expected to identify the      build a list premises on the board.
     threat posed by strategic nuclear       premises that the specifications for    Once a full premise-conclusion
     missiles.” In either case, the gener-   the software are necessarily            summary of the argument is con-
     al software requirements are to         unknown, that there is no chance        structed from student responses,
     take in sensor data and direct          for any realistic system-level test-    ask for one person to argue for and
     weapons systems to destroy an           ing, and that there is no chance for    another against the truth of each
     incoming attack before it reaches       debugging during operation. Addi-       premise. If time permits, ask if
     the United States.                      tional slides can be used in a future   Parnas’ analogy for the level of
         The next segment of the class       class to review the analysis of the     reliability expected of SDI soft-
     would again be about 10 minutes         premises after the assignment is        ware (an expectation similar to that
     in length. It would mention the         completed. To connect this analy-       of your car starting when you turn
     M.I.T.-CPSR debate, identify the        sis of Reagan-era SDI program           the key) is appropriate, and if oth-
     participants in the debate, and then    with current national missile           er analogies might be more appro-
     watch the six-minute video clip of      defense scenarios, students might       priate. As a follow-up homework
     Dertouzos’ overview of the SDI          be asked the additional homework        assignment, students can be asked
     problem. Based on his presenta-         question of how their overall           to analyze how the truth of the
     tion, students should get a greater     analysis of the argument would          premises and conclusion would
     appreciation for the vastness of the    change if the scenario involved no      change for a scenario of an attack
     geographic area to be monitored         more than ten missiles and ten          consisting of tens of missiles from
     by sensors, the numbers of war-         decoys launched from an area such       a smaller country.
     heads and decoys to be handled in       as North Korea or Iraq.                     A different option for one 75-
     an attack, and the time scale of an        The primary weakness of cover-       minute class would be to use the
     attack. They should also get a bet-     ing this subject in a single 50-        material in the module to present a
     ter idea of the data flow and deci-     minute class is that the “other side”   summary of Parnas’ argument after

24                                                                    IEEE Technology and Society Magazine, Spring 2002
viewing his presentation, and then       itary weapons systems. One              ethics issues still be addressed, of
watch Seitz’ presentation and also       advantage of this case is that it has   course. At a bare minimum, stu-
use the prepared material to pre-        been the subject of criminal and        dents should be made aware of
sent a summary of his argument.          civil court cases that have run to      what the professional codes of
The class would then end at the          conclusion, and so there is a good      ethics say about requirements,
point where a natural homework           deal of documentation surrounding       specifications, testing, and valida-
assignment would be for students         the case. A current case that is even   tion of software. Software engi-
to write a short critique of the rela-   more directly related to SDI is that    neering students may be able to
tive merits of the two arguments.        of Nira Schwartz versus TRW             usefully devote more time to Par-
                                         [14]. In this case, an engineer         nas’ arguments about why SDI
Two or more classes.                     working on missile defense soft-        presents a unique computing prob-
    Full coverage of this module         ware “has charged the company           lem and why it would not be able
would normally take two, or possi-       with faking tests and evaluations       to be realistically tested. Also,
bly three, classes. This allows time     of a key component for the pro-         there is a quote by James Ionson
to also see the video clips of the       posed $27 billion antimissile sys-      from the Reagan-era SDI office to
rebuttal statements, and to analyze      tem” [14] (see also [19]). The alle-    the effect that SDI software does
the issues from different perspec-       gations in this case can be seen to     not have to be error-free, but only
tives. It also allows time for assess-   come back to the central point in       fault-tolerant, and that “if another
ment of the premises used in the         Parnas’ argument, that of design-       million lines of code has to be
arguments. An important addition-        ing a system to meet unknown            written to ensure fault tolerance,
al perspective is to explicitly iden-    specifications.                         then so be it.” This quote should
tify the ethical issues involved, and        For a general introduction to       provide an interesting opportunity
to discuss the guidance that the         whistle blowing, in particular the      to discuss what is meant by error-
codes of ethics give. Students           use of the “False Claims Act” in        free and fault-tolerant.
should be able to easily identify        connection with fraud on the federal
relevant items of the AITP Stan-         government, a good additional           Use in a science, technology, and
dards of Conduct, the ACM/IEEE-          video resource is available from the    public policy course.
CS Software Engineering Code of          Taxpayers Against Fraud organiza-          Students in this type of course
Ethics, and the ACM Code of              tion [18]. The video presents short     are likely, overall, to be less inter-
Ethics. Analysis of the guidance         summaries of three whistle-blowing      ested in the technical details of
provided by the codes of ethics          cases that involve legal action under   software development and testing
could be done either as an in-class      the False Claims Act. It clearly        and more interested in the deci-
active learning style activity or as a   makes the points that whistle blow-     sion-making and public policy
homework assignment.                     ing is often done at great personal     aspects of the case. An interesting
                                         cost, that it often involves saving     discussion theme for this type of
Connection to whistle-blowing.           lives as well as government money,      course may be the politics/technol-
    While Parnas’ actions are com-       and that it requires gathering and      ogy decision-making conflict men-
monly referred to as whistle-blow-       presenting information carefully.       tioned earlier. That is, what are the
ing, this case does not at all present   Importantly, the video also presents    implications of making a political
a typical whistle-blowing scenario.      some of the history of, and motiva-     decision to pursue a system that is
If anything, this incident may have      tion for, the False Claims Act (orig-   doomed to failure on technical
increased Parnas’ professional           inally adopted under Abraham Lin-       grounds? What is the responsibility
stature and visibility. Students         coln). The video is just over           to make the technical assessment of
should not be left with the impres-      seventeen minutes long. A short         the project known to the public?
sion that the typical whistle-blow-      review of the video and suggestions     What it the responsibility of techni-
er fares so well. It is important that   for using it in class can be found at   cal professionals working on such a
students also see a more standard        www.cse.nd.edu/~kwb/nsf-ufe/.           project – does pursuit of quality
treatment of whistle blowing [15].                                               standards still have meaning?
There are several good whistle-          Use in a software engineering
blowing case studies of relevance        course.                                 CHALLENGING REAL-
to students in computing and infor-         When the module is used in a         WORLD PROBLEM
mation systems majors. One is the        software engineering course, there         Safety-critical software is an
case of Goodearl and Aldred ver-         will likely be relatively more time     important topic for courses in
sus Hughes Aircraft [13]. This case      spent on the software testing issues    ethics and computing, computers
study involves (lack of) testing of      and relatively less on the ethics       and society, software engineering,
hybrid computer chips used in mil-       issues. It is important that the        technology and public policy, and

  IEEE Technology and Society Magazine, Spring 2002                                                                       25
other related areas. The missile        ACKNOWLEDGMENT                                    indecision,” ACM SigSoft Software Engineer-
                                                                                               ing Notes, vol. 24, no. 4, pp. 47-49, July 1999.
     defense problem presents the most          Special thanks are due to David                [9] W.J. Broad, “Scientist at work: Philip E.
     challenging real-world software         Parnas and Chuck Seitz for reading                Coyle III; Words of caution on missile
     engineering problem imaginable –        and commenting on earlier drafts                  defense,” New York Times, Jan. 16, 2001.
                                                                                               [10] R.J. Smith, “Bad weather, computer
     to interpret real-time sensor data      of this paper. It was Chuck Seitz’                woes delay laser test,” The Washington Post,
     taken under natural conditions and      suggestion to include copies of the               Oct. 8, 1997.
     appropriately handle an attack by       Eastport Report and the OTA                       [11] “Possible Soviet responses to the U.S.
                                                                                               Strategic Defense Initiative,” Central Intelli-
     an intelligent adversary likely to      report with the other materials for               gence Agency memo NICM 83-10017, Sept.
     employ strategies that have not         the module.                                       12, 1983. Available at http://www.fas.org/
     been fully anticipated. The curren-        Professors Robin Murphy and                    spp/starwars/offdocs/m8310017.htm
                                                                                               [12] “The SDI imperative” (editorial), Na-
     cy of the national missile defense      Bill Albrecht at USF, Don Gotter-                 tional Review, Feb. 22, 1999.
     problem makes analysis of this          barn at ETSU, Doris Appleby at                    [13] K.W. Bowyer, “Goodearl and Aldred
     Reagan-era SDI case study highly        Marymount College, and Gordon                     versus Hughes Aircraft: A whistle-blowing
                                                                                               case study,” Frontiers in Education (FIE
     relevant for today’s students. The      Hull at Vanderbilt provided valu-                 ‘00), pp. S2F-2-S2F-7, Oct. 2000.
     historical view of over fifteen years   able feedback from classroom-test-                [14] “Former engineer says company faked
     should allow a more objective eval-     ing an early draft of this module,                tests,” The Tampa Tribune, Mar. 7, 2000.
                                                                                               [15] K.W. Bowyer, Ethics and Computing:
     uation of the issues. The basic         resulting in a number of improve-                 Living Responsibly In A Computerized
     technical issues still apply to any     ments. Thanks are also due to an                  World, 2nd ed. New York, NY: IEEE/Wiley,
     system envisioned today.                anonymous reviewer who provided                   2001.
                                                                                               [16] K.W. Bowyer, “Resources for teaching
         This case study allows opportu-     several excellent suggestions for                 ethics and computing,” J. Information Sys-
     nities for extended critical-thinking   revisions that have been incorpo-                 tems Education, vol. 11, no. 3-4, pp. 91-92,
     exercises, including the develop-       rated into the final version.                     Summer-Fall 2000.
                                                                                               [17] Software Engineering Code of Ethics,
     ment of summary pro/con argu-              Christine Kranenburg and Laura                 IEEE Computer Society web site:
     ments and the design and evalua-        Malave provided substantial assis-                http://www.computer.org.
     tion of system testing plans. It also   tance in creating the PowerPoint                  [18] Taxpayers Against Fraud, Fighting
                                                                                               Fraud: Citizen Action and the Qui Tam Rem-
     allows opportunity for analysis of      and digitized video to support the                edy, VHS format video tape can be ordered
     how the professional codes of           use of this module. The idea to                   from www.taf.org. Taxpayers Against Fraud,
     ethics deal with the issues             develop a curriculum module on                    The False Claims Act Legal Center / 1220
                                                                                               19th Street, NW, Suite 501 / Washington, DC
     involved, and connection to whis-       this topic was originally suggested               20036.
     tle-blowing topics. For advanced        to me by Joe Wujek at one of the                  [19] 60 Minutes II, America’s Dream
     students in computing majors, it        NSF-sponsored UFE workshops.                      Defense, originally aired Dec. 26, 2000.
                                                                                               Transcript available from CBS News through
     can be used to provide motivation                                                         Burrell’s Information Services. 1-800-777-
     for discussion of concepts such as      REFERENCES                                        8398.
     fault-tolerance in software, consis-    [1] R. Reagan, “Address to the nation on          [20] K.W. Bowyer, “ ‘Star Wars’ revisited –
                                             national security,” Mar. 23, 1983, VHS            A continuing case study in ethics and safety-
     tency in distributed databases, and     video, The Reagan Library, 40 Presidential        critical software,” in Proc. Int. Symp. Tech-
     the Byzantine agreement problem.        Drive, Simi Valley California, 93065-0699.        nology and Society 2001 (ISTAS ’01), July
         This curriculum module is being     http://www.reagan.utexas.edu/.                    2001. A shorter version also appears in Fron-
                                             [2] D.L. Parnas, “Software aspects of             tiers in Education 2001 (FIE ’01).
     made available free of charge for       strategic defense systems,” Communica-            [21] F.P. Brooks, The Mythical Man-Month.
     use in academic teaching. The           tions of the ACM, vol. 28, no. 12, pp. 1332-      Reading, MA: Addison-Wesley, 1995.
     materials may be down-loaded            1335, Dec. 1985.                                  [22] Eastport Study Group, Summer Study
                                             [3] D.E. Mosher, “The grand plans,” IEEE          1985: Rep. to the SDIO Director, Dec. 1985.
     from the web site http://www.cse.       Spectrum, vol. 34, no. 9, pp. 28-39, Sept.        [23] U.S. Congress, Office of Technology
     nd.edu/~kwb/nsf-ufe/starwars/.          1997.                                             Assessment, Ballistic Missile Defense Tech-
     This web site also contains a wealth    [4] Special issue on ballistic missile defense,   nologies, OTA-ISC-254. Washington, DC:
                                             IEEE Spectrum, vol. 34, no. 9, Sept. 1997.        U.S. Government Printing Office, Sept.
     of other materials created under        [5] The Association of Information Technol-       1985.
     partial sponsorship of an NSF DUE       ogy Professionals (AITP). Web site                [24] “U.S. may deploy defenses untested,”
     grant on teaching ethics and com-       http://www.aitp.org.                              Tampa Tribune, June 8, 2001.
                                             [6] DOD Ballistic Missile Defense Organiza-       [25] “Bush missile plan faces huge obstacle,”
     puting. Also, faculty may obtain a      tion (BMDO). Web site http://www.acq.osd.         Tampa Tribune, June 9, 2001.
     copy of the material by sending two     mil/bmdo/.                                        [26] Comments by Newt Gingrich in the
     blank CDs to the author, with           [7] W. Panofsky, “Nuclear offense versus          transcript of National Public Radio’s “All
                                             defense,” Science, vol. 291, no. 23, Feb.         Things Considered,” July 18, 2001. Avail-
     stamped, self-addressed return          2001, 1447.                                       able through http://www.npr.org/about/
     mailing container.                      [8] D.L. Parnas, “Parnas on Parnas: A life of     transcripts/index.html

26                                                                           IEEE Technology and Society Magazine, Spring 2002
You can also read