Free Essay

My Paper

In:

Submitted By anitasigiro
Words 1957
Pages 8
Google and Operation Aurora
“Business Ethics”

Group
Angela Fisriza
Anita Christiani Sigiro
Suryadi
Williem

Faculty of Economics and Business
Master of Management
Universitas Gadjah Mada
2014
Google and Operation Aurora I. Introduction
In a competitive business world, there are two practices to win the competition which so-called competitive intelligence and industrial espionage. In competitive intelligence, a business entity legally gathers information by examining corporate publications, websites, patent filings and the like, to determine its activities. For the same reason, in industrial espionage, it steals trade secrets by removing, copying, or recording of confidential or valuable information in a competing company.
Industrial espionage describes hidden activities, such as the theft of trade secrets, bribery, blackmail and technological surveillance. Industrial espionage is most commonly associated with technology-heavy industries, particularly the computer and auto sectors, in which a significant amount of money is spent on research and development (R&D).
One of the most notable industrial espionage is “Operation Aurora” which took place in 2009 when some parties hacked Google China operation, stealing intellectual property and, in particular, accessing the email accounts of human rights activists. II. Brief Explanation
Operation Aurora was a cyber attack conducted by advanced persistent threats, such as Elderwood Group that based in Beijing China. Elderwood Group was the digital arms dealer that was used against Google, operating since 2009, when Titan was hit. The Elderwood supplier has frequently been linked to the 2009 attacks. Elderwood used against a large number of industries, including defense, technology and human rights organizations, throughout 2014 and before. Some researchers believe that attack code has been sold to cyber espionage hackers since 2009.
The name Operation Aurora itself was given by Dmitri Alperovitch, Vice President of threat research at cyber Security Company in McAfee. Based on McAfee’s research on cyber attack, it found that aurora was part of the file path on the attacker’s machine. This was included in two of the malware binaries. George Kurtz, the chief technology officer of McAfee once mentions in his blog that McAfee believe the name was the internal name the attacker/s gave to this operation.
On the 12nd of January 2010, Google revealed on its blog that they had been attack. The attack occurred in mid December and originated from China. Google said that the attack was reviewing its business in China. The next day, January 13rd, the news agency reported that U.S congress plans to investigate Google’s allegations that the Chinese government used to spy on human right activists.
McAfee as an American global computer security software said that the main goal of the attack was not money, but to gain access to and potentially modify source code repositories at high tech, security and defense contractor companies. By the high used of technology such as banks, shopping, and even communication, it might be possible for the cyber attack. Google stated that over 20 other companies had been attacked and other sources said more than 34 organizations were targeted. The hacker successes in stilling intellectual property from companies with the used of the security gap in Internet Explorer. The target for this operation not only companies, but also Chinese opposition figures.
The other evidence including IP addresses, domain names, malware signatures and other factors, showed that Elderwood was behind the Operation Aurora. One of numerous attacks conducted by the Elderwood gang and others such as PLA Unit 61398, a Shanghai-based advanced persistent threat group also called "Comment Crew", named after the technique often used by the group involving internal software "comment" features on web pages, which are used to infiltrate target computers that access the sites. III. Consideration of Ethical Matter It is unethical because in this case, there is a violation in the privacy, intellectual property rights, and human rights. The attackers took certain data in illegal ways and used it for their own personal interests in unethical ways. By the help of an insider in Google and the government of China, the criminal stole the data and violated the system to gain important information. According to John Locke, intellectual property should be treated like private property. Meaning that, when an organization or individual create a software program, then it should be treated as a private property. When stealing or using data without permission, they are violating property rights. IV. Stakeholders
There were three classifications of stakeholders in this case, suspects, victims, and others. For suspects, parties such as Elderwood, Beijing Group, and People’s Liberation Army came into mind. Elderwood and People’s Liberation Army were on the same side which attacked Google in 2009. The attackers used various server addresses in which located in China, Taiwan, Texas, and Illinois. Elderwood was revealed after technical evidences such as IP addresses, malware signature, and others show that this group was behind Operation Aurora.

Figure 1. Stakeholders in Operation Aurora Symantec and McAfee were two security companies which tried to identify the problem. According to Symantec, the primary targets were companies in the defense industry supply chain. The Elderwood attacked target towards intellectual property systematically. Meanwhile, McAfee stated that the primary goal of the attack was to gain access to source code repositories at high tech, security, and defense contractor companies. Google, after the attack, planned to operate a completely uncensored version of its search engine in China. Later on, it closed its offices in Mainland and departed to Hong Kong. V. Business Ethics Theories
In Operation Aurora case, we try to evaluate the morality of the violation by using theory of Kantianism, utilitarianism, and social contract. We choose these theories because in these theories the moral principles of individuals can be defined by using logical reasoning. The rational perspective of this case can be approached to consider the moral judgment by modern society standards with these theories.
Kant’s theory is based on moral principle called categorical imperative. It emphasizes that everyone should be treated equally to everyone else. It means that everyone has the same moral right to such treatment and to treat others in the same way. Kant attempted to show that there are certain moral rights and duties that all human beings possess regardless of any utilitarian benefits that the exercise of those rights and duties may provide for others. Kant’s version of the categorical imperative is following the principle:
“An action is morally right for a person in a certain situation if, and only if, the person’s reason for carrying out the action is a reason that he or she would be willing to have every person to act on the person in any similar situation.”
In Kant’s analysis, human beings have a clear interest in being free from injury or fraud and in being free to think, have privacy, and associate with whomever they choose. Kant’s moral principles imply that everyone should be free of the interference of others in these areas. That is, human beings have these negative rights: the right to freedom from injury or fraud, freedom of thought, freedom of association, freedom of speech, and the right to privacy. From the perspective of Kantianism we can conclude that spying the privacy of individuals in terms of communication (email privacy in this case) and private property information is immoral and unethical in society and business as well.
Utilitarian have proposed an important and influential alternative version of utilitarianism to deal with critics of traditional utilitarianism called rule-utilitarianism. The basic strategy of the rule-utilitarian is to limit utilitarian analysis to the evaluations of moral rules. According to the rule-utilitarian, when trying to determine whether the a particular action is ethical, one is never supposed to ask whether that particular action will produce the greatest amount of utility. Instead, one is supposed to ask whether the action is required by the correct moral rules that everyone should follow. According to the rule-utilitarian, the correct moral rule is the one that would produce the greatest amount of utility for everyone affected. In Operation Aurora, there were larger losses in the companies targeted compared to the amount of benefit gained by the attacker. Therefore, we can conclude that according to the rule-utilitarian perspective, this kind of action is unethical.
Social contract theory offered the concept that morality is based on rules describing how individuals are supposed to treat one to another. Rational individuals will accept certain rules if everyone else also follows those rules for mutual benefit. There are also some principles in the social contract stated that people have the right to freedom of speech, freedom of association, the right to be safe from harm, and the right to own property. In Operation Aurora case, the attacker violated one of the principles of the social contract theory which is the right to own property. Because the attacker did not respect the property ownership of the original authors, this action can be considered as an unethical conduct under the social contract theory. VI. Alternative Actions by Google Following the Operation Aurora attack, Google demanded an explanation from Chinese government which denied its involvement in the action. Due to this unsatisfactory follow up, Google then cancelled its censored search results policy, shut down its office in Mainland, China, and moved its operation to Hong Kong. However, there were several alternatives Google could take to solve the problems, either it was legally or illegally.
It was possible for Google to strike back the suspects, such as Elderwood and Beijing Group. Another possible action was to negotiate with China government about the agreement on censorship and security in its services. Google could reserve the right to strike back any parties who potentially attack Google in the future. VII. Recommendation Google can make preventive action in human resource and security. In human resource, Google should improve the quality of screening and recruiting the employees. It has to make sure that the selected employees loyal and have integrity as the complementary for the technical and managerial expertise. It is important since this procedure will minimize the likelihood the employees harm Google by selling sensitive information to other parties. In security, empowering antimalware software is a necessity. If needed, Google could cooperate with security provider to strengthen its security system. Governments of the countries potential to be the victims can make a whitelist (a list of software which are safe to use). The list functions as a guide for computer users to check the security level of software. The list should be updated regularly to cope with the rapid development of software. For internet users, they should be wiser in using the Internet. Safety in internet usage becomes critical nowadays. Safety internet actions can take form such as increasing the level of password security, changing the passwords periodically, and update the browser and antivirus software regularly, particularly for office application and others which commonly connected to the Internet.
References:
Investopedia, Industrial Espionage definition, URL: http://www.investopedia.com/terms/ i/industrial-espionage.asp, accessed May 28, 2014.
Brewster, Tom (2014), Is Elderwood the digital arms dealer that fuelled attacks on Google?. URL: http://www.theguardian.com/technology/2014/may/15/ elderwood-digital-arms-dealer-google, accessed May 27, 2014.
Harvey, Mike (January 16, 2010), China accused of cyber attack on Google and ‘global industrial targets’, URL: http://www.thetimes.co.uk/tto/technology/ article1859862.ece, accessed May 28, 2014.
Velasques, Manuel G. (2012), Business Ethics: Concepts and Cases, Seventh Edition, Pearson Education Limited, London.
VivaNews (2010), Serangan Cyber Terbesar Sepanjang Sejarah, URL: http://teknologi.news.viva.co.id/news/read/193494-serangan-cyber-terbesar-sepanjang-sejarah, accessed May 28, 2014.
Zampaglione, Aaron (2011), Intellectual Property and Cyber Threat. URL: http://www.azampagl.com/docs/intellectual-property-and-the-cyber-threat_aaron-zampaglione.pdf, accessed May 27, 2014.

Similar Documents

Premium Essay

Personal Narrative: My First Paper

...My first paper was a little rocky. At first I could not settle with a topic. When I would start to write a paper I would think it was not good enough and change it to something else. I changed my paper three different times. It was just hard for me to get started and it was also hard narrowing down my topic because I felt like what I was talking about was so broad. Turns out when I finally picked my topic my paper was headed in all the wrong directions. I ended up having to change a lot of things. When I went to Professor Warfield’s office hours it did help me but I was still a little discouraged that I would never get my paper right. I am still trying to keep a positive mind frame and I am hoping for the best with my grade. Overall I learned...

Words: 301 - Pages: 2

Premium Essay

My Special Interest Research Paper

...My special interest is writing. Through elementary, middle, and high school I have improved my writing skills. When it comes to writing, I like to put my imagination or a past experience in a story with characters that reflect the people who I have encountered throughout my life. At a young age, I remember starting my own book. It was nothing special but about a girl's struggles growing up in a big family. The characters that I incorporated were about my own family, my friends, and even strangers that I would see around stores. I wrote about one hundred pages in less than three months. That didn't stop there, I remember that even as young as I was I would take inspiration from just about anything to write a story. For example, I once had an...

Words: 259 - Pages: 2

Premium Essay

My Lai Massacre Research Paper

...The My Lai Massacre took place on March 16, 1968. The Massacre was a horrific event during the Vietnam War. At the beginning of the war, the American soldiers didn’t ever see their enemy. They would fall into poison bungee sticks, and were taken back to an American base for treatment; that is one way that the Americans lost some of their men. Another way that they lost soldiers, was that they would run into landmines. When the My Lai Massacre took place, the American soldiers were advised to kill anyone in the village, treating them as if they were all part of the Vietnamese military. The My Lai Massacre took place shortly after the Tet Offensive (which is another war in Vietnam). It was a bad part of American history because there were so...

Words: 520 - Pages: 3

Premium Essay

My Sister's Keeper Research Paper

...My Sister’s Keeper by Jodi Picoult, is an amazing story of love and sacrifice. In the book, Anna Fitzgerald was born to help her sister, Kate, battle leukemia. All of Anna’s life, from the time she was born to her teenage years, has had to sacrifice her time and her body for her sister. Over the course of time Anna has been donating her blood and plasma to her sister. Anna was tired of giving everything to her sister, so she hired an attorney to sue her parents. Getting closer and closer to the trial Anna did not know if she wanted to actually go through with the trial. She did not want her sister to die, all she wanted was to make her own decisions. The trial was ripping her family apart, Anna's dad, Brian, agreed with Anna; but her mother...

Words: 267 - Pages: 2

Premium Essay

My Lai Massacre Research Paper

...The My Lai massacre was one of the most horrendous instances to ever take place during any of the wars the United States fought in. A United States Army battalion directed by William Calley, entered then My Lai village anticipating to discover participants of the Vietcong. Instead, the Charlie Company killed approximately 500 innocent civilians brutally. This massacre was not stopped until Robert Thompson, a helicopter pilot saw all the lifeless bodies and flew down to figure out what transpired. Calley claims Ernest Medina ordered him to execute the killings. When Calley was indicted for murder the nation broke out in a "Free Calley" movement claiming he was innocent. William “Rusty” Calley was born June 8th 1943 in Miami, Florida. His father was a United States Navy veteran from World War II. He attended Palm Beach Junior College for a year, but had to drop out due to...

Words: 1313 - Pages: 6

Free Essay

All My Sons Reaction Paper

...Through his character, Chris Keller, in the play All My Sons, the playwright Arthur Miller he explores the theme of accountability and responsibility of man which is as universal and relevant today as it was in the post WWII era. Chris Keller calls for corporate responsibility and the human universality of man looking out for man. As humans we have a highly developed brain, capable of abstract reasoning, language, and problem solving, with this in mind if we are smart enough to start of businesses then we should be responsible for the effects they cause. What does it mean to say that "business" has responsibilities? Only people can have responsibilities. A corporation is an artificial person and in this sense may have artificial responsibilities, but "business" as a whole cannot be said to have responsibilities, even in this vague sense(Friedman, Milton). Joe Keller owned a small factory that manufactured many spare parts and Steve was working for him. During the war the factory manufactured cylinder heads for the Air Force planes. One day they shipped some bad parts to the Army which resulted in the crash of twenty-one planes and the death of their pilots. That was a great scandal. Both Joe and Steve were arrested and brought up to trial for that terrible crime. Joe was clever enough to get off with it. He proved to the court that he had nothing to do with the shipped those bad cylinders. Life is full of many hard decisions that people have to take, often on the...

Words: 271 - Pages: 2

Premium Essay

Personal Narrative: If You Give A Suitor A Cookie

...English rules. My very first piece, “If You Give a Suitor a Cookie”, was an analytical 8-point paper about The Odyssey, and it was quite literally the worst paper I have ever written. It was so terrible, that I couldn’t even make it through the first paragraph, when I attempted to re-read it. I remembered my writing not being horrible, because, otherwise, I wouldn’t have turned it in. As I recall, it was so bad, that you didn’t even grade it, because I would’ve gotten an F (thank you about that, by the way). This paper exemplifies the very beginning of my career as a high school writer, and through re-reading...

Words: 1216 - Pages: 5

Premium Essay

English 1010 Research Paper

...English 1010 has been a very interesting journey for me. Throughout my journey, I experienced frustration, stress, and long nights in the computer lab. English 1010 have not only made me a better writer, but it has also improved my creativity in my writing. My writing has improved tremendously since the first day of class. I am satisfied with the grade I earned although; I feel I could have done a lot better on to receive a higher grade. I believe my grade should be a B. According to the English 1010 syllabus I feel that my grade should be a B because I improved since my first paper, I participate in class conversations, and I have decent attendance. At the very beginning of the English 1010 Course, my writing style wasn’t too good. I noticed...

Words: 596 - Pages: 3

Premium Essay

Torture

...12 December 2012 Writing Process My personal writing process is probably somewhat similar to what other students do for theirs, because we may have been taught similar ways. I have my writing process broken down into a few different parts. First, I do research and gather information if research is necessary to the paper’s topic. Then, I would start writing the introduction to the paper. Next, I do the actual writing of the paper and describe each topic in more detail. The last step is to, I revise it in case of any errors. I also revise it to make it better. Each step is important in order to make my writing good. I will discuss in depth and detail about each part of my writing process. As soon as I get the topic and know what I am to write about, I think to myself of some of the ideas that I have that could relate to this piece of writing. Often times, I come up with a story in my own life that can relate or something that I know of that can influence my paper to have more meaning, not only to the reader, but also to me. It will make writing the paper easier if you can make a connection to the topic and relate it to yourself somehow. If I don’t really have a way to connect it I just brainstorm for things or ideas that can be included or used in the piece. I make a list of things pertaining to the paper so I can go through the list easier. If it is a really detailed piece, I sometimes use the web process. If it is necessary to the paper, I will research the topic and try to...

Words: 708 - Pages: 3

Premium Essay

Personal Narrative: Art Censorship

...Throughout my 8th grade writing career, I have changed a lot. I used to despise writing assignments, and I always procrastinate when I have to work at home. Now I find myself enjoying some of the writing tasks. I still think some papers are pointless, but I have started to enjoy prompts such as narrative writing. In fact, I have even started to write my own story for fun. As a writer, I’d say I use pretty good language. I can describe things well, I’m good at organization, but I can improve on all of these. I also need to work on concentrating so that I don’t have to work late. A writer always has room to grow. While one may be excellent in some parts of writing, they’re not the best at everything. For me, I’d say I’m good at descriptions,...

Words: 1014 - Pages: 5

Premium Essay

Personal Narrative: My Writing Process

...My writing process often begins with good intentions. As soon as I receive an assignment, I begin planning my essay and gathering my ideas. However, I often have trouble actually getting work done until I feel motivated by my time constraints. This is a weak point that could potentially cause my work to suffer. Once enough time has passed that I am under some pressure to start putting pen to paper, I gather my laptop, a pencil, and some paper. I prefer making notes about the topic of my assignment on a piece of paper before actually writing any drafts. I make short, simple notes, so it does not usually take very much time. After I have researched my points, I make a basic outline for my essay. This helps me keep my paper organized and make...

Words: 309 - Pages: 2

Premium Essay

My American History Project

...When I was in eighth grade I had a huge project in my American History Class. In this project I had to write a ten page paper about the decade of my choice, come up with a question from the decade I chose, find people from the era to help me answer my question, and create a display. This was one of the hardest and most time consuming projects I had ever done. It didn’t help that I was in a lot of other tough classes and in a lot of extracurricular activities. I didn’t know how I would be able to finish it but I eventually did. I was extremely proud of the project I completed and all the work I put into it. The project began in the fall of my eighth grade year and it was due at the end of the year. This project seemed overwhelming. The teacher...

Words: 676 - Pages: 3

Premium Essay

English Reflective Essay

...if I have progressively advanced in my writing. Although, I have not perfected any of the different writing aspects; I have learned from Mrs. Menetre’s corrections especially on my use of second person. Over my English...

Words: 515 - Pages: 3

Premium Essay

English 102 Class Reflection

...Throughout the course of my English 102 class, there have been many attributing factors that have not only geared me toward meeting the course objectives but have challenged and strengthened my analytical and critical thinking skills. My portfolio highlights these acquired skills through two outside of class essays, which required two completely different styles of writing. Another key element that has helped to illustrate the writing process for the two essays in my portfolio was the use of reading various types of literature. This included but was not limited to, editorials, newspaper articles, books, and specific disciplines of research in course related fields. These two essays essentially reshaped my ability to write for specific audiences...

Words: 660 - Pages: 3

Premium Essay

Lollipop Rough Draft

...It was a few minutes after 10pm on a Monday night and I had just remembered that my rough draft essay for my dual enrollment English class was due the next day. Even though I wrote the date it was due down, I always pushed it off to do “another day”, well another day became that night. I had to write 500 descriptive words about the nature of opening and eating a tootsie pop; I didn’t even have a tootsie pop. I knew I would have to improvise, so I grabbed the old lollipop in my pantry and started opening it. As I opened the lollipop I wrote down descriptive thought I had. I started with the sound I heard, I wrote down “crispy crackling”, then I thought about how it looked “hard, glazed strawberry”. Before I knew it the lollipop was gone,...

Words: 372 - Pages: 2