Cybersecurity Debate

Fulfills Step 3 of GSUSA Ambassador Cybersecurity Basics badge requirements.

Info Needed for the badge requirements: Think about the balance between protecting individual privacy and ensuring collective safety. Consider how decisions impact trust and security. First are the types of hackers: White Hat, The good guys, fixing problems legally. Gray Hat, They break rules but try to help. Black Hat, The bad guys, causing harm or stealing. Then reflect on what happens when security weaknesses are discovered. Should the information be kept secret, shared publicly, or reported to the organization for improvement? Consider different perspectives like: Government, Wants safety and crime prevention. Companies, Want to protect users’ trust. Hackers and Public, Opinions vary depending on the situation. Realize that decisions have consequences. Will the choice help or harm individuals and organizations?

Items Needed

Instructions

  1. Scouts debate the ethics of hacking through three scenarios. Use one card for each Decision Point.
  2. Decision Point 1:
    • Divide scouts into two groups, representing Apple and the FBI.
    • What Happened:
      In 2015, a terrorist attack in San Bernardino, California, resulted in 14 fatalities and 22 injuries. The FBI recovered one of the shooter’s phones but couldn’t unlock it due to encryption. The FBI asked Apple to create software to bypass security features, but Apple declined, citing its corporate policy. A legal battle ensued.
    • Debate Prompt: Should Apple comply with the FBI’s order to create software that would allow the FBI to unlock the phone?
    • Ensure all know the order of the Mini-Debate (1-minute turns for each side)
      • FBI presents arguments.
      • Apple presents arguments.
      • FBI responds to Apple’s points.
      • Apple responds to FBI’s points.
      • FBI closing arguments.
      • Apple closing arguments.
  3. Decision Point 2:
    • Divide scouts into two new groups based on their stance. Give each group five minutes to discuss their position and organize their arguments, then share their conclusions.
    • What Happened:
      During the legal battle, the FBI reached out to hackers nationwide and eventually offered $1 million to a hacker who could unlock the phone.
    • Debate Prompt: Should the hacker agree to help the FBI crack the passcode?
    • Ensure all know the order of the Mini-Debate (1-minute turns for each side)
      • Agree to help presents arguments.
      • Don’t help presents arguments.
      • Agree to help responds to Apple’s points.
      • Don’t help responds to FBI’s points.
      • Agree to help closing arguments.
      • Don’t help closing arguments.
  4. Decision Point 3:
    • Divide scouts into two new groups based on their stance. Give each group five minutes to discuss their position and organize their arguments, then share their conclusions.
    • What Happened:
      The FBI unlocked the phone with help from a third party, exploiting a security vulnerability. This weak point could be used by malicious hackers. The FBI could release the vulnerability to Apple, allowing them to fix it, but doing so might hinder future investigations.
    • Debate Prompt: Should the FBI release the security vulnerability data to Apple?
    • Ensure all know the order of the Mini-Debate (1-minute turns for each side).
      • Release data presents arguments.
      • Don’t release presents arguments.
      • Release data responds to Apple’s points.
      • Don’t release responds to FBI’s points.
      • Release data closing arguments.
      • Don’t release closing arguments

Optional Extension:

  • Return to the original groups from the first debate and allow scouts to refine their arguments. Reverse the presentation order, with Apple speaking first.