{"id":487,"date":"2012-06-05T21:59:43","date_gmt":"2012-06-05T13:59:43","guid":{"rendered":"http:\/\/blog.a-cubed.info\/?p=487"},"modified":"2012-06-06T00:20:23","modified_gmt":"2012-06-05T16:20:23","slug":"security-and-human-behaviour-session-5-foundations","status":"publish","type":"post","link":"http:\/\/blog.a-cubed.info\/?p=487","title":{"rendered":"Security and Human Behaviour &#8211; Session 5 Foundations"},"content":{"rendered":"<p><strong>David Livingstone-Smith, New England<br \/>\nIdeology<\/strong><\/p>\n<p>The camera obscura description of ideology as an accidental inversion of reality. The Conspiracy Model of ideology as a purposive distortion of reality in pursuit of some goal.<\/p>\n<p>There is a perfectly good model of non-intentional purposiveness available: the notion of biological purpose, e.g. the orhid that simulates a wasp for the &#8220;purpose&#8221; of seducing male wasps to use them as a pollenation vector.<\/p>\n<p>Millikan&#8217;s theory of proper function provides analysis of non-intentional purposes. The thing that caused a reproduction of an item is the proper function of the item.<\/p>\n<p>Ideologies are collective misrepresentations of the social world that:<\/p>\n<p>perpetuate the power of dominant groups, creating the circumstances allowing their reproduction and the reproduction of that power.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Rachel Greenstadt, Drexel<\/strong><br \/>\n<strong>Anonymouth: How to make machine learning for security usable<\/strong><\/p>\n<p><strong><\/strong>Long term anonymity is challenging, as shown in the case of &#8220;A Gay Girl in Damascus&#8221;. It&#8217;s particularly difficult to re-write an existing document in a new style.<\/p>\n<p>Anonymouth provides a suggestion set of ideas for how to make your documents less recognisable as your own.<\/p>\n<p><strong>Luke Church, Cambridge<\/strong><br \/>\n<strong>&#8220;tracking&#8221; for societal benefit<\/strong><\/p>\n<p>Users don&#8217;t understand derived sales models.<\/p>\n<p>Asking programmers to allow the researchers to record and analyse their every keystroke and mouse click leads to refusal because they are afraid of the usage of that data.<\/p>\n<p>Please can we slow down the process of restricting scientists access to data.<\/p>\n<p><strong>Bruce Schneier, BT<\/strong><br \/>\n<strong>Profiling and Airports<\/strong><\/p>\n<p>Why profiling makes no sense in security, even if you have a differential threat. Arguing against intuition, &#8220;common sense&#8221; and &#8220;obviousness&#8221; with clear (security) engineering principles is hard.<\/p>\n<p>Public policy has important characteristics which divorce it from individual common sense about security.<\/p>\n<p>Political rhetoric focusses on folk belief, common sense and intuition, rather than solid engineering principles. Non-security issues are driving security decisions (including corporate interest, law enforcement interests, military interests).<\/p>\n<p>The four horsemen of the cyber apocalypse used for two decades to justify intrusion.<\/p>\n<p>Persuasion and security questions. How to teach people not to have their security fear buttons pushed.<\/p>\n<p><strong>Matt Blaze, University of Pennsylvania<\/strong><br \/>\n<strong>Folklore<\/strong><\/p>\n<p>Why (Special Agent) Johnny (Still) Can&#8217;t Encrypt (redux)<\/p>\n<p>APCO Project 25 (P25) cryptographic system for first responders.<\/p>\n<p>Serious vulnerabilities in multiple ways, in theory. How often do they cause problems in practice?<\/p>\n<p>Rule #1 of cryptanalysis &#8211; look for cleartext.<\/p>\n<p>Ridiculous amount and high security content of cleartext. About 30 minutes of cleartext per day per city.<\/p>\n<p>The problem exists because radio encryption is harder than we think.<\/p>\n<p>After discussions with various agencies there was often a short term drop in cleartext but then a reversion and even an increase.<\/p>\n<p>The act of paying attention to problems like this can lead to a reduction of security because of misunderstanding.<\/p>\n<p>Institutional memory of the previous generation of analogue radios (encryption reduces quality) is still maintained even though it is completely incorrect for the current systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>David Livingstone-Smith, New England Ideology The camera obscura description of ideology as an accidental inversion of reality. The Conspiracy Model of ideology as a purposive distortion of reality in pursuit of some goal. There is a perfectly good model of non-intentional purposiveness available: the notion of biological purpose, e.g. the orhid that simulates a wasp [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29,43,5],"tags":[],"class_list":["post-487","post","type-post","status-publish","format-standard","hentry","category-academia","category-security","category-legal-and-ethical"],"_links":{"self":[{"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/posts\/487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=487"}],"version-history":[{"count":4,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/posts\/487\/revisions"}],"predecessor-version":[{"id":489,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/posts\/487\/revisions\/489"}],"wp:attachment":[{"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=487"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}