<?xml version="1.0"?>
<?xml-stylesheet href="/transform" type="text/xsl"?>
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:bs="http://purl.org/ontology/bibo/status/" xmlns:ci="https://vocab.methodandstructure.com/content-inventory#" xmlns:dct="http://purl.org/dc/terms/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:xhv="http://www.w3.org/1999/xhtml/vocab#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" lang="en" prefix="bibo: http://purl.org/ontology/bibo/ bs: http://purl.org/ontology/bibo/status/ ci: https://vocab.methodandstructure.com/content-inventory# dct: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ rdf: http://www.w3.org/1999/02/22-rdf-syntax-ns# xhv: http://www.w3.org/1999/xhtml/vocab# xsd: http://www.w3.org/2001/XMLSchema#" vocab="http://www.w3.org/1999/xhtml/vocab#" xml:lang="en">
  <head>
    <title property="dct:title">&#x201C;Adversary Experience&#x201D; Design</title>
    <base href="https://doriantaylor.com/adversary-experience-design"/>
    <link href="document-stats#EOloKl0WxWqHi30u74tN3L" rev="ci:document"/>
    <link href="elsewhere" rel="alternate bookmark" title="Elsewhere"/>
    <link href="this-site" rel="alternate index" title="This Site"/>
    <link href="http://purl.org/ontology/bibo/status/published" rel="bibo:status"/>
    <link href="" rel="ci:canonical" title="&#x201C;Adversary Experience&#x201D; Design"/>
    <link href="person/dorian-taylor#me" rel="dct:creator" title="Dorian Taylor"/>
    <link href="//www.amazon.com/dp/081297381X" rel="dct:references"/>
    <link href="person/dorian-taylor" rel="meta" title="Who I Am"/>
    <link about="./" href="3f36c30c-6096-454a-8a22-c062100ae41f" rel="alternate" type="application/atom+xml"/>
    <link about="./" href="f07f5044-01bc-472d-9079-9b07771b731c" rel="alternate" type="application/atom+xml"/>
    <link about="./" href="this-site" rel="alternate"/>
    <link about="./" href="elsewhere" rel="alternate"/>
    <link about="./" href="e341ca62-0387-4cea-b69a-cdabc7656871" rel="alternate" type="application/atom+xml"/>
    <link about="verso/" href="3f36c30c-6096-454a-8a22-c062100ae41f" rel="alternate" type="application/atom+xml"/>
    <link about="verso/" href="this-site" rel="alternate"/>
    <link about="verso/" href="elsewhere" rel="alternate"/>
    <meta content="adversary-experience-design" datatype="xsd:token" property="ci:canonical-slug"/>
    <meta content="In the wake of recent cyberattacks, consider an &#x201C;insurance policy&#x201D; of injecting some information security into your product design process." name="description" property="dct:abstract"/>
    <meta content="2016-10-23T00:03:22+00:00" datatype="xsd:dateTime" property="dct:created"/>
    <meta content="adversary-experience-design" property="dct:identifier"/>
    <meta content="2016-10-23T00:08:42+00:00" datatype="xsd:dateTime" property="dct:issued"/>
    <meta content="2016-12-28T05:28:51+00:00" datatype="xsd:dateTime" property="dct:modified"/>
    <meta content="2022-05-31T15:10:50+00:00" datatype="xsd:dateTime" property="dct:modified"/>
    <meta about="person/dorian-taylor#me" content="Dorian Taylor" name="author" property="foaf:name"/>
    <meta content="summary" name="twitter:card"/>
    <meta content="@doriantaylor" name="twitter:site"/>
    <meta content="&#x201C;Adversary Experience&#x201D; Design" name="twitter:title"/>
    <meta content="In the wake of recent cyberattacks, consider an &#x201C;insurance policy&#x201D; of injecting some information security into your product design process." name="twitter:description"/>
    <object>
      <nav>
        <ul>
          <li>
            <a href="document-stats#EOloKl0WxWqHi30u74tN3L" rev="ci:document" typeof="qb:Observation">
              <span>urn:uuid:3a5a0a97-45b1-45aa-b1e2-df4bbbe2d377</span>
            </a>
          </li>
        </ul>
      </nav>
    </object>
  </head>
  <body about="" id="EyCFoGREQLKyQBezMxkx7I" typeof="bibo:Article">
    <section id="EKShlikqMe_1gulJQagjXL">
      <blockquote class="quote" id="ECKOrg_zExvWzGgrUwOnoK">
        <p><q>Security will always be exactly as bad as it can possibly be while allowing everything to still function.</q></p>
        <p><cite>Nat Howard</cite>, via <a rel="dct:references" href="https://www.youtube.com/watch?v=nT-TGvYOBpI" title="Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014 - YouTube">Dan Geer</a></p>
        <p style="font-size: 75%">to which Geer added <q>&#x2026;but with each passing day, that <q>and still function</q> clause requires a higher standard.</q></p>
      </blockquote>
      <p>On October 21, 2016, <a rel="dct:references" href="https://motherboard.vice.com/read/blame-the-internet-of-things-for-destroying-the-internet-today">an internet outage occurred</a> that had the ultimate effect of crippling several big services, including some services that people use to do their jobs. It turned out to be an <em>attack</em>, <a rel="dct:references" href="https://dyn.com/">on a particular provider</a> of <a rel="dct:references" href="https://en.wikipedia.org/wiki/Domain_Name_System" title="Domain Name System &#x2014; Wikipedia">domain name resolution</a>, a core service that enables us to find other services on the internet. The attack was carried out by co-opting an army of so-called <q>smart</q> gadgets and instructing them to <a rel="dct:references" href="https://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_attack" title="Denial-of-service attack &#x2014; Wikipedia">hurl deliberately-broken internet traffic</a> at its targets. Legitimate requests to the name servers couldn't get through the torrent, making them unable to do their job of telling people where to look on the internet for the <em>other</em> services. It is important to recognize that this damage could easily have been caused by one person: <em>anybody</em>, anywhere on the planet, who knows how and cares enough to bother.</p>
      <p>For those who haven't gotten <a rel="external" href="https://www.amazon.com/dp/081297381X?tag=doriantaylor-20" title="The Black Swan: Second Edition: The Impact of the Highly Improbable: With a new section: &quot;On Robustness and Fragility&quot; (Incerto)">the memo</a>, we are now living in Extremistan: a state of affairs in which governments, corporations, terrorists, criminals, and even a bored teenager halfway around the world can cause untold amounts of damage. We are lucky that this damage has so far <em>only</em> been financial. It will not stay this way forever.</p>
      <p>When this kind of thing happens, and it <em>will</em> keep happening, somebody is eventually going to have to be held responsible. Fingers are already pointing at the manufacturer of <abbr title="digital video recorder">DVRs</abbr> and webcams that were used in the attack&#x2014;devices which could have been protected with a modicum of design effort. Maybe the Chinese government will prosecute. Either way, it's doubtful that <a rel="dct:references" href="https://dyn.com/">Dyn</a>, the target, let alone collateral damage like <a rel="dct:references" href="https://netflix.com/">Netflix</a> ,<a rel="dct:references" href="https://twitter.com/">Twitter</a> and <a rel="dct:references" href="https://github.com/">GitHub</a>, are going to see any compensation.</p>
      <blockquote class="note" id="EensOumLoFYN6SgaudX6xJ">
        <p><ins datetime="2016-10-24">October 24, 2016</ins>: It looks like <a rel="dct:references" href="http://boingboing.net/2016/10/24/xiongmai.html" title="China electronics maker will recall some devices sold in U.S. after massive IoT hack / Boing Boing">Xiongmai is issuing a recall</a>.</p>
      </blockquote>
      <p>The other common practice is, of course, to blame the users. Turns out that these devices were compromised because they were reachable over the internet with baked-in default passwords nobody bothered to change. But to millions of people, these things are just gadgets. They have <em>no idea</em> the extent to which these objects can be weaponized. Our marketing departments don't tell them, to say nothing of the people who actually <em>make</em> these devices. <a rel="dct:references" href="https://twitter.com/OddLetters/status/789840696412868608">Molly Sauter has a point</a> that the prevailing attitude of the so-called <q>tech community</q> is flagrantly anti-user.</p>
    </section>
    <section id="E6oYD5cXlT6ZLlJya3bgQJ">
      <h2>This is a Job for User Experience Design</h2>
      <p>The <em>stated purpose</em> of user experience design is to empathize with and advocate for the user. However, it isn't clear to me how well-rehearsed <abbr title="user experience">UX</abbr> designers are with information security. In my experience, most <em>developers</em> have a poor grasp of information security. That's only half-excusable, as short-term business interests are inherently hostile to it: albeit only incrementally, security costs more time and more money. In today's climate of so-called <q>Agile</q>, <q>fail-fast</q>, <q><abbr title="Minimum Viable Product">MVP</abbr></q> product development, it almost seems like it will take a real disaster or two, <a rel="dct:references" href="http://geer.tinho.net/geer.blackhat.6viii14.txt">or perhaps stricter liability legislation</a>, to spur an appropriate response.</p>
      <p>I propose a new role in the business of developing software, information service, and software-driven objects: a <em>designer</em>, whose job it is,</p>
    <ol>
      
      <li>to help companies design products that <span class="parenthesis" title="and mitigate damage when they do get hacked">don't get hacked</span>, and</li>
      <li>to help companies design products that are resilient to <em>other</em> products/services <span class="parenthesis" title="or otherwise failing">getting hacked</span>.</li>
    </ol>
    <blockquote class="note" id="EAdsMkfEI24QxRrdEs8g5L">
      <p>Fallout takes all sorts of shapes: <a rel="dct:references" href="https://twitter.com/ow/status/789515155877027840">here is somebody reporting</a> that his thermostat cranked up the heat on his house <span class="parenthesis" title="a questionable practice in its own right">because it couldn't contact its manufacturer</span>. It's also worth noting that this would have happened in any outage, irrespective of whether there was a cyberattack behind it.</p>
    </blockquote>
    <p>This person is basically a cop, who watches over the <em>design</em> process as the surrogate for a hypothetical adversary. This person&#x2014;let's say it's me&#x2014;will help product design teams make robust decisions to keep their users safe and their products effective. This role is different from a typical <abbr title="user experience">UX</abbr> designer, whose goal is to design the interactions of <em>legitimate</em> users, and a typical security consultant, whose goal is the <em>technical</em> security of the product. Rather, it's something in between.</p>
    <p>As somebody who has chops in both <abbr title="user experience">UX</abbr> design <em>and</em> information security, I can say with confidence that many of the techniques of the latter are far from alien to the former: oversimplified, you create a <q>persona</q> who is a badguy, and you design your product to keep him out. Like <abbr title="user experience">UX</abbr> is in the first place, this is more of a mindset&#x2014;the skills anybody can learn. While it would help a less-experienced team to start with an outside person dedicated to owning the adversary, it's entirely reasonable that over time, an in-house design team can integrate the role themselves.</p>
    </section>
    <section id="EnbG8k9G_O6g6uYnOaT1MJ">
      <p>The remaining question is <em>will</em> on the part of business leaders. The business community only <em>just</em> seems to be warming up to the idea of paying for design as it <em>is</em>, as a way to make better products that earn more money. What I'm proposing is that the businesses who have already bought into design, bump that budget up just a <em>wee</em> little bit more, as an insurance policy against <em>losing</em> that precious money, either from an embarrassing <abbr title="public relations">PR</abbr> scenario, a product recall, or something far more serious.</p>
      <ul>
        <li>If you sell a product or service that can be weaponized by hackers,</li>
        <li>If you sell a product or service that depends on the internet in ways you may not have fully accounted for,</li>
      </ul>
      <p>&#x2026;which is just about anything that either <em>is</em> software or is driven by it, you should really be thinking about injecting a little security-think into your product development process. Cybercrime/attacks/war are only going to escalate. Penalties, both from the attacks themselves and from liabilities in permitting them, are only going to get stiffer. Get prepared now and internalize the discipline. This is something I can help with.</p>
    </section>
  </body>
</html>
