{"id":8,"date":"2005-04-03T09:12:45","date_gmt":"2005-04-03T13:12:45","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/rlucastemp\/2005\/04\/03\/check-cutters-drop-ball-bash-harva"},"modified":"2005-04-03T09:12:45","modified_gmt":"2005-04-03T13:12:45","slug":"check-cutters-drop-ball-bash-harvard-circle-wagons-consumerist-atti","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/rlucastemp\/2005\/04\/03\/check-cutters-drop-ball-bash-harvard-circle-wagons-consumerist-atti\/","title":{"rendered":"Check-cutters drop ball, bash Harvard, circle wagons; &#8220;consumerist&#8221; attitudes toward computing."},"content":{"rendered":"<p><a name='a71'><\/a><\/p>\n<p>Paymaxx, a payroll services provider, recently confessed to a major<br \/>\nmistake that essentially made public many of their customers&#8217;<br \/>\nemployees&#8217; W-2 forms. My firm uses Paymaxx to run payroll. So, as it<br \/>\nhappens, does another Harvard-associated person&#8217;s small computer firm.<br \/>\nThis person, however, has more time (or more curiosity) than I, and<br \/>\ndiscovered a gaping hole in the system serving W-2 forms, a hole that<br \/>\nmade it trivial to retrieve others&#8217; forms. This person did not create<br \/>\nthe hole or &#8220;crack into&#8221; the system &#8212; just stumbled upon the hole left<br \/>\nopen. What happened next was unfortunate.\n<\/p>\n<p>The discoverer of the hole was in a bind; to confirm the existence<br \/>\nand nature of the hole, he necessarily performed some testing and<br \/>\nexperiments. Upon forming a supported theory of the problem, he<br \/>\ncontacted the company with his complaint, and a sales pitch for his<br \/>\nservices to fix it. Was this morally correct? Certainly, he was<br \/>\ncompelled to take action by knowledge that his security and privacy was<br \/>\nthreatened; certainly, he was correct to inform the company. Certainly,<br \/>\nhe was under no obligation to provide his expertise without<br \/>\ncompensation. However, the quandary seems to center on the nature and<br \/>\nspecificity of his notice \/ sales pitch to the company: did he wrongly<br \/>\nwithhold information about the problem in a manner as to constitute<br \/>\n(morally, if not legally) a form of extortion?\n<\/p>\n<p>The response of Paymaxx was less than satisfactory as well.  In a letter to its customers, Paymaxx stated:\n<\/p>\n<blockquote><p>The hacker, is a 21 year-old Harvard student (or<br \/>\ngraduate) with a history of similar stunts. He was a PowerPayroll<br \/>\ncustomer for nearly four years. In mid- February when we informed him<br \/>\n(and the rest of our customer base) of the availability of 2004 W-2<br \/>\ninformation on-line, he e-mailed one of our sales reps informing him<br \/>\nthat he had found a flaw in the security aspects of our on-line W-2<br \/>\napplication and that he would tell us about it if we would hire his<br \/>\nfirm. We considered this a sales pitch and dismissed him.\n<\/p><\/blockquote>\n<p>The remainder of the letter is a bunch of hand-waving.<br \/>\nHowever, it is this paragraph that is most troubling. Why was their<br \/>\ncustomer referred to as a &#8220;21-year old Harvard student?&#8221; This seems to<br \/>\nme nothing more than an attempt to excuse their incompetence by<br \/>\naverring that it required an evil genius from Harvard (that spooky and<br \/>\nmuch-maligned ivory tower of mysterious egghead commies) to get into<br \/>\ntheir systems. Bad job, Paymaxx &#8212; there went your opportunity to own<br \/>\nup to your screw-up, be clear about how and why you screwed up, and<br \/>\ndemonstrate the objective steps you&#8217;ve taken to prevent it in future.<br \/>\nInstead, you pled the Harvard defense, and tried to shift the blame<br \/>\nonto someone else. However, rather than inveigh against Paymaxx for<br \/>\ntheir wounded-animal response, I&#8217;d rather look to the systemic reasons<br \/>\nwhy we can expect this kind of problem throughout corporate America for<br \/>\nthe forseeable future. I&#8217;ll begin with a brief technical description,<br \/>\nand then give my theory on the attitude that leads to this kind of<br \/>\nresult.<\/p>\n<p>\nThe problem was, schematically, that the URLs for retrieving W-2 forms were like this:<\/p>\n<pre>http:\/\/bogus.paymaxx.com\/w2form?123456<\/pre>\n<p>Where, as you might guess, the next employee&#8217;s form is 123457. This<br \/>\nis not exactly how the problem manifested, but it&#8217;s close enough to<br \/>\nillustrate: the engineers who put that into play were either lazy or<br \/>\nstupid, not taking into account that changing digits in the URL is<br \/>\ntrivial. Put in the right number, and you get the W-2 form, with name,<br \/>\naddress, and earnings.<\/p>\n<p>\n(Merely to demonstrate that I am not declaiming against their engineers<br \/>\nuninformedly, let me state that what needs to have been done is to 1.<br \/>\nuse HTTPS, if they had not, and 2. engineer the sharing of a true,<br \/>\nnon-trivially guessable secret (for example by snail-mailing a PIN to<br \/>\neach employee), and 3. putting a guess-number-count limit on the<br \/>\nretrieval dialog to prevent brute-force attacks. In defense of Paymaxx,<br \/>\nthey are probably just the first payroll company to get caught with<br \/>\nsomething like this &#8212; I have chosen to stay with them despite, and<br \/>\nsomewhat because of, their experience with this problem, since now they<br \/>\nshould be more rightly paranoid about security and because I don&#8217;t<br \/>\nexpect any better from other firms.)\n<\/p>\n<p>I can only speculate at the reasons behind this goof, but it does<br \/>\nfit with a general pattern I have witnessed, of what I term a &#8220;consumer<br \/>\nattitude&#8221; to data and computing. This attitude is promoted by the false<br \/>\npromises of the software industry to liberate us from the burdensome<br \/>\ntask of comprehension &#8212; the notion that all software can be<br \/>\n&#8220;intuitive&#8221; and that humans and computers can interact without the<br \/>\nhumans holding up their end of the bargain. Holding this attitude leads<br \/>\nto the implicit adoption of certain maxims;\n<\/p>\n<ul>\n<li>All that is displayed visually (representation) is the thing itself<br \/>\n(underlying form) and can only be manipulated thereby, and conversely,<\/li>\n<li>How something can be manipulated via a visual interface is the only means of manipulating it.<\/li>\n<li>(or, things work as they apparently do, and they don&#8217;t work in other ways.)\n<\/li>\n<li>The visual interface must permit a user with no or cursory<br \/>\ntraining to access any conceivable functionality (by conceivable, I<br \/>\nmean conceivable by a lay person with experience in the problem domain<br \/>\nand describable in plain language, for example, &#8220;move the invoice date<br \/>\nto the first Monday of the month;&#8221; I except functionality that lay<br \/>\npersons would not think themselves qualified to describe, such as<br \/>\ncertain mathematical wrangling), and therefore,<\/li>\n<li>Any program functionality that is reasonably described in plain<br \/>\nlayman&#8217;s terms by someone familiar with the problem domain should be<br \/>\nsimple to implement, by a layman who is made familiar with computing<br \/>\ntools (rather than by a programmer who is made familiar with the<br \/>\nproblem domain).<\/li>\n<\/ul>\n<p>\nThe attitude brings with it the conceit of thinking that others will<br \/>\nshare the attitude &#8212; an assumption that always proves fatally flawed,<br \/>\nfor even imagining a world devoid of legitimate curious &#8220;hackers,&#8221;<br \/>\nthere will always be black-hat &#8220;crackers&#8221; who shun the maxims of<br \/>\nconsumer attitudes in favor of experimenting, breaking things, and<br \/>\nseeking alternative scenarios. The consumer attitude is one of taking<br \/>\nthe image on the screen at face value; of seeing the shiny parts of the<br \/>\nsystem as the important onces. It is also, unfortunately, the reigning<br \/>\nattitude in the business world, because having a &#8220;producer&#8221; orientation<br \/>\nto data and computing is hard and often unpleasant &#8212; much easier to<br \/>\nfire up Excel or Solitaire, than to write code! The consumer attitude<br \/>\nmakes one believe that links are something clicked upon and not<br \/>\nmanipulated, and dulls one to critical and proactive thinking about<br \/>\nsecurity.<\/p>\n<p>I<br \/>\nam not suggesting that every executive be intimately familiar with Web<br \/>\napplication security before leading his company to make use of the Web,<br \/>\nbut in the Paymaxx case, it apepars that even their <i>engineers<\/i><br \/>\nmanifested the consumer attitude, thinking shallowly about their<br \/>\napplication&#8217;s security.&nbsp; Hiring these engineers, therefore was the big problem.&nbsp; <span style=\"font-style: italic;\">If executives have ONE imperative in their relationship to technology, it&#8217;s responsible vendor selection!<\/span>&nbsp; \n<\/p>\n<p>I suggest therefore that executives be made aware<br \/>\nof the existence of the consumer attitude and the problems with it, and<br \/>\nbe trained to evaluate solutions and providers with an eye toward<br \/>\navoiding &#8220;consumerist&#8221; technology thinking. Those who design, create,<br \/>\nmanage, and maintain our technology infrastructure must have a<br \/>\n&#8220;producer&#8217;s&#8221; attitude toward technology, understanding what the hard<br \/>\nproblems are, and that they are hard, and not shying from depth of<br \/>\nunderstanding. Inevitably, this will grow to include executives at most<br \/>\nkinds of businesses, as all forms of organization rely increasingly on<br \/>\ninformation technology.<\/p>\n<p>We are in a unique historical<br \/>\nmoment with regard to this problem of attitude. The past century did<br \/>\nnot suffer so greatly, for every shipping concern would naturally have<br \/>\nbeen managed by men who had sailed on ships, and every bridge-building<br \/>\noutfit would have been managed by engineers and architects &#8212; because<br \/>\nship&#8217;s officers and engineers had existed as professions for<br \/>\ngenerations. There might be one generation of management-age persons<br \/>\nwho have a solid generalist background in computer science as of today,<br \/>\nand these few are a tiny fraction of the number needed to fill the<br \/>\nranks of executive positions at IT-reliant firms. As a result, we are<br \/>\nstuck with dilettante consumers making critical decisions for<br \/>\nproductive firms. Who would hire someone to oversee a pharmaceutical<br \/>\nplant&#8217;s operations on the basis of his qualification of taking medicine<br \/>\ndaily? It is absurd &#8212; but every time we put a &#8220;consumerist&#8221; person in<br \/>\ncharge of an IT-reliant operation, we do the same thing.\n<\/p>\n<p>There was a time when people did not hold a consumer attitude towards IT; indeed, the pendulum was <span style=\"font-style: italic;\">too far<\/span> in the other direction. People were scared witless about computers, and<br \/>\nthey were seen as the domain of &#8220;wizards.&#8221; Indeed, secretaries became &#8220;pseudo-wizards&#8221; in their own right,<br \/>\nmemorizing WordPerfect macros, and in effect writing their own programs<br \/>\nfor routine tasks. This, of course, did not last: while some arcane jobs will always require engineers, for the<br \/>\nmost part people got over their computer fears with training.&nbsp;<br \/>\n\n<\/p>\n<p>It was accepted that to use a computer required<br \/>\ntraining and knowledge, as with using an automobile or a welder&#8217;s<br \/>\ntorch.&nbsp; Then, with the rise of the Gog and Magog of Windows and<br \/>\nMacintosh, we found ourselves in the middle of an apocalyptic war<br \/>\nbetween two indistinguishable armies &#8212; meet the new boss, same as the<br \/>\nold boss. What they fought over was market share, but what they agreed<br \/>\nupon was promising the world that computers should be easy and<br \/>\neffortless.&nbsp; Details of interface were the ideas in dispute,<br \/>\nrather than the underlying metaphors, attitudes, and concepts. And it<br \/>\nwas amidst this battle &#8212; waged over the turf of the newly discovered<br \/>\nmass-market for computing &#8212; that the consumer attitude was<br \/>\npropagandized to the masses as well as the elites.\n<\/p>\n<p>It made sense, too, in a world where computers were machines for<br \/>\nthree families of applications: word processing and spreadsheets,<br \/>\nemail, and custom (internal) applications. Word processing &#8212; at least<br \/>\nat a casual to moderate use level &#8212; is a great candidate for WYSIWYG,<br \/>\nknow-nothing interfaces. Spreadsheets had the beautiful characteristic<br \/>\nof direct analog to well-understood ledger books and pocket<br \/>\ncalculators, combined with a spatial orientation that paralleled the<br \/>\nWYSIWYG ideal of the word processor. Email was a finite<br \/>\ndomain, and it had similar metaphors to familiar tools. And custom<br \/>\napplications, internal to a given organization, were the special<br \/>\nexceptions to the know-nothing rule &#8212; staffs were trained on workflow<br \/>\nprocesses, order entry &#8220;screens,&#8221; predefined queries written for a<br \/>\nparticular purpose. Each internal application was like a special tool<br \/>\ninside the firm, usable for its one purpose, and only by those who were<br \/>\ntrained.<\/p>\n<p>And<br \/>\nhow well this regime worked for a while! Get familiar with the clicking<br \/>\nand typing bits, and you&#8217;ve got the word processing, spreadsheet, and<br \/>\nemail stuff down pat. Watch the training video or read the manual, and<br \/>\nyou can use your company&#8217;s order-tracking system or pull the<br \/>\nquarter-to-date sales figures from the Oracle database.&nbsp; But what<br \/>\nhappens as soon as Visual Basic for Applications is embedded in your<br \/>\nword processor?&nbsp; What happens when your Excel model requires a<br \/>\nprocedural language routine, or sources data from an external database?\n<\/p>\n<p>If businesspeople are to operate effectively in the world of<br \/>\ncomputing, I believe that we must produce a thriving culture of rounded<br \/>\ngeneralist executives, interacting with honest vendors who make the problems<br \/>\nof computing as simple as possible &#8212; <span style=\"font-style: italic;\">but no simpler!<\/span>&nbsp;<br \/>\nWe must expect people to learn some of the underlying ideas behind the<br \/>\nabstractions; just as a freight forwarder must understand the underying<br \/>\nlimitations and strengths of various forms of transport, regulations,<br \/>\netc., an author of a complex data report must understand the<br \/>\nlimitations and strengths of his data sources, the concept of the<br \/>\nnormalization of data, timeliness and validity, etc.<\/p>\n<p>Future directions: why a<br \/>\nconsumerist &#8220;know-nothing,&#8221; and a technician, &#8220;specialized tool&#8221; model<br \/>\nare both insufficient ways for businesspeople to approach computing.<br \/>\nNecessity of generalist computing knowledge. Folly of having businesses<br \/>\ndriven by IT run by modern-computing-illiterate executives (would one<br \/>\nrun an oil company with no chemical engineers or geologists on the<br \/>\nmanagement team?). Folly of expecting interfaces to require a constant<br \/>\namount of learning (zero) while they expose a geometrically expanding<br \/>\nrange of functionality to the user. Uniqueness of the generalist<br \/>\ncomputing skill set and how it is already as important to an executive<br \/>\nto understand data as it is to understand accounting and bookkeeping &#8212;<br \/>\neven if this is not accepted today.<\/p>\n<p><a href='http:\/\/www.thinkcomputer.com\/corporate\/news\/pressreleases.html?id=18'>Check-cutters drop ball, bash Harvard, circle wagons; &#8220;consumerist&#8221; attitudes toward computing. &#8230;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paymaxx, a payroll services provider, recently confessed to a major mistake that essentially made public many of their customers&#8217; employees&#8217; W-2 forms. My firm uses Paymaxx to run payroll. So, as it happens, does another Harvard-associated person&#8217;s small computer firm. This person, however, has more time (or more curiosity) than I, and discovered a gaping [&hellip;]<\/p>\n","protected":false},"author":1180,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/rlucastemp\/wp-json\/wp\/v2\/posts\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/rlucastemp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/rlucastemp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/rlucastemp\/wp-json\/wp\/v2\/users\/1180"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/rlucastemp\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/rlucastemp\/wp-json\/wp\/v2\/posts\/8\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/rlucastemp\/wp-json\/wp\/v2\/media?parent=8"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/rlucastemp\/wp-json\/wp\/v2\/categories?post=8"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/rlucastemp\/wp-json\/wp\/v2\/tags?post=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}