Last talk at #enigma2021 today is @iMeluny speaking about "DA DA: WHAT SHARK CONSERVATION TEACHES US ABOUT EMOTIONALITY AND EFFECTIVE COMMUNICATION STRATEGIES FOR SECURITY AND PRIVACY"

usenix.org/conference/eni…
I dreamt of being a shark scientist and worked my ass off to get a scholarship to one of the top programs. My career took a loop, but to this day I find lessons from sharks for security and privacy.
Lessons:
Incidents are emotional
* Risks will never be zero
* Public is ill-informed and fear is common
* science-based policy is not the norn
Over the last several years I've been troubled by institutions using crisis as a governing strategy:
* Frequent or erratic policy changes
* Everything becomes a crisis
* Manipulation of public anxiety
* Control and protection for the powerful using /emotionality/
What is "emotionality"?
* how we experience and express emotions
* when exploited it can become a threat to effective communication and incident response
* emotions don't stand in isolation -- they're a manifestation of biases
First fear:
* most people are afraid of sharks (but some places they're revered!)
* where they're feared it's hard for scientists to get good policy passed (just like in sec and priv)... because there's pressure to react immediately and thus make short-term decisions
Fear is a natural response:
* causes fight or fight to prepare for an emergency
* but closes off the ability to use good judgement

[ ... see also my PEPR talk about incident response. Hard agree. ]
Following shark bites political actors often choose policy responses which are designed to *appear* like a strong response but don't address the underlying causes.

... wow that sounds a lot like security and privacy
Western Australia has operated one of the largest lethal-control programs in the world since 2012
* original criteria "imminent threat" had to be broadened to "threat"
* wasn't working and had impact on other sea life
"Summer of the shark" was created by media despite no increase of bites (or fatal bites), continued until 9/11 overtook it.
Parallel in security/privacy: law enforcement wanting backdoors into encryption, even when they ignore early warning signs. [the wording here is strong watch the talk!] Purposeful users of emotionality.
Would work better to rebuild public trust, put in place safeguards, address underlying causes.

These agencies use crisis to govern. The most momentum they get is after an incident. Using and inciting a crisis is how many political players move their agendas forward.
Data breach and privacy enforcement
* hearings and grandstanding and screaming don't address the underlying issues
* use emotionality to label incidents and try to use them to move forward and manipulate agendas
Leaders are eager to issue grand statements when startups aren't even required to do the bare minimum!
Incident response red flags
* militaristic style -- they demonstrate power without really understanding the appropriate subject matter
* lack of salience -- media narratives don't follow what is actually going on, but stoke public panic
Political leaders fall back on the old crutch of emotionality, which leads to perception narrowing and ineffective enforcement
It's a series of knee-jerk reactions designed to protect the powerful, not actually solve problems.
What does work?
* South Africa organized a shark-spotting program after several attacks
* Early warning system at several beaches
What was good?
* Proactive
* Community-based
* Real public service
* Provided access to the public of current and historical information
* Focus on reducing dangerous interactions
* Focused on strategic locations
Sharkspotter program is, to this day, one of the best of the world and we can use those strategies in our security and privacy programs.

[end of talk]

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Lea Kissner

Lea Kissner Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @LeaKissner

3 Feb
Next up at #enigma2021, Alex Gaynor from @LazyFishBarrel (satirical security company) will be talking about "QUANTIFYING MEMORY UNSAFETY AND REACTIONS TO IT"

usenix.org/conference/eni…
Look for places where there are a lot of security issues being handled one-off rather than fixing the underlying issue Image
We tried to fix credential phishing mostly by telling people to be smarter, rather than fixing the root cause: people being able to use phished credential.

2-factor auth just ... fixes the problem. ImageImage
Read 15 tweets
3 Feb
It's time to talk about @zoom_us security over @zoom_us at #enigma2021 by Merry Ember Mou with the talk "BUILDING E2EE AND USER IDENTITY"

usenix.org/conference/eni…
Zoom's launched end-to-end encryption 5 months after the white paper was published
* prevents eavesdroppers between users who are speaking to each other
* protection against compromised servers Image
[ here's the E2EE whitepaper from Zoom]

github.com/zoom/zoom-e2e-…
Read 20 tweets
3 Feb
@carmelatroncoso is speaking about "CONTACT TRACING APPS: ENGINEERING PRIVACY IN QUICKSAND" at #enigma2021

usenix.org/conference/eni…
Engineering contact-tracing apps has been a marathon

Why make them?
* manual contact-tracing became totally overwhelmed with covid cases
* can we supplement with technology? Image
Constraints: security and privacy
* protect from misuse: surveillance, target marginalized individuals, etc.
* purpose limitation by default
* hide user's identity, location, behaviour
* preserve system integrity
Read 18 tweets
3 Feb
In more pandemic talks at #enigma2021, Mark Funk is here to talk about "DESIGNING VERIFIABLE HEALTH SOLUTIONS FOR GLOBAL PANDEMIC"

usenix.org/conference/eni…
This is about work done with a nonprofit to try to find a way to prevent infected people from entering a location in a privacy-preserving way.

(Stopped this work when it became clear that this was being built for a world which wouldn't exist any time soon.) Image
Right now, we ask people to self-diagnose, which requires on diagnosis and truthfulness

There are stronger mechanisms like PCR tests Image
Read 25 tweets
3 Feb
Last day of #enigma2021 and we're kicking off with @cooperq from @EFF talking about "DETECTING FAKE 4G LTE BASE STATIONS IN REAL TIME"

usenix.org/conference/eni…
Focus on tech which targets at-risk people (e.g. activists, rights defenders, sex workers) Image
What is a cell site simulator?

*transmitter or receiver which intercepts metadata from cell phones, often by pretending to be a legit cell tower Image
Read 21 tweets
2 Feb
Kicking off the final session of today at #enigma2021: Sofia Celi with ""I THOUGHT I WAS BEING STRONG WITH A COMPLICATED PERSON": THE TALES OF INTIMATE GENDER-BASED ONLINE ABUSE IN THE GLOBAL SOUTH"

[Content disclaimer: difficult content.]

usenix.org/conference/eni…
The way people use technology to abuse others is different in the global south.

This talk is a reminder that we can work together to change this.
Where does one begin?
From a personal experience to a shared experience to a community experience to a global situation

This started from my personal experience.
Read 15 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!