Ethnography and Security

Since 2000 I have been actively integrating anthropological perspectives, methods and theory into business practices in order to enhance information security policies and procedures. Many companies say that this approach has been uniquely successful in both uncovering the true source of risk and giving them a handle on how to achieve better information security.

For example, the recent TSSI ‘Dishonest Britain’ Survey provides exactly the kind of data that a security practitioner needs to be aware of before s/he engages in an identity management project:

Dishonesty and fraud are widespread in the UK, with nearly half of people admitting to forgery and one in ten to low level identity fraud. A quarter of Britons confessed to exaggerating their educational qualifications to gain employment.

Worryingly, with the prevalent terrorist threat, 10 per cent had misused ID access control systems by impersonating someone else or had assisted someone else to do so, and 32 per cent admitted conning their way past security personnel. 21 per cent owned up to having used fake identity cards.

The survey sample was 1,000 people and, perhaps most relevant to general security, one in seven (140 people) confessed to spying on people entering PINs, pass codes and passwords.

While some initially react to Anthropology as an esoteric branch of learning, the practical application or exercise of ethnography in a corporate setting can have very real rewards including significant savings related to solutions that have a much higher rate of adoption and success. Personally I have found controls are significantly weaker when cultural differences have not been considered. This is especially true in groups that are either highly diverse or that have not had sufficient time to develop a common understanding around “safety” or “reasonable” security.

I find great promise in the fact that some major corporations are starting to take cultural relativism seriously and have hosted an Ethnographic Praxis in Industry Conference (EPIC), which claimed “By understanding people; what they do, how they do it, and how these change over time, we can create better corporate strategies, processes, and products, as well as enhance and simplify people’s lives.” Yes, exactly.

A presentation called “The Worst Technology for Girls?” reportedly gave insight into “how teen girls use technology in relation to privacy practices in their everyday lives”. This sounds like it might have been related to the news about a British teenage girl’s ankle-tag dilemma, as reported earlier this year.

Perhaps next year there will be an information security track to explore topics like what constitutes “dishonesty”, “spying” or “borrowing” for different groups and why these “violations” are far more common than we might like to admit.

OldBoy

A strange and sometimes violent movie, OldBoy sprinkles dark humor in among the scenes of torture and fist-fights to lighten things up now and again. I couldn’t help but chuckle when a man found three chopsticks on his meal tray and opined (roughly translated):

    All I could think now
    was that my neighbor next door
    ate with one chopstick

The production is Korean, but it’s definitely a Japanese story. Perhaps most interesting, at least from a security perspective, is that the protagonist is suddenly free from solitary confinement after fifteen years but entirely unsure about who or why he was imprisoned in the first place. Like Kafka’s Joseph K, he sets out to figure out what his crime might have been and in the process continuously stumbles into the question of whether to trust anything or anyone.

How to measure security

Robin Wright has an interesting story in the Washington Post about the shrinking perimeter that journalists have experienced when travelling in Iraq with the US Secretary of State over the past two years. From a two night stay in a hotel in downtown Baghdad and idle strolls down the streets in mid-2003 to an extremely brief look at the desolate barricades and then a same-day extraction complete with “blackout” to avoid enemy fire; the article makes it sound as though security has deteriorated by nature of the fact that mobility is restricted, information leaks are a major concern and the exchange of goods in public is now impossible.

Motion-recognition phone

Have you ever wanted a phone that has a pedometer? How about a music player that you can shake to skip to the next song (yes, as a feature — perhaps it came as a side-effect to the non-skip technology rush of the 90s). Leave it to Samsung to bundle these exciting capabilities into a cell phone and then announce “gesture recognition with health management and leisure features”. MobileKorea.TV has more information:

The handset is also loaded with “Bobsleigh�, “Shooting�, and other games, which are activated by the user gesture.

Loaded with Shooting? I can think of a few gestures that might be really bad for one’s health. But I digress…

Next up, phones that recognize you by your gait and can automatically dial numbers based on the steps you take. Two steps to the left, three forward, one step back, you shake it all about and…that’s how you dial “Voicemail”