Exploring the law of unintended consequences

DRM and asbestos curtains meet the Shah of Iran

Column The law of unintended consequences shows us how many innocent innovations like email, anti-virus and DRM can become something far worse than the inventors had ever imagined.

Back in the 1970s, long before the revolution that would eventually topple him from power, the Shah of Iran was one of America's best friends (he was a dictator who brutally repressed his people, but he was anti-communist, and that made him OK in our book). Wanting to help out a good friend, the United States government agreed to sell Iran the very same intaglio presses used to print American currency so that the Shah could print his own high quality money for his country. Soon enough, the Shah was the proud owner of some of the best money printing machines in the world, and beautiful Iranian Rials proceeded to flow off the presses.

All things must come to an end, and the Shah was forced to flee Iran in 1979 when the Ayatollah Khomeini's rebellion brought theocratic rule to Iran. Everyone reading this undoubtedly knows the terrible events that followed: students took American embassy workers hostage for over a year as Iran declared America to be the "Great Satan," while evidence of US complicity in the Shah's oppression of his people became obvious, leading to a break in relations between the two countries that continues to worsen to this day.

During the early 90s, counterfeit $100 bills began to flood the Mideast, eventually spreading around the world. Known as "superbills" or "superdollars" by the US Treasury due to the astounding quality of the forgeries, these $100 bills became a tremendous headache not only for the US and its economy, but also for people all over the world that depend on the surety of American money. Several culprits have been suggested as responsible for the superbills, including North Korea and Syria, but many observers think the real culprit is the most obvious suspect: an Iranian government deeply hostile to the United States... and even worse, an Iranian government possessing the very same printing presses used to create American money.

If you've ever wondered just why American currency was redesigned in the 1990s, now you know. In the 1970s, the US rewarded an ally with a special machine; in the 1990s, the US had to change its money because that ally was no longer an ally, and that special machine was now a weapon used to attack the US's money supply, where it really hurts. As an example of the law of unintended consequences, it's powerful, and it illustrates one of the main results of that law: that those unintended consequences can really bite back when you least expect them.

Unprepared and unready

Sometimes unintended consequences occur from the best of intentions. For instance, Denny's is known for being open 24 hours a day, every day, always. The story goes that in 1998, for the first time in 35 years, Denny's decided to close its doors on Christmas, but there was a big problem: since Denny's was always open, many stores didn't have locks on the doors, so they couldn't close.

Likewise, email was invented in 1971 and was immediately embraced as a great way to communicate with folks all over the world. Since virtually everyone on the Net pretty much knew each other at the time, email was developed without a lot of safeguards. Spoofing the sender? Not a real issue. False headers? Why in the world would anyone want to do that? Purposely misspelled words in the subject to get past filters? First of all, what the heck are filters, and why would someone want to spell something weird to get past one?

It was a more innocent age, but that innocence was lost long ago, thanks to a trickle ... no, a stream ... no, a flood, an absolutely Biblical flood of garbage, scams, lies, ads, swindles, and just plain crap. In fact, it's gotten so bad that MX Logic, an antispam vendor, now estimates that 75 per cent of all email is spam, while in same article Postini Inc. jacks that number up to 88 per cent of all email. Think about that: only about 1 in 10 emails is legitimate. That's truly pathetic, almost enraging, and it's finally leading (slowly, oh so slowly) to necessary changes - not in the legal system, since the CAN-SPAM Act of 2003 seems to have done virtually nothing to stem the tide - but in email infrastructure, to things like Microsoft's proposed Sender ID, Yahoo's Domain Keys, and Sender Policy Framework. Of course, at this time there's no consensus on the solution, and with patents and other contentious issues of so-called intellectual property acting as flies in the ointment, we may never reach a unified approach to the problem of spam. Naturally, that just helps the spammers. But they don't mind - they're busy helping each other.

Fast forward from 1971 to 2005. Would the inventors recognize the monstrosity they innocently unleashed upon the world?

Making things easier for the bad guys

Bruce Schneier, in his excellent Beyond Fear, reports that drivers in Russia have made interesting choices that have not always resulted in improving their situations. Crime is a large and growing problem in Russia, and one of the biggest threats is in the area of auto theft. To combat car theft, automobile owners installed car alarms. The result? Thieves waited until the owner approached the car to turn off the alarm, and then shot him, took his keys, and drove away in the car. Round one to the bad guys. Fine. So car owners quit using alarms, and instead installed security systems that made cars virtually impossible to hotwire. Ah ha! Round two to the good guys. Not so fast - since cars were extremely difficult to hotwire, thieves turned to carjackings instead, which is far more likely to result in injury or death to the car owner. Round three to the bad guys, and once again we see how "security" sometimes serves only to make things easier for the criminals.

A similar thing has popped up recently with one of my favorite bugaboos, DRM. I'm opposed to DRM for quite a number of reasons (if you're looking for an excellent list of those reasons, read Cory Doctorow's brilliant dissection of DRM), and now there's a new one: because it actually helps the bad guys.

Microsoft has touted its Windows Media Player (or WMP) as an industy- and DRM-friendly app that supports so-called "protected" media files. Basically, if you try to play a DRM-laden Windows media file, WMP checks to see if you have a valid license to do so. If you do, the file plays; if you don't, WMP heads off to a web site specified by the media file to acquire and download (and often purchase) a license.

But guess what? WMP doesn't check to see where it's going, or even what it's downloading, so individuals up to no good simply redirect it to sites where users end up with spyware, viruses, and other nastiness on their Windows machines. One researcher went ahead, pressed "Yes" to allow stuff to install, and then measured the results:

My computer quickly became contaminated with the most spyware programs I have ever received in a single sitting ... all told, the infection added 58 folders, 786 files, and an incredible 11,915 registry entries to my computer.

Amazing. Astounding. And another example of how some supposed "security" actually makes things easier for the bad guys - and makes things far worse for the good guys (and by "good guys," I mean users, not the companies pushing DRM).

Feel safer, act riskier

Social scientists have noticed an interesting pattern in human behavior over the years: it seems that the more safe and secure people feel, the more likely they are to engage in risky behavior. For proof of this, look no further than the Iroquois Theater in Chicago, opened for business in November of 1903. Fires at this time were a serious threat in theaters, due to the hot lights hung all around the stage in close proximity to backdrops and sets decorated with oil paints. Not to worry, though: the managers of the Iroquois advertised that they had put into place an asbestos curtain that would drop in case of fire, protecting the audience from the flames. Additional precautions common to theaters of the time that should have been put into place - things like firemen near the stage, and readily avilable fire hoses and extinguishers - were ignored because it was believed that the asbestos curtain was the ultimate in fire safety.

On 30 December 1903, a velvet curtain caught on fire as 1900 men, women, and children were packed in to see an afternoon performance of the musical "Mr. Blue Beard, Jr." The asbestos curtain was lowered, but got caught on a lamp and failed to close, exposing the crowd to flames and smoke. People rushed the doors in a panic, but the doors open inwardly, making them impossible to open. 603 people died in the fire - and the supposed asbestos curtain turned out to be a fake, since it too burned in the fire. Chicago's strict fire codes resulted from the fire, but it was a steep price to pay.

Computer viruses, worms, and spyware don't compare to death and destruction, but we see the same sort of human behavior - feeling safer, acting riskier - at work. For years, anti-virus software from third-party vendors has been included with most new Windows machines, and now both AOL and Microsoft are bundling A/V software with their products. Virtually all of the A/V software included with new PCs is time limited: it's free for 3 months, or maybe 6 months, and then the user has to buy it. You and I both know that few users actually go ahead and sign up... but many users still believe they're protected.

In fact, a recent study covered in The Register illustrates this tendency. Researchers looked at the computers of 329 volunteers. Nearly all of the machines were infected with viruses, spyware, and other garbage - one fellow had 1,059 spyware and adware programs on his machine! - yet about 75 per cent of those same users "reported believing that their PC is very secure or moderately secure". I'm not surprised.

And now Microsoft is adding "free" anti-spyware to the mix. Is this a good thing? On the one hand, sure - now people will have anti-spyware on their machines, and as regular readers know, it is badly needed, given the outrageous levels of spyware out there on the Net. On the other hand, how effective is this software going to be? We've seen increasing attacks on security software over the past year; on top of that, Microsoft's other security software - like its firewall - is hardly a shining paragon in its category. Further, it appears that history will repeat itself: Microsoft's ultimate aim is to charge for its bundled anti-virus and anti-spyware as part of a new A1 security subscription service.

What's the result? Users think they're protected - after all, their computer comes with anti-virus software! it comes with anti-spyware software! it's got a firewall! - but in reality they're still vulnerable. Given that mindset, why not use Internet Explorer? Why not use Outlook Express, or Outlook? Why not click on whatever appears in the web browser? Or in email? Why worry about security? They're safe and secure!

It's enough to make a security pro want to take off from work and go see a mid-day show.

The law of unexpected consequences is one that we simply can't afford to forget, and even though they're impossible to adequately plan for, we can minimize their effects. We have to worry about it, and we have to always ask the hard question: given this new thing foo, what are all the possible results that could happen? Brainstorm. Think out of the box. Don't be afraid to consider whatever crazy idea pops into your head. Trust me: it's never crazy enough.

My British readers at least have one advantage over us Yanks: it appears that so many people in the UK are taking Prozac that the drinking water now contains traces of the drug. Wait a little longer, and security pros in the UK won't be worrying about unintended consequences: thanks to one that I would have never thought of, they'll be blissfully unconcerned about them. And on it goes.

Copyright © 2004, SecurityFocus logo

Scott Granneman is a senior consultant for Bryan Consulting Inc. in St. Louis. He specializes in Internet Services and developing Web applications for corporate, educational, and institutional clients.

Further Reading

"Iroquois Theatre Fire of 1903". Chicago Historical Society (17 February 2004).
McNeil Jr., Donald G. "New C-Note Is Awaited In the Land Of Fake Bills". The New York Times (3 December 1995): 9.

Other stories you might like

  • Zuckerberg sued for alleged role in Cambridge Analytica data-slurp scandal
    I can prove CEO was 'personally involved in Facebook’s failure to protect privacy', DC AG insists

    Cambridge Analytica is back to haunt Mark Zuckerberg: Washington DC's Attorney General filed a lawsuit today directly accusing the Meta CEO of personal involvement in the abuses that led to the data-slurping scandal. 

    DC AG Karl Racine filed [PDF] the civil suit on Monday morning, saying his office's investigations found ample evidence Zuck could be held responsible for that 2018 cluster-fsck. For those who've put it out of mind, UK-based Cambridge Analytica harvested tens of millions of people's info via a third-party Facebook app, revealing a – at best – somewhat slipshod handling of netizens' privacy by the US tech giant.

    That year, Racine sued Facebook, claiming the social network was well aware of the analytics firm's antics yet failed to do anything meaningful until the data harvesting was covered by mainstream media. Facebook repeatedly stymied document production attempts, Racine claimed, and the paperwork it eventually handed over painted a trail he said led directly to Zuck. 

    Continue reading
  • Florida's content-moderation law kept on ice, likely unconstitutional, court says
    So cool you're into free speech because that includes taking down misinformation

    While the US Supreme Court considers an emergency petition to reinstate a preliminary injunction against Texas' social media law HB 20, the US Eleventh Circuit Court of Appeals on Monday partially upheld a similar injunction against Florida's social media law, SB 7072.

    Both Florida and Texas last year passed laws that impose content moderation restrictions, editorial disclosure obligations, and user-data access requirements on large online social networks. The Republican governors of both states justified the laws by claiming that social media sites have been trying to censor conservative voices, an allegation that has not been supported by evidence.

    Multiple studies addressing this issue say right-wing folk aren't being censored. They have found that social media sites try to take down or block misinformation, which researchers say is more common from right-leaning sources.

    Continue reading
  • US-APAC trade deal leaves out Taiwan, military defense not ruled out
    All fun and games until the chip factories are in the crosshairs

    US President Joe Biden has heralded an Indo-Pacific trade deal signed by several nations that do not include Taiwan. At the same time, Biden warned China that America would help defend Taiwan from attack; it is home to a critical slice of the global chip industry, after all. 

    The agreement, known as the Indo-Pacific Economic Framework (IPEF), is still in its infancy, with today's announcement enabling the United States and the other 12 participating countries to begin negotiating "rules of the road that ensure [US businesses] can compete in the Indo-Pacific," the White House said. 

    Along with America, other IPEF signatories are Australia, Brunei, India, Indonesia, Japan, South Korea, Malaysia, New Zealand, the Philippines, Singapore, Thailand and Vietnam. Combined, the White House said, the 13 countries participating in the IPEF make up 40 percent of the global economy. 

    Continue reading
  • 381,000-plus Kubernetes API servers 'exposed to internet'
    Firewall isn't a made-up word from the Hackers movie, people

    A large number of servers running the Kubernetes API have been left exposed to the internet, which is not great: they're potentially vulnerable to abuse.

    Nonprofit security organization The Shadowserver Foundation recently scanned 454,729 systems hosting the popular open-source platform for managing and orchestrating containers, finding that more than 381,645 – or about 84 percent – are accessible via the internet to varying degrees thus providing a cracked door into a corporate network.

    "While this does not mean that these instances are fully open or vulnerable to an attack, it is likely that this level of access was not intended and these instances are an unnecessarily exposed attack surface," Shadowserver's team stressed in a write-up. "They also allow for information leakage on version and build."

    Continue reading
  • A peek into Gigabyte's GPU Arm for AI, HPC shops
    High-performance platform choices are going beyond the ubiquitous x86 standard

    Arm-based servers continue to gain momentum with Gigabyte Technology introducing a system based on Ampere's Altra processors paired with Nvidia A100 GPUs, aimed at demanding workloads such as AI training and high-performance compute (HPC) applications.

    The G492-PD0 runs either an Ampere Altra or Altra Max processor, the latter delivering 128 64-bit cores that are compatible with the Armv8.2 architecture.

    It supports 16 DDR4 DIMM slots, which would be enough space for up to 4TB of memory if all slots were filled with 256GB memory modules. The chassis also has space for no fewer than eight Nvidia A100 GPUs, which would make for a costly but very powerful system for those workloads that benefit from GPU acceleration.

    Continue reading
  • GitLab version 15 goes big on visibility and observability
    GitOps fans can take a spin on the free tier for pull-based deployment

    One-stop DevOps shop GitLab has announced version 15 of its platform, hot on the heels of pull-based GitOps turning up on the platform's free tier.

    Version 15.0 marks the arrival of GitLab's next major iteration and attention this time around has turned to visibility and observability – hardly surprising considering the acquisition of OpsTrace as 2021 drew to a close, as well as workflow automation, security and compliance.

    GitLab puts out monthly releases –  hitting 15.1 on June 22 –  and we spoke to the company's senior director of Product, Kenny Johnston, at the recent Kubecon EU event, about what will be added to version 15 as time goes by. During a chat with the company's senior director of Product, Kenny Johnston, at the recent Kubecon EU event, The Register was told that this was more where dollars were being invested into the product.

    Continue reading

Biting the hand that feeds IT © 1998–2022