text
stringlengths 0
118
|
---|
former Disney actress attempted suicide on the very day the images went |
public.20 Olstead was hospitalized and lost consciousness for several days. |
Olstead described her reaction to the violation of privacy: “[Y]ou realize |
that everything that you cared for—your work, your family, you know, the |
person that you love. . . you could lose everything because of the actions of |
a stranger, someone you’ve never met can take everything from you so |
fast.”21 |
“I was humiliated,” Olstead declared. “[T]his is the sort of thing that will |
haunt me for a very long time. And I realized that suddenly I wasn’t the girl |
who works full time, is a full-time student, still manages to make the dean’s |
list. I was the girl who was naked on the Internet.”22 |
The leaked nude images sparked an FBI response. In what was referred |
to as “Operation Hackerazzi,” the FBI investigated the source of the leaked |
images. The FBI closed in on Chaney, and on February 10, 2011, FBI |
agents searched the home Chaney was living in and seized his computers. |
The FBI didn’t arrest him because they hoped Chaney might be able to help |
identify others engaging in similar conduct. The media descended upon |
Chaney, who apologized and admitted that his actions caused “probably one |
of the worst invasions of privacy someone could experience.”23 |
Nevertheless, Chaney continued to hack into celebrity accounts. Chaney |
was soon indicted with multiple counts of illegally gaining access and |
causing damage to email systems, aggravated identity theft, and illegal |
wiretapping. He was arrested the day after his indictment was handed |
down.24 |
Chaney plead guilty to unauthorized access to a protected computer to |
obtain information, unauthorized damage to a protected computer, and |
wiretapping. At his sentencing hearing, prosecutors asked for Chaney to |
serve six years in prison. In an unusual move, the judge increased the |
sentence to 10 years—beyond the prosecution’s recommendation and even |
beyond the sentencing guidelines.25 |
This case shows how easy it is to hack into other people’s accounts and |
snoop into their most intimate information. Chaney possessed no special |
knowledge of computer programming. Chaney didn’t possess magical |
mind-reading capabilities. He was so successful because the password |
system is set up so that people will fail. |
Time to Kill the Password? |
Authentication presents one of the greatest security challenges |
organizations face. How do we accurately ensure that people seeking access |
to accounts or data are actually whom they say they are? People need to be |
able to access accounts and data conveniently, and access must often be |
provided remotely without being able to see or hear the person seeking |
access. |
The most common approach to authentication is the use of passwords. |
Passwords are quite useful because they are so easy to create and replace. |
Passwords by themselves, however, are a very poor form of security.26 The |
problem with passwords is people. People select poor passwords, reuse |
them on many sites, and have difficulty remembering them.27 |
As we previously mentioned, an annual list is compiled of the most |
widely used passwords.28 Some perennial ones that always make the top of |
the list include simple words like “dragon,” “monkey,” “baseball,” and |
“princess.” Passwords such as “login,” “password,” and “letmein” are also |
included on the list. The password “123456” is often at the top of the list. |
So are “12345” and “1234.” |
Among experts, it is common to hear humorous stories about foolish |
passwords or of people writing down passwords on sticky notes and pasting |
them on their computer monitors. “People need to be savvier and more |
careful,” the experts say. All this is true, but it’s not people’s fault. Creating |
and remembering so many passwords of sufficient length and complexity is |
beyond people’s cognitive bandwidth. |
Peoples’ bandwidth gets depleted because authentication is needed on so |
many sites and systems—there are too many passwords for even those with |
the best memories to remember. According to one study, consumers have an |
average of 24 online accounts.29 For those who use the Internet more |
robustly, the number of accounts is in the hundreds—accounts for health |
insurance sites, bank sites, investment company sites, credit card company |
sites, utility company sites, news sites, entertainment sites, social media |
sites, and merchant sites, among many others. There are also logins |
associated with one’s place of employment and logins for devices like smart |
phones and laptops. The number of accounts that people have can be |
staggering. |
To make matters worse, people are advised not to use a dictionary word |
or someone’s name, as these can be cracked too easily.30 Password systems |
often require people to use special characters, numbers, punctuation, and |
upper and lower case. All these add complexity to passwords, which make |
them harder to guess through random attempts, but they also make |
passwords significantly harder to remember. |
These demands have resulted in users being given the Herculean task of |
creating a unique, complex password for every account. No one can |
remember all these passwords, so people ignore the advice about using |
unique passwords and reuse the same password or draw from a pool of a |
few passwords. According to a study, 73 percent of accounts use duplicate |
passwords, and consumers use, on average, only one unique password per |
every four accounts.31 |
Common approaches to authentication result in even greater |
unreasonable demands on human memory. Impossible isn’t enough, so it |
must be multiplied by another impossible feat. A common (though |
obsolete) security practice is to change passwords frequently, and many |
companies force people to do so. It’s hard enough to juggle dozens of balls, |
but now people are being asked to juggle them while riding a unicycle on a |
tightrope. Unsurprisingly, when people aren’t forced to change their |
passwords, they don’t. Indeed, nearly half of consumers have a password |
they haven’t changed in more than five years.32 |
Many years ago, a company marketed a product called Password Minder |
with an infomercial that touted it as a revolutionary way to “safely store |
passwords.” |
“Never |
lose |
a |
password,” |
the |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.