{"id":3711,"date":"2018-05-11T10:51:31","date_gmt":"2018-05-11T10:51:31","guid":{"rendered":"http:\/\/achangeiscoming.net\/?p=749"},"modified":"2024-01-20T05:13:31","modified_gmt":"2024-01-20T05:13:31","slug":"social-threat-modeling","status":"publish","type":"post","link":"https:\/\/2024.thenexus.today\/index.php\/2018\/05\/11\/social-threat-modeling\/","title":{"rendered":"&#8220;Social threat modeling&#8221;: the winds of change are in the air"},"content":{"rendered":"<p>\t\t\t\t<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-751\" src=\"http:\/\/achangeiscoming.net\/wp-content\/uploads\/sites\/7\/2018\/05\/Riskfactors.jpg\" alt=\"Risk: Impact, Possibility, and Ease of Exploitation\" width=\"507\" height=\"361\" \/><\/p>\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/Category:Threat_Modeling\" target=\"_blank\" rel=\"nofollow noopener\">Threat modeling<\/a> is a structured approach to looking at security threats\u200a\u2014\u200aand what can be done in response. EFF&#8217;s <a href=\"https:\/\/ssd.eff.org\/en\/module\/assessing-your-risks\">Assessing Your Risks<\/a> describes how people wanting to keep their data safe online can do threat modeling, starting with questions like &#8220;what do I want to protect?&#8221; and &#8220;who do I want to protect it from?&#8221; Threat modeling is also an important software engineering technique, and it&#8217;s that aspect I&#8217;m going to focus on here.<\/p>\n<p>When a company takes threat modeling seriously as part of an overall security development process, it can have a huge impact. I saw this first-hand working with the Windows Security team back when I was at Microsoft Research in the early 2000s, and things have come a long way since then. Today there are books, checklists, tutorials, tools, and even games about how to do it well (although there are still plenty of companies who prefer to ignore the risks).<\/p>\n<p>Even for companies that do practice it, threat modeling today generally has a rather selective focus. As Amanda Levendowski points out in <a href=\"https:\/\/www.levendowski.net\/conflict-modeling\/\">Conflict Modeling<\/a>:<\/p>\n<blockquote><p>In the <a href=\"https:\/\/www.amazon.com\/Threat-Modeling-Designing-Adam-Shostack\/dp\/1118809998\">security<\/a> and <a href=\"https:\/\/www.esat.kuleuven.be\/cosic\/publications\/article-1412.pdf\">privacy<\/a> contexts, threat modeling developed as a predictable methodology to recognize and analyze technical shortcomings of software systems. And when compared with security and privacy threat modeling, systems have lagged in developing similarly consistent, robust approaches to online conflict.<\/p><\/blockquote>\n<p>Indeed. <a href=\"https:\/\/www.owasp.org\/index.php\/Application_Threat_Modeling\" target=\"_blank\" rel=\"noopener\">OWASP\u2019s Application Threat Modeling page<\/a> discusses things like decomposing the application into components, identify the data that need to be protected, and focusing on trust boundaries between running processes. It doesn&#8217;t have much at all to say about the people who are in the system. And there&#8217;s similarly no mention of important categories of other social and user harms like online conflict, harassment, computational propaganda, and influencing elections.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-750\" src=\"http:\/\/achangeiscoming.net\/wp-content\/uploads\/sites\/7\/2018\/05\/example-threat-model-1024x551.png\" alt=\"Threat model for different ways of harrassing people\" width=\"1024\" height=\"551\" \/><\/p>\n<p style=\"text-align: center;\"><em>Simplified threat model with different approaches to harassment<br \/>\n<\/em><\/p>\n<p>Several people are working on extending threat modeling or similar techniques to these social threats. The work&#8217;s still at a relatively early stage, and there isn&#8217;t yet a good name for this overall approach &#8212; I&#8217;m calling it &#8220;social threat modeling&#8221; for now, but as Shireen Mitchell of Stop Online Violence Against Women points out that&#8217;s only one aspect of it. Whatever you call it, though, there&#8217;s clearly something interesting going on here. A few examples*:<\/p>\n<ul class=\"postList\">\n<li>Susan Herring et. al.\u2019s <a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01972240290108186\" target=\"_blank\" rel=\"noopener\">Searching for Safety Online: Managing \u201cTrolling\u201d in a Feminist Forum<\/a>, in<em> The information society<\/em> (2002), analyzes the strategies that made a troller successful and the targeted group largely ineffectual in responding to his attack, as a means to understand how such behavior might be minimized and managed in general. Frances Shaw\u2019s <a href=\"http:\/\/twentytwo.fibreculturejournal.org\/fcj-157-still-searching-for-safety-online-collective-strategies-and-discursive-resistance-to-trolling-and-harassment-in-a-feminist-network\/\" target=\"_blank\" rel=\"noopener\">Still \u2018Searching for Safety Online\u2019: collective strategies and discursive resistance to trolling and harassment in a feminist network,<\/a> in <em>The Fibreculture Journal, <\/em>from 2013, looks at similar dynamics in a network of blogs.<\/li>\n<li>Robert Meyer and Michel Cukier\u2019s <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/1633535\/\" target=\"_blank\" rel=\"noopener\">Assessing the Attack Threat due to IRC Channels<\/a>, in <em>Dependable Systems and Networks<\/em>, 2006, uses a combination of bots and regular users in IRC chat, and the social structure of IRC channels, to investigate<\/li>\n<li>Borja Sanz et al.\u2019s <a href=\"http:\/\/paginaspersonales.deusto.es\/claorden\/publications\/2010\/sanz_RECSI10_A%20Threat%20Model%20Approach%20to%20Attacks%20and%20Countermeasures%20in%20OSN.pdf\" target=\"_blank\" rel=\"noopener nofollow\">A threat model approach to attacks and countermeasures in on-line social networks<\/a>, , in<em> Proceedings of the 11th Reunion Espanola de Criptograf\u0131a y Seguridad de la Informaci\u00f3n (RECSI),<\/em> focuses on identifying attacks against users of online social networks and possible countermeasures to mitigate the risks<\/li>\n<li>Leigh Honeywell\u2019s <a href=\"https:\/\/modelviewculture.com\/pieces\/another-six-weeks-muting-vs-blocking-and-the-wolf-whistles-of-the-internet\" target=\"_blank\" rel=\"noopener\">Another Six Weeks: Muting vs. Blocking and the Wolf Whistles of the Internet<\/a> on <em>Model View Culture <\/em>analyzes different kinds of attackers and their motiviations in the context of somebadly-thought-out functionality. \u201cIn attempting to solve the problem of users being retaliated against for blocking, Twitter missed other ways that harassers operate on their service.\u201d<\/li>\n<li>Mozilla\u2019s Coral Project <a href=\"http:\/\/guides.coralproject.net\/threat-modeling-for-communities\/\" target=\"_blank\" rel=\"noopener\">applies a threat modeling perspective to online communities<\/a>. <a href=\"https:\/\/medium.com\/u\/7bdeb357cfaa\" target=\"_blank\" rel=\"noopener\">caroline sinders<\/a> of the Coral project briefly talks about threat modeling\u2019s application to harassment in <a href=\"http:\/\/www.slate.com\/articles\/double_x\/doublex\/2015\/10\/sxsw_canceled_panels_here_is_what_happened.html\" target=\"_blank\" rel=\"noopener nofollow\">SXSW canceled panels: Here is what happened<\/a>, from 2016<\/li>\n<li><a href=\"https:\/\/medium.com\/u\/190efea63f27\" target=\"_blank\" rel=\"noopener\">Amanda Levendowski<\/a> describes Conflict Modeling as \u201ca predictable framework to structure thinking around online conflict by suggesting a methodology for conflict modeling, defining a taxonomy of conflict\u200a\u2014\u200asafety, comfort, usability, legal, privacy, and transparency (SCULPT)\u200a\u2014\u200aand examining common mitigation techniques adopted by systems to reduce the risk of certain conflicts.\u201d A draft was presented at the <a href=\"https:\/\/www.law.berkeley.edu\/research\/bclt\/upcoming-events\/june-2017-10th-annual-privacy-law-scholars-conference-plsc\/agenda-plsc-2017\/\" target=\"_blank\" rel=\"noopener\">2017 Privacy Law Scholars Conference,<\/a>; as far as I know, the only public information is <a href=\"https:\/\/www.levendowski.net\/conflict-modeling\/\" target=\"_blank\" rel=\"noopener\">on her web site<\/a><\/li>\n<li><a href=\"https:\/\/medium.com\/u\/4b19e9d59e5e\" target=\"_blank\" rel=\"noopener\">Shireen Mitchell<\/a> and I suggested applying threat modeling techniques to online harassment in our 2017 SXSW talk on <a href=\"https:\/\/medium.com\/a-change-is-coming\/diversity-friendly-software-at-sxsw-2017-references-c0ca05a191a6\" target=\"_blank\" rel=\"noopener\">Diversity-friendly Software.<\/a> I went into a little more detail in <a href=\"https:\/\/medium.com\/a-change-is-coming\/transforming-tech-with-diversity-friendly-software-338f56d91df\" target=\"_blank\" rel=\"noopener\">Transforming Tech with Diversity-Friendly Software<\/a> (<a href=\"https:\/\/docs.google.com\/presentation\/d\/1JB3bTbJvjEypKlPu1JKV20Oz9YlF5zRCl3vLIPdDTrA\/edit#slide=id.g2073602466_0_67\" target=\"_blank\" rel=\"noopener\">the slides have a short example<\/a>) and worked with <a href=\"https:\/\/medium.com\/u\/5787059db75\" target=\"_blank\" rel=\"noopener\">Kelly Ireland<\/a> at <a href=\"https:\/\/o.school\/\" target=\"_blank\" rel=\"noopener\">O.school<\/a> applying this approach to their pleasure education platform; Shireen is working with <a href=\"https:\/\/medium.com\/u\/6991e9b5ea5f\" target=\"_blank\" rel=\"noopener\">Kaliya-IdentityWoman<\/a> on applying a generalized threat modeling approach to social and user harms in the self-sovereign ID world.<\/li>\n<\/ul>\n<p>While this work is very promising, the most striking thing to me is how little attention is getting paid to this issue. Twitter, Facebook, and Google spend zillions of dollars a year (and publish bunches of research papers) on AI; how much have they invested here? And the red-hot blockchain world has a golden chance to get things right from early on, but (with the notable exception of Kaliya), very few of the people I talked to at the recent Internet Identity Workshop were even thinking about stuff like this.<\/p>\n<p>Still, the winds of change are in the air. The UN is discussing <a href=\"https:\/\/www.reuters.com\/article\/us-myanmar-rohingya-facebook\/u-n-investigators-cite-facebook-role-in-myanmar-crisis-idUSKCN1GO2PN\">Facebook&#8217;s role in genocides<\/a>, Amnesty International is reporting on <a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2018\/03\/online-violence-against-women-chapter-1\/\">Toxic Twitter<\/a>, and Safiya Umolya Noble&#8217;s outstanding <em><a href=\"https:\/\/nyupress.org\/books\/9781479837243\/\">Algorithms of Oppression<\/a><\/em> is getting excerpted <a href=\"http:\/\/time.com\/5209144\/google-search-engine-algorithm-bias-racism\/\">in <\/a><em>Time Magazine.<\/em> More and more people are seeing <a href=\"http:\/\/www.achangeiscoming.net\/docs\/cssocsci.html\">computer science as a social science,<\/a> and coming around to a point that Zeynep Tufecki, Sally Applin, and others have been making for quite a while: software companies need to get sociologists involved in the process. As Window Snyder (co-author of a 2004 book on threat modeling and now chief security officer at Fastly) said at the recent OurSA conference, <a href=\"https:\/\/www.wired.com\/story\/oursa-security-conference-calls-out-lack-of-inclusion\/\">&#8220;the industry changes when we change it.&#8221;<\/a><\/p>\n<p>So I expect we&#8217;ll be seeing a lot more attention to this area over the next few months. It&#8217;ll be interesting to see which companies gets ahead of the curve.<\/p>\n<p>&nbsp;<\/p>\n<p>* If there&#8217;s other work that should be in this list, please let me know!<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Image credits:<\/p>\n<ul>\n<li>Microsoft DREAD risk-ranking model from <a href=\"https:\/\/www.owasp.org\/index.php\/Application_Threat_Modeling\">OWASP&#8217;s Application Threat Modeling page<\/a><\/li>\n<li>Simplified threat model for harassment from <a href=\"https:\/\/medium.com\/a-change-is-coming\/transforming-tech-with-diversity-friendly-software-338f56d91df\">Transforming Tech with Diversity-friendly software<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Threat modeling is a structured approach to looking at security threats\u200a\u2014\u200aand what can be done in response. EFF&#8217;s Assessing Your Risks describes how people wanting to keep their data safe online can do threat modeling, starting with questions like &#8220;what do I want to protect?&#8221; and &#8220;who do I want to protect it from?&#8221; Threat [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":750,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,14,421,16],"tags":[472],"class_list":["post-3711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-personal","category-social-sciences","category-software","category-tales-from-the-net","tag-social-threat-modeling"],"_links":{"self":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/3711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/comments?post=3711"}],"version-history":[{"count":1,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/3711\/revisions"}],"predecessor-version":[{"id":4333,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/3711\/revisions\/4333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/media?parent=3711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/categories?post=3711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/tags?post=3711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}