January 29, 2019

None of us love terrorists

None of us love terrorists. A few of us study and admire warfare and revolutionary spirit and history and daring battles, but that doesn't match actual facts on the ground. War is 1% heroism and 99% death, destruction, scorched earth for causes nobody can remember. Terrorists are 100% ruthless killers that will stop at nothing.

This however does not mean that we as a society should change our lives to suit the agenda of the terrorist. The theory of terrorism clearly aims to achieve maximum media blitz, because the terrorist wishes to recruit at home. More blitz, more willing immatures to the cause.

If you are reporting on terrorism, as I am today, you are part of the problem not the solution. Slice the lifeline of international media attention, kill the thrill. Cut the media buzz, there will be no global endorsement of the worthiness of the terrorist's pathetic message.

No worthy cause, no local hillbilly to take up arms.

The response of an intelligent society is to suppress that media blitz and get on with our life.

In particular I refer to the Londoners in 7/7 who walked home. Without fuss. Without complaint. Without media demands for war, vengance, invasion of some random country. Without caring that nobody much remembers that day.

I was in London that day, due to meet someone near Tavistock square. But I slept in.

Which was how it was: we did not respond.

Londoners have their memories. Many died. But we did not respond. The English have seen it all before and no amount of terrorism was going to cause a response from the people. Much the same all across the continent, Europeans understand the balance - it's a police business, and for the rest of us, we do not respond.

First day I was in Madrid back in 1991 or so, there were three ETA bombings. I saw the smoke from my 4 star hotel window and wondered. The Spanish have seen it all and they did not respond.

I do not refer to the British authorities who bought into the whole USA control-by-fear-of-terrorism agenda. It was you that the Brexiters voted against. And, for all the controls, costs, spying, economic exclusion, false positives, what do you have to show?

I was at the infamous JFK airport terrorist incident in New York, in the height of terromania in USA. In our thousands, we ran out of terminals onto the tarmac and camped under planes. To panicked people, I explained why we were totally safe - "no they can't shoot us because we just run further out to the airfield." Stay here, and do not respond. You are safe.

The Kenyan people aren't going to be effected by the Dusit attack. Nairobi as a people weren't effected by the Westgate attack, that I saw, and I was there in Nairobi at the time.

The Kenyans did not respond.

Not because Kenyans are insensitive or dumb or unaware. To the contrary - what Kenyans were effected by was political disaster of 2007, in which 2000 or more people died. Kenyas were marked by 2007, deeply. If there is anything that Kenyans remember of Westgate, it was the political backstory of Westgate - the army's response. The cynicism runs deep in Kenya, and it seems that the army did not shoot the police in this new Dusit event. Progress.

Do not respond.

The smarter society analyses the risks. Nairobi is a city of 3 million people or so, which means about 100 die on a given day. The people of Nairobi, and any large city, can only be effected by much larger numbers dying, OR by mainstream media spruiking a panic.

The smarter society does not respond to mainstream media.

Authorities everywhere would be smart to recognise that the agenda of fear only goes so far before they create their own revolution.

We, society are watching. Don't make us respond, because we will respond to something closer to the truth than you want.

Posted by iang at 02:18 AM | Comments (0)

How does the theory of terrorism stack up against AML? Badly - finally a case in Kenya: Dusit

Finally, an actual financial system & terrorism case lands before the courts, relating to the Dusit attack. Is this a world first? I don't know because this conjunction is so rare, nobody's tracking it.

The essential gripe is that since 9/11 the financial world decided to slap the terrorism label on their compliance process. Yet to no avail. Very few cases, so small that they fall between bayesian cracks. So misdirected because terrorists have options, and they can adjust their approach to slip under they radar. Backfiring because the terrorists are already outside norms and will do as much damage as needed, thus further harming the financial system.

And so hopeless because your true terrorist doesn't care about being caught afterwards - he's either dead or sacrificed.


Anyway, that's the theory - anti-terrorism applied to the financial system simply won't work. Let's see how the theory stacks against the evidence.

A suspect linked to the Dusit terror attack received Sh9 million from South Africa in three months and sent it to Somalia, the Anti-Terror Police Unit have said. Twenty one people, including a GSU officer, were killed in the January 15 attack. The cash was received through M-Pesa.

So far so good. We have about $90,000 (100 Kenya shillings is 1 USD) sent through M-Pesa, a mobile money system in Kenya, allegedly related to the Dusit attack.

Hassan Abdi Nur has 52 M-Pesa agent accounts. Fourty seven were registered between October and December last year, each with a SIM card. He used different IDs to register the SIM cards.

So (1), the theory of terrorism predicts that the money will be moved safely, whatever the cost. We have a match. In order to move the money, 52 accounts were opened, at the cost of different IDs.

One curiosity here is the cost. In my long running series on the Cost of your Identity Theft we see (or I suggest) an average cost of an Identity set of around $1000. Which would amount to a cost of $52k for 50 odd sets. But this is high for a washed amount of $90k.

Either the terrorists don't care of the cost, or cost of dodgy ID is lower in Kenya, or the alleged middleman amortised the cost over other deals. Interesting for further investigation but not germane to this case.

Then (2), the theory of bayesian statistics and the "base rate fallacy" predict that no terrorists will ever be caught before the fact based on AML/KYC controls.

Clearly this is a match - the evidence is being compiled from after-the-fact forensics. Now, in this the Kenyan authorities are to be applauded for coming out and actually revealing what's going on. In the western world, there is too much of a tendency to hide behind "national secrets" and thus render outside scrutiny, the democratic imperative, an impossibility. One up for the Kenyans, let's keep this investigation transparent and before the courts.

Next (3). The theory predicts that follow the money is a useless tool.

Ambitham was in constant communication with slain lead attacker Ali Salim Gichunge, who died during the attack and his spouse Violent Kemunto Omwoyo.

[Inspector] Githaiga yesterday said Ambitham’s phone led to his arrest on Tuesday after detectives established his communication with the Gichunges.

The police are following the social graph and arresting anyone involved. Having traced the phones, they then investigated the M-Pesa evidence, which provided many additional and interesting confirmatory facts.

Which is what they should do. But it was the contact information that cracked this case, not the financial flows. The contact information has always been available to them. And, where there is a credible case of terrorism as is in this case, the financial information has never been withheld. Again, the theory matches the evidence: follow the money is useless before the event, only confirmatory after the event.

Finally (4), the theory of unforeseen consequences says that the damage done by unintelligent responses will haunt the future of anti-terrorism efforts.

These are the agents that received the money, which was later withdrawn at the Diamond Trust Bank, Eastleigh branch, before it was wired to Somalia. ... The manager of the bank where Nur was withdrawing the money,, Sophia Mbogo, was arrested for failing to report Nur’s suspicious transactions. Nur is said to have made huge withdrawals in short intervals, which Mbogo ought to have reported to relevant authorities, but there is no indication she did so.

Without wishing to compromise the investigation - this looks inept. Eastleigh is the Somali district of Nairobi. It's a bustling centre of trade. In some respects the Somalis are better traders than the Kenyans, and a lot of trade is done. And a lot of that is in cash, because the Kenyan banking system is ... not responsive. Lots of legitimate cash would move in and out of that bank branch.

Given the alleged fact that the money man had 52 M-Pesa accounts, he was certainly aware enough to run under the radar of the branch. Thresholds and actions by banks are no secret, especially by those motivated by terrorism to conduct any crime to find out - bribery, extortion, kidnapping are options.

Maybe there is evidence that the branch or the manager is "in" on the deal. Or maybe there is not, and the Kenyan police have just confirmed the theory that FATF anti-terrorism will do more damage. They've sent a message to all branches to drown their customers in pointless compliance, and to not cooperate with the police.

The Kenyan police had better get a clear and undeniable conviction against the branch manager, or they are going to rue the day. The next terrorist attack will surely be harder.

Posted by iang at 01:33 AM | Comments (0)

June 25, 2018

FCA on Crypto: Just say no.

Because it's Sunday, I thought I'd write a missive on that favourite depressing topic, the current trend of the British nation to practice economic self-immolation. I speak of course of the FCA's letter to the CEO.

Some many may be bemused and think that this letter shows signs of progress. No such. What the letter literally is, is the publication of a hitherto secret order sent to CEOs of banks to not bank crypto.

The instruction was delivered some time ago. Verbally. And deniably. The banks knew it, the FCA knew it, but all denied it unless under condition of confidentiality or alcohol.

Which put the FCA, the banks, and Britain into considerable difficulties - the FCA could neither move forward to adjust because there was no position to adjust, the British banks could not bank crypto because they were under instruction, and the British crypto-using public either got screwed by the banks or they left the country for Europe and places further afield.

(Oddly, it turns out that Berlin is the major beneficiary here, but that's a salacious distraction.)

After some pressure as the 'star chamber' process of business policy, it transpires a week ago that the FCA has come out of the cold and issued the actual instruction in writing. This is now sufficient to replace the secret instruction, so it represents a movement of sorts. We can now at least openly debate it.

However the message has not changed. To understand this, one has to read the entire letter and also has to know quite a lot about banks, compliance and the fine art of nah-saying while appearing to be encouraging.

The tone is set early on:

CRYPTOASSETS AND FINANCIAL CRIME

As evidence emerges of the scope for cryptoassets1 to be used for criminal purposes, I am writing regarding good practice for how banks handle the financial crime risks posed by these products.

There are many non-criminal motives for using cryptoassets.

It's all about financial crime. The assumption is that crypto is probably used for financial crime, and the banks' job is to stop that happening. Which would logically set a pretty high bar because (like money, which is also used for financial crime) the use of crypto (money) by customers is generally opaque to the bank. But banks are used to being the frontline soldiers in the war on finance, so they will not notice a change here.

The problem is of course that it simply doesn't work. The bank can't see what you are doing with crypto, so what to do? When the banks ask customers what they do with the money, costs sky rocket, but the quality of the information doesn't increase.

There is therefore only one equilibrium in this mathematical puzzle that the FCA has set the banks: Just say no. Shut down any account that uses crypto. Because we will hold you for it and we will insist on no failures.

Now, if it was just that, a dismal letter conflating crime with business, one could argue the toss. But the letter goes on. Here's the smoking gun:

Following a risk-based approach does not mean banks should approach all clients operating in these activities in the same way. Instead, we expect banks to recognise that the risk associated with different business relationships in a single broad category can vary, and to manage those risks appropriately.

The risk-based approach!

Once that comes into play, what the bank reads is that they are technically permitted to use crypto, but they are strictly liable if it goes wrong. Because they've been told to do their risk analysis, and they've done their risk analysis, and therefore the risks are analysed which conflates with reduced to zero.

Which means, they can only touch crypto if they know . This knowledge being full knowledge not that other long-running joke called KYC. Banks must know that the crypto is all and totally bona fide.

But they generally have no such tool over customers, because (a) they are bankers and if they had such a tool (b) they wouldn't be bankers, they would be customers.

(NB., to those who know their history, anglo-world banks used to know their customers' business quite well. But that went the way of the local branch manager and the dodo. It was all replaced by online, national computer networks, and now AIs that do not manifestly know anything other than how to spit out false positives. NB2 - this really only refers to the anglo world being UK, USA, AU, CAN, NZ and the smaller followers. Continental banking and other places follow a different path.)

Back to today. The upshot of the relationship for regulator-bank in the anglo world is this: "risk-based analysis" is code for "if you get it wrong, you're screwed." Which latter part is code for fines and so forth.

So what is the significance of this, other than the British policy of not doing crypto as a business line (something that Berlin, Gibraltar, Malta, Bermuda and others are smiling about)? It's actually much more devastating that one would think.

It's not about just crypto. As a society, we don't care about crypto more than as a toy for rich white boys to play at politics and make money without actually doing anything. Fun for them, soap opera for observers but the hard work is elsewhere.

It's not in the crypto - it's in the compliance. As I wrote elsewhere, banks in the anglo world and their regulators are locked in a deadly embrace of compliance. It has gotten to the point where all banking product is now driven by compliance, and not by customer service, or by opportunity, or by new product.

In that missive on Identity written for R3's member banks, I made a startling claim:

FITS – the Financial Identity Trilemma Syndrome

If you’re suffering from FITS, if might be because of compliance. As discussed at length in the White Paper on Identity, McKinsey has called out costs of compliance as growing at 20% year on year. Meanwhile, the compliance issue has boxed in and dumbed down the security, and reduced the quality of the customer service. This is not just an unpleasantness for customers, it’s a danger sign – if customers desert because of bad service, or banks shed to reduce risk of fines, then banks shrink, and in the current environment of delicate balance sheets, rising compliance costs and a recessionary economy, reduction in bank customer base is a life-threatening issue.

For those who are good with numbers, you'll pretty quickly realise that 20% is great if it is profits or revenues or margin or one of those positive numbers, but it's death if it is cost. And, compliance is *only a cost*. So, death.

Which led us to wonder how long this can go on?

(youtube, transcript) Cost to compliance now is about 30% I’ve heard, but you pick your own number. Who works at a bank? Nobody, okay. That’s probably good news. [laughs] Who’s got a bank account? I’ve got bad news: if you do the compounding, in seven years you won’t have a bank accounts, because all the banks will be out of money. If you compound 30% forward by 20%, in seven years all of the money is consumed on compliance.

As I salaciously said at a recent Mattereum event on Identity, the British banks have 7 years before they die. That's assuming a 30% compliance cost today and 20% year on year increase. You could pick 5% now and 10% by 2020 as Duff & Phelps did which perversely seems more realistic as if the load is now 30% then banks are already dead, we don't need to wait until 100%. Either way, there is gloom and doom however society looks at it.

Now these are stupid numbers and bloody stupid predictions. The regulators are going to kill all the banks? Nah... that can only be believed with compelling evidence.

The FCA letter to the CEO is that compelling evidence. The FCA has doubled down on compliance. They have now, I suspect, achieved their 20% increase in compliance costs for this year, because now the banks must double down and test all accounts against crypto-closure policy. More.

We are one year closer to banking Armageddon - thanks, FCA.

What can we see here? Two things. Firstly, it cannot go on. Even Mark Carney must know that burning the banking village to save it is going to put Britain into the mother of all recessions. So they have to back off sometime, but when will that be? If I had to guess, it will be when major clients in the City of London desert the British banks, because no other message is heard in Whitehall or Threadneedle St. C.f., Brexit. Business itself isn't really listened to, or in the immortal words of the British Foreign Secretary,

Secondly, is it universal? No. There is a glimmer of hope. The major British banks cannot do crypto because the costs are asymmetric. But for a crypto bank that is constructed from ground up, within the FCA's impossible recipe, the costs are manageable. Such a bank would basically impose the crypto-compliance costs over all, so all must be in crypto. An equilibrium available to a specialist bank, not any high street dinosaur.

You might call that a silver lining. I call it a disaster. The regulators are hell bent on destroying the British economy by adding 20% extra compliance burden every year - note that they haven't begun to survey their costs, nor the costs to society.

After the collapse there will be green shoots, and we should cheer? Shoot me now.
Frankly, the broken window fallacy would be better than that process - we should just topple the banks with crypto right now and get the pain over with, because a fast transition is better than the FCA smothering the banks with compliance love.

But, obviously, the mandarins in Whitehall think differently. Watch the next seven years to learn how British people live in interesting times.

Posted by iang at 07:02 AM | Comments (2)

May 04, 2017

On a Principled Approach to Blockchain Governance - 7 Requirements

Over on Steem, I've published a short 7 part cycle on a Principled Approach to Blockchain Governance:

One of the things that I learnt in the CAcert adventure was that governance was critical to the safe operation of large communities. How large is large ... is a question of much debate, but to put it bluntly, this is needed beyond say a 2 digit size, which I’ve always seen as around 30, but certainly well before Dunbar’s number of 150.

Now, the problem with governance is that once it’s in place, it becomes power. And power corrupts. ...

Each part lays out one principle:

  1. Open Entry
  2. Toxics not Welcome!
  3. Constitution!
  4. Arbitration
  5. Consensors are Enforcers
  6. Arms of Governance are Independent
  7. Community exercises their Democratic voice to set rules

The reason I'm using Steem as the blog rather than good ol' Financial Cryptography ... might be revealed soon enough. Watch this space. Or that space!

Posted by iang at 09:40 PM | Comments (4)

October 23, 2016

Bitfinex - Wolves and a sheep voting on what's for dinner

When Bitcoin first started up, although I have to say I admired the solution in an academic sense, I had two critiques. One is that PoW is not really a sustainable approach. Yes, I buy the argument that you have to pay for security, and it worked so it must be right. But that's only in a narrow sense - there's also an ecosystem approach to think about.

Which brings us to the second critique. The Bitcoin community has typically focussed on security of the chain, and less so on the security of the individual. There aren't easy tools to protect the user's value. There is excess of focus on technologically elegant inventions such as multisig, HD, cold storage, 51% attacks and the like, but there isn't much or enough focus in how the user survives in that desperate world.

Instead, there's a lot of blame the victim, saying they should have done X, or Y or used our favourite toy or this exchange not that one. Blaming the victim isn't security, it's cannibalism.


Unfortunately, you don't get out of this for free. If the Bitcoin community doesn't move to protect the user, two things will happen. Firstly, Bitcoin will earn a dirty reputation, so the community won't be able to move to the mainstream. E.g., all these people talking about banks using Bitcoin - fantasy. Moms and pops will be and remain safer with money in the bank, and that's a scary thought if you actually read the news.

Secondly, and worse, the system remains vulnerable to collapse. Let's say someone hacks Mt.Gox and makes a lot of money. They've now got a lot of money to invest in the next hack and the next and the next. And then we get to the present day:

Message to the individual responsible for the Bitfinex security incident of August 2, 2016

We would like to have the opportunity to securely communicate with you. It might be possible to reach a mutually agreeable arrangement in exchange for an enormous bug bounty (payable through a more privacy-centric and anonymous way).


So it turns out a hacker took a big lump of Bitfinex's funds. However, the hacker didn't take it all. Joseph VaughnPerling tells me:

"The bitfinex hack took just about exactly what bitfinex had in cold storage as business profit capital. Bitfinex could have immediately made all customers whole, but then would have left insufficient working capital. The hack was executed to do the maximal damage without hurting the ecosystem by putting bitfinex out of business. They were sure to still be around to be hacked again later.

It is like a good farmer, you don't cut down the tree to get the apples."

A carefully calculated amount, coincidentally about the same as Bitfinex's working capital! This is annoyingly smart of the hacker - the parasite doesn't want to kill the host. The hacker just wants enough to keep the company in business until the next mafiosa-style protection invoice is due.

So how does the company respond? By realising that it is owned. Pwn'd the cool kids say. But owned. Which means a negotiation is due, and better to convert the hacker into a more responsible shareholder or partner than to just had over the company funds, because there has to be some left over to keep the business running. The hacker is incentivised to back off and just take a little, and the company is incentivised to roll over and let the bigger dog be boss dog.

Everyone wins - in terms of game theory and economics, this is a stable solution. Although customers would have trouble describing this as a win for them, we're looking at it from an ecosystem approach - parasite versus host.

But, that stability only survives if there is precisely one hacker. What happens if there are two hackers? What happens when two hackers stare at the victim and each other?

Well, it's pretty easy to see that two attackers won't agree to divide the spoils. If the first one in takes an amount calculated to keep the host alive, and then the next hacker does the same, the host will die. Even if two hackers could convert themselves into one cartel and split the profits, a third or fourth or Nth hacker breaks the cartel.

The hackers don't even have to vote on this - like the old joke about democracy, when there are 2 wolves and 1 sheep, they eat the sheep immediately. The talk about voting is just the funny part for human consumption. Pardon the pun.

The only stability that exists in the market is if there is between zero and one attacker. So, barring the emergence of some new consensus protocol to turn all the individual attackers into one global mafiosa guild, a theme frequently celebrated in the James Bond movies, this market cannot survive.


To survive in the long run, the Bitcoin community have to do better than the banks - much better. If the Bitcoin community wants a future, they have to change course. They have to stop obsessing about the chain's security and start obsessing about the user's security.

The mantra should be, nobody loses money. If you want users, that's where you have to set the bar - nobody loses money. On the other hand, if you want to build an ecosystem of gamblers, speculators and hackers, by all means, obsess about consensus algorithms, multisig and cold storage.


ps; I first made this argument of ecosystem instability in "Bitcoin & Gresham's Law - the economic inevitability of Collapse," co-authored with Philipp Güring.

Posted by iang at 12:35 PM | Comments (0)

July 17, 2016

Ricardian Contracts in the media!

Ricardian Contracts were featured in R3's event on Smart Contract Templates in coordination with Barclays.

See the deck, pages 44-67. The Riccy formed a big part of that event as the idea of laying out the prose contract alongside the smart code are now becoming evidently necessary as well as just merely necessary. The R3 weekend read pulls quotes from IBTimes / Lee Braine and Richard Gendal Brown:

The following pull quote is best contrasted with The DAO entry at the beginning of this post:
Braine said that one of the motivations for creating smart contracts, together with shared ledgers underneath them, is the opportunity to reduce the number and duration of disputes. Some of the potential improvements could result from simply making the relevant information, such as agreements governing specific trades, more easily accessible.

Brown agreed, adding: "If you look at the experience with The DAO recently, one of the key takeaways from that incident was that, in a system that perhaps had an express design goal of having the code be dominant, there is a need to have a broader contract that explains what happens in the event that things do go wrong."

This future of contracting sees a layout of {prose, code, params} which fully describe a smart contract entered into by parties, something I talked about in SOAC a while back.

Instead of the normal boring presentation on 'what' the Ricardian Contract is, I talked about 'why' with the hope that, by understanding the research origins that led to the design pattern, it would be clearer why it has to be so. I hope we can do a voice release or article / paper at some point so a little more context can be explained.

And, to round off the news, we now have the Ricardian Contract's own wikipedia page. Thanks to Arthur Doohan for that hard work!

Posted by iang at 05:40 PM | Comments (1)

June 18, 2016

Ethereum is one step away from creating a workable smart contracting community

To live in interesting times!

First TheDAO started up as a crowd funded smart contract which took in about $160m of contributions. Hoorah!

Then, a programmer spotted a bug and used it to sweep about $60m across to own account. Howzat!?

Next, the Ethereum coredevs reacted in collective angst and moved to unwind the 'theft.' Hooray!

Finally, someone called "attacker" claimed credit for the actions, and reminded everyone that there was a legal contract in place. YeeHaa!

Ethereum is the reality TV of the new financial cryptographic generation. However, let's not be entirely damning, it is also important to take pause and review what they have achieved. Positively.

Firstly, Ethereum has established beyond a doubt that the smart code needs to be part of a wider agreement at law. You can see this on the Explainer page of TheDAO where it carefully lays out:

"When you click the “I Accept” button or check box presented with the terms you are agreeing that you are taking part in The DAO’s Creation under the terms set forth in The DAO’s smart contract code at your own risk."

By clicking "I Accept", you enter into a legal contract, with the above text as part thereof.

To see that it is a legal contract, imagine if it didn't exist - in the absence of an agreement, there is no party who claims responsibility for TheDAO, and therefore TheDAO is abandoned at law. Which means that anyone can do whatever they like. Indeed, that means whoever can claim the value within can do so - it's like an abandoned ship at sea or unclaimed land; first person to plant a flag is the winner.

Clearly, the founders of TheDAO were smart enough not to want their smart contract to be 'abandoned' so it/they must and did enter into a legal agreement with contributors to (a) exert existence and (b) exert its authority to control the assets on behalf of the beneficiaries.

Having asserted its capacity to act, it also asserts that the smart code dominates over the legal prose:

The terms of The DAO Creation are set forth in the smart contract code existing on the Ethereum blockchain at 0xbb9bc244d798123fde783fcc1c72d3bb8c189413. Nothing in this explanation of terms or in any other document or communication may modify or add any additional obligations or guarantees beyond those set forth in The DAO’s code.

This is the correct order, which you can divine if you follow the logic: the legal agreement is prime over the smart code because it can bind the humans, and the legal agreement then has to defer primacy explicitly to any or all terms in the smart code. In summary, TheDAO has now exemplified 3 principles.

  1. The smart contract is a contract at law.
  2. The smart contract includes both code and prose.
    1. The legal prose asserts the capacity of the contract to act, a role outside the capability of the code;
    2. a purported smart contract without that capacity is likely abandoned, and also a statement that the authors are not smart enough to defend the property they create;
    3. the code requests that you click "I agree," a role outside the capability of the legal prose; and
    4. if you as user haven't clicked "I agree" or otherwise recorded your intent, then the smart contract is at liberty to ignore you - no intent established, no contract entered into.
  3. The legal prose rules over the smart contract.
    1. Then, the legal prose may with words pass the legal dominance to any part or all of the smart code; and
    2. indeed that might be the only thing that the legal prose does! But see below...

With these principles in hand, we are almost at the point of a viable smart contracting industry. And, we can thank the evolutionary efforts of many for this: Nick Szabo for the abstraction now called the smart contract, Satoshi for converting Nick's abstraction into the inspired form in Bitcoin, the Ethereum team for their more Turing-complete environment, and the authors of TheDAO for their big reveal of what it takes to make a real smart contract. What a social experiment!

On behalf of the entire Internet, I thank you. But we are still one step short of a complete smart contracting environment.

Recall that the point of a contract be it smart, simple, dumb or otherwise, is to create certainty over the uncertain agreements of human agents. Think about that statement for a moment - the goal is to create certainty. Got it? Now look at TheDAO and ask what you see?

Uncertainty.

If there is a better example of uncertainty in cryptographic affairs than TheDAO, I do not know of it, off hand. Indeed, the current life of TheDAO is so uncertain, it is likely to become a catchphrase for uncertainty in smart contracting!

Right? Let's list the ways. We have half the community up in arms that the terms of the smart code are going to be overridden and thus their contractual worldview is going to be overturned. We've the other half up in arms over the fact that someone has scarfed up a good chunk of the contents, and thus has breached the intent of the contract. And, now we have the Ethereum coredev team asserting their authority for a hard fork, and "Attacker" reminding them that there is a legal contract:

I am disappointed by those who are characterizing the use of this intentional feature as "theft". I am making use of this explicitly coded feature as per the smart contract terms and my law firm has advised me that my action is fully compliant with United States criminal and tort law. For reference please review the terms of the DAO:

"The terms of The DAO Creation are set forth in the smart contract code existing on the Ethereum blockchain at 0xbb9bc244d798123fde783fcc1c72d3bb8c189413. Nothing in this explanation of terms or in any other document or communication may modify or add any additional obligations or guarantees beyond those set forth in The DAO’s code. Any and all explanatory terms or descriptions are merely offered for educational purposes and do not supercede or modify the express terms of The DAO’s code set forth on the blockchain; to the extent you believe there to be any conflict or discrepancy between the descriptions offered here and the functionality of The DAO’s code at 0xbb9bc244d798123fde783fcc1c72d3bb8c189413, The DAO’s code controls and sets forth all terms of The DAO Creation."

A soft or hard fork would amount to seizure of my legitimate and rightful ether, claimed legally through the terms of a smart contract. ...

When we have such strong, valid-on-the-face arguments, at dramatically opposing poles, we have ... a dispute. TheDAO is now in fatal dispute. And what Ethereum lacks is a clear way forward to resolve that dispute.

Let's check the options. "Attacker" suggests a United States reading of the law, which suggests a USA court. USA courts typically accept any case for any nexus. But they will likely not accept the contract as valid under the securities laws in the USA, so Attacker will likely also find surprise in the event that it goes there. No matter, at $60million or whatever it is is well worth this minute, someone might try their luck in court.

And for the most part, Ethereum people are apparently located in Europe - London, Berlin, Switzerland. I'm not saying TheDAO was done by these people, but if Attacker knows who they are, and this seems reasonable, and any lawsuit names the authors and founders of TheDAO, what have we got?

A mess. What we haven't got is resolution. We can see a law suit that ricochets around the globe and locks a lot of people up in a world of pain. Everyone loses. We can see echoes of Assange and Snowden - we'll get articles, books, movies, but the one thing we won't get is ... resolution.

Certainty, this ain't.

And this is the critical step that Ethereum is short of - resolution, certainty. The traditional courts of law are not well suited to resolving this sort of dispute for a myriad of reasons - both good and bad.

Which brings us to the inevitable discovery that Ethereum must now make. There is a way that can give certainty to this mess in the general case; there is a way to resolve this sort of dispute. It is beholden on the community to find that forum of dispute resolution that can bring certainty to the smart contract when the smart contract itself has lost certainty.

Ethereum needs to set up its own forum - its own court - a court of smart contract dispute resolution.

This is not a trivial task; but it is a lot easier than you think. It's a matter of law, the choice is called Arbitration, and if you search around you can find volumes written on it. I'll leave that as an exercise for the reader, but you might want to look at DAMN. That's not how I would do it, but hey - compare and contrast!

Know it now - you face a fork in the road. On the one hand you have the failed social experiment known as TheDAO. On the other hand, you have your own forum of dispute resolution, designed to resolve precisely this mess, the smart contract in trouble. Like some science fiction movie, the choice is clear: choose to repeat the failure in TheDAO, or choose to engage in informed dispute resolution, customised for your disputes.

Choose quickly, before the next big reveal. Good luck.


Some notes.

  1. I'm handwaving over some elements of the legal arguments above, as I haven't identified precisely where the contract is entered. But that can be left as an exercise to the reader.
  2. Vitalik argues that there is no cryptographic connection. That's an odd argument, because (a) nobody's argued in court yet that there has to be a cryptographic connnection, (b) that argument reduces to "Vitalik doesn't attest to it being the contract" whereas (c) we need to go much much more, like "it isn't the contract because this other thing is the contract." Oh, and (d) we can guarantee that the court will look favourably on anything that looks like a contract, and will be entirely skeptical of a prose-free lump of code.
  3. I haven't talked about the parties to the contract at all in the above. That's because we don't need to - in this context. A given case may need to, but actually in TheDAO case, we don't need to. It could be entirely sufficient for the ethcore team to present the evidence as expert witnesses, and the Arbitrator to return a ruling authorising a hard fork. The parties do not need to be examined unless the case demands it.
Posted by Prometheus at 11:22 AM | Comments (0)

June 12, 2016

Where is the Contract? - a short history of the contract in Financial Cryptography systems

(Editor's note: Dates are approximate. Written in May of 2014 as an educational presentation to lawyers, notes forgotten until now. Freshened 2016.09.11.)

Where is the contract? This is a question that has bemused the legal fraternity, bewitched the regulator, and sent the tech community down the proverbial garden path. Let's track it down.

Within the financial cryptography community, we have seen the discussion of contracts in approximately these ways:

  1. Smart Contracts, as performance machines with money ,
  2. Ricardian Contract which captures the writings of an agreement ,
  3. Compositions: of elements such as the "offer and acceptance" agreement into a Russian Doll Contracts pattern, or of clause-code pairs, or of split contract constructions.

Let's look at each in turn.

a. Performance

a(i) Nick Szabo theorised the notion of smart contracts as far back as 1994. His design postulated the ability of our emerging financial cryptography technology to automate the performance of human agreements within computer programs that also handled money. That is, they are computer programs that manage performance of a contract with little or less human intervention.

At an analogous level at least, smart contracts are all around. So much of the performance of contracts is now built into the online services of corporations that we can't even count them anymore. Yet these corporate engines of performance were written once then left running forever, whereas Szabo's notion went a step further: he suggested smart contracts as more of a general service to everyone: your contractual-programmer wrote the smart contract and then plugged it into the stack, or the service or the cloud. Users would then come along and interact with this machine, to get services.

a(ii). Bitcoin. In 2009 Bitcoin deployed a limited form of Smart Contracts in an open service or cloud setting called the blockchain. This capability was almost a side-effect of a versatile payments transaction of smart contracts. After author Satoshi Nakamoto left, the power of smart contracts was reduced in scope somewhat due to security concerns.

To date, success has been limited to simple uses such as Multisig which provides a separation of concerns governance pattern by allowing multiple signers to release funds.

If we look at the above graphic we can see a fairly complicated story that we can now reduce into one smart contract. In a crowd funding, a person will propose a project. Many people will contribute to a pot of money for that project until a particular date. At that date, we have to decide whether the pot of money is enough to properly fund the project and if so, send over the funds. If not, return the funds.

To code this up, the smart contract has to do these steps:

  1. describe the project, including an target value v and a strike date t.
  2. collect and protect contributions (red, blue, green boxes)
  3. on the strike date /t/, count the total, and decide on option 1 or 2:
    1. if the contributions reach the amount, pay all over to owner (green arc), else
    2. if the contributions do not exceed the target v, pay them all back to funders (red and blue arcs).

A new service called Lighthouse now offers crowdfunding but keep your eyes open for crowdfunding in Ethereum as their smart contracts are more powerful.

b. Writings of the Contract

Back in 1996, as part of a startup doing bond trading on the net, I created a method to bring a classical 'paper' contract into touch with a digital accounting system such as cryptocurrencies. The form, which became known as the Ricardian Contract, was readily usable for anything that you could put into a written contract, beyond its original notion of bonds.

In short: write a standard contract such as a bond. Insert some machine-readable tags that would include parties, amounts, dates, etc that the program also needed to display. Then sign the document using a cleartext digital signature, one that preserves the essence as a human-readable contract. OpenPGP works well for that. This document can be seen on the left of this bow-tie diagram.



Then - hash the document using a cryptographic message digest function that creates a one-for-one identifier for the contract, as seen in the middle. Put this identifier into every transaction to lock in which instrument we're paying back and forth. As the transactions start from one genesis transaction and then fan out to many transactions, all of them including the Ricardian hash, with many users, this is shown in the right hand part of the bow-tie.

See 2004 paper and wikipedia page on the Ricardian contract. We have then a contract form that is readable by person and machine, and can be locked into every transaction - from the genesis transaction, value trickles out to all others.

The Ricardian Contract is now emerging in the Bitcoin world. Enough businesses are looking at the possibilities of doing settlement and are discovering what I found in 1996 - we need a secure way to lock tangible writings of a contract on to the blockchain. A highlight might be NASDAQ's recent announcements, and Coinprism's recent work with OpenAssets project [1, 2, 3], and some of the 2nd generation projects have incorporated it without much fuss.

c. Composition

c(i). Around 2006 Chris Odom built OpenTransactions, a cryptocurrency system that extended Ricardian Contract beyond issuance. The author found:

"While these contracts are simply signed-XML files, they can be nested like russian dolls, and they have turned out to become the critical building block of the entire Open Transactions library. Most objects in the library are derived, somehow, from OTContract. The messages are contracts. The datafiles are contracts. The ledgers are contracts. The payment plans are contracts. The markets and trades are all contracts. Etc.

I originally implemented contracts solely for the issuing, but they have really turned out to have become central to everything else in the library."

In effect Chris Odom built an agent-based system using the Ricardian Contract to communicate all its parameters and messages within and between its agents. He also experimented with Smart Contracts, but I think they were a server-upload model.

c(ii). CommonAccord construct small units containing matching smart code and prose clauses, and then compose these into full contracts using the browser. Once composed, the result can be read, verified and hashed a la Ricardian Contracts, and performed a la smart contracts.

c(iii) Let's consider person to person trading. With face-to-face trades, the contract is easy. With mail order it is harder, as we have to identify each components, follow a journey, and keep the paper work. With the Internet it is even worse because there is no paperwork, it's all pieces of digital data that might be displayed, might be changed, might be lost.

Shifting forward to 2014 and OpenBazaar decided to create a version of eBay or Amazon and put it onto the Bitcoin blockchain. To handle the formation of the contract between people distant and anonymous, they make each component into a Ricardian Contract, and place each one inside the succeeding component until we get to the end.

Let's review the elements of a contract in a cycle:

✓ Invitation to treat is found on blockchain similar to web page.
✓ offer by buyer
✓ acceptance by merchant
✓ (performance...)
✓ payment (multisig partner controls the money)

The Ricardian Contract finds itself as individual elements in the formation of the wider contract formation around a purchase. In each step, the prior step is included within the current contractual document. Like the lego blocks above, we can create a bigger contract by building on top of smaller components, thus implementing the trade cycle into Chris Odom's vision of Russian Dolls.


Conclusion

In conclusion, the question of the moment was:

Where is the contract?

So far, as far as the technology field sees it, in three areas:

  • as performance - the Smart Contract
  • as writing - the Ricardian Contract
  • as composition - elements packaged into Russian Dolls, clause-code pairs and convergance as split contracts.

I see the future as convergence of these primary ideas: the parts or views we call smart & legal contracts will complement each other and grow together, being combined as elements into fuller agreements between people.

For those who think nothing much has changed in the world of contracts for a century or more, I say this: We live in interesting times!

(Editor's reminder: Written in May of 2014, and the convergence notion fed straight into "The Sum of all Chains".)

Posted by iang at 07:35 PM | Comments (0)

March 13, 2016

Elinor Ostrom's 8 Principles for Managing A Commmons

(Editor's note: Originally published at http://www.onthecommons.org/magazine/elinor-ostroms-8-principles-managing-commmons by Jay Walljasper in 2011)

Elinor Ostrom shared the Nobel Prize in Economics in 2009 for her lifetime of scholarly work investigating how communities succeed or fail at managing common pool (finite) resources such as grazing land, forests and irrigation waters. On the Commons is co-sponsor of a Commons Festival at Augsburg College in Minneapolis October 7-8 where she will speak. (See accompanying sidebar for details.)

Ostrom, a political scientist at Indiana University, received the Nobel Prize for her research proving the importance of the commons around the world. Her work investigating how communities co-operate to share resources drives to the heart of debates today about resource use, the public sphere and the future of the planet. She is the first woman to be awarded the Nobel in Economics.

Ostrom’s achievement effectively answers popular theories about the "Tragedy of the Commons", which has been interpreted to mean that private property is the only means of protecting finite resources from ruin or depletion. She has documented in many places around the world how communities devise ways to govern the commons to assure its survival for their needs and future generations.

A classic example of this was her field research in a Swiss village where farmers tend private plots for crops but share a communal meadow to graze their cows. While this would appear a perfect model to prove the tragedy-of-the-commons theory, Ostrom discovered that in reality there were no problems with overgrazing. That is because of a common agreement among villagers that one is allowed to graze more cows on the meadow than they can care for over the winter—a rule that dates back to 1517. Ostrom has documented similar effective examples of "governing the commons" in her research in Kenya, Guatemala, Nepal, Turkey, and Los Angeles.

Based on her extensive work, Ostrom offers 8 principles for how commons can be governed sustainably and equitably in a community.

8 Principles for Managing a Commons


1. Define clear group boundaries.


2. Match rules governing use of common goods to local needs and conditions.


3. Ensure that those affected by the rules can participate in modifying the rules.


4. Make sure the rule-making rights of community members are respected by outside authorities.


5. Develop a system, carried out by community members, for monitoring members’ behavior.


6. Use graduated sanctions for rule violators.


7. Provide accessible, low-cost means for dispute resolution.


8. Build responsibility for governing the common resource in nested tiers from the lowest level up to the entire interconnected system.

Posted by iang at 08:34 PM | Comments (0)

August 24, 2015

The Great Bitcoin Fork - heartbleed or bleeding hearts?

Bitcoin has just had its first big security failure. Perhaps surprising to some, the security was breached at the human layer known as governance, and not at the cryptographic or protocol layers.

TL;DR: the threat that evaded the security model was this: the Bitcoin community has failed to agree on how to evolve the protocol, and this failure has taken concrete form in the announcement of Bitcoin-XT, an alternate that may be incompatible with the current client. To solve this failure, a new governance layer is needed.

If one subscribes to the triple entry thesis, Bitcoin underpins the most radical and productive innovation in finance since double entry accounting, and it thus behoves to analyse the nature of the security failure carefully. The failure for a group to reach consensus is a very old problem of humanity and is not easily susceptible to technological hack. Whilst we have some good algorithms and structures to manage these problems, it is important that the community recognise that fixes required to the threat model is as much to the community itself as to the protocol or cryptography.


A brief interlude to explain, before discussing solutions: This schism within the Bitcoin community resulted in the announcement of larger blocksizes in Bitcoin-XT to deliver higher transaction capacity, something which many claim is necessary to take Bitcoin commerce to the retail level. However, the process of changing the fixed parameters in the Bitcoin protocol is fraught because of the nature of the consensus algorithm.

Bitcoin is a replicated shared ledger system that batches transactions into 'blocks'. The network of distributed client programs comes together to agree on each block, the result being the Nakamoto Signature over each block.

It doesn't matter today how that signature works - the proof of work consensus protocol - what matters is that some 6000 nodes meet and sign every 10 minutes according to a very complicated set of rules. To change those rules is problematic because we can’t update all the clients at once, and so … problems can emerge.

That problem is broadly called a fork - when one part of the network fights for a block that differs to the block of another part, the consensus algorithm starts humming until there is an eventual winner. This is the genius of Nakamoto's signature - if there is a fork, the network just keeps humming away until one or other of the sides backs away and dies.

But, the fear is, if there are different protocol rules, the "erstwhile losers" will never back off and a permanent fork is possible - the shared replicated ledger enters the twilight zone where your transaction is both confirmed and lost at the same time. In this case, the older clients will never accept a block larger than 1,000,000 bytes; blocks greater than that size could conceivably trigger a permanent fork.

Conventional logic is that the community needs to manage such a change to software carefully and plan ahead. Which would be fine, if that were done, but as is the way with these things, this planning, which was first mooted 5 years ago, has been stymied by one means or another.

What's going on here? It probably helps to catalogue the forms of fork that exist, as of the moment, in a layered approach:

  1. There is the fork in transactional block understanding, which the proof of work consensus algorithm strives to and ultimately suppresses. This works because statistically, the network of clients includes enough uncertainty and the algorithm provides enough incentive to push some nodes around and thus force one side or other to lose.
  2. A fork in software is more problematic as the rules should be deterministic for the first fork to resolve. The normal statistical methods don't work here, but when it happens - once in recorded history - the core team can come together as they did in 2013, isolate the rule failure, and push software changes or recommendations out to fold back the competing blocks into one.
  3. A fork in the core team is more problematic. When one side of the team wants path A and the other side of the team wants path B, arguments ensue. Against the threat of core team fork, the Bitcoin mitigation of 'we voluntarily agree' is too soft for a credible security project.

It is this third type of fork we now observe. To defend against this fork, the control of Bitcoin’s core algorithm has been left by custom to a small, tight team that manages one client software base called bitcoind. Five committers work closely together to put changes in.

However there was always a fork possible because in the open source world, forking the software base and starting a new project is considered normal, routine, and a cause for celebration: creativity. Indeed, there are many hundreds of projects called altcoins that have done precisely that - forked the software and started up a new chain - and there are several competing code bases that follow the same rules.

That part we know well, but an attempt to fork the software, change the rules and work on the same chain is novel.

Surely the core team knew well enough to not do that? Surely they had the discipline to not deliberately risk a permanent fork and bring down the entire $4bn Bitcoin community? That’s how many people are putting it - outrage - but we instead would like to point out that in the history of human affairs, one thing stands out:

If it can go wrong, it will.

Murphy's Law has it that if there is a weakness, eventually someone or something will get around to finding the circumstances for triggering that precise set of conditions. This view would suggest that even if the core team could present that elusive quality of better discipline and better responsibility, something is going to happen, one day. The flaw isn't in the team, because they are human after all, the flaw is in the systems design or more properly the security model. Failure to agree is a well known failure mode, and should have at least had a higher likelihood assigned in the risk analysis. Accept the risk of core team failure was then always a short term mitigation.


Assuming the inevitability of human divergence, how do we solve the higher layer team fork?

There are several ways to deal with this. One is to not have a fork. Another way is to encourage forks to naturally resolve themselves. A third is to find a way to live with the fork.

Not having the fork means in essence better leadership - not have the core team decide to fork. But our Murphy's Law observation indicates that a small tight single team will always fork in one way or another. Or, to draw on political history, there is a contradiction between the ideals of Bitcoin as a system of property rights, and the lack of ownership of the system as a property right, and until that is fixed, Bitcoin is in trouble.

There are many ways to deal with this contradiction, but just one way that seems to keep emerging throughout time is to split the single team into three and establish joint ownership of the system for the commons: Legislature ⇔ Judiciary ⇔ Executive.

Popularised by the US Republic, the 'powers' are split between the three ‘heads’ in an inherently unstable fashion. The executive appoints judges, but cannot tell the judiciary what to do. In contrast, the judiciary can tell the executive what to do, but, the judge's power is limited by a given case, and by the body of law and precedent, which comes from the Legislature. The legislature can tell the other two what to do, but only in the future. In order to keep the legislature and the executive in check, the people assemble every 4 or so years and throw the buggers out.

Long term stability is ensured by the inherent instability of the triangle; fights are frequent and noisy but civil war rarely breaks out. This stable triangle of unstable nodes, sometimes called three heads of power, can be adopted by any community. For example, the CAcert community does exactly that model: Policy ⇔ Arbitration ⇔ Board. Same powers and roles, same fights, different labels. Alternatively, many other methods and variants have been trialled throughout history and through the open source world.


How might this work in practice for the Bitcoin community? Part of it is already in place - Bitcoin’s system of BIPs presents a legislature. Another part would be to fork (pun intended) the political decisions away from the engineering decisions. In this case, the decision to increase the blocksize would be made by the political or executive team, which would be subject to regular elections. The technical dev or engineering team would then simply implement the how, and not engage in the politics of the whether other than to provide the politicians with advice.

The third part is when the technical team and executive team, or any other participants, cannot agree on something. For this, a forum of dispute resolution is needed. This is simple to organise - everyone who participates simply agrees up front to refer their disputes to the forum - but is harder to run as an Arbitrator has a tough job of making a ruling over an already complex situation. However, that’s out of scope of this article, what's important is that there is always a path by which fights are resolved, before escalating into civil war and bloodshed.

This method turns a core team fork into a decision as to lead team, but it wouldn’t stop the fork from happening - a rival team could simply start a new core development. But even then, the separation between political, engineering and dispute decisions would facilitate negotiation and finding new agreement because there are now three potential paths with which to negotiate with the rival team. Each of the three heads of power could find different paths, and the instability of their arrangement would lead to a solution emerging.

The combined power of the three, and the better control by the community would lead to more faith. The presence of the judiciary and the possibility of your voice being heard would strongly tilt preference to the governed system and away from rival teams. It might also lay the foundation for treasured ideals such as clear fungibility in most circumstances, and reversals of clear wrongs in the exception.

In closing, we should remember that technology cannot fix all of mankind’s problems. Very often, in fixing one problem, we reveal knottier and usually deferred problems in higher layers; Bitcoin’s consensus algorithm fixes blockchain forks and thus reveals forks in the rules and in the team. How to build a protocol that can handle higher layer forks remains an issue as outsiders can still attack the mainnet chain with their own proposed codebase. This is beyond the scope of today's brief missive, indeed, it's quite a project in its own right, but it is not outrageous - have a look at treechains or sidechains or Tezos for alternate schools of thought in how to handle higher-layer forks.

That the Bitcoin design got this far, and the community has come to cross this Rubicon so early in life is no disaster, rather it is the mark of accelerated intellectual robustness and excellence in design. But design does not solve everything, it especially does not address the age-old problem of being unable to foretell the future, a syndrome which is commonly referred to as 'politics'.


Ed note: this essay received some comments and wordings from Arthur Doohan and Ada Lovelace.

Posted by iang at 04:27 PM | Comments (5)

June 17, 2015

Cash seizure is a thing - maybe this picture will convince you

There are many many people who do not believe that the USA police seize cash from people and use it for budget. The system is set up for the benefit of police - budgetary plans are laid, you have no direct recourse to the law because it is the cash that defends itself, the proceeds are carved up.

Maybe this will convince you - if cash seizure by police wasn't a 'thing' we wouldn't need this chart:

Posted by iang at 08:00 PM | Comments (1)

June 05, 2015

Coase's Blockchain - the first half block - Vinay Gupta explains triple entry

Editor's Preamble! Back in 1997 I gave a paper on crowdfunding - I believe the first ever proper paper, although there was one "lost talk" earlier by Eric Hughes - at Financial Cryptography 1997. Now, this conference was the first polymath event in the space, and probably the only one in the space, but that story is another day. Because this was a polymath event, law professor who's name escapes Michael Froomkin stood up and asked why I hadn't analysed the crowdfunding system from the point of view of transaction economics.

I blathered - because I'd not heard of it! But I took the cue, went home and read the Ronald Coase paper, and some of his other stuff, and ploughed through the immensely sticky earth of Williamson. Who later joined Coase as a Nobel Laureate.

The prof was right, and I and a few others then turned transaction cost discussion into a cypherpunk topic. Of course, we were one or two decades too early, and hence it all died.

Now, with gusto, Vinay Gupta has revived it all as an explanation of why the blockchain works. Indeed, it's as elegant a description of 'why triple entry' as I've ever heard! So here goes my Saturday writing out Coase's first half block, or the first 5 minutes of Gupta's talk.



This is the title of the talk - Coase's Blockchain. Does anyone in the audience know who Ronald Coase was? No? Ok. He got the Nobel Prize for Economics in 1940. Coase's question was, why does the company exist as an institution? Theoretically, if markets are more efficient than command economies, because of a better distribution of information, why do we then recreate little pockets of command economy in the form of a thing you call a company?

And, understanding why the company exists is a critical thing if you want to start companies or operate companies because the question you have to ask is why are we doing this rather than having a market of individual actors. And Coase says, the reason that we don't have seas of contractors, we've got structures like say IBM, is because making good decisions is expensive.

Last time you bought a telephone or a television or a car you probably spent 2 days on the Internet looking at reviews trying to make a decision, right? Familiar experience? All of that is a cost, that in a company is made by purchasing. Same thing for deciding strategy, if you're a small business person you spend a ton of time worrying about strategy, and all of those costs in a large company are amortised across the whole company. The company serves to make decisions and then amortise the costs of the decisions across the entire structure.

This is all essentially about transaction costs. Now, move onto Venture Capital.

Paul Graham's famous essay "Black Swan Farming." What they basically say is venture capitalists have no idea what will or won't work, we can't tell. We are in the business of guessing winners, but it turns out that our ability to successfully predict is less than one in a hundred. Of a hundred companies we fund, 90 will fail, 10 will make about 10 times what we put into them, and one in about a thousand will make us a ton of money. One thousand to one returns are higher, but we actually have no way of telling which is which, so we just fund everything.

Even with their very large sample size, they are unable to successfully predict what will or will not succeed. And if this is true for venture capitalists, how much truer is it for entrepreneurs? As a venture capitalist, you have an N of maybe 600 or 1000, as an entrepreneur you've got an N of 2 or 3. All entrepreneurs are basically guessing that their thing might work with totally inadequate evidence and no legitimate right to assume their guess is any good because if the VCs can't tell, how the heck is the entrepreneur supposed to tell?

We're in an environment with extremely scarce information about what will or will not succeed and even the people with the best information in the world are still just guessing. The whole thing is just guesswork.

History of Blockchains in a Nutshell, and I will bring all this back together in time.

In the 1970s the SQL database was basically a software system that was designed to make it possible to do computation using tape storage. You know how in databases, you have these fixed field lengths, 80 characters 40 characters, all this stuff, it was so that when you fast-forwarded the tape, you knew that each field would take 31 inches and you could fast forward by 41 and a half feet to get to the record you needed next. The entire thing was about tape.

In the 1990s, we invent the computer network, at this point we're running everything across telephone wires, basically this is all pre-Ethernet. It's really really early stuff and then you get Ethernet and standardisation and DNS and the web, the second generation of technology.

The bridges between these systems never worked. Anybody that's tried to connect two corporations across a database knows that it's just an absolute nightmare. You get hacks like XML-EDI or JSON or SOAP or anything like that but you always discover that the two databases have different models of reality and when you interconnect them together in the middle you wind up having to write a third piece of software.

The N-squared problem. So the other problem is that if we've got 50 companies that want to talk to 50 companies you wind up having to write 50-squared interconnectors which results in an unaffordable economic cost of connecting all of these systems together. So you wind up with a hub and spoke architecture where one company acts as the broker, everybody writes a connector to that company, and then that company sells all of you down the river because it has absolute power.

As a result, computers have had very little impact on the structure of business even though they've brought the cost of communication and the cost of knowledge acquisition down to a nickel.

This is where we get back to Coase. The revolution that Coase predicted that computers should bring to business hasn't yet happened, and my thesis is that blockchains is what it takes to get that to run.


Editor again: That was Vinay's first 5m after which he took it across to blockchains. Meanwhile, I'll fork back a little to triple entry.

Recall the triple entry concept as being an extension of double entry: The 700 year old invention of double entry used two recordings as a redundant check to eliminate errors and surface fraud. This allowed the processing of accounting to be so reliable that employed accountants could do it. But accounting's double entries were never accepted outside the company, because as Gupta puts it, companies had "different models of reality."

Triple entry flips it all upside down by having one record come from an independent center, and then that record is distributed back to the two companies of any trade, making for 3 copies. Because we used digital signatures to fix one record, triply recorded, triple entry collapses the double vision of classical accounting's worldview into one reality.

We built triple entry in the 1990s, and ran it successfully, but it may have been an innovationary bridge too far. It may well be that what we were lacking was that critical piece: to overcome the trust factor we needed the blockchain.

On that note, here's another minute of the talk I copied before I realised my task was done!


The blockchain, regardless of all the complicated stuff you've heard about it, is simply a database that works just like the network. A computer network is everywhere and nowhere, nobody really owns it, and everybody cooperates to make it work, all of the nodes participate in the process, and they make the entire thing efficient.

Blockchains are simply databases updated to work on the network. And those databases are ones with different properties than the databases made to run on tape. They're decentralised, you can't edit anything, you can't delete anything, the history is stored perfectly, if you want to make an update you just republish a new version of it, and to ensure the thing has appropriate accountability you use digital signatures.

It's not nearly as complicated as the tech guys in blockchainland will tell you. Yes it's as complicated as the inside of an SQL database. All of your companies run SQL databases, none of you really know how they work, it's going to be just like that with blockchains. Two years you'll forget the word blockchain, you'll just hear database, and it'll mean the same thing. Probably.

Posted by iang at 08:07 AM | Comments (0)

May 16, 2015

NASDAQ on the blockchain - why?

The recent announcement that NASDAQ are experimenting with putting assets on the blockchain ruffled some feathers! Amonst many question, chief was /which chain/? Now the answer to that has leaked, people are asking "why Bitcoin?"

Two factors are strong here, being the asset-capabilities axis, and the control or "permission" axis.

1. First the assets. As I have hummed or written or shrilled loudly, the big thing that is missing in Bitcoin is assets. Just quickly, Satoshi Nakamoto made a remarkable simplification by establishing precisely one and only one unit - the BTC. But that trick is only possible for one unit; as soon as you need two units, chaos ensues.

And the altCoins market is the proof of that, chaos. The keystone it is missing is the ability to describe an issued instrument in cohesive, rigourous terms. By that I mean, in short words, the legal or prose contract offered by an issuer.

Briefly, we need a written, prose contract that is locked into the accounting system, one-for-one -- something you can take to court. The longer story can be read in my Ricardian Contract paper, etc, but for now, we need to just fixate on how we lock a legal contract into an issuance of value.

Recently, it turns out, there was a change in Bitcoin's underlying code ("OpReturn") that allowed sufficient information in it to do just that. This is seen most clearly in colored coins and the OpenAssets project, or at CoinPrism. In essence, you can now include the Ricardian hash in the transaction so that your payment points securely to the contract you are paying.

Having a contract means you can describe equity, securely. Which means that NASDAQ can describe their issuances, securely. Which means they can do an end-to-end demonstration of their intended vision, as a proof of concept.

The takeaway for assets is that NASDAQ can now do it on bitcoin, whereas before they would have been limited to one of the gen 2 products.

(NB, in the above, I'm not referring to smart contracts. For more on this distinction, see On the intersection of Smart Contracts and Ricardian Contracts.)

2. Now for Permission. To summarise the "permissionless" debate, it is industry expectation that institutions will want to be able to benefit from the innovation of bitcoin for the most part, but, at the end of the day, they will need a kill-switch. Because, we're talking the assets of the company, or the shares your client holds, or the loot the court just ordered you to seize, some control is needed. As Tim Swanson said:

"No bank's going to want to put a billion dollars of value [on a ledger] if it can be destroyed by anonymous validators," he said in an interview.

That's the industry expectation, and obviously this goes 100% counter to bitcoin expectation. Without getting into that debate today, I agree, *in principle* this is the force that will be brought to bear. But that's only in principle. It is a given that we know the layers and principles of financial cryptography, but the art lies in knowing when to break them.

Where then can we adjust?

As NASDAQ are only experimenting at this stage, it matters not what they do. Once they are done with experimenting with the tech, they'll then have to build it - which doesn't mean the tech, it means the rest of the infrastructure. The tech is a small part of the equation, sorry guys.

Out of that conversation will come any decisions to switch tech, so in essence NASDAQ are building one to throw away.

Thusly, their choice of technology is totally open. Why then not go with technology that more closely approximates their market, which might be Ethereum, Eris, Hyperledger, Open Transactions or even my own Ricardo? Again, the answer is the same: using permissionless technology such as Bitcoin gives them ... permissionlessness!

Why is this necessary or even slightly useful? Isn't NASDAQ a huge institution with incredible power?

They are. But this doesn't mean they are not subject to influence, power, pressure, bribery, corruption, rotating doors and favours. Directly above them, as an SRO, they have the SEC, and the Fed. To the side, the other exchanges, clearing houses, banks, DTCC, OTC markets, etc. Underneath many thousands of brokers. And then, swimming like sharks around a wounded whale, NASDAQ is surrounded by 50 direct state regulators, probably 10 national regulators in addition to the SEC and the Fed, and hundreds of other interested agencies, armed and ready to have their say. And we haven't even mentioned the insiders...

Telling those parties that they are working on the open blockchain is a very powerful signal. It basically stops everyone of those parties in their tracks. It means none of them can form an opinion, issue a letter, insist on a rule, start the power game, phone in favours, etc etc. Because bitcoin is permissionless, then it needs no permission for even NASDAQ to play. E.g., if FinCEN phones up, NASDAQ can respond, "by all means, come play with us, what's your bitcoin address?"

Or as gendal put it, come along and play in our permissionless innovation sandpit:

Permissionless Innovation

Because it turns out that censorship-resistance implies an even more interesting property: permissionless innovation.

"Permissionless innovation" -- the general freedom to experiment with new technologies and business models -- has been the secret sauce that fueled the success of the Internet and the digital economy.

This story is as important to a huge organisation such as NASDAQ as it is to the SV techie in a basement.

In the alternate, we can compare that story to the sad sorry debacle of Ripple. Although they said all the right words to anyone that would listen, at the end of the day, they were just words. Actions are the issue. Ripple had a permissioned system, and when push came to shove, they just didn't have enough of it.

By choosing the permissionless system, NASDAQ has bypassed all that. For now. Which is just what they need to ... experiment, innovate, play.

Posted by iang at 10:50 AM | Comments (1)

February 16, 2015

Google's bebapay to close down, Safaricom shows them how to do it

In news today, BebaPay, the google transit payment system in Nairobi, is shutting down. As predicted in this blog, the payment system was a disaster from the start, primarily because it did not understand the governance (aka corruption) flow of funds in the industry. This resulted in the erstwhile operators of the system conspiring to make sure it would not work.

How do I know this? I was in Nairobi when it first started up, and we were analysing a lot of market sectors for payments technology at the time. It was obvious to anyone who had actually taken a ride on a Matatu (the little buses that move millions of Kenyans to work) that automating their fares was a really tough sell. And, once we figured out how the flow of funds for the Matatu business worked, from inside sources, we knew a digital payments scheme was dead on arrival.

As an aside there is a play that could have been done there, in a nearby sector, which is the tuk-tuks or motorbike operators that are clustered at every corner. But that's a case-study for another day. The real point to take away here is that you have to understand the real flows of money, and when in Africa, understand that what we westerners call corruption means that our models are basically worthless.

Or in shorter terms, take a ride on the bus before you decide to improve it.

Meanwhile, in other news, Safaricom are now making a big push into the retail POS world. This was also in the wings at the time, and when I was there, we got the inside look into this field due to a friend who was running a plucky little mPesa facilitation business for retails. He was doing great stuff, but the elephant in the room was always Safaricom, and it was no polite toilet-trained beast. Its reputation for stealing other company's business ideas was a legend; in the payment systems world, you're better off modelling Safaricom as a bank.

Ah, that makes more sense... You'll note that Safaricom didn't press over-hard to enter the transit world.

The other great takeway here is that westerners should not enter into the business of Africa lightly if at all. Westerners' biggest problem is that they don't understand the conditions there, and consequently they will be trapped in a self-fulfilling cycle of western psuedo-economic drivel. Perhaps even more surprising, they also can't turn to their reliable local NGOs or government partners or consultancies because these people are trained & paid by the westerners to feed back the same academic models.

How to break out of that trap economically is a problem I've yet to figure out. I've now spent a year outside the place, and I can report that I have met maybe 4 or 5 people amongst say 100 who actually understand the difference? Not a one of these is employed by an NGO, aid department, consultant, etc. And, these impressive organisations around the world that specialise in Africa are in this situation -- totally misinformed and often dangerously wrong.

I feel very badly for the poor of the world, they are being given the worst possible help, with the biggest smile and a wad of cash to help it along its way to failure.

Which leads me to a pretty big economic problem - solving this requires teaching what I learnt in a few years over a single coffee - can't be done. I suspect you have to go there, but even that isn't saying what's what.

Luckily however the developing world -- at least the parts I saw in Nairobi -- is now emerging with its own digital skills to address their own issues. Startup labs abound! And, from what I've seen, they are doing a much better job at it than the outsiders.

So, maybe this is a problem that will solve itself? Growth doesn't happen at more than 10% pa, so patience is perhaps the answer, not anger. We can live and hope, and if an NGO does want to take a shot at the title, I'm in for the 101th coffee.

Posted by iang at 07:59 AM | Comments (1)

December 30, 2014

Audit: when the Economist finally opens up the debate on the silent fraud of the century

What ever happened to Audit? 5 years ago now it seems, I penned a 7 part essay that tried to lay out why audit did not spot or contribute anything to the financial crises if 2007-2008. The silence has not gone unnoticed, and now the Economist picks up with The dozy watchdogs

PwC's failure to detect the problem is hardly an isolated case. If accounting scandals no longer dominate headlines as they did when Enron and WorldCom imploded in 2001-02, that is not because they have vanished but because they have become routine. On December 4th a Spanish court reported that Bankia had mis-stated its finances when it went public in 2011, ten months before it was nationalised. In 2012 Hewlett-Packard wrote off 80% of its $10.3 billion purchase of Autonomy, a software company, after accusing the firm of counting forecast subscriptions as current sales (Autonomy pleads innocence). The previous year Olympus, a Japanese optical-device maker, revealed it had hidden billions of dollars in losses. In each case, Big Four auditors had given their blessing.

Yes, we've all noticed a steady series of blindspots-turned-disaster. But it goes further than the accidental, and I asked "Let's check the record: did any audit since Sarbanes-Oxley pick up any of the problems seen in the last 18 months to do with the financial crisis?" The Economist carries on:

And although accountants have largely avoided blame for the financial crisis of 2008, at the very least they failed to raise the alarm. America's Federal Deposit Insurance Corporation is suing PwC for $1 billion for not detecting fraud at Colonial Bank, which failed in 2009. (PwC denies wrongdoing and says the bank deceived the firm.) This June two KPMG auditors received suspensions for failing to scrutinise loan-loss reserves at TierOne, another failed bank. Just eight months before Lehman Brothers' demise, EY's audit kept mum about the repurchase transactions that disguised the bank's leverage.

What went wrong? The Economist puts it this way:

Of course, no police force can hope to prevent every crime. But such frequent scandals call into question whether this is the best the Big Four can do -- and if so, whether their efforts are worth the $50 billion a year they collect in audit fees. In popular imagination, auditors are there to sniff out fraud. But because the profession was historically allowed to self-regulate despite enjoying a government-guaranteed franchise, it has set the bar so low -- formally, auditors merely opine on whether financial statements meet accounting standards -- that it is all but impossible for them to fail at their jobs, as they define them.

Now, I put it differently, but not so differently that we would part friends:

My claim in today's post then is that the user cannot tell whether an audit is any use or not. Which audit is good for you, and which not, even if good for others? Which audit is good, and which is plain bad? The crux of the matter is that you yourself cannot tell what any of those pronouncements mean, unless you are an insider. You don't know whether you can rely, when to rely or how to rely.

Which was a truth, or an absence of reliable truth, that I'd discovered in a 3 year auditing experience at CAcert. Which leads to the Economist's view as to the future of audit:

In recent years this yawning "expectations gap" has led to a pattern in which investors disregard auditors and make little effort to learn about their work, value securities as if audited financial statements were the gospel truth, and then erupt in righteous fury when the inevitable downward revisions cost them their shirts.

The stakes are high. If investors stop trusting financial statements, they will charge a higher cost of capital to honest and deceitful companies alike, reducing funds available for investment and slowing growth. Only substantial reform of the auditors' perverse business model can end this cycle of disappointment.

Of course, the Economist is speaking to all those auditors who purchase subscriptions of the magazine, and thus it is best to suggest "substantial reform," details in issues to come. I'm not so sure; I actually think the Audit boat has sailed, and what is left I tried out for size in part 7:

You!

People who have followed financial cryptography for the last 2 decades will know of which I speak. E.g., Ricardo was mostly self-auditing with a thing called the 5 parties model, and a lot of crypto-glue to knit the statements together, something which maybe now is making its way into Bitcoin and especially sidechains which attempt to knit two blockchains together. At CAcert we pioneered a way of delivering member-made reliable statements called CARS, and I built a system to couple this up to the criteria body. As long as we have a member-body to do the work, the audit itself is almost routine, and it's certainly auditable in and of itself.

We -- you! -- can do it without the auditors.

Which all leads to a dictum waiting to emerge, but already hinted at by the arisal of Bitcoin: we will build the next financial system as a self-auditing system. AKA "trustless" or "open governance."

Not because we're against the state, or we don't like taxes or we're looking to re-finance the silk road, or hoping to sell off our kid sister.

But because we have to. Because the audit profession left us no choice.

Posted by iang at 03:11 PM | Comments (2)

November 21, 2014

Banking - licensed to cheat! And whether you'll get away with it.

Research into what most people will feel is so trivially true that the research wasn't needed has been conducted -- are bankers cheats?

The subjects took part in a simple experiment of flipping a coin, and involved around two hundred bankers, including 128 from a single unnamed international bank. They were divided into two groups. The people from the first were asked specifically about their jobs in banking, while the other half were asked unrelated questions.

"The rules required subjects to take any coin, toss it 10 times, and report the outcomes online," the researchers reported in the journal Nature. "For each coin toss they could win an amount equal to approximately $20 depending on whether they reported 'heads' or 'tails'."

The point is that the players were told ahead of the game whether "heads" or "tails" would win as well as in which case they could keep their winnings.

Given maximum winnings of $200, there was "a considerable incentive to cheat," wrote the team of researchers.

The bankers were asked to fill out questionnaires before tossing each coin. Those who were asked about things unrelated to their job hardly ever cheated in the coin toss, reporting 51.6 percent wins.

But those asked about their banking careers made the cheat rate go up - they reported 58.2 percent as wins. If everyone was completely honest, the proportion of winning tosses in each group would be 50 percent.

That's actually a stunning result. Just talking about banking made the bankers cheat! As an aside, this research is a dead cert for the IgNoble awards, a sort of faux Noble in odd science which celebrates wacky research that on the face of it should not have been conducted, but in actuality reveals some interesting results.

Back to the banking cheats. Up until now, there has been a stunning silence on the behalf of the prosecution authorities for what is likely either the #1 or #2 crisis in modern history. So bankers are confirmed in their skulduggery, they will almost certainly get away with it.

What can we as society do about this? Putting some of them in jail has been commented as what is missing, indeed the reason we're likely confirmed that banking as a whole is a poisoned pot is that nobody's gone to jail for the financial crisis.

In Britain, last month, a crown court in London announced:

"A senior banker from a leading British bank pleaded guilty at Southwark Crown Court on 3 October 2014 to conspiracy to defraud in connection with manipulating Libor," the court said in a statement.

"This arises out of the Serious Fraud Office investigations into Libor fixing."

And, in Iceland a world-wide first:

Nov 19 (Reuters) - The former chief executive of Landsbanki, one of three banks that racked up $75 billion in debt before collapsing and crashing the economy in 2008, was sentenced to one year in jail on Wednesday for market manipulation.

Sigurjon Arnason was convicted of manipulating the bank's share price and deceiving investors, creditors and the authorities in the dying days of the bank between Sept. 29 and Oct. 3, 2008.

The Reykjavik District Court said nine months of Arnason's sentence were suspended. Ivar Gudjonsson, former director of proprietary trading, and Julius Heidarsson, a former broker, were also convicted and received nine-month sentences, six of which were suspended. All pleaded innocent to the charges.

"This sentence is a big surprise to me as I did not nothing wrong," Sigurjon Arnason told Reuters after the sentencing, adding that he and his attorney had not yet decided whether to appeal to the supreme court.

More:

In receiving a one year prison sentence, Sigurjon Arnason officially became the first bank executive to be convicted of manipulating the bank's stock price and deceiving investors, creditors and the authorities between Sept. 29 and Oct. 3, 2008, as the bank's fortunes unwound, crashing the economy with it. Landsbanki was one of three banks that had tallied nearly $75 billion in debt before the final curtain was drawn.

All pleaded innocent to the charges...

Posted by iang at 12:07 AM | Comments (1)

May 26, 2014

Why triple-entry is interesting: when accounting is the weapon of choice

Bill Black gave an interview last year on how the financial system has moved from robustness to criminogenia:

If you can steal with impunity, as soon as you devastate regulation, you devastate the ability to prosecute. And as soon as that happens, in our jargon, in criminology, you make it a criminogenic environment. It just means an environment where the incentives are so perverse that they are going to produce widespread crime. In this context, it is going to be widespread accounting control fraud. And we see how few ethical restraints remain in the most elite banks.

You are looking at an underlying economic dynamic where fraud is a sure thing that will make people fabulously wealthy and where you select by your hiring, by your promotion, and by your firing for the ethically worst people at these firms that are committing the frauds.

No prizes for guessing he's talking about the financial system and the failure of the regulators to jail anyone, nor find any bank culpable, nor find any accounting firm that found any bank in trouble before it collapsed into the mercy of the public purse.

But where is the action? Where is the actual fraud taking place? This is the question that defies analysis and therefore allows the fraudsters to lay a merry trail of pointed fingers that curves around and joins itself. Here's the answer.

So in the financial sphere, we are mostly talking about accounting as the weapon of choice. And that is, where you overvalue assets, sometimes you undervalue liabilities. You create vast amounts of fictional income by making really bad loans if you are a lender. This makes you rich through modern executive compensation, and then it causes tremendous losses to the lender.

The first defence against this process is transparency. Which implies the robust availability of clear accounting records -- what really happened? Which is where triple-entry becomes much more interesting, and much more relevant.

In the old days, accounting was the domain of intra-firm transactions. Double entry enabled the growth of the business empire because internal errors could be eliminated by means of the double-links between separate books; clearly, money had to be either in one place or another, it couldn't slip between the cracks any more, so we didn't need to worry so much about external agents deliberately dropping a few entries.

Beyond the firm, it was caveat emptor. Which the world muddled along with for around 700 years until the development of electronic transactions. At this point of evolution from paper to electronic, we lost the transparency of the black & white, and we also lost the brake of inefficiency in transactions between firms. That which was on paper was evidence and accountable to an entire culture called accountants; that which was electronic was opaque except to a new generation of digital adepts.

Say hello to Nick Leeson, say good bye to Barings Bank. The fraud that was possible now exploded beyond imagination.

Triple-entry addresses this issue by adding cryptography to the accounting entry. In effect it locks the transaction into a single electronic record that is shared with three parties: the sender, the receiver and a third party to hold & adjudicate. Crypto makes it easy for them to hold the same entry, the third parties makes it easy to force the two interested agents not to play games.

You can see this concept with Bitcoin, which I suggest is a triple-entry system, albeit not one I envisaged. The transaction is held by the sender and the recipient of the currency, and the distributed blockchain plays the part of the third party.

Why is this governance arrangement a step forward? Look at say money laundering. Consider how you would launder funds through bitcoin, a fear claimed by the various government agencies. Simple, send your ill-gotten gains to some exchanger, push the resultant bitcoin around a bit, then cash out at another exchanger.

Simple, except every record is now locked into the blockchain -- the third party. Because it is cryptographic, it is now a record that an investigator can trace through and follow. You cannot hide, you cannot dive into the software system and fudge the numbers, you cannot change the records.

Triple-entry systems such as Bitcoin are so laughably transparent that only the stupidest money launderer would go there, and would therefore eliminate himself before long. It is fair to say that triple-entry is practically immunised against ML, and the question is not what to do about it in say Bitcoin, but why aren't the other systems adopting that technique?

And as for money laundering, so goes every other transaction. Transparency using triple-entry concepts has now addressed the chaos of inter-company financial relationships and restored it to a sensible accountable and governable framework. That which double-entry did for intra-company, triple-entry does for the financial system.

Of course, triple-entry does not solve everything. It's just a brick, we still need mortar of systems, the statics of dispute resolution, plans, bricklayers and all the other components. It doesn't solve the ethics failure in the financial system, it doesn't bring the fraudsters to jail.

And, it will take a long time before this idea of cryptographically sealed receipts seeps its way slowly into society. Once it gets hold, it is probably unstoppable because companies that show accounts solidified by triple-entry will eventually be rewarded by cheaper cost of capital. But that might take a decade or three.

________
H/t to zerohedge for this article of last year.

Posted by iang at 10:25 AM | Comments (0) | TrackBack

May 19, 2014

How to make scientifically verifiable randomness to generate EC curves -- the Hamlet variation on CAcert's root ceremony

It occurs to me that we could modify the CAcert process of verifiably creating random seeds to make it also scientifically verifiable, after the event. (See last post if this makes no sense.)

Instead of bringing a non-deterministic scheme, each participant could bring a deterministic scheme which is hitherto secret. E.g., instead of me using my laptop's webcam, I could use a Guttenberg copy of Hamlet, which I first declare in the event itself.

Another participant could use Treasure Island, a third could use Cien años de soledad.

As nobody knew what each other participate was going to declare, and the honest players amongst did a best-efforts guess on a new statically consistent tome, we can be sure that if there is at least one honest non-conspiring party, then the result is random.

And now verifiable post facto because we know the inputs.

Does this work? Does it meet all the requirements? I'm not sure because I haven't had time to think about it. Thoughts?

Posted by iang at 10:19 AM | Comments (1) | TrackBack

May 11, 2014

(B) The Business Choice of making a Business Investment in Bitcoin (part B of ABC)

Last month, I launched a rocket at those who invest in Bitcoin as the Coin or the Currency. It's bad, but I won't repeat the arguments against it.

For those of you who've survived the onslaught on your sensitivities, and are genuinely interested in how to make an investment into the cryptocurrency world, here is part B: the Business! The good news is that it is shorter.


If one was to look for a good Bitcoin investment in a business, what would it be? I think you should be asking questions like these:

  • The business in question has a regulatory model. It doesn't need to be right or sustainable, more that the business owners just need to understand the word. That's because, whether they know it or not, the word is coming for them one day.
  • hey have a governance model. Ditto.
  • You as investor understand the difference. This is where it gets messy. Most people think the above two terms are the same thing, but they are not. A regulatory model is imposed by a regulator, and is mostly about compliance with something that protects others such as the regulator or their flock (banks). Whereas a governance model is imposed by yourself, over your own operations, to protect your assets and the assets of the customer. Completely different, and completely misunderstood in the eyes of the external stakeholder community. Therefore, likely misaligned in the eyes of the Bitcoin CEO. Do you see where this is going?
  • They have a Sean Parker. By this, I mean the person with real experience of this broad Internet / money / social networking business space, the guy who's been there twice before, and this time, *he's there* at the critical juncture to that 2 kids and a fridge full of beer all the way to a big business. See the Facebook movie if this doesn't make any sense.


Signs of a bad investment:

  • Wanting to be the next big exchange.
  • No relevant experience in the chosen direct business model. This is distinct from the Sean Parker point above. By this I mean, if wanting to do an exchange, the people have / do not have (select one) prior experience in what a daily trading model is, what 5PM is, what governance is, what an internet security model is. E.g., Mt Gox, which traded without understanding any of these things.
  • Belief that tech solves all problems.
  • No knowledge of what came before the Bitcoin paper.
  • Deal hinges in part on banks or regulators. For example, these guys are DITW:
    Part of laying the groundwork is bringing the establishment on board, Malka said. “We need more banks participating in this. We need regulators. I’m part of the Bitcoin Foundation – we are out there trying to educate regulators.” Getting regulators on board will help get the banks to come along, Liew predicted. “If the regulators explicitly set forth rules that say, ‘Bright line, do this, you will find a bank that is willing to take on bitcoin customers,’” Liew said.


That's my B list so far. You'll note that it includes no conventional things, because you already have those. All it includes is pointers to the myths-of-doom peddled in the current bitcoin world as business talk. It's designed to separate out the happy hopefuls from the actual business possibilities, in a world where talking is deeper than walking.

Next up, when I get to it, is my A list: a point I believe so important I saved it for another post. Watch this space.

Posted by iang at 01:38 PM | Comments (1) | TrackBack

April 01, 2014

The IETF's Security Area post-NSA - what is the systemic problem?

In the light of yesterday's newly revealed attack by the NSA on Internet standards, what are the systemic problems here, if any?

I think we can question the way the IETF is approaching security. It has taken a lot of thinking on my part to identify the flaw(s), and not a few rants, with many and aggressive defences and counterattacks from defenders of the faith. Where I am thinking today is this:

First the good news. The IETF's Working Group concept is far better at developing general standards than anything we've seen so far (by this I mean ISO, national committees, industry cartels and whathaveyou). However, it still suffers from two shortfalls.

1. the Working Group system is more or less easily captured by the players with the largest budget. If one views standards as the property of the largest players, then this is not a problem. If OTOH one views the Internet as a shared resource of billions, designed to serve those billions back for their efforts, the WG method is a recipe for disenfranchisement. Perhaps apropos, spotted on the TLS list by Peter Gutmann:

Documenting use cases is an unnecessary distraction from doing actual work. You'll note that our charter does not say "enumerate applications that want to use TLS".

I think reasonable people can debate and disagree on the question of whether the WG model disenfranchises the users, because even though a a company can out-manouver the open Internet through sheer persistence and money, we can still see it happen. In this, IETF stands in violent sunlight compared to that travesty of mouldy dark closets, CABForum, which shut users out while industry insiders prepared the base documents in secrecy.

I'll take the IETF any day, except when...

2. the Working Group system is less able to defend itself from a byzantine attack. By this I mean the security concept of an attack from someone who doesn't follow the rules, and breaks them in ways meant to break your model and assumptions. We can suspect byzantium disclosures in the fingered ID:

The United States Department of Defense has requested a TLS mode which allows the use of longer public randomness values for use with high security level cipher suites like those specified in Suite B [I-D.rescorla-tls-suiteb]. The rationale for this as stated by DoD is that the public randomness for each side should be at least twice as long as the security level for cryptographic parity, which makes the 224 bits of randomness provided by the current TLS random values insufficient.

Assuming the story as told so far, the US DoD should have added "and our friends at the NSA asked us to do this so they could crack your infected TLS wide open in real time."

Such byzantine behaviour maybe isn't a problem when the industry players are for example subject to open observation, as best behaviour can be forced, and honesty at some level is necessary for long term reputation. But it likely is a problem where the attacker is accustomed to that other world: lies, deception, fraud, extortion or any of a number of other tricks which are the tools of trade of the spies.

Which points directly at the NSA. Spooks being spooks, every spy novel you've ever read will attest to the deception and rule breaking. So where is this a problem? Well, only in the one area where they are interested in: security.

Which is irony itself as security is the field where byzantine behaviour is our meat and drink. Would the Working Group concept past muster in an IETF security WG? Whether it does or no depends on whether you think it can defend against the byzantine attack. Likely it will pass-by-fiat because of the loyalty of those involved, I have been one of those WG stalwarts for a period, so I do see the dilemma. But in the cold hard light of sunlight, who is comfortable supporting a WG that is assisted by NSA employees who will apply all available SIGINT and HUMINT capabilities?

Can we agree or disagree on this? Is there room for reasonable debate amongst peers? I refer you now to these words:

On September 5, 2013, the New York Times [18], the Guardian [2] and ProPublica [12] reported the existence of a secret National Security Agency SIGINT Enabling Project with the mission to “actively [engage] the US and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs.” The revealed source documents describe a US $250 million/year program designed to “make [systems] exploitable through SIGINT collection” by inserting vulnerabilities, collecting target network data, and influencing policies, standards and specifications for commercial public key technologies. Named targets include protocols for “TLS/SSL, https (e.g. webmail), SSH, encrypted chat, VPNs and encrypted VOIP.”
The documents also make specific reference to a set of pseudorandom number generator (PRNG) algorithms adopted as part of the National Institute of Standards and Technology (NIST) Special Publication 800-90 [17] in 2006, and also standardized as part of ISO 18031 [11]. These standards include an algorithm called the Dual Elliptic Curve Deterministic Random Bit Generator (Dual EC). As a result of these revelations, NIST reopened the public comment period for SP 800-90.

And as previously written here. The NSA has conducted a long term programme to breach the standards-based crypto of the net.

As evidence of this claim, we now have *two attacks*, being clear attempts to trash the security of TLS and freinds, and we have their own admission of intent to breach. In their own words. There is no shortage of circumstantial evidence that NSA people have pushed, steered, nudged the WGs to make bad decisions.

I therefore suggest we have the evidence to take to a jury. Obviously we won't be allowed to do that, so we have to do the next best thing: use our collective wisdom and make the call in the public court of Internet opinion.

My vote is -- guilty.

One single piece of evidence wasn't enough. Two was enough to believe, but alternate explanations sounded plausible to some. But we now have three solid bodies of evidence. Redundancy. Triangulation. Conclusion. Guilty.

Where it leaves us is in difficulties. We can try and avoid all this stuff by e.g., avoiding American crypto, but it is a bit broader that that. Yes, they attacked and broke some elements of American crypto (and you know what I'm expecting to fall next.). But they also broke the standards process, and that had even more effect on the world.

It has to be said that the IETF security area is now under a cloud. Not only do they need to analyse things back in time to see where it went wrong, but they also need some concept to stop it happening in the future.

The first step however is to actually see the clouds, and admit that rain might be coming soon. May the security AD live in interesting times, borrow my umbrella?

Posted by iang at 11:56 PM | Comments (0) | TrackBack

March 10, 2014

How Bitcoin just made a bid to join the mainstream -- the choice of SSL PKI may be strategic rather than tactical

How fast does an alternative payment system take to join the mainstream? With Paypal it was less than a year; when they discovered that the palm pilot users were preferring the website, the strategy switched pretty quickly. With goldmoney it was pretty much instant, with e-gold, they never achieved it.

With Bitcoin's new announcement, we can mark their intent as around four years or so. Belated welcome is perhaps due, if one thinks the mainstream is actually the place to be. Many do, although I have my reservations on this point and it is somewhat of a surprise to read of Bitcoin's choice of merchant authentication mechanism:

Everyone seems to agree - the public key infrastructure, that network of certificate authorities that stands between you and encrypting your website, sucks.

It’s too expensive. CA’s don’t do enough for the fees they charge. It’s too big. There isn’t enough competition. It’s compromised by governments. The technology is old and crusty. We should all use PGP instead. The litany of complaints about the PKI is endless.

In recent weeks, the Bitcoin payment protocol (BIP 70) has started to roll out. One of the features present in version 1 is signing of payment requests, and the mechanism chosen was the SSL PKI.

Mike Hearn then goes on to describe why they have chosen the SSL PKI. The description reads like a mix between an advertisement, an attack on the alleged alternates (such as they are) and an apology. Suffice to say, he gets most of the argumentation as approximately right & wrong as 99% of the experts in the field do.

Several things stand out. I read from the article that there was little attempt to explore what might be called the "own alternative." From this I wonder if what is happening is that a conservative inner group are actually trying to push Bitcoin faster into the mainstream?

Choosing to push merchants to SSL PKI authentication would certainly be one way to do it. However, this is a dangerous strategy, and what I didn't see addressed was the vector of control issue. This was a surprise, so I'll bring it out.

A danger with stated approach is that it opens up a clear attack on every merchant. Right now, merchants deal under the radar, or can do so, and caveat emptor widely rules in Bitcoinlandia. Once merchants are certified to trade by the CAs however, there is a vector of identification, and permission. There is evidence. Requirements for incorporation. There are trade records and trade purposes.

And, there is a CA which has ... what?

Terms & conditions. Unfortunately, T&C in the CA industry are little known, widely ignored, and not at all understood. Don't believe me? Ask anyone in the industry for a serious discussion about the legal contracts behind PKI and you will hear more stoney silence than if you'd just proven to the UN that global warming was another malthusian plot to prepare the world for the invasion of Martians. Still don't believe me? Check what CABForum's documents say about them. Stoney silence, in words.

But they are real, they exist, and they are forceful. They are very intended, as even when CAs don't understand them themselves, they mostly end up copying them.

One thing you will find in them is that most CAs will decline to do business with any person or party that does something illegal. Skipping the whys and wherefores, this means that any agency can complain to any CA about a merchant on any basis ("hasn't got a license in my state to do some random thing") and the CA is now in a tricky position. Tricky enough to decide where its profits come from.

Now, we hope that most merchants are honest and legal, and as mentioned above, maybe the strategy is to move in that direction in a more forceful way. The problem is that in the war against Bitcoin, as yet undeclared and still being conducted under diplomatic cover, any claim of illegality will take on a sort of state-credibility, and as we know when the authorities say that a merchant is acting against the law, the party is typically seen to be guilty until proven innocent &/or bankrupt. Factor in that it is pretty easy for an agency to take a line that Bitcoin is illegal per se. Factor in that all commercial CAs are now controlled via CABForum and are all aligned into one homogoneous equivalency (forget talk of competition, pah-lease...). Factor in that one sore thumb isn't worth defending, and sets a precedent. We should now see that all CAs will slowly but surely feel the need to mitigate against the threat to their business that is Bitcoin.

It won't be that way to begin with. One thing that Bitcoiners will be advised to do is to get a CA in a safe and remote country, one with spine. That will last for a while. But the forces will build up. The risk is that one day, the meme will spread, "we're not welcoming that business any more."

In military strategy, they say that the battle is won by the general that imposes his plan over the opponent, and I fear that choosing the SSL PKI may just be the opponent's move of choice, not Bitcoin's move of choice, no matter how attractive it may appear.

But what's the alternative, Mike Hearn asks? His fundamental claim seems to stand: there isn't a clear alternative.

This is true. If you ignore Bitcoin's purpose in life, if you ignore your own capabilities and you ignore your community, then ... I agree! If you ignore CAcert, too, I agree. There is no alternate.

But what would happen if you didn't ignore these things? Bitcoin's community is ideally placed to duplicate the system. We know this because it's been done in the past, and the text book is written. Indeed, long term readers will know that I am to some extent just copying the textbook in my current business, and I can tell you it certainly isn't as hard as getting Bitcoin up and rolling.

Capabilities? Well, actually when it comes to cryptographic protocols and reliable transactions and so forth, Bitcoin would certainly be in the game. I'm not sure why they would be so shy of this, as they are almost certainly better placed in this game than all the other CAs except perhaps the very biggest, and even that's debatable because it's been a long time since the biggest actually had the staff and know-how to do any game-changing. Bitcoin has got the backing of google who almost certainly have more knowledge about this stuff than all the CAs combined, and most of the vendors as well (OK, so Microsoft might give them a run for their money if they could get out of the stables).

They've got the mission, the community, the capabilities and the textbook. Why then not? This is why I think that Bitcoin people have made a strategic decision to join the mainstream. If that's the case, then good luck, but boy-oh-boy! are they playing high-stakes poker here.

Old Chinese curse: be careful what you wish for.

Posted by iang at 06:55 AM | Comments (4) | TrackBack

February 26, 2014

How MtGox Failed the Five Parties Governance Test

This was a draft of an article now published in Bitcoin Magazine. That latter is somewhat larger, updated and has some additional imagery.

MtGox, the Bitcoin exchange, is in the news again, this time for collapsing. One leaked report maintains that MtGox may only have 2,000 Bitcoins in reserve over against 744,408 BTC in liabilities - which indicates a reserve of less than 1%.

MtGox originally claimed that their troubles stem from a long-term exploit of the evil malleability bug, which was exploited by means of repeated double spending through an algorithm. However a loss of 99.7% of their reserves cannot be attributed to some mere market timing bug. It is clear that the failure of MtGox is a failure of governance.

Trust Shall Not Live by Tech Alone

One of the temptations for applied cryptographers is to think that we can solve all problems with clever mathematics and inspired code. Thus there has been much discussion over the past two decades about using cryptography to build trust models that work for untrusted parties over the Internet.

This hope in cryptography is misplaced, and often dangerously so. In the first generation of the Internet, SSL was promoted to solve the trust and security problem. However, it failed to do that. Although it secured the line of communications, it left the end-points open to attack, and failed to solve the problem of knowing who the person at an end-point really is.

As history shows, and MtGox confirms, the end-point security question is by far the dominating one, and thus we saw the rise of phishing attacks, "man in the browser" attacks, and server breaches throughout the 2000's. Yet, SSL remains synonymous with Internet e-commerce security, and its very domination is a blindness that attackers benefit from.

Bitcoin can be broadly described as an attempt to solve the problem of governance of a centralised issuer of currency through technology. By using a common protocol to manage a public blockchain, we can make sure everyone follows the rules and make it technically impossible to issue more Bitcoins than the protocol has decreed shall ever exist.

However, like SSL, Bitcoin's solution to the issuance problem has left open the weaker parts of the system to continued attack. In order to provide useful Bitcoin services, businesses must hold the users' Bitcoins and/or their cash in trust. These businesses, such as exchanges, brokerages, online wallets, retail, etc, are at risk from insider theft, external hacking and loss through poor accounting.

Bitcoin's brilliant design for issuance governance may have obscured a complete lack of protection for end-point governance.

How can a user trust a person to protect his or her value?

This is not a new problem for finance. It is called the "agency problem" in reference to the fact that an agent acts for the user as a trusted intermediary. Institutions in the finance space have been dealing with the issue of trusted intermediaries for millennia. This field is broadly called "governance" and has many well known methods for achieving accountability and reliability for fiduciary institutions.

Drawing from "Financial Cryptography in Seven Layers," Governance includes the following techniques:

  • Escrow of value with trusted third parties. For example, funds underlying a dollar currency would be placed in a bank account.
  • Separation of powers: routine management from value creation, authentication from accounting, systems from marketing.
  • Dispute resolution procedures such as mediation, arbitration, ombudsman, judiciary, and force.
  • Use of third parties for some part of the protocol, such as creation of value within a closed system.
  • Auditing techniques that permit external monitoring of performance and assets.
  • Reports generation to keep information flowing to interested parties. For example, user-driven display of the reserved funds against which a currency is backed.

As technologists, we strive to make the protocols that we build as secure and self-sustaining as possible; our art is expressed in pushing problem resolution into the lower layers. This is an ideal, however, to which we can only aspire; there will always be some value somewhere that must be protected by non-protocol means.

Our task is made easier if we recognise the existence of this gap in the technological armoury, and seek to fill it with the tools of Governance. The design of a system is often ultimately expressed in a compromise between Governance and the lower layers: what we can do in the lower layers, we do; and what we cannot is cleaned up in Governance.

The question then is how to bring those practices into a digital accounting and payment system.

To address this weakness of customer escrowed funds, back in the late 1990's we developed a governance technique for digital currency that we called the "Five Parties Governance Model." (This model was built into the digital currency platform that we designed for exchange, called "Ricardo".)

The five parties model shares the responsibility and roles for protection of value amongst five distinct parties involved in the transactions. Although originally designed to protect an entire digital issuance, a problem that Bitcoin addressed with its public blockchain and its absence of an asset redemption contract, this technique can be broadly applied to many problems such as that which has brought MtGox down.

The Five Parties Model (5PM)

In terms of a cryptocurrency issuance with a single issuer (Ricardo model), the Five Parties Model looks like this (Figure 1).

Figure 1. Simple Five Parties Model


Issuer. The Issuer is the institution guaranteeing the contract with the User. This is the person or entity ultimately responsible for the assets and whether the governance succeeds or fails.

In the present case, MtGox is the contractual party that is guaranteeing to deliver an exchange of value, and in the mean time keep those values secure. In Ricardo the Issuer is the party who defines and offers the contract for a particular issuance, which contract creates the rules that govern the five parties.

As can be seen from the following screen capture taken from the Internet Archive, MtGox did in fact have a contract with the users to fully reserve their internal Bitcoin and currency accounts:





Figure 2. Mt. Gox Terms & Conditions

However, as an Issuer, MtGox appears to have failed to implement internal controls to put the other four parties into place.

Trustee. In a digital value scenario, there is always a Trustee role that controls creation or release of long-term funds. For MtGox, this Trustee might be the person who signs off on outgoing wires and outgoing Bitcoin payments, or it might be the person who creates or deletes the derivative monetary units (BTC,LTC,EUR,USD,etc) inside the exchange's books.

For a cryptocurrency that contracts to an underlying asset, the Trustee's account, sometimes known as the Mint account, is the only one that has the ability to create or destroy digital units of value, as that underlying asset pool increases or decreases. For a cryptocurrency without a contractual underlying, the protocol itself can stand in the person's stead by employing an algorithm such as Bitcoin's mining rewards program.

Manager. The manager is the person or entity, usually an employee of the Issuer, who asks the Trustee to perform the big controlled operations: create or destroy digital assets, or deposit or withdraw physical ones, in order to reflect the overall pattern of trading activities.

The Manager typically works on a daily trading basis. As funds come in and go out, some of these request match each other. For a perfect balance, nothing needs to be done, but normally there is an overall flow in one direction or another. As trading balances build up or draw down, the Manager asks the Trustee to authorise the conversion of daily trading assets against the long-term reserves.

In the MtGox context, when BTC is flowing out and cash is flowing in, the Manager would ask the Trustee to release the BTC from the cold wallets, and would deliver cash into the long-term sweep accounts held at bank under the Trustee's control. The Trustee would control that action by looking at the single transfer into the sweep account to confirm the transaction is backed by assets.

In the context of an issuance of digital gold, the Manager might receive an inflow of a 1kg physical bar. The Manager must bail the physical gold into the vault, and present the receipt to the Trustee. With that receipt in hand, and any other checks desired, the Trustee can now release 1kg of freshly-minted digital gold to the Manager's Account.

The Manager is in this way guarded by the Trustee, but it works the other way as well. In a well-governed system, the Trustee can only direct value to be sent to the Manager. In this way, the Trustee cannot steal the value under trust, without conspiring with the Manager; a well-run business will keep these two parties at a distance and bound to govern each other by various techniques such as professional conduct codes.

For example, Ricardo has an ability to lock the Mint's account together with the Manager's account in this fashion. Bitcoin lacks account-control features, but there is no reason that MtGox could not have implemented account-control for their internal Bitcoin accounts.

Operator / Escrow / Vault. For a cryptocurrency, the operator is the part of the business ensuring that the servers and the software are running and properly doing their job. By outsourcing this to a third party, we add another degree of separation of powers to the governance model.

In the case of Ricardo and similar contractually-controlled issuances, there is generally a single server cluster that maintains the accounts. The sysadmin for this server controls the accounts and ensures that no phantom accounts or transactions are let in; software designs assist by including techniques such as triple entry accounting, which guarantees that only original users can create signed instructions to transfer value with their private keys.

For the physical side of a digital issuance such as gold, a vault fills the operator role. In the case of GoldMoney.com the vault operator is ViaMat. They don't do anything with the client's gold unless they receive a signed instruction from the Trustee. They just keep thieves from physically stealing it.

Bitcoin is very different in this respect in that it creates the public blockchain as the accounting mechanism. In this case, the operator role is not outsourced to one party, rather it is spread across the miners, the software and the development team, presenting a very strong governance equation over operator malfeasance.

For a business such as MtGox, the operators or escrows are two-fold. On the one part is the bank providing accounts, and especially the primary account holding long term cash reserves. On the other part, as an exchange provider, is the set of cold wallets holding long term BTC.

The Fifth Party - The Public as Auditor. The final and most important element of the Five Parties Model is the role of the Public as auditor.

Typically, the role of audit is to examine the books to validate that the other parties are indeed doing their job. As is covered elsewhere (Audit), paid auditors have a long-term conflict of interest, which has been at the root of several notable disasters in the last decade - the failure of Enron, the wholesale bankruptcy of banking in 2007 financial crisis, the collapse of AIG, none of which auditors rang the bell for.

Auditors, as well as being conflicted, are also expensive, which leads to the search for alternates. Once we have mined the cryptographic techniques available to us, we are still left with a set of things we cannot control so easily. What then?

Introducing you, the user, or the Public. You do not have a conflict of interest, in that it is your value at risk, and you have a strong interest in seeing that the other four parties are doing their job properly. Which then begs the question of how you, the public, can audit anything, when audit almost by definition means seeing that which cannot be seen?

The answer is to make that which was previously unseen, seen. Some examples of digital currencies that have supported audit by you the Public include:

  • e-gold.com published a real time balance sheet of their digital issuance.
  • Goldmoney.com publishes their physical gold as held by their vault operators, and auditors publish the monthly report.
  • Bitcoin publishes the blockchain.
  • Ricardo publishes the balances of the Trustee and Manager accounts.

Two-Sided Variation on the Five Parties Model

The Five Parties Model is just and exactly that - a model. Which means there are variations and limitations, and a business must modify it to suit. For example, many businesses in the space have not one but two bases of value to control: an underlying asset and a digital issuance. Bitcoin Exchanges fall into this category, for example.

When an Issuer is backing the digital currency with a reserve asset, both of these assets need to be protected. To do this, we utilise two instances of the Five Parties Model in a mirrored pair. In each, the Issuer and the Public act as parties on both sides, whereas the Trustee, the Operator and the Manager may be duplicated (or not). Figure 3 shows an arrangement where a single Manager works with mirrored Operators and Trustees.

Figure 3. Two-Sided or Mirrored Variation of the 5 Parties Model

An exchange such as MtGox would have had an even more complicated regime. For every one of their assets - BTC, Altcoins, USD, EUR, JPY, etc, they would have needed to delegate operators, trustees and managers. We as users expect they did that, which then leaves us with a question -- what went wrong?

MtGox Failed Because Nobody Was Watching Them

We can now measure MtGox against the governance picture drawn above. Although originally developed for an issuance, the model applies wherever there is an important asset to protect.

As a business, the role of Issuer is relatively easy to identify - the company MtGox itself. Their terms and conditions constituted a clear contract between themselves and the users, where MtGox would hold the user's Bitcoin assets in reserve.

Likewise, the Operator for cash is clear: the banks holding the long-term value are presumably identifiable via incoming and outgoing wires. MtGox had transactions going in and out for some time, so Managers are in evidence. The Operator for the long-term BTC cold wallets is the Bitcoin network itself.

What about Trustees? Although MtGox has repeatedly placed blame on their in-house operations team for various hacks and bugs, it is rather more likely that they fell short on the appointment and management of Trustees.

Somehow, the Management created for themselves 744,408 BTC on their internal books against an underlying reserve of only 2,000 actual Bitcoins, which should have been an obvious disaster to all. If this is the case, this suggests that no Trustees were appointed at all, and Managers were essentially uncontrolled.

Finally, the Public as auditor is not in evidence. MtGox on their website did not show the balances of any of their major asset classes, nor provide any easy way to ensure that their parties are doing their job.

Ideally, MtGox would have displayed a balance sheet with references to cold wallets on one side, and their internal Bitcoin/Altcoin balances on the other side. The former is checkable via the blockchain, the latter could be made available by the operator, and periodically audited to ensure the code providing the balance query was accurate.

With this information, you the Public as individuals or as media or other observers can verify that things are as they should be, and if not, sound the alarm! That's what Twitter is for, that's what sites such as DGCMagazine.com, CoinDesk.com and Bitcoin Magazine are for.

Under such circumstances failure might be expected and indeed may be inevitable. As MtGox did not have a sufficient governance model in place, we might have been disconcerted to learn that more than $300 million worth of Bitcoin managed to disappear, but we should also be aware that we may ultimately blame our own failure to insist on good governance.

What other players in the Bitcoin world will fall for the same lack of care? You, the fifth party, the auditing Public would be well advised to review all of your Bitcoin partners to see what forms of governance they use, and to choose wisely. It is your value at risk, and demanding quality governance such as is outlined above is your right.

Posted by iang at 04:56 PM | Comments (3) | TrackBack

February 15, 2014

If you only read one thing this weekend, read about the Vampire Squid

If you read only one thing this weekend, read this.

This is why the 2007 crisis was not resolved. This is why we now socialize their losses, but leave them their profits. This is why it is impossible to fix, and the only game in town is predicting which economy is toast, this weekend, and which investment bank is making monopoly profits while being technically bankrupt.

It is likely impossible to roll back the USA's lifting of the Glass-Steagall barrier, which is in other places known as sound banking. How one deals with a world in which banking is morphing into industrial combines with infinite and free capital is beyond my small brain; we need something like bitcoin, but much stronger.

Hack on, your code may save society as we know it.

Posted by iang at 06:56 AM | Comments (1) | TrackBack

February 09, 2014

Digital Evidence journal is now open source!

Stephen Mason, the world's foremost expert on the topic, writes (edited for style):

The entire Digital Evidence and Electronic Signature Law Review is now available as open source for free here:

Current Issue         Archives

All of the articles are also available via university library electronic subscription services which require accounts:

EBSCO Host         HeinOnline         v|lex (has abstracts)

If you know of anybody that might have the knowledge to consider submitting an article to the journal, please feel free to let them know of the journal.

This is significant news for the professional financial cryptographer! For those who are interested in what all this means, this is the real stuff. Let me explain.

Back in the 1980s and 1990s, there was a little thing called the electronic signature, and its RSA cousin, the digital signature. Businesses, politicians, spooks and suppliers dreamed that they could inspire a world-wide culture of digitally signing your everything with a hand wave, with the added joy of non-repudiation.

They failed, and we thank our lucky stars for it. People do not want to sign away their life every time some little plastic card gets too close to a scammer, and thankfully humanity had the good sense to reject the massively complicated infrastructure that was built to enslave them.

However, a suitably huge legacy of that folly was the legislation around the world to regulate the use of electronic signatures -- something that Stephen Mason has catalogued here.

In contrast to the nuisance level of electronic signatures, in parallel, a separate development transpired which is far more significant. This was the increasing use of digital techniques to create trails of activity, which led to the rise of digital evidence, and its eventual domination in legal affairs.

Digital discovery is now the main act, and the implications have been huge if little understated outside legal circles, perhaps because of the persistent myth in technology circles that without digital signatures, evidence was worth less.

Every financial cryptographer needs to understand the implications of digital evidence, because without this wisdom, your designs are likely crap. They will fail when faced with real-world trials, in both senses of the word.

I can't write the short primer on digital evidence for you -- I'm not the world's expert, Stephen is! -- but I can /now/ point you to where to read.That's just one huge issue, hitherto locked away behind a hugely dominating paywall. Browse away at all 10 issues!

Posted by iang at 02:47 AM | Comments (0) | TrackBack

September 19, 2013

Research on Trust -- the numbers matter

Many systems are built on existing trust relationships, and understanding these is often key to their long term success or failure. For example, the turmoil between OpenPGP and x509/PKI can often be explained by reference to their trust assumptions, by comparing the web-of-trust model (trust each other) to the hierarchical CA model (trust mozilla/microsoft/google...).

In informal money systems such as LETS, barter circles and community currencies, it has often seemed to me that these things work well, or would work well, if they could leverage local trust relationships. But there is a limit.

To express that limit, I used to say that LETS would work well up to maybe 100 people. Beyond that number, fraud will start to undermine the system. To put a finer point on it, I claimed that beyond 1000 people, any system will require an FC approach of some form or other.

Now comes some research that confirms some sense of this intuition, below. I'm not commenting directly on it as yet, because I haven't the time to do more than post it. And I haven't read the paper...


'Money reduces trust' in small groups, study shows
By Melissa Hogenboom Science reporter, BBC News

People were more generous when there was no economic incentive

A new study sheds light on how money affects human behaviour.

Exchanging goods for currency is an age old trusted system for trade. In large groups it fosters co-operation as each party has a measurable payoff.

But within small groups a team found that introducing an incentive makes people less likely to share than they did before. In essence, even an artificial currency reduced their natural generosity.

The study is published in journal PNAS.

When money becomes involved, group dynamics have been known to change. Scientists have now found that even tokens with no monetary value completely changed the way in which people helped each other.

Gabriele Camera of Chapman University, US, who led the study, said that he wanted to investigate co-operation in large societies of strangers, where it is less likely for individuals to help others than in tight-knit communities.

The team devised an experiment where subjects in small and large groups had the option to give gifts in exchange for tokens.

The study
  • Participants of between two to 32 individuals were able to help anonymous counterparts by giving them a gift, based solely on trust that the good deed would be returned by another stranger in the future
  • In this setting small groups were more likely to help each other than the larger groups
  • In the next setting, a token was added as an incentive to exchange goods. The token had no cash value
  • Larger groups were more likely to help each other when tokens had been added, but the previous generosity of smaller groups suffered

Social cost

They found that there was a social cost to introducing this incentive. When all tokens were "spent", a potential gift-giver was less likely to help than they had been in a setting where tokens had not yet been introduced.

The same effect was found in smaller groups, who were less generous when there was the option of receiving a token.

"Subjects basically latched on to monetary exchange, and stopped helping unless they received immediate compensation in a form of an intrinsically worthless object [a token].

"Using money does help large societies to achieve larger levels of co-operation than smaller societies, but it does so at a cost of displacing normal of voluntary help that is the bread and butter of smaller societies, in which everyone knows each other," said Prof Camera.

But he said that this negative result was not found in larger anonymous groups of 32, instead co-operation increased with the use of tokens.

"This is exciting because we introduced something that adds nothing to the economy, but it helped participants converge on a behaviour that is more trustworthy."

He added that the study reflected monetary exchange in daily life: "Global interaction expands the set of trade opportunities, but it dilutes the level of information about others' past behaviour. In this sense, one can view tokens in our experiment as a parable for global monetary exchange."

'Self interest'

Sam Bowles, of the Santa Fe Institute, US, who was not involved with the study, specialises in evolutionary co-operation.

He commented that co-operation among self-interested people will always occur on a vast scale when "helping another" consists of exchanging a commodity that can be bought or sold with tokens, for example a shirt.

"The really interesting finding in the study is that tokens change the behavioural foundations of co-operation, from generosity in the absence of the tokens, to self-interest when tokens are present."

"It's striking that once tokens become available, people generally do not help others except in return for a token."

He told BBC news that it was evidence for an already observed phenomenon called "motivational crowding out, where paying an individual to do a task which they had already planned to do free of charge, could lead people to do this less".

However, Prof Bowles said that "most of the goods and services that we need that make our lives possible and beautiful are not like shirts".

"For these things, exchanging tokens could never work, which is why humans would never have become the co-operative species we are unless we had developed ethical and other regarding preferences."

Posted by iang at 05:24 AM | Comments (0) | TrackBack

June 07, 2013

PRISM Confirmed: major US providers grant direct, live access to the NSA and FBI

In an extraordinary clean sweep of disclosure from the Washington Post and the Guardian:

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.

The process is by direct connection to the servers, and requires no intervention by the companies:

Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.”

....
Dropbox, the cloud storage and synchronization service, is described as “coming soon.”

From outside direct access might appear unusual, but it is actually the best way as far as the NSA is concerned. Not only does it give them access at Level Zero, and probably better access than the company has itself, it also provides the victim supplier plausible deniability:

“We do not provide any government organization with direct access to Facebook servers,” said Joe Sullivan, chief security officer for Facebook. ....

“We have never heard of PRISM,” said Steve Dowling, a spokesman for Apple. “We do not provide any government agency with direct access to our servers, ..." ....

“Google cares deeply about the security of our users’ data,” a company spokesman said. “We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a ‘back door’ for the government to access private user data.”

Microsoft also provided a statement: “.... If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”

Yahoo also issued a denial. “Yahoo! takes users’ privacy very seriously,” the company said in a statement. “We do not provide the government with direct access to our servers, systems, or network.”

How is this apparent contradiction possible? It is generally done via secret arrangements not with the company, but with the employees. The company does not provide back-door access, but the people do. The trick is to place people with excellent tech skills and dual loyalties into strategic locations in the company. These 'assets' will then execute the work required in secret, and spare the company and most all of their workmates the embarrassment.

Patriotism and secrecy are the keys. The source of these assets is easy: retired technical experts from the military and intelligence agencies. There are huge numbers of these people exiting out of the armed forces and intel community every year, and it takes only a little manipulation to present stellar CVs at the right place and time. Remember, the big tech companies will always employ a great CV that comes highly recommended by unimpeachable sources, and leapfrogging into a stable, very well paid civilian job is worth any discomfort.

Everyone wins. It is legal, defensible and plausibly deniable. Such people are expert at keeping secrets -- about their past and about their current work. This technique is age-old, refined and institutionalised for many a decade.

Questions remain: what to do about it, and how much to worry about it? Once it has started, this insertion tactic is rather difficult to stop and root out. At CAcert, we cared and a programme developed over time that was strong and fair -- to all interests. Part of the issue is dealing with the secrecy of it all:

Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.

But for the big US companies, is it likely that they care? Enough? I am not seeing it, myself, but if they are interested, there are ways to deal with this. Fairly, legally and strongly.

How much should we worry about it? That depends on (a) what is collected, (b) who sees it, and (c) who's asking the question?

There has been “continued exponential growth in tasking to Facebook and Skype,” according to the PRISM slides. With a few clicks and an affirmation that the subject is believed to be engaged in terrorism, espionage or nuclear proliferation, an analyst obtains full access to Facebook’s “extensive search and surveillance capabilities against the variety of online social networking services.”

According to a separate “User’s Guide for PRISM Skype Collection,” that service can be monitored for audio when one end of the call is a conventional telephone and for any combination of “audio, video, chat, and file transfers” when Skype users connect by computer alone. Google’s offerings include Gmail, voice and video chat, Google Drive files, photo libraries, and live surveillance of search terms.

Firsthand experience with these systems, and horror at their capabilities, is what drove a career intelligence officer to provide PowerPoint slides about PRISM and supporting materials to The Washington Post in order to expose what he believes to be a gross intrusion on privacy. “They quite literally can watch your ideas form as you type,” the officer said.

Live access to everything, it seems. So who sees it?

My rule of thumb was that if the information stayed in the NSA, then that was fine. Myself, my customers and my partners are not into "terrorism, espionage or nuclear proliferation." So as long as there is a compact with the intel community to keep that information clean and tight, it's not so worrying to our business, our privacy, our people or our legal situation.

But there is no such compact. Firstly, they have already engaged the FBI and the US Department of Justice as partners in this information:

In exchange for immunity from lawsuits, companies such as Yahoo and AOL are obliged to accept a “directive” from the attorney general and the director of national intelligence to open their servers to the FBI’s Data Intercept Technology Unit, which handles liaison to U.S. companies from the NSA. In 2008, Congress gave the Justice Department authority for a secret order from the Foreign Surveillance Intelligence Court to compel a reluctant company “to comply.”

Anyone with a beef with the Feds is at risk of what would essentially be a corrupt bypass of the legal justice system of fair discovery (see this for the start of this process).

Secondly, their credibility is zero: The NSA has lied about their access. They have deceived most if not all employees of the companies they have breached. They've almost certainly breached the US constitution and the US law in gaining warrant-free access to citizens. Dismissively. From the Guardian:

"Fisa was broken because it provided privacy protections to people who were not entitled to them," the presentation claimed. "It took a Fisa court order to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the United States. There were too many email accounts to be practical to seek Fisas for all."

The FISA court that apparently governs their access is evidently ungovernable, as even members of Congress cannot breach its secrecy.

And that's within their own country -- the NSA feels that it is under no such restrictions or niceties outside their own country.

A reasonable examination of the facts and the record of the NSA (1, 2, 3) would therefore conclude that they cannot be trusted to keep the information secret. American society should therefore be worried. Scared, even. The risk of corruption of the FBI is by itself enough to pull the plug on not just this programme, but the system that allowed it to arise.

What does it mean to foreign society, companies, businesses, and people? Not a lot different as all of this was reasonable anyway. Under the history-not-rules of foreign espionage, anything goes. The only difficulty likely to be experienced is when the NSA conspires with American companies to benefit them both, or when American assets interfere with commercial businesses that they've targetted as assisting enemies.

One thing that might now get a boost is the Internet in other countries:

The presentation ... noted that the US has a "home-field advantage" due to housing much of the internet's architecture.

Take note, the rest of the world!

Posted by iang at 02:28 AM | Comments (3) | TrackBack

May 01, 2013

MayDay! MayDay! British Banking Launches new crisis of titanic proportions...

Yes, it's the first of May, also known as May Day, and the communist world's celebration of the victory over capitalism. Quite why MayDay became the international distress message over radio is not known to me, but I'd like to know!

Meanwhile, the British Banking sector is celebrating its own version of MayDay:

The bank went through their customer base and identified which businesses were asset rich and cash poor.

Typically, the SME (small to medium enterprise) would require funding for expansion or to cover short term exposures, and the bank’s relationship manager would work with the business owner on a loan funding cover.

The loan may be for five or ten years, and the relationship manager would often call the client after a short time and say “congratulations, you’ve got the funding”.

The business owner would be delighted and would start committing the funds.

Only then would the relationship manager call them back and say, “ah, we have a concern here about interest rates”.

This would start the process of the disturbance sale of the IRSA.

The rest you can imagine - the bank sold an inappropriate derivative with false information, and without advising the customer of the true costs. This time however the costs were more severe, as it seems that many such businesses went out of business in whole or in part because of the dodgy sale.

In particular, the core issue is that no-one has defined whether the bank will be responsible for contingent liabilities.

The liabilities are for losses made by those businesses that were mis-sold these products and, as a result, have now gone into bankruptcy or been constrained so much that they have been unable to compete or grow their business as they would have if they had not taken these products.

Ouch! I have to applaud Chris Skinner and the Financial Services Club here for coming forth with this information. It is time for society to break ranks here and start dealing with the banks. If this is not done, the banks will bring us all down, and it is not clear at all that the banks aren't going to do just that.

Meanwhile back to the scandal du jour. We are talking about 40k businesses, with average suggested compensation of 2.5 million quid - so we are already up to a potential exposure of 100 billion pounds. Given this, there is no doubt that even the most thickest of the dumbest can predict what will happen next:

Mainly because of the Parliamentary investigation, the Financial Services Authority was kicked into action and, on June 29 2012, announced that it had found "serious failings in the sale of IRSAs to small and medium sized businesses and that this has resulted in a severe impact on a large number of these businesses.”

However, it then left the banks to investigate the cases and work out how to compensate and address them .

The banks response was released on January 31 2013, and it was notable that between the June announcement and bank response in January that the number of cases rose from 28,000 to 40,000. It was also noteworthy that of those 40,000 cases investigated, over 90% were found to have been mis-sold. That’s a pretty damning indictment.

Even then the real issue, according to Jeremy [of Bully Banks], is that the banks are in charge of the process.

Not only is the fox in charge of the chickens, it's also paying off them off for their slaughter. Do we really need to say more? The regulators are in bed with the banks in trying to suppress this scandal.

Obviously, this cunning tactic will save poor banks money and embarrassment. But the emerging problem here is that, as suggested many times in this blog (e.g., 2, 3, 4, ...) and elsewhere, the public is now becoming increasingly convinced that banks are not healthy, honest members of society.

Which is fine, as long as nothing happens.

But I see an issue emerging in the next systemic shock to hit the financial world: if the public's patience is exhausted, as it appeared to be over Cyprus, then the next systemic shock is going to cause the collapse of some major banks. For right or wrong, the public is not going to accept any more talk of bailouts, taxpayer subsidies, etc etc.

The chickens are going to turn on the foxes, and they will not be satisfied with anything less than blood.

One hopes that the old Lady's bank tear-down team is boned up and ready to roll, because they'll be working hard soon.

Posted by iang at 04:34 AM | Comments (3) | TrackBack

July 17, 2012

Auditors All Fall Down; PFGBest and MF Global Frauds Reveal Weak Watchdogs

Without much comment, from Francine McKenna:

Auditors All Fall Down; PFGBest and MF Global Frauds Reveal Weak Watchdogs

[snip]

The made-for-TV drama is instead unfolding in Cedar Falls, Iowa and Chicago where, in “truth is stranger than fiction” style, PFGBest’s Russell Wasendorf Sr. says he used his “blunt authority” as sole owner and CEO to falsify bank statements sent to regulators for twenty years using Photoshop, Excel, scanners and laser printers.

Instead of MF Global’s world-renowned auditor PwC, we’ve got a one-woman show, Jeannie Veraja-Snelling, signing the audit opinion accompanying the financial statements for PFGBest. Not that there’s much less apparent incompetence when a global firm like PwC misses increased risk and deteriorating controls at MF Global and signs off on a clean annual audit opinion as recently as March 31, 2011, seven months before MF Global was forced into bankruptcy. PwC also signed off on a 10-Q review at the end of June, and a bond issue in August of 2011.

Wasendorf’s suicide note said that he duped his first-response regulator, the National Futures Association, by intercepting its request for confirmation of his bank balances, including funds segregated and safeguarded for customers, by using a P.O. Box he set up in the name of US Bank. He simply wrote whatever he wanted on those confirmation requests and signed in the name of the bank. His doctored banks statements with matching figures were sent along with the confirmation request back to the regulator.

“I was forced into a difficult decision: Should I go out of business or cheat?” he wrote. “I guess my ego was too big to admit failure. So I cheated,” his suicide note said.

Regulators, auditors and internal controls can not prevent a psychopath from lying, cheating and stealing to perpetuate a myth and sustain a lavish lifestyle, but they can and should detect the fraud much sooner if not immediately.

Wasendorf’s admission does not explain how he also duped the independent auditor. One of the cornerstones of an independent audit is an independent confirmation of bank balances. PFGBest’s auditor was either duped for twenty years or complicit in the fraud. Neither conclusion is a good one for her. Auditors are forbidden to use company personnel to obtain or process bank balance confirmations. Of course, that hasn’t prevented auditors from falling down on this critical part of their job anyway, leading recently to some of the biggest and most notorious fraud cases in years.

Deloitte’s audit client Parmalat gave that firm falsified bank confirmations. Deloitte’s Milan firm and its international coordinating firm eventually settled the 2003 case with Parmalat bondholders and shareholders for almost $200 million total. Price Waterhouse India partners are still facing criminal charges and the firm is being sued by its former audit client Mahindra Satyam for the fraud revealed by Satyam’s CEO who admitted to falsifying $1 billion in bank balances. Price Waterhouse India paid fines to the SEC, PCAOB, and settled with shareholders. Regulators said Price Waterhouse India’s audits were negligent because they failed to obtain confirmations of bank balances directly from banks and instead accepted management’s representations without independent verification. Several of the current Chinese frauds allege bank confirmation fraud, including accusations of collusion with executives by bank officials and negligence by auditors Deloitte China and others.

What’s even more troubling to me is PFGBest’s auditor, and many others who audit only SEC-registered broker-dealers, may be breaking laws as well as being negligent in their public duty to the capital markets.

(Big Snip)

On that latter, read the article for detail...

Posted by iang at 09:23 AM | Comments (0) | TrackBack

June 20, 2012

Banks will take responsibility for online fraud

Several cases in USA are resolving in online theft via bank account hackery. Here's one:

Village View Escrow Inc., which in March 2010 lost nearly $400,000 after its online bank account with Professional Business Bank was taken over by hackers, has reached a settlement with the bank for an undisclosed amount, says Michelle Marsico, Village View's owner and president.

As a result of the settlement, Village View recovered more than the full amount of the funds that had been fraudulently taken from the account, plus interest, the company says in a statement.

And two more:

Two similar cases, PATCO Construction Inc. vs. Ocean Bank and Experi-Metal Inc. vs. Comerica Bank, raised questions about liability and reasonable security, yet each resulted in a different verdict.

In 2010, PATCO sued Ocean Bank for the more than $500,000 it lost in May 2009, after its commercial bank account with Ocean Bank was taken over. PATCO argued that Ocean Bank was not complying with existing FFIEC requirements for multifactor authentication when it relied solely on log-in and password credentials to verify transactions.

Last year, a District Court magistrate found the bank met legal requirements for multifactor authentication and dismissed the suit.

In December 2009, EMI sued Comerica after more than $550,000 in fraudulent wire transfers left EMI's account.

In the EMI ruling, the court found that Comerica should have identified and disallowed the fraudulent transactions, based on EMI's history, which had been limited to transactions with a select group of domestic entities. The court also noted that Comerica's knowledge of phishing attempts aimed at its clients should have caused the bank to be more cautious.

In the ruling, the court required Comerica to reimburse EMI for the more than $560,000 it lost after the bank approved the fraudulent wire transfers.

Here's how it happens. There will be many of these. Many of the victims will sue. Many if the cases will lose.

Those that lose are irrelevant. Those that win will set the scene. Eventually some precedent will be found, either at law or at reputation, that will allow people to trust banks again. Some more commentary.

The reason for the inevitability of this result is simple: society and banks both agree that we don't need banks unless the money is safe.

Online banking isn't safe. It behoves to the banks to make it safe. We're in the phase where the court of law and public opinion are working to get that result.

Posted by iang at 04:42 PM | Comments (2) | TrackBack

April 10, 2012

What's the takeaway on Audit?

OK, so I edited the title, to fit in with an old Audit cycle I penned a while ago (I, II, III, IV, V, VI, VII).

Here's the full unedited quote from Avivah Litan, who comments on the latest 1.5m credit card breach in US of A:

What’s the takeaway on PCI? The same one that’s been around for years. Passing a PCI compliance audit does not mean your systems are secure. Focus on security and not on passing the audit.

Just a little emphasis, so audit me! PCI is that audit imposed by the credit card industry on processors. It's widely criticised. I imagine it does the same thing as most mandated and controlled audits - sets a very low bar, one low enough to let everyone pass if they've got the money to pay to enter the race.

For those wondering what happened to the audits of Global Payments, DigiNotar, Heartland, and hell, let's invite a few old friends to the party: MFGlobal, AIG, Lehman Brothers, Northern Rock, Greece PLC, the Japanese Nuclear Industry disaster recovery team and the Federal Reserve.... well, here's Avivah's hint:

In the meantime, Global Payments who was PCI compliant at the time of their breach is no longer PCI compliant – and was delisted by Visa – yet they continue to process payments.

That's a relief! So PCI comes with a handy kill-switch. If something goes wrong, we kill your audit :)

Problem solved. I wonder what the price of the kill-switch is, without the audit?

Posted by iang at 06:41 PM | Comments (2) | TrackBack

February 18, 2012

one week later - chewing on the last morsel of Trust in the PKI business

After a week of fairly strong deliberations, Mozilla has sent out a message to all CAs to clarify that MITM activity is not acceptable.

It would seem that Trustwave might slip through without losing their spot in the root list of major vendors. The reasons for this is a combination of: up-front disclosure, a short timeframe within which the subCA was issued and used (at this stage limited to 2011), and the principle of wiser heads prevailing.

That's my assessment at least.

My hope is that this has set the scene. The next discovery will be fatal for that CA. The only way forward for a CA that has issued at any time in the past an MITM-enabled subCA would be the following:

+ up-front disclosure to the public. By that I mean, not privately to Mozilla or other vendors. That won't be good enough. Nobody trusts the secret channels anymore.
+ in the event that this is still going on, an *fast* plan, agreed and committed to vendors, to withdraw completely any of these MITM sub-CAs or similar arrangements. By that I mean *with prejudice* to any customers - breaching contract if necessary.

Any deviation means termination of the root. Guys, you got one free pass at this, and Trustwave used it up. The jaws of Trust are hungry for your response.

That is what I'll be looking for at Mozilla. Unfortunately there is no forum for Google and others, so Mozilla still remains the bellwether for trust in CAs in general.

That's not a compliment; it's more a description of how little trust there is. If there is a desire to create some, that's possibly where we'll see the signs.

Posted by iang at 10:53 PM | Comments (1) | TrackBack

January 21, 2012

the emerging market for corporate issuance of money

As an aside to the old currency market currently collapsing, in the now universally known movie GFC-2 rolling on your screens right now, some people have commented that perhaps online currencies and LETS and so forth will fill the gap. Unlikely, they won't fill the gap, but they will surge in popularity. From a business perspective, it is then some fun to keep an eye on them. An article on Facebook credits by George Anders, which is probably the one to watch:

Facebook’s 27-year-old founder, Mark Zuckerberg, isn’t usually mentioned in the same breath as Ben Bernanke, the 58-year-old head of the Federal Reserve. But Facebook’s early adventures in the money-creating business are going well enough that the central-bank comparison gets tempting.

Let's be very clear here: the mainstream media and most commentators will have very little clue what this is about. So they will search for easy analogues such as a comparison with national units, leading to specious comparisons of Zuckerberg to Bernanke. Hopeless and complete utter nonsense, but it makes for easy copy and nobody will call them on it.

Edward Castronova, a telecommunications professor at Indiana University, is fascinated by the rise of what he calls “wildcat currencies,” such as Facebook Credits. He has been studying the economics of online games and virtual worlds for the better part of a decade. Right now, he calculates, the Facebook Credits ecosystem can’t be any bigger than Barbados’s economy and might be significantly smaller. If the definition of digital goods keeps widening, though, he says, “this could be the start of something big.”

This is a little less naive and also slightly subtle. Let me re-write it:

If you believe that Facebook will continue to dominate and hold its market size, and if you believe that they will be able to successfully walk the minefield of self-issued currencies, then the result will be important. In approximate terms, think about PayPal-scaled importance, order of magnitude.

Note the assumptions there. Facebook have a shot at the title, because they have massive size and uncontested control of their userbase. (Google, Apple, Microsoft could all do the same thing, and in a sense, they already are...)

The more important assumption is how well they avoid the minefield of self-issued currencies. The problem here is that there are no books on it, no written lore, no academic seat of learning, nothing but the school of hard-knocks. To their credit, Facebook have already learnt quite a bit from the errors of their immediate predecessors. Which is no mean feat, as historically, self-issuers learn very little from their forebears, which is a good predictor of things to come.

Of the currency issuers that spring up, 99% are destined to walk on a mine. Worse, they can see the mine in front of them, they successfully aim for it, and walk right onto it with aplomb. No help needed at all. And, with 15 years of observation, I can say that this is quite consistent.

Why? I think it is because there is a core dichotomy at work here. In order to be a self-issuer you have to be independent enough to not need advice from anyone, which will be familiar to business observers as the entrepreneur-type. Others will call it arrogant, pig-headed, too darned confident for his own good... but I prefer to call it entrepreneurial spirit.

*But* the issuance of money is something that is typically beyond most people's ken at an academic or knowledge level. Usage of money is something that we all know, and all learnt at age 5 or so. We can all put a predictions in at this level, and some players can make good judgements (such as Peter Vodel's Predictions for Facebook Credits in 2012).

Issuance of money however is a completely different thing to usage. It is seriously difficult to research and learn; by way of benchmark, I wrote in 2000 you need to be quite adept at 7 different disciplines to do online money (what we then called Financial Cryptography). That number was reached after as many years of research on issuance, and nearly that number working in the field full time.

And, I still got criticised by disciplines that I didn't include.

Perhaps fairly...

You can see where I'm heading. The central dichotomy of money issuance then is that the self-issuer must be both capable of ignoring advice, and putting together an overwhelming body of knowledge at the same time; which is a disastrous clash as entrepreneurs are hopeless at blindspots, unknowns, and prior art.

There is no easy answer to this clash of intellectual challenges. Most people will for example assume that institutions are the way to handle any problem, but that answer is just another minefield:

If Facebook at some point is willing to reduce its cut of each Credits transaction, this new form of online liquidity may catch the eye of many more merchants and customers. As Castronova observes: “there’s a dynamic here that the Federal Reserve ought to look at.”

Now, we know that Castronovo said that for media interest only, but it is important to understand what really happens with the Central Banks. Part of the answer here is that they already do observe the emerging money market :) They just won't talk to the media or anyone else about it.

Another part of the answer is that CBs do not know how to issue money either; another dichotomy easily explained by the fact that most CBs manage a money that was created a long time ago, and the story has changed in the telling.

So, we come to the the really difficult question: what to do about it? CBs don't know, so they will definately keep the stony face up because their natural reaction to any question is silence.

But wait! you should be saying. What about the Euro?

Well, it is true that the Europeans did indeed successfully manage to re-invent the art and issue a new currency. But, did they really know what they were doing? I would put it to you that the Euro is the exception that proves the rule. They may have issued a currency very well, but they failed spectacularly in integrating that currency into the economy.

Which brings us full circle back to the movie now showing on media tonight and every night: GFC-2.

Posted by iang at 06:54 PM | Comments (1) | TrackBack

November 28, 2011

Audit redux.2 - and what happened to the missing MF Global client funds?

As we all know by now, MF Global crashed with some many billions of losses, filing for bankrupcy on 31st October. James Turk wonders aloud:

First of all investors should be concerned because everything is so inter-connected today. People call it contagion and this contagion is real because the MF Global bankruptcy is going to have a knock on effect, just like Lehman Brothers had a knock on effect.”

The point being that we know there is a big collapse coming, but we don't know what it will that will trigger it. James is making the broad point that a firm collapsing on the west side of the Atlantic could cause collapse in Europe. But wait, there's more:

So the contagion is the first reason for concern. The second reason for concern is it’s taking so long for them to find this so called missing money, which I find shocking. It’s been three weeks now since the MF Global bankruptcy was declared and they started talking about $600 million of missing funds.

So I’m not too surprised that now they are talking about $1.2 billion of missing customer funds. I think they are just trying to delay the inevitable as to how bad the situation at MF Global really is.

And more! Chris points to an article by Bloomberg / Jonathan Weil:

This week the trustee for the liquidation of its U.S. brokerage unit said as much as $1.2 billion of customer money is missing, maybe more. Those deposits should have been kept segregated from the company’s funds. By all indications, they weren’t.

Jonathan zeroes in on the heart of the matter:

Six months ago the accounting firm PricewaterhouseCoopers LLP said MF Global Holdings Ltd. and its units “maintained, in all material respects, effective internal control over financial reporting as of March 31, 2011.” A lot of people who relied on that opinion lost a ton of money.

So when I asked:

Let's check the record: did any audit since Sarbanes-Oxley pick up any of the problems seen in the last 18 months to do with the financial crisis?

we now know that PricewaterhouseCoopers LLP will not be stepping up to the podium with MF Global! Jonathan echoes some of the questions I asked:

What’s the point of having auditors do reports like this? And are they worth the cost? It’s getting harder to answer those questions in a way the accounting profession would favor.

But now that we have a more cohesive case study to pick through, some clues are emerging:

“Their books are a disaster,” Scott O’Malia, a commissioner at the Commodity Futures Trading Commission, told the Wall Street Journal in an interview two weeks ago. The newspaper also quoted Thomas Peterffy, CEO of Interactive Brokers Group Inc., saying: “I always knew the records were in shambles, but I didn’t know to what extent.” Interactive Brokers backed out of a potential deal to buy MF last month after finding discrepancies in its financial reports.

That's a tough start for PricewaterhouseCoopers LLP. Then:

For fiscal 2007, MF Global paid Pricewaterhouse $17.1 million in audit fees. By fiscal 2011, that had fallen to $10.9 million, even as warning signs about MF’s internal controls were surfacing publicly.

In 2007, MF and one of its executives paid a combined $77 million to settle CFTC allegations of mishandling hedge-fund clients’ accounts, as well as supervisory and record-keeping violations. In 2009, the commission fined MF $10 million for four instances of risk-supervision failures, including one that resulted in $141 million of trading losses on wheat futures. Suffice it to say, Pricewaterhouse should have been on high alert.

On top of that, Pricewaterhouse’s main regulator, the Public Company Accounting Oversight Board, released a nasty report this week on the firm’s audit performance. The agency cited deficiencies in 28 audits, out of 75 that it inspected last year. The tally included 13 clients where the board said the firm had botched its internal-control audits. The report didn’t name the companies. One of them could have been MF, for all we know.

In a response letter to the board, Pricewaterhouse’s U.S. chairman, Bob Moritz, and the head of its U.S. audit practice, Tim Ryan, said the firm is taking steps to improve its audit quality.

Ha! Jonathan asks the pointed question:

The point of having a report by an independent auditor is to assure the public that what a company says is true. Yet if the reports aren’t reliable, they’re worse than worthless, because they sucker the public with false promises. Maybe, just maybe, we should stop requiring them altogether.

Exactly. This was what I was laying out for the reader in my Audit cycle. But I was doing it from observation and logic, not from knowing about any particular episode. One however was expected to follow from the other...

The Audit brand depletes. Certainly time to start asking hard questions. Is there value in using a big 4 auditor? Could a firm get by on a more local operation? Are there better ways?

And, what does a big N auditor do in the new world? Well, here's one suggestion: take the bull by the horns and start laying out the truth! KPMG's new Chairman seems to be keen to add on to last week's revelation with some more:

KPMG International LLP’s global chairman, Michael Andrew, said fraud was evident at Olympus Corp. (7733) and his firm met all legal obligations to pass on information related to Olympus’s 2008 acquisition of Gyrus Group Ltd. before it was replaced as the camera maker’s auditor.

“We were displaced as a result of doing our job,” Andrew told reporters at the Foreign Correspondents’ Club in Hong Kong today. “It’s pretty evident to me there was very, very significant fraud and that a number of parties had been complicit.”

Now, if I was a big N auditor, that's exactly what I'd do. Break the cone of silence and start revealing the dirt. We can't possibly make things any worse for audit, so let's shake things up. Go, Andrew.

Posted by iang at 03:51 PM | Comments (1) | TrackBack

November 21, 2011

Audit redux - KPMG reveals... FRAUD? You be the Jury!

I like a guy who picks a fight. Especially, if he's an auditor!

New KPMG global chairman Michael Andrew says global regulators are hell-bent on breaking the dominance of large global audit firms without regard for the impact on stability of financial makerts and employment. "This is the worst time to be reforming the profession. You want financial stability. You want large employers in the marketplace taking on graduates. Why an earth is this an imperative right now?"

Australian Financial Review's article, "Global Chief blasts audacious attack on audit" of 21st November 2011, brings us some of the worst sort of self-serving excuses - saying that Auditors are part of the solution, not part of the problem.

I'm not buying it. Back in February of 2009 I asked of the auditors:

Let's check the record: did any audit since Sarbanes-Oxley pick up any of the problems seen in the last 18 months to do with the financial crisis?

No. Not one, not even a single one!

KPMG's Chairman is going to need a better set of excuses. Indeed, belatedly, it seems that others are asking too. From the same article, behind a paywall it seems:

The move against the big four is a backlash to the global financial crisis. The whole premise of audit is to inform capital markets. So why didn't they foresee, or prevent, the financial crisis and Europe's currency problems?

Now, I'm not going that far. I don't think audit could or should have prevented the GFC1 or GFC2, and it is the economist that foresees crises, not auditors. Rather, I'm saying:


Yet, the basic failures in the financial crisis are so blatant that surely, even by accident at least one audit should have picked up at least one pending failure, and fixed it?

Surely an easier test: not a single auditor has rung the bell on a single bad bank, that we know of. So what went wrong? I suggest the cause of failure by examination of the basic product of audit, and I conclude, in short words, you the public cannot rely on it. To you, the public, audit is an unknown unknown, you don't even know enough to know what it is. And in that environment, auditors shifted it somewhere else.

However, Michael Andrew brings a new causality to the court of public appeal:

One of the US's major criticisms of IFRS (International Financial Reporting Standards) is that it is subject to political intervention.

They're right to be concerned, said Mr Andrew. "We had regulators and governments telling us not to write down Greek debt in certain countries. They were refusing to allow accounting firms to adjust, saying they would underwrite a portion of the debt but refusing to put [that commitment] in writing," he said.

Whoa! Did he just say that? Did I just write out those words, taken from a scrappy photocopy of a print-only article? Yes indeed, word for word.

Haven't we seen that before? Let's ask Joseph T. Wells for the definition of fraud:


Under common law, three elements are required to prove fraud: a material false statement made with an intent to deceive (scienter), a victim's reliance on the statement and damages.

Now, I don't want to be sued back into the dark ages by accusing auditors of fraud, so let's test it in the court of the informed observer:

  1. Intent?!
    1. Was failing to write down the greeks a bad?
    2. Did the Auditors deliver reports saying the banks' accounts were good?
    3. Would good reports over bad greeks be materially false?
    4. Was there an intent to deceive the audit-relying public?
    5. Who by?
  2. Did the victims of the worlds financial markets rely on rosy audit reports? and
  3. Were there damages?

Now, I'm no lawyer. And, the Auditor's defence will clearly be "the government told us to do it!" Which might even get them off, who knows? Or it might just bring the governments in on the act -- have they defrauded the entire planet by some act of conspiracy or abuse? Or, or or...

I don't know. But this is a question that simply must be answered.

I call for a jury of victims! Over to you. What is your verdict?

PS: before the papparazzi and the bureaucrats get too excited: Michael Andrew did the right thing by blowing the lid on the intervention. We need more facts, more causes, not more coverups.

PPS 2017: finally 6 years later, the system may be brought to trial.

Posted by iang at 02:18 PM | Comments (3) | TrackBack

August 07, 2011

Regulating the future financial system - the double-entry headache needs a triple-entry aspirin

How to cope with a financial system that looks like it's about to collapse every time bad news turns up? This is an issue that is causing a few headaches amongst the regulators. Here's some musings from Chris Skinner over a paper from the Financial Stability gurus at the Bank of England:

Third, the paper argues for policies that create much greater transparency in the system.

This means that the committees worldwide will begin “collecting systematically much greater amounts of data on evolving financial network structure, potentially in close to real time. For example, the introduction of the Office of Financial Research (OFR) under the Dodd-Frank Act will nudge the United States in this direction.

“This data revolution potentially brings at least two benefits.

“First, it ought to provide the authorities with data to calibrate and parameterise the sort of network framework developed here. An empirical mapping of the true network structure should allow for better identification of potential financial tipping points and cliff edges across the financial system. It could thus provide a sounder, quantitative basis for judging remedial policy actions to avoid these cliff edges.

“Second, more publicly available data on network structures may affect the behaviour of financial institutions in the network. Armed with greater information on counterparty risk, banks may feel less need to hoard liquidity following a disturbance.”

Yup. Real time data collection will be there in the foundation of future finance.

But have a care: you can't use the systems you have now. That's because if you layer regulation over policy over predictions over datamining over banking over securitization over transaction systems … all layered over clunky old 14th century double entry … the whole system will come crashing down like the WTC when someone flies a big can of gas into it.

The reason? Double entry is a fine tool at the intra-corporate level. Indeed, it was material in the rise of the modern corporation form, in the fine tradition of the Italian city states, longitudinal contractual obligations and open employment. But, double entry isn't designed to cope with the transactional load of of inter-company globalised finance. Once we go outside the corporation, the inverted pyramid gets too big, too heavy, and the forces crush down on the apex.

It can't do it. Triple entry can. That's because it is cryptographically solid, so it can survive the rigours of those concentrated forces at the inverted apex. That doesn't solve the nightmare scenarios like securitization spaghetti loans, but it does mean that when they ultimately unravel and collapse, we can track and allocate them.

Message to the regulators: if you want your pyramid to last, start with triple entry.

PS: did the paper really say "More taxes and levies on banks to ensure that the system can survive future shocks;" … seriously? Do people really believe that Tobin tax nonsense?

Posted by iang at 07:46 AM | Comments (0) | TrackBack

May 24, 2011

Lords: Auditors guilty of 'dereliction of duty'

I had thought I was a voice in the wilderness on the question of criticising Audit as having left the party by the back door before the cops arrived. But, no, it seems that some have noticed. The Economist reports:

THE average divorce in Britain comes after 11 years of marriage. Compare that with the fidelity of a big British company to its auditors: 48 years on average, according to the Financial Reporting Council, Britain’s accounting watchdog, which tallied the figures for Britain’s biggest firms, the constituents of the FTSE 100. The reason is increasingly obvious, and worrisome, to regulators in Britain and elsewhere: the concentration of big accounting engagements in just four firms’ hands: PwC, Deloitte, KPMG and Ernst & Young.

The “Big Four” audit 99 of the FTSE 100, and 240 of the FTSE 250. ...

OK, that's really a follow-on from the Arthur Anderson and KPMG story of too big to fail. Yes, the Audit industry is now totally concentrated, which indicates to the economists amongst us that fees will have risen and the product will have drifted. Note that I didn't say quality, as in some cases the quality might have gone up -- including to well beyond reasonable, where we are paying for something we don't get a benefit from.

Which point I made in that Audit cycle; Auditors no longer serve society, society serves Auditors. Which came to a head with the financial crisis of 2007:

This caught the attention of the House of Lords, which in March pinned the firms’ “dereliction of duty” in the financial crisis, in part, on their oligopoly. (To make matters worse, only three of the four audit banks in Britain.) The Lords recommended that the Office of Fair Trading take a look at the problem. On May 17th the OFT announced that it was opening formal investigations into whether to refer the issue onto the Competition Commission, which could force changes on the industry.

So an investigation is being opened. This is one of those sticky areas where the Auditors police themselves, so what happens when that fails? Who do you go to? Well, the answers are somewhere between nobody and everyone. In this case, everyone includes the Lords, the OFT and the Competition Commission.

Which brings up the next sticky point. Are we really saying that this is a competition issue?

The firms insist that removing experienced audit firms from their clients would be inefficient and expensive. But regulators will weigh that potential expense against the expense of another systemic “dereliction of duty” by the auditors. The disappearance of one of the Big Four—recalling how quickly Arthur Andersen evaporated in the Enron scandal—would be more expensive still.

Apparently we are at least weighing competition issues with the systemic problem of the collapse of 2007. I don't know quite how the Economist came to that conclusion, but to me, the big question is this: how did the Auditors completely miss that all the big firms in Wall Street were about to cross into bankrupcy (declared or otherwise)? As the UK parliament summarised this question:

‘The breakdown of dialogue between bank auditors and regulators made the financial crisis worse’

Auditors were either unaware of the mounting dangers in the banks or, if they were aware, failed to alert the supervisory authority. The paucity of meetings between bank auditors and the supervisor was a “dereliction of duty” by both auditors and regulators. The Committee recommends legislation to re-establish mandatory two-way confidential dialogue between bank auditors and supervisors to help avoid a similar crisis in future.

Here's one suggestion of an answer:

...the UK House of Lords’ Economic Committee [...] recently asked UK leaders of all of the Big 4 audit firms – Deloitte, Ernst & Young, KPMG and PricewaterhouseCoopers – about the absence of warnings or “going concern” qualification for banks that failed or were bailed out.

The auditors’ response: The Bank of England told us, in confidence, that they would support the banks financially.

That's a really interesting answer! But I for one am not ready to call that a *good answer*. And if we don't have a good answer to that question, do we have a need for a good Audit?

ICAEW chief executive Michael Izza rejected the argument that auditors were culpable in the banking crisis, stating: “They did the job that they were expected to do - provide an audit opinion on banks' financial statements.”

But that isn't it! Audit has shifted from "opinion over financial statements" to being a small cog in a huge consulting machine. So we seem to be getting to the nub of the question: can the Auditors have their cake and eat it to?

This is a question that is slowly being asked. Amongst leading cases against audit is this:

Cuomo’s final act as NYAG last [December] was suing Ernst & Young for fraud for allowing Lehman Brothers to cook its books using “Repo 105.” That accounting practice, which may have been used by other Wall Street firms during the subprime binge, allowed Lehman to take billions of its toxic assets off its balance sheet for a few days at the end of the crucial 2nd and 3rd quarters of 2008, months before it filed for bankruptcy.

By moving toxic assets first off and then back on its books, Lehman was effectively dressing up its balance sheet in a deceptive manner. The lawsuit essentially alleges that Ernst & Young was aware of the practice, starting when it became Lehman Bros.’ auditor in 2001 until the firm’s death in 2008.

Lehman Bros.’ actions, and Ernst & Young turning a blind eye to them, stink to high heaven. Investors suffered devastating losses from the accounting chicanery. But one, huge question remains unanswered: As the financial and subprime crisis unfolded, where were the auditors who were the “gatekeepers” charged with protecting shareholders?

Or, more on point to whether Auditors do indeed provide an audit opinion, the Lehman Brothers bankrupcy report said:

(3) Ernst & Young Would Not Opine on the Materiality of Lehman’s Repo 105 Usage

Don't hold your breath that Auditors will be brought to account before the judge, though.

"Every time somebody comes up with a new fraudulent scheme, auditors miss it," said Andrea Kim, a partner at law firm Diamond McCarthy LLP in Houston who represents plaintiffs in auditor lawsuits. "The historical pattern is that they find a way to manage the litigation to limit their liability."

The credit crisis, which pushed the U.S. financial system to the brink of collapse, led to a wave of investor litigation against banks, lenders and others. Auditors are prime targets because investors try to rope in as many defendants as possible to increase recoveries. Auditors also may have the deepest pockets if the company they audited files for bankruptcy.

So we are now seeing a big lesson unfold. So far the Auditors are securing many dismissals and some settlements. The lesson then is more for us than them.

Posted by iang at 04:37 AM | Comments (3) | TrackBack

May 06, 2011

"Members of the media are not included."

In yet more confusing evidence, Wired reports on the Boeing Audit Whistleblowing case:

The 9th U.S. Circuit Court of Appeals set aside the appeal of two former Boeing auditors who claimed their leaks to the media were protected by the Sarbanes-Oxley Act of 2002, adopted to protect shareholders against fraud. A three-judge panel of the San Francisco-based appeals court sided with Boeing, saying a provision in the act only protects those who notify the authorities, not the media, of alleged wrongdoing.

What appears to be the cause of this is that auditors, frustrated at trying to get attention in Boeing for Sarbanes-Oxley compliance, decided to leak some documents. Claiming immunity under Sarbanes-Oxley is novel, but leaking documents to the media in order to put pressure on the company is not novel - it's just not done. And, this is not a case of "should have known better." Auditors know better, they knew they are given the keys to the castle, so it is unclear why they were just fired.

The law protects employees from discrimination if they deliver the information to a federal regulatory or law enforcement agency, a member or committee of Congress or or a work supervisor.

“Members of the media are not included,” Judge Barry Silverman wrote for the unanimous court.

Anyway, that all aside, we benefit by a unique insight into the traumas of audit. Referring to the original article from Seattle-Post Intelligencer:

Sarbanes-Oxley is a wide-ranging law aimed at preventing stockholder rip-offs such as the Enron scandal from happening again. Among its requirements, it forced public companies such as Boeing to shine a light on their internal controls. It must show it has checks and balances on people and computer systems to guarantee accuracy of financial statements. ....

The federal guidelines for computer controls are unclear, and where the law is murky, auditors and company officials are left to fill in the gaps — facing criminal penalties if they are wrong. Companies are hungry for clarification on how to handle the information technology portion of Sarbanes-Oxley, according to The Institute of Internal Auditors, a leading professional association.

In step the Auditors, the cash-machine bells spinning in their eyes, and havoc reigns:

But Boeing’s information technology staff suffered. “They weren’t used to being involved in a finance-related audit,” McGee said in a June interview at Chicago headquarters. “We drove process discipline pretty hard.”

One person involved in the compliance effort, who asked not to be identified, told the P-I that information technology managers thought the new rules would blow over and that workers were “openly hostile” to the audits. The level of rigor — for example, documenting every single approval for a coding change — was foreign to the get-things-done culture of Boeing’s computer professionals.

The employee described the first two years as “pure hell” for the information technology staff. Colleagues agreed. Even auditors were unhappy, leading to infighting last year between consultants at PricewaterhouseCoopers and Jefferson Wells — the two firms contracted to help Boeing with internal audits.

Infighting in consultants is nothing special, as they defend their billings to the death. There's a huge incentive in replacing another contractor that turns them against each other. This sometimes ends up badly for a consultant, but it always ends up badly for the client:

Meanwhile, the experts at Jefferson Wells and PricewaterhouseCoopers spent hours — billed to Boeing — disputing each other’s findings.

What appears to be at the heart of this is that audit hasn't really served the corporation well. We know that Sarbanes-Oxley was a good effort at tightening up controls. But to what end? In this case, Boeing wasn't an Enron. It's easy to measure its progress. Planes come off the line at regular intervals, they are huge and easily countable, and if they don't work, it's spectacularly obvious.

So we have the possibility of over-measurement -- measuring something that costs more to measure than it delivers in benefits to the stockholder. What might be needed for the Enrons and the banks of the world, which deal in virtual product, isn't so clear for the physical sector.

“This sounds really, really messy,” Heriot Prentice, director of technology practices at the Institute of Internal Auditors, said upon hearing all of the charges and countercharges without knowing that he was speaking about Boeing, specifically. “This sounds like a big mess.”

Companies have been monitoring their computer systems for years — but under Sarbanes-Oxley, it was the first time that all public companies were required by law to do so as a part of a company’s “internal control over financial reporting.”

That control requirement, often nicknamed “404 compliance” after its corresponding part of the law, has been the most controversial and expensive aspect of Sarbanes-Oxley — and federal rules are now under review. Many executives bristled at the soaring costs of information technology compliance.

Control over financial reporting starts with control over financial transactions ... perhaps this was a simple case where they should have used SOX not SOx and triple entry accounting not double entry auditors?

Posted by iang at 01:22 AM | Comments (2) | TrackBack

May 05, 2011

Did you read your adverse Audit Review?

Twans asks what happened to the blog, and the short answer is, like the US Patent Office in the early 1900s, there's nothing new worth writing.

Here's a small piece of evidence from the financial crisis, which I covered in much depth in my Audit cycle:

At one point, the lack of quality control at Deutsche Bank’s mortgage lending unit, MortgageIT, prompted the hiring of an outside vendor to conduct reviews of the mortgages the bank approved for FHA insurance.

According to the suit, when the outside vendor found violations in the way it was approving mortgages for FHA insurance it sent letters to MortgageIT making them aware of the problems. Unfortunately, those letters weren’t read because employees there “stuffed the letters, unopened and unread, in a closet in MortgageIT’s Manhattan headquarters,” according to the suit.

Short version: In order to get some form of subsidy in the securitization business, Deutschebank hired an external auditor to review its lending practices. Then, didn't read the results. Which of course were adverse.

What does it mean for the mortgage lending industry? Sabino speculates that there’s a 50/50 chance that the allegations made by the U.S. Attorney’s office are not unique to Deutsche Bank.

In my Audit cycle I speculated that the Audit industry is so filled with errors at many and different points that at this time in history, it is useless to society. That is, it cannot be relied upon to deliver the result. This is evidence supporting that hypothesis.

Posted by iang at 12:48 AM | Comments (1) | TrackBack

November 03, 2010

VeriSign takes the "Trust" out of "SSL certificates"

In a funny little announcement that will have CA industry fans scratching their heads for a year or so, Verisign announces a one day sale of its "Trust seals":

According to VeriSign, "The VeriSign Trust seal shows the world that VeriSign has confirmed your identity and your site has passed the VeriSign malware scan."

A year's worth of service for a VeriSign Trust seal normally sells for $299. During the "Dollar Day" sale, which will run from 12:01AM PST to 11:59PM -- "from midnight to midnight," said Tim Callan, head of marketing for VeriSign trust services at Symantec -- VeriSign is offering a $298 discount on one year's worth of Trust seal.

A comment of background. VeriSign recently closed a deal to sell its CA (Certification Authority) to Symantec. For CAs, this was a big development, because VeriSign has about three quarters of the market, it would be like General Motors selling its car division to some random dude with a car parts shop.

The big issue then for VeriSign and Symantec is how to slice and dice the various brands and assets up to maintain the integrity of the deal [1]. VeriSign more or less pioneered the use of the word "Trust" as with a lot else, hence the term "Trust Business." A curiosity that arose from the sale was whether Symantec was to be Trusted with the Business, as it were. Apparently they are:

Available since April 2010, the VeriSign Trust seal is an alternative to the company's older seal. "The 'VeriSign Secured' circle-and-check VeriSign Seal has historically been yoked to our VeriSign SSL certificate, which meant that you had to be using VeriSign SSL Certificates to get a seal," said Callan.

"But many small businesses outsource their shopping cart to a third party like Yahoo or eBay, where they can't get SSL," said Callan. These third-party shopping carts are typically secured with SSL on their own, as indicated by the URL starting with HTTPS or SHTTP. "This means that credible businesses are penalized for being too small. So we are creating a standalone version of the seal. Businesses have to be secure, and have their identify confirmed... but they don't have to be using SSL."

Is that for real? Yes it is. Indeed, over at CAcert (where I do lots) we have long recognised that the use of these words in the context of the overall certificate business was confusing and could present substantial difficulties if challenged in court [2].

The word "Trust" is more or less taboo in CAcert, and has been for many years; instead, we do other things that IMNSHO are far more sustainable, useful and justifiable. These are loosely grouped under the term RELY, generally written in caps to signal its special status as a word of much meaning.

Using the opportunity at hand, the new manager has wisely firewalled the issue as a separated brand and business. Which leaves the rest of the CA business to swing back into line in their own time.


[1] this is a standard business problem. For example, IBM had to do the same when it sold its market-leading laptops to Lenova, giving them a 5 year franchise on the use of the IBM brand.

[2] That's euphemistic code for "open to charges of deceptive trading practices" or other salacious troublemongering by an aggrieved plaintiff. I also hasten to point out that I have from time to time warned CAs about sailing too close to the wind, and VeriSign to its credit had become more careful about using the term too aggressively. Which is to say, I claim voce piano, there's more to this than idle grumbling about a successful competitor's annoyingly successful brand.

Posted by iang at 07:31 PM | Comments (2) | TrackBack

September 28, 2010

Crypto-plumbers versus the Men in Black, round 16.

Skype, RIM, and now CircleTech v. the governments. This battle has been going on for a while. Here's today's battle results:

BIS [Czech counter-intelligence] officers first offered to Satanek that his firm would supply an encryption system with "a defect" to the market which would help the secret service find out the content of encrypted messages. "This is out of question. It is as if we were proclaiming we are selling bullet-proof vests that would actually not be bullet-proof," Satanek told MfD.

This is why BIS offered a deal to the firm's owners. BIS wanted CircleTech to develop a programme to decipher the codes. It would only partially help the secret service since not even CircleTech is capable of developing a universal key to decipher all of its codes. Nevertheless, software companies are offering such partial services, and consequently it would not be a problem for CircleTech to meet the order, MfD notes.

However, BIS officers said the firm need not register the money it would receive from BIS for the order, the paper writes. "You will have on opportunity to get an income that need not be subject to taxation," MfD cites the secret recording of a BIS officer at a meeting with the firm. Satanek rejected the offer and recorded the meetings with BIS.

BIS then gave it up. However, two months ago it contacted Satanek again, MfD writes. "They told me that we are allegedly meeting suspicious persons who pose a security risk to the state. In such a case we may not pass security vetting of the National Security Office (NBU)," Satanek told MfD.

Subversion, bribes, and threats, it's all in there! And, no wonder every hot new code jockey goes all starry-eyed at the thought of working on free, open encryption systems.

Posted by iang at 07:55 AM | Comments (0) | TrackBack

August 24, 2010

What would the auditor say to this?

Iran's Bushehr nuclear power plant in Bushehr Port:

"An error is seen on a computer screen of Bushehr nuclear power plant's map in the Bushehr Port on the Persian Gulf, 1,000 kms south of Tehran, Iran on February 25, 2009. Iranian officials said the long-awaited power plant was expected to become operational last fall but its construction was plagued by several setbacks, including difficulties in procuring its remaining equipment and the necessary uranium fuel. (UPI Photo/Mohammad Kheirkhah)"

Click onwards for full sized image:

Compliant? Minor problem? Slight discordance? Conspiracy theory?

(spotted by Steve Bellovin)

Posted by iang at 05:53 AM | Comments (2) | TrackBack

May 18, 2010

Why Open + Internet + Brand can changes the Governance map for CAs

Daniel wrote in comments a month or so back about the need to put the CA's brand on the chrome, so all can see who makes the statement:

Assume for the moment that there is a real interest in fixing this issue (there isn't, but I'll play along). Andy is right that it isn't going to do much good because, in essence, users don't care.

The fundamental problem with this security scheme is that it requires some action of the part of the consumer. But consumers aren't interested in the bother.

This is the accepted wisdom of the community that builds these tools. Unfortunately it is too simple, and the sad reality is that this view is dangerously wrong, but self-perpetuating. Absence of respect is not evidence that the actors are stupid. For a longer discussion, see this paper: "So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users." The title is maybe self-referential; if it takes you a while to work out what it is saying, you'll appreciate how consumers feel :-)

In short, it is not that consumers aren't interested in the bother, it's that they reject bad advice. And they're right to do so.

So there are two paths here, one is to improve the advice /up to the point where it is rational for users to pay attention/ which you'll recognise is a very hard target. Or, remove the advice entirely and fix the model so that it represents a better trade-off (e.g., there is only one mode, and it is secure). As far as the secure browser architecture goes, that second path is pretty much impossible because it relies on too many external components, ones which will not move unless we've also figured out how to start and stop earthquakes, volcanoes and tsunamis at whim.

So we are left with improving the advice, itself a very hard target. Let's try that:

Imagine the following situation. You walk into your local bank but in order to withdraw any money you needed to do the following: interview the guard at the door to make sure he really worked for the bank, interviewed the teller to make sure he really worked for the bank, and then set at least 10% of the money you withdrew from the bank on fire so you could watch it burn and see if it was fake or not.

Right, this is a common problem. The mistake you are making is that the majority view is how to design the product. In this case, if the majority ignore the information, we don't need to follow their view in order to redesign the product.

The reason for this is that the minority can have a sufficient effect to achieve the desired result. This is what we call Open Governance: the information is put out there, but only a small minority look at any particular subset. The crowd in aggregate looks at all, but individually, specialisation takes root and becomes the norm.

Let's step outside that context and try another. Consider a police officer's badge. It's got a number on it. Often a name, as well. When the police officer busts some trouble maker, likely the perp does not notice the badge, nor the number. 99% likely, because the perp doesn't need to know, he's busted, and it matters little by whom. So what's the point?

The point is, 1% will notice the badge number! And that's enough to cause the police -- that officer and all others -- to be cautious. To follow the rules. They don't know beforehand who's noting these things down, or not, and they don't need to. The just need to know that bad behaviour can be spotted, and as we get closer to routine bad behaviour, it is more likely that the number will be noted.

Same with your bank guard. You don't have to interview him because the teller will. And if not, someone else in the branch. And if not them, some other customer will look.

Welcome to Open Governance. This is a concept where the governance of the thing, whatever it be (a CA, a bank, a government, a copper) is done by all of us, the world, not by "some special agency." Each of us on the net has the same chance to play in this game -- to govern the big bad player -- but only a very few of us actually govern any particular thing in question.

Let's go back closer into context and consider CAs. How are these governed? Well, they publish CPSs, they get audited by auditors, and they audit is checked over by third party vendors.

For example, we've seen audit reports that totally exclude important issues from consideration. And, nobody noticed beforehand! Which indicates that whatever is being done, whatever is being written, it isn't being verified nor understood. Which more or less casts in doubt all the prior due diligence done over CAs.

This is one reason why Mozilla decided to bring in more open governance ideas. There was a recognition that the old mid-1990s CA audit model wasn't providing a reliably solid answer. There was at least some smoke and mirrors, some criticism of abuse, and these criticisms weren't getting answered. More was needed, but not more of the same, more alternate governance.

So Mozilla put in place an open list (you can join), published all new requests from CAs, and proposed them for open review (section 16 of the policy). There are a few people who read these things. Not many, because it is hard work, and it takes a lot of time. But it's a start, we can't grow these things on trees. A forest starts with a single tree.

The brand name on the chrome is the same thing. We might predict that 99% of the users won't look at it. But 1% will. And, we also know that most all computer users have someone experienced they turn to for help, and those people have a shot at knowing what the brand is about.

The effect of the brand on the chrome as a security feature is then highly dependent on that effect: the CA doesn't know who is looking, but it knows that it is now totally tied to the results in the minds of those who are looking. This is powerful. Any marketing person will tell you that a threat to the brand is far more important than a deviation from a policy. CAs will fiddle their policies and practices in a heartbeat, but they'll not fiddle their brand.

There is an old saying "trust but verify". The problem is that this is a contradiction in terms. Trust means precisely that I don't have to verify. If I have to verify every transaction to see if the money is good, that's not trust. If I have to spy on my wife all the time to see if she's cheating, that's not trust.

Asking the user to verify, when what the user wants to do is trust, is design failure that no amount of coding is going to fix.

Actually, the expression is dead-right; trust can only come from verification, and repeated verifications at that. However, those verifications will have happened in the past; we might for example point to the fact that 99.999999% of all certificates issued have never caused a problem. That's a million verifications, right there.

When you say you don't have to verify, you're really saying you can take a risk this time. But there will come a time when that will rebound. Trust without verification is naïveté.

But, what we can do is outsource and share who does the verifying. And that's what Brand on the Chrome is about; outsourcing and sharing the verification of the CAs' business practices to the crowd.

Posted by iang at 06:49 AM | Comments (4) | TrackBack

April 26, 2010

The Python and the Mongoose: it helps if you know the rules of engagement

NYT suggests that the SEC changes mentioned yesterday are approved:

The proposed changes, approved in a 5-0 vote despite misgivings expressed by two commissioners, now enter a 90-day period for public comment before coming back to the commission for revision and final approval.

but more importantly,

The bond issuers would also be required to keep a chunk of the securities in their own portfolios so that they retain some of the bonds’ risk, under the S.E.C.’s plan. ... The changes would “represent a fundamental revision to the way in which the asset-backed securities market would be regulated,” the S.E.C.’s chairwoman, Mary L. Schapiro, said. “I think changes are both necessary and critical components of restoring investor confidence.”

Aha! Someone knows the definition of banking:

Banking is the borrowing of /demand deposits/ from the public, and the lending of those same deposits, /at term/ to the public.

Banking is special for one and only one reason. Because the funds are borrowed as deposits, they can be returned today, immediately. That's what "on demand" means, and also that's what deposits mean.

Yet the loans are "at term" or to be repaid in the future. 30 years away, in the case of modern western mortgages.

And that is the crux of banking. The loans out on houses can't be called in under normal circumstances, but the public can call in its deposits now, today. Ordinarily this would be called fraud, because the bank is entering into a contract that it knows it is impossible to guarantee. For this reason, a bank charter is like a specialised permission to undergo a certain sort of fraud, or more kindly, to turn this specialised contract into something that isn't a fraud.

This arrangement is delicate. Change one word above and it is no longer banking (and in this statement you can find much of the ills of modern banking). Which leads us to securitization.

Securitization is the process of creating the at-term loans, with demand deposits, and then packaging them and selling them onto the bond market. A bond issue might collectively handle thousands of similar properties, and gets sold into the market maybe 100 days after the mortgages are sold.

Securitization breaks banking. It breaks banking because the loans are no longer at term, or they are, but they are no longer in the hands of the banks, they are on the market! So the investors in the bond market are lending at term to the house owners, and the magic link of banking has been broken.

Regulators say the financial companies that created the bonds had little incentive to ensure that the bonds were backed by reliable loans. When large portions of the borrowers began to default on the loans, the holders of the securities had big losses.

Right, exactly. As, in theory the banks no longer owned the bonds, having sold them on the market, they no longer had an incentive to manage the loans. And this is the implicit, unwritten corollary in the definition of banking: in order to get the charter, you have to look after the loans for their entire term. That's what it means, to be a bank, guard the deposited funds, out on loan, for their entire life!

The proposed rules, which would affect a large portion of new offerings in the $9.5 trillion market for securities backed by consumer loans, would in many cases require financial companies to retain 5 percent of each offering, a move that Ms. Schapiro said would “better align” the interests of investors and the securities firms.

Financial reform bills winding their way through Congress contain similar requirements that financial companies “keep skin in the game,” as the commission put it. So does a proposal by the Federal Deposit Insurance Corporation, which regulates some asset-backed securities originated by banks.

Skin in the game! Which the Python can only shed, as it outgrows model after model, leaving investors more and more confused. Models can only approximate risks of defaulting borrowers, and aren't a substitute for attentive bankers.

The big message to take away is this: Securitization breaks the fundamental law of banking. Is this good or bad? We should probably know this, because practically everything is done with securitization these days. And why not? It is decidedly more efficient, saving the occasional global meltdown.

The answer is, that securitization is decidedly good, but it renders banking no longer "special." This has a lot of ramifications: it means we no longer need banks. But we've got banks, so there is going to be a huge hangover period while society shifts from banking to market-oriented facilitation. And likely a few more crises.

It also means we don't need central banks; or at least partly, we don't need that part which regulates the banks, because standard competition and exchange regulators should be able to do the job. It's all consumer products called bonds, after all.

Yeah, sure, I hear you say, "we don't need banks..." chortle chortle. Admittedly the hangover from the century of central banking will be with us for a long time, and we can only move forward slowly. But watch: slowly but surely the move will be to open the market for loans origination.

Under the new rules, bond underwriters would not be required to receive a credit rating; rather, the chief executive of the bond issuer would have to certify that the assets were likely to produce the expected cash flows. ... Moody’s, in a statement, said, “We believe the market benefits when ratings agencies compete on the basis of the quality of their credit analysis, and we have long supported the removal of ratings from regulation.”

Baby step by baby step, the business of banking is moving over to the marketplace.

Posted by iang at 12:53 AM | Comments (6) | TrackBack

April 24, 2010

When the Python meets the Mongoose ... the SEC and programming Asset Backed Securities

Twan points to an odd thing from the Securities and Exchanges Commission in USA:

We are proposing to require that most ABS issuers file a computer program that gives effect to the flow of funds, or “waterfall,” provisions of the transaction. We are proposing that the computer program be filed on EDGAR in the form of downloadable source code in Python. … (page 205)

Under the proposed requirement, the filed source code, when downloaded and run by an investor, must provide the user with the ability to programmatically input the user’s own assumptions regarding the future performance and cash flows from the pool assets, including but not limited to assumptions about future interest rates, default rates, prepayment speeds, loss-given-default rates, and any other necessary assumptions … (page 210)

An ABS or asset backed security is a basically a financial instrument that has or "owns" a lump of property. In short, instead of owning the property yourself, you own a security (or instrument or contract) that has an interest in the property. At the simplest, trivial level of own house, one instrument, this is mostly meaningless, because the instrument owns the property so you may as well own it directly.

But it allows for more complexity. What they are talking about here is securitized home loans and the like, essentially the instruments that blew up in the recent financial crisis. In this case, your instrument has an interest in 1000 properties, but also this is the same interest that another 10,000 instruments have. So you don't own a house, or a tenth of a house, you own a share in the revenues of a combined 1000 houses.

What is that revenue? Well, it is probably the mortgage payments on the 1000 houses. Every month, the mortgage payments are collected, aggregated, fees taken, then the payments out are sent to the instrument holder.

So what the SEC is on about is complicated formulas. Also, they change. If 10 of the houses are delinquent this month, then 20 next month, the money changes. If interest rates go up, again it changes. If fees change, more change. Indeed, it's pretty clear that there is much more complexity and change than there is stability.

So the SEC is seeking to encourage the manager to show the formulas. In a computer program, so we can plug in the numbers, and investors can play around to isolate their preferred situations. On the surface it is a good idea. It gives the investor more power, and it sets up a key disclosure which can likely be challenged in the event of trouble. But it is unlikely to work as a mandated thing.

There are several things against this. Complexity is the enemy here. There are two ways of looking at it, as too complex, and as not complex enough. Initially, the models will be simple, but this will just set the scene for disputes, and the models will get more complex. And then more complex again because the hidden-by-complexity bug will strike -- managers will realise that if they make the models so complex that nobody can deal with them except real experts, then they'll be both compliant and impenetrable, and can get back to their normal games. If you look long enough at the financial crisis, you'll see that one important factor is complexity, and worse, deliberate complexity. This is an old game.

Further, there is a bit of a trap for young players here (as explained to me by Jim). The model will display the "flow of funds" which is in turn dictated by the instrument (the contract). Servicing and pooling provisions in the contract will mandate the manager's actions, and therefore the cash flow. So measuring & comparing the cash flow in this way tells us the manager is meeting targets, etc, *but it tells us nothing about the underlying collateral* which is the true asset in the picture. Recall, again, the financial crisis: meeting targets and bonuses was part of the problem, not the solution. These agreements are written to provide plenty of scope for this sort of trouble, and the SEC's invention runs the risk of making this worse, not better.

What's the solution? Well, the real health of the fund to which your instrument draws on is based on the collateral, and the revenues from it. That is, the real information you want is detailed income, not aggregated outgoings. So if the SEC were to want to make a difference, what it should do is mandate that the anonymised income transactions be made available (FCers will know what that means). That is, any time a house-owner makes a payment into the fund, that transaction be published to the fund investors. By tracking month to month the payments, and matching that to what the investors get, we have some data of value.

Would they do this? The SEC is not going to propose this, because of the complexity argument. The industry will not give up any of its treasured complexity, because that's how it makes money. If you could see what was going on, the prices would be beaten down.

But it could be done voluntarily. A private player could set this up; we have all the tech and understanding to do this. So what could the SEC do? Expand its proposal slightly, and create a format for a fund to reveal the anonymised flow of incomes from the collateral. And provide a program to deal with that. And see if anyone bites...

Meanwhile, two postcripts on spotted observations. One: a group of language specialists think the SEC are trying to give formal definition to the instrument; by means of Python. No, they're on the wrong track. Firstly, that isn't what the SEC is trying to do. Secondly, it won't work because bonds by their nature are contracts, and formal proofs of contracts are the domain of the courts, not compilers. Although this concept has been explored, real world bonds still have more to do with my Ricardian Contract form than esoterica like Nick Szabo's smart contracts.

Two: another group of developers are arguing whether Python is the right language. No need to comment :)

And Three, added from next post, maybe this is to happen:

The companies selling the bonds would also have to give the government extensive information, in a form that is easily searchable, on all of the individual loans that make up the portfolio behind the bond offering, and update it on a continuing basis. Previously, reports were required only on the overall credit quality of the pool of loans, and for some bonds, updates were suspended after about a year. .... Ms. Casey also expressed concerns about the impact of the rules on personal privacy, asking whether “data miners” might be able to use the information on individual loans to determine the identification of loan holders.

Spotted in NYT article.

Posted by iang at 09:15 AM | Comments (2) | TrackBack

March 15, 2010

Ernst & Young staring down the barrel that shot Arthur Andersen

The report on Lehman Brothers' collapse is out, and it apparently includes a smoking gun against the auditor. Prison Planet alleges that "The firm’s auditor, Ernst & Young, one of the four biggest auditing firms in the world, failed in its oversight role:"

In May 2008, a Lehman Senior Vice President, Matthew Lee, wrote a letter to management alleging accounting improprieties; in the course of investigating the allegations, Ernst & Young was advised by Lee on June 12, 2008 that Lehman used $50 billion of Repo 105 transactions to temporarily move assets off balance sheet and quarter end.The next day -- on June 13, 2008 -- Ernst & Young met with the Lehman Board Audit Committee but did not advise it about Lee’s assertions, despite an express direction from the Committee to advise on all allegations raised by Lee.

Ernst & Young took virtually no action to investigate the Repo 105 allegations. Ernst & Young took no steps to question or challenge the non-disclosure by Lehman of its use of $50 billion of temporary, off-balance sheet transactions.

Colorable claims exist that Ernst & Young did not meet professional standards, both in investigating Lee’s allegations and in connection with its audit and review of Lehman’s financial statements.

Now, I haven't read it in depth. But, on first blush, that looks directly analogous to the conditions that wiped out Arthur Andersen. (Agreement on Business Insider.)

The Audit industry will now feel the old Chinese curse: to live in interesting times...

Posted by iang at 09:25 PM | Comments (3) | TrackBack

December 29, 2009

pushback against the external auditor (if they can do it, so can you!)

Lynn in comments points to news that Mastercard has eased up on the PCI (association for credit card issuers) standard for merchant auditing:

But come Dec. 31, 2010, MasterCard planned to require that all Level 1 and, for the first time, Level 2 merchants, use a QSA for the annual on-site PCI assessment.

(Level 1 merchants are above 6 million transactions per year, with 352 merchants bringing in around 50% of all transactions in the USA. Level 2 merchants are from 1 to 6 million, 895 merchants and 13% of all merchants.)

Now, this rule would have cost your merchant hard money:

That policy generated many complaints from Level 2 merchants, who security experts say would have to pay anywhere from $100,000 to $1 million for a QSA’s services.

These Qualified Security Assessors (QSA) are certified by the PCI Security Standards Council for an on-site assessment, or audit. Because of kickback, complaints, etc, MasterCard backed down:

This month, however, MasterCard pushed back the deadline by six months, to June 30, 2011. And instead of requiring use of a QSA, MasterCard will let Level 2 merchants do the assessments themselves provided they have staff attend merchant-training courses offered by the PCI Council, and each year pass a PCI Council accreditation program. Level 2 merchants are free to use QSAs if they wish. Come June 30, 2011, Level 1 merchants can use an internal auditor provided the audit staff has PCI Council training and annual accreditation.

That's you, that is. Or close enough that it hurts. Your company, being a retail merchant bringing in say 100 million dollars a year over 1 million transactions, can now save itself some $100,000 to $1 million. You can do it with your own staff as long as they go on some courses.

If a merchant with millions to billions of direct value on the line, and measurable losses of say 1% of that (handwave and duck) can choose to self-audit, why can't you?

Posted by iang at 11:09 AM | Comments (1) | TrackBack

December 28, 2009

Audits VII: the future of the Audit is in your hands

I established in a series of posts that Audit is in a crisis (I, II, III, IV, V, VI). It didn't perform during the financial crisis, and even if it had, we wouldn't know it. Audit has entered a phase of life where it can not deliver its brand-promise to the buying public, but the cost of the brand is delivered frequently in invoices to us, the buying public. Worse, the cost will go up and the relevance will go down, the machine they built ensures it.

What then do we do in the future? How do we live in a world of Audits without Control? How do we reclaim the control that works to our real needs?

As a user, as a (systems not financial) auditor, as a builder of systems, both financial and Internet, as an investor, as a financial player and as a party reading and relying on audits, I've come across only one person that will provide for your auditing needs. That person is:

You.

In a maxim, it is this: if you the user cannot see it, it is worthless. To you.

It is not entirely true that Audit is worthless, per se, in absolute terms. Many checks and balances can help, and this is the spirit that the audit profession alludes to. These checks and balances are good; we call them governance. But the problem for you is, you can't tell from the outside whether these checks, this audit, are useful or useless. Whether they are coded positively or negatively, whether they are purchased or perverted.

And therefore, your only good strategy is to label an opaque process as useless.

Which leads to a first step: Let's call for an open audit process, not a closed audit process. We know that "open" works from the Internet world, and the claim of many is that "open" can work in many more scenarios than we believed. I emphasise this in a presentation on An Open Audit (which, to close the loop back to the first post of the Audit series, was immediately after Bruce Schneier's apropos talk on the psychology of security).

But, please note, openness is only a first and intermediate step: once we get across the brave step of opening up the entire process, we are inexorably drawn to the fact that if an audit is really open, then the user can do it, herself. An open audit is an audit over open data; if the data is open, she can also audit the data herself.

All of it, or most of it, as much as the user can handle. Which is to say, even my meager attempt at open audit is not going far enough; what you really want is to openly audit the entire system yourself. I as auditor might simply lay the guide posts for you to follow, and in future, you can follow them better than I can.

Say hello to open governance . Yes, this way means more work for the user. But, this is work we already proved we could do. The wider Internet musters thousands of communities of thousands and millions, and a few of those people -- call them the 1% -- are the self-appointed guardians of truth and justice within their communities. Open governance harnesses the vigilantes of Wall Street, the crypto-jihadists of the security world, the peer-to-peer rebels of the intellectual property world, all, as the leaders in a process of checking for everyone else.

What then is the part of the professional auditor? We already recognised over the past couple of years that the proper role of the security expert is to educate programmers and architects to employ more security techniques. Likewise, the proper role of the auditor may be to teach the mechanisms of open governance; rather than opine on their results themselves. To teach, rather than to measure. To lead, rather than to do. To participate, rather than bill.

How would this work? Well, here's one idea. I haven't implemented it, but I want to. Over at the audit I participated in, there is a set of criteria which have to be audited against. Some have green ticks, others have red crosses, signifying OK and not OK. Classical audit process would call for me to investigate all those criteria, find evidence of controls over the criteria, and report on each. That's a lot of work. A lot of billable hours.

Open governance would call for each individual of the body-public to do that instead; in tech terms, each criteria would become a blog post, with comments added by the public, including comments of reliance. In effect, mini-opinions. If you the member-public post that the criteria is good and covered, and you put your monika on to that statement (which is easy to do because it is a CA and client-certs are its business), then that becomes reliable evidence. Once the set of criteria meets some watermark (say 95% green ticks), the audit is done.

By you.

That's just one idea. I know a dozen or so others; but their essence is all the same. Instead of having one person look and attest, have our entire net community look, and share notes. Travelling long distances, checking technical things and making clear reports is now trivial with the net, with cryptography, with protocols, with communities. We no longer need the single trusted third party to do this, we have the trusted members, we have our own stakeholders, we have customers.

It may be that the evolution of open governance, an invention from the world of digital cash, has come just in time to save us. We'll see.

Posted by iang at 11:30 PM | Comments (6) | TrackBack

December 09, 2009

Bowles case is more evidence: Britain takes another step to a hollowed-out state

In the very sad story of the Justice System as we know it, a British courts has ruled the beginning of the end.

He went to jail this week, protesting his innocence. Speaking to The Times, he said: "There are no missing millions, there's no villa in the Virgin Islands, there has been no fraud. I am not allowed to earn any money, my assets were restrained so I couldn't use them to defend myself - it's a relentless, never-ending, vicious, cruel and wicked system.

Of course, all mobsters say that. So what was the crime?

Bowles was convicted by a jury in June of cheating the Revenue of £1.2 million in VAT but sentencing had been adjourned on three previous occasions. He had been found guilty of failing to pay VAT on a BIG land sale and diverting money due to the taxman to prop up Airfreight Express, his ailing air-freight company.

Now we have come full circle, and the evidence is presented: the Anti-money-laundering project of the OECD (known as the Financial Action Task Force, a Paris-based body) is basically and fundamentally inspired by the desire to raise tax. Hence, we will see a steady progression of government-revenue cases, occasionally interspersed with Mr Big cases. This is exactly what the OECD wanted. Not the mobsters, murderers, drug barons and terrorists pick up, but:

Bowles is a divorced, middle-aged company director from Maidenhead who has been transformed from successful entrepreneur to convicted fraudster.

A businessman, from the very heartland of English countryside. Not a dangerous criminal at all, but someone doing business. Not "them" but us. POCA or Proceeds of Crime Act is now an important revenue-raising tool:

It was not suggested that Bowles, who has no criminal record, had used the money to fund a luxury lifestyle. Nevertheless, when the Revenue began a criminal investigation into his affairs in 2006 all his assets were frozen under the powers of the Proceeds of Crime Act.

Bowles was required to live on an allowance and rely on legal aid for his defence rather than pay out of his own resources. Defence lawyers claimed that preparation of Bowles's defence case was hampered further because his companies' financial records were in the hands of administrators.

The accounts were not disclosed until a court hearing in February this year, at which point Bowles sought permission to have a forensic accountant examine them to determine the VAT position. He was refused a relaxation of the restraint order to pay for a forensic accountants' report. The Legal Services Commission also declined to fund such a report from legal aid.

After the court was told that the records "could be considered by counsel with a calculator" the trial went ahead. Bowles was cleared of two charges but found guilty of a third.

It works this way. First the money is identified. Then, the crime is constructed, the assets are frozen, legal-aid is denied, and the businessman goes to jail. By the time he gets out of that, he probably cannot mount a defence anyway, and rights are just so much confetti. This stripping of rights is a well-known technique in law, as only 1 in 100 can then mount a recovery of rights action, it is often done when the job of the prosecutor is more important than rights.

Let's be realistic here and assume that Bowles was guilty of tax fraud. His local paper certainly thinks he was guilty:

A tax cheat from Maidenhead who dodged paying £1.3m in VAT has been jailed for three-and-a-half years. ... The court heard between October 2001 and July 2006 Bowles failed to submit VAT returns to HM Customs and Excise (HMCE) and then HM Revenue & Customs (HMRC). The VAT related to the sale of land for commercial development in Cardiff worth £7.5m.

Following an HMRC criminal investigation Bowles, from Sandisplatt Road, was charged on three counts of 'cheating the revenue'. Peter Avery, assistant director, HMRC Criminal Investigations, said: "This sentence will serve as a deterrent to anyone who thinks that tax fraud is a risk worth taking."

Firstly, this is quite common, and secondly, tax is the most complicated thing in existence, so complicated that most ordinary lawyers don't recognise it as law by principle. It's the tax code, it's special. It's actually very hard not to be guilty of it, when you have a fair-sized business (whoever heard of a value-added-tax on a land sale?)

But even assuming that the guy was guilty, there was rather stunning evidence to the contrary, which underscores the point that this was revenue raising, not the bringing down of a Mr Big:

A financial report has since been prepared, free of charge, by a firm of chartered accountants. A draft copy was presented to the judge two months ago and a full version handed to him this week. Its analysis concludes that rather than owing tax, Bowles's companies had actually overpaid their taxes.

The report stated: "In our opinion, none of the evidence points to Philip Bowles fraudulently evading or concealing VAT due to HMRC ... It would have been reasonable to conclude that no fraud has taken place."

Lawyers for Bowles claimed in court that matters were compounded by a failure to explain VAT law properly. They alleged the jury were wrongly informed that companies in the same group could not assign tax liabilities and credits between each other.

When a firm of *chartered accountants* utters _an opinion_ over finances, this is a legally imposing evidence. It is given a special status in court, in that the court may rely on it, and so might all others; this special status is awarded for the purposes of public companies that need to impress others such as creditors and shareholders that the company is sound. This form of reliance is not available outside the accounting profession, and only available in an accounting context (e.g., when a firm of accountants audits a certification authority, we do not get a special right to rely on it without further ado).

When a firm of chartered accountants does this for free, this is beyond surprising, this is a shock. The natural order of things is now upset. When the accountants are working for free, this might mean that the professions are mounting a last-ditch effort to preserve the Justice System in Britain, as I predicted:

It took 20 years to hollow out Mexico, we have a bit longer in other countries, because the institutions are staffed by stiffer, better educated people.

Those stiffer, better educated institutions realise that we all are poorer when the justice system is used to raise revenue. Or perhaps they realise their turn is next?

Posted by iang at 08:26 AM | Comments (1) | TrackBack

October 25, 2009

Audits VI: the wheel spins. Until?

We've established that Audit isn't doing it for us (I, II, III). And that it had its material part to play in the financial crisis (IV). Or its material non-part (II). I think I've also had a fair shot at explaining why this happened (V).

I left off last time asking why the audit industry didn't move to correct these things, and especially why it didn't fight Sarbanes-Oxley as being more work for little reward? In posts that came afterwards, thanks to Todd Boyle, it is now clear that the audit industry will not stand in front of anything that allows its own house to grow. The Audit Industry is an insatiable growth machine, and this is its priority. No bad thing if you are an Auditor.

Which leaves us with curious question: What then stops the Audit from growing without bound? What force exists to counterbalance the natural tendency of the auditor to increase the complexity, and increase the bills? Can we do SOX-1, SOX-2, SOX-3 and each time increase the cost?

Those engineers and others familiar with "systems theory" among us will be thinking in terms of feedback: all sustainable systems have positive feedback loops which encourage their growth, and negative feedback loops which stop their growth exploding out of control. In earlier posts, we identify the positive feedback loop of the insider interest. The question would then be (for the engineers) what is the negative feedback control?

Wikipedia helpfully suggests that Audit is a feedback control over organisations, but where is the feedback control over Audit? Even accepting the controversial claim that Sarbanes-Oxley delivered better reliability and quality in audits, we do know there must be a point where that quality is too expensive to pay for. So there must be a limit, and we must know when to stop paying.

And now the audit penny drops: There is no counterbalancing force!

We already established that the outside world has no view into the audit. Our chartered outsider has taken the keys to the citadel and now owns the most inner sanctums. The insider operates to standard incentives which is to improve own position at the expense of the outsider; the Auditor is now the insider. Which leads to a compelling desire to increase size, complexity and fees of Audit.

Yet the machine of audit growth has no brake. So it has no way to stop it moving from a useful position of valuable service to society to an excessive position of unsustainable drain on the public welfare. There is nothing to stop audit consuming the host it parasites off, nor is there anything that keeps even the old part of the Audit on the straight and narrow.

And this is more or less what has happened. That which was useful 30 years ago -- the opinion of financial statements, useful to educated investors -- has migrated well beyond that position into consuming the very core of the body corporate. IT security audits, industry compliance audits, quality audits, consulting engagements, market projects, manufacturing advice, and the rest of it now consume far more of their proper share.

Many others will point at other effects. But I believe this is at the core of it: the auditor promises a result for outsiders, has taken the insiders' keys and crafted a role of great personal benefit, without any external control. So it follows that it must grow, and it must drift off any useful agenda. And so it has, as we see from the financial crisis.

Which leads to a rather depressing conclusion: Audit cannot regulate itself. And we can't look to the government to deal with it, because that was part & parcel of our famous financial crisis. Indeed, the agencies have their hands full right now making the financial crisis worse, we hardly want to ask them to fix this mess. Today's evidence of agency complicity is only just more added to a mountain of depression.

What's left?

Posted by iang at 08:46 PM | Comments (2) | TrackBack

October 15, 2009

taking phishing to the next level

Phishing has come a long way. It is now no longer characterised by its email lure to get you to click on a different website. The phishers have moved on from the basic MITM that cracked secure browsing ... and are now concentrating on takeover of the machine. MITB, and the email is one of their weaker hooks.

Defences have also moved on, too. In some places they relied on two-factor auth, and in others a series of barriers. One common barrier was to make transactions to the country easy, and outside hard, on the basis that all phishers come from another country.

Phishers responded by employing Mules, being people who are in the country, and are well-paid to just re-transmit the money. People, it turns out, can easily send the money abroad, but trojans or MITBs couldn't.

But a problem with Mules is that they are slow. They might take a day or two to get around to it, because they are busy people. And in that time, the victim often spotted the fraudulent transaction ... and complained to the Mule! At which point the latter often realised he had been duped, was not part of the new International trading world, but was instead an essential cog in an international conspiracy to launder money etc et al ad nauseum.

Now phishers have gone to the next step:

New malware being used by cybercrooks does more than let hackers loot a bank account; it hides evidence of a victim’s dwindling balance by rewriting online bank statements on the fly, according to a new report.

The sophisticated hack uses a Trojan horse program installed on the victim’s machine that alters html coding before it’s displayed in the user’s browser, to either erase evidence of a money transfer transaction entirely from a bank statement, or alter the amount of money transfers and balances.

The ruse buys the crooks time before a victim discovers the fraud, though won’t work if a victim uses an uninfected machine to check his or her bank balance.

The novel technique was employed in August by a gang who targeted customers of leading German banks and stole Euro 300,000 in three weeks, according to Yuval Ben-Itzhak, chief technology officer of computer security firm Finjan

This is the man in the middle, par exellence. Not only does Mallory steal the information and use it, he rewrites the evidence to hide the crime. Note, this was back in August. More claimed facts, ftr, and also and here:

The researchers also found statistics in the command tool showing that out of 90,000 visitors to the gang’s rogue and compromised websites, 6,400 were infected with the URLZone trojan. Most of the attacks Finjan observed affected people using Internet Explorer browsers, but Ben-Itzhak says other browsers are vulnerable too.

Which juxtaposes with a question that Stephen asked me a few days ago: how can we presume that the system is operating correctly? He was asking this hypothetical from the legal tradition, where it is common for banks to assert the presumption. In the above case, it is quite interesting, because from both points of view, the evidence is clear: correct operation.

The user sees the correct balances and transactions. The bank sees the correct authentication procedures. But we have a case here were neither side is correct, and the system is not operating correctly.

Why is this a problem? Because security commerce has it that a security system is secure. It has to be completely secure, otherwise it is impossible to sell. Nobody buys a partly-secure system, they want the fully-secured model. So what tends to happen is a form of society-wide cognitive dissonance where we sell the partly-secured as fully-secured. Hence, by the time the banks get around to being the defendents in some case against their "fully-secured" system, they are compelling in their belief that it is secure. The presumption that it operates correctly is part of that cognitive dissonance.

Which reminds us of a German case where the presumption that DES was secure was knocked out, because there were things like DeepCrack out there. The role of the courts in breaking this dissonance is important; I can't recall the case precisely, but here is another case from German courts, this time over the famous Sony rootkit:

According to Germany’s Heise, a district court has just ruled in a case where an individual claimed that the presence of the Sony rootkit caused him financial losses.

After purchasing an Anastacia CD, the plaintiff played it in his computer but his anti-virus software set off an alert saying the disc was infected with a rootkit. He went on to test the CD on three other computers. As a result, the plaintiff ended up losing valuable data.

Claiming for his losses, the plaintiff demanded 200 euros for 20 hours wasted dealing with the virus alerts and another 100 euros for 10 hours spent restoring lost data. Since the plaintiff was self-employed, he also claimed for loss of profits and in addition claimed 800 euros which he paid to a computer expert to repair his network after the infection. Added to this was 185 euros in legal costs making a total claim of around 1,500 euros.

The judge’s assessment was that the CD sold to the plaintiff was faulty, since he should be able to expect that the CD could play on his system without interfering with it. The court ordered the retailer of the CD to pay damages of 1,200 euros.

Which strangely echoes this case:

Between April 2007 and January 2008, visitors to the Kmart and Sears web sites were invited to join an "online community" for which they would be paid $10 with the idea they would be helping the company learn more about their customers. It turned out they learned a lot more than participants realized or that the feds thought was reasonable.

To join the "My SHC Community," users downloaded software that ended up grabbing some members' prescription information, emails, bank account data and purchases on other sites. Sears called the group that participated "small" and said the data captured by the program was at all times secure and was then destroyed.

The FTC filed a complaint against Sears, accusing the retailer of deceiving those who signed up for the service and downloaded the software.

"(Sears) failed to disclose adequately that the software application, when installed, would: monitor nearly all of the Internet behavior that occurs on consumers' computers, including information exchanged between consumers and websites other than those owned, operated, or affiliated with respondent, information provided in secure sessions when interacting with third-party websites, shopping carts, and online accounts, and headers of web-based email; track certain non-Internet related activities taking place on those computers; and transmit nearly all of the monitored information (excluding selected categories of filtered information) to respondent's remote computer servers," the FTC concluded.

Which all seems to lead to a rather heavy presumption of rightness in favour of the larger party. Sony was safe in installing rootkits, and only got slapped for the direct costs that this unexpected behaviour caused. Sears was safe for the same practice, except it got a tap on the wrist for not disclosing it fully.

Which leads to class action. The obvious asymmetry here is that the large parties (allegedly) did a lot of small damages to many parties. Yet, in each case, they do not get more than a light tap, for various reasons. So the message is clear: if there is profit, take on that risk, because the downside is small.

Which leads me to an old observation I made many times in the original phishing days: the issue of fundamental liability allocation will only be sorted out when class action suits redress the imbalance in power (to avoid adverse judgement).

This solution of course is only applicable in the USA where class-action is popular. And it probably doesn't apply to continental banking where the banks tend to take more care and absorb more of the liabilities directly (hence their losses are much lower). Which is bad news for UK, Australia, Canada, where the banking models tend to follow liability-dumping models, but don't have the ultimate backstop of the class-action suit.

Closing remark: all of these articles were spotted in Bruce Schneier's cryptogram, and all seemed to resonate. There is one hilarious thread about the DHS in USA deciding to "employ 1000 cyber-security experts." Frequent readers of this blog will see the error at multiple levels. But Bob Cringley took the claim at face value and did some research. He asked 6 people who he thought were experts, and this one was the closest:

“Define ‘expert,’ said another friend from behind Door Number Three, who comes from the security software business. “(An expert is) a person with a high degree of skill in or knowledge of a certain subject. Great, but the question is all about scope. I may be an expert cook – but can I run a kitchen? Same thing with security there are tons of experts – in specific areas. I was an expert in AV, IDS, and other areas. But I was not the all knowing security guru. (even though my knowledge base was very broad). This is where we run into unintended actuated consequences. An expert will make a choice and take an action. The end result may not be what they had anticipated because of other factors beyond the realm of their expertise caused an unanticipated consequence.

Which is to say, the word expert simply doesn't work for us. The field is too big so you are either a generalist like myself (and make frequent detailed mistakes, but hopefully survive in the big picture) or you are a deep specialist who gets the detail correct, but ends up on the wrong mapboard.

But this guy also hit the nail on the head:

So this is the wrong approach entirely. It won’t work, the DHS probably knows it won’t work (if they don’t know that, well God help us all) but they see it as better than nothing. That doesn’t worry me so much, though. What really worries me is the point brought up by cybersecurity expert number six, who himself came in from the cold:

“Sure there are 1,000 (cybersecurity experts),” he said, ” but they are already employed… as hackers.”

And, looking at our "presumption of security" question in the big picture, we can understand why. Because of liability dumping, your country's banks are cooperating with the world's 1000 cybersecurity experts. Who's engaged in a criminal conspiracy now?

Posted by iang at 09:28 AM | Comments (1) | TrackBack

September 18, 2009

Where does the accounting profession want to go, today?

So, if they are not doing audits and accounting, where does the accounting profession want to go? Perhaps unwittingly, TOdd provided the answer with that reference to the book Accounting Education: Charting the Course through a Perilous Future by W. Steve Albrecht and Robert J. Sack.

It seems that Messrs Albrecht and Sack, the authors of that book, took the question of the future of Accounting seriously:

Sales experts long ago concluded that "word of mouth" and "personal testimonials" are the best types of advertising. The Taylor Group1 found this to be true when they asked high school and college students what they intended to study in college. Their study found that students were more likely to major in accounting if they knew someone, such as a friend or relative, who was an accountant.

So they tested it by asking a slightly more revealing question of the accounting professionals:

When asked "If you could prepare for your professional career by starting college over again today, which of the following would you be most likely to do?" the responses were as follows:
Type of Degree % of Educators Who Would % of Practitioners Who Would

Who Would Earn a bachelor's degree in something other than accounting and then stop 0.0 7.8
Earn a bachelor's degree in accounting, then stop 4.3 6.4
Earn a Master's of Business Administration (M.B.A.) degree 37.7 36.4
Earn a Master's of Accountancy degree 31.5 5.9
Earn a Master's of Information Systems degree 17.9 21.3
Earn a master's degree in something else 5.4 6.4
Earn a Ph.D. 1.6 4.4
Earn a J.D. (law degree) 1.6 11.4

These results are frightening,...

Well indeed! As they say:

It is telling that six times as many practicing accountants would get an M.B.A. as would an M.Acc., over three times as many practitioners would get a Master's of Information Systems degree as would get an M.Acc., and nearly twice as many practitioners would get a law degree instead of an M.Acc. Together, only 12.3 percent (6.4% + 5.9%) of practitioners would get either an undergraduate or graduate degree in accounting.2 This decrease in the perceived value of accounting degrees by practitioners is captured in the following quotes:
We asked a financial executive what advice he would give to a student who wanted to emulate his career. We asked him if he would recommend a M.Acc. degree. He said, "No, I think it had better be broad. Students should be studying other courses and not just taking as many accounting courses as possible. ...

My job right now is no longer putting numbers together. I do more analysis. My finance skills and my M.B.A. come into play a lot more than my CPA skills.

.... we are creating a new course of study that will combine accounting and
information technology into one unique major....

...I want to learn about information systems.


(Of course I'm snipping out the relevant parts for speed, you should read the whole lot.) Now, we could of course be skeptical because we know computing is the big thing, it's the first addition to the old list of Reading, Arithmetic and Writing since the dark ages. Saying that Computing is core is cliche these days. But the above message goes further, it's almost saying that Accountants are better off not doing accounting!

The Accounting profession of course can be relied upon to market their profession. Or can they? Todd was on point when he mentioned the value chain, the image in yesterday's post. Let's look at the wider context of the pretty picture:

Robert Elliott, KPMG partner and current chairman of the AICPA, speaks often about the value that accountants can and should provide. He identifies five stages of the "value chain" of information. The first stage is recording business events. The second stage is summarizing recorded events into usable data. The third stage is manipulating the data to provide useful information. The fourth stage is converting the information to knowledge that is helpful to decision makers. The fifth and final stage is using the knowledge to make value-added decisions. He uses the following diagram to illustrate this value chain:

This five-stage breakdown is a helpful analysis of the information process. However, the frightening part of Mr. Elliott's analysis is his judgment as to what the segments of the value chain are worth in today's world. Because of the impact of technology, he believes that:

  • Stage 1 activity is now worth no more than $10 per hour
  • Stage 2 activity is now worth no more than $30 per hour
  • Stage 3 activity is now worth $100 per hour
  • Stage 4 activity is now worth $300 per hour
  • Stage 5 activity is now worth $1,000 per hour

In discussing this value chain, Mr. Elliott urges the practice community to focus on upper-end services, and he urges us to prepare our students so they aim toward that goal as well. Historically, accounting education has prepared students to perform stage 1- and stage 2-type work.

Boom! This is compelling evidence. It might not mean that the profession has abandoned accounting completely. But it does mean that whatever they do, they simply don't care about it. Accounting, and its cousin Audits are loss-leaders for the other stuff, and eyes are firmly fixed on other, higher things. We might call the other stuff Consulting, and we might wonder at the correlation: consulting activities have consumed the major audit firms. There are no major audit firms any more, there are major consulting firms, some of which seem to sport a vestigial audit capability.

Robert Elliot's message is, more or less, that the audit's fundamental purpose in life is to urge accountancy firms into higher stages. It therefore matters not what the quality (high?) is, nor what the original purpose is (delivering a report for reliance by the external stakeholder?). We might argue for example whether audit is Stage 2 or Stage 3. But we know that the auditor doesn't express his opinion to the company, directly, and knowledge is the essence of the value chain. By the rules, he maintains independence, his opinion is reserved for outsiders. So audit is limited to Stages 3 and below, by its definition.

Can you see a "stage 4,5 sales opportunity" here?

Or perhaps more on point, can you avoid it?

It is now very clear where the auditors are. They're not "on audit" but somewhere higher. Consulting. MBA territory. Stage 5, please! The question is not where the accounting profession wants to go today, because they already got there, yesterday. The financial crisis thesis is confirmed. Audits are very much part of our problem, even if they are the accounting profession's solution.

What is less clear is where are we, the business world? The clients, the users, the reliers of audit product? And perhaps the question for us really is, what are we going to do about it?

Posted by iang at 09:13 AM | Comments (3) | TrackBack

September 17, 2009

TOdd on Audits V: why oh why?

Editor's note: TOdd wrote this long comment to Audits V and I thought it had to be a post:


Regarding the failure of financial auditing, or statutory audits, there is probably a body of knowledge to be found in academia and business journals. There is certainly a lot of wisdom and knowledge among the accounting profession, although it is heavily suppressed, and auditors, like bankers, start out opaque and unself-aware. All three of these things grow deeper over lifelong habit (lack of honest self appraisal, lack of communication skills to talk about their business in anything but literal terms, and lack of any motive or impulse to be honest or candid even if they wanted to.) So, you'll find the best research on this problem in the business schools and press, for whom auditors are a business problem to be understood, and in the accountancy schools who still harbor a lot of great minds, with too much integrity to survive in the global audit firms. The audit profession took root in the 1930s and I would have to guess that it was captured from day one, by the publicly listed companies they were supposed to be auditing.

Accountants have had the choice to improve themselves at several historic points in time; the 1929 crash, the end of WW2, when every other economy was demolished, and the end of the Soviet threat. What they've actually done was continue fiddling with their false definitions of economic substance, called GAAP, which is really intended to modulate the lies and maintain as much opaqueness as the public would tolerate.

The greatest opportunity to improve business reporting, if that were the intention, has come from improvements in database, computing, and the internet. Internally of course, companies have built information tools to navigate and understand their customers, suppliers, financial structures and inner working. All of it conceived, developed and maintained for the benefit of senior executives. The host-centric, server-centric architecture of the dominant computing architectures (ibm, att, dec, sun, microsoft etc) reflect this.

There is nothing that reveals the intent and will of the AICPA more clearly than its design choices in XBRL. And I doubt if anybody will ever write the book about XBRL, since the people who realized what a betrayal it was, while it was being cooked up, were physically nauseated and left the standards bodies, myself included. Outside the meeting room and convention halls, there were more than a few people who saw what was happening-- and why would they pay annual dues of $thousands, plus travel costs, to attend the next XBRL conference, unless they were part of the corrupt agenda themselves?

I am reminded of the State of Washington democratic party convention I attended a few years ago-- more than 2/3s of the 1000 delegates from the precincts, statewide had never been to a convention before. And, by the end of the convention, a percentage even larger than that, was in open rebellion against the selection of candidates and railroading of the platform and agenda, by top party officials. So, 2/3s of them would never bother participating in the Democratic Party in the next election cycle either.

The people responsible for the sabotage and corruption of the AICPA's XBRL and other technologies, are Barry Melancon, working on behalf of opaque interests in the audit firms and wall street, and, the young turks they hired, Charlie Hoffman and Eric Cohen. Hoffman bubbled up in the Seattle area as an evangelist for microsoft technologies in accounting firms and probably never understood where the money and support for his magic carpet ride was coming from. Microsoft itself being a front-end for IBM and wall street. There have been a few, who try from time to time, to make these technologies honest, such as David RR Weber, Glen Gray, Bill McCarthy...

A more hopeful technology, ebXML emerged shortly after XBRL, and again the history is so vast, somebody should write a book---indeed would write a book-- if they had the stomach for it. Now, here, we ran into a different set of entrenched interests, the EDI industry and adjacent companies and interests. It was a fabulous project, with at least ten different workgroups, each with a lot of dedicated people, supported by many great companies.

To sum it all up-- there are people who want to use the power of computers and communications to reach process improvements, labor savings, AND transparency for all stakeholders. These people have developed over many years, a very complete understanding of business processes in their industries and somewhat less completely, a generalized architecture for all economic transactions. However, there are a plutocracy who own all their companies and make all of the hiring and firing decisions. Obviously, these people at the very top, have leaned hard on the tiller, since the early days.

And the accounting and auditing profession knows where its bread is buttered, see Bob Elliot's diagram of "five stage value chain."


Iang responds in the next post.

Posted by iang at 07:43 PM | Comments (0) | TrackBack

September 14, 2009

OSS on how to run a business

After a rather disastrous meeting a few days ago, I finally found the time to load up:

OSS's Simple Sabotage Field Manual

The Office of Strategic Services was the USA dirty tricks brigade of WWII, which later became the CIA. Their field manual was declassified and published, and, lo and behold, it includes some mighty fine advice. This manual was noticed to the world by the guy who presented the story of the CIA's "open intel" wiki, he thought it relevant I guess.

Sections 11, 12 are most important to us, the rest concentrating on the physical spectrum of blowing up stuff. Onwards:

(11) General Interference with Organizations and Production


(a) Organizations and Conferences

(1) Insist on doing everything through "channels." Never permit short-cuts to be taken in order to, expedite decisions.

(2) Make "speeches." Talk as frequently as possible and at great length. Illustrate your "points" by long anecdotes and accounts of personal experiences. Never hesitate to make a few appropriate "patriotic" comments.

(3) When possible, refer all matters to committees, for "further study and consideration." Attempt to make the committees as large as possible - never less than five.

(4) Bring up irrelevant issues as frequently as possible.

(5) Haggle over precise wordings of communications, minutes, resolutions.

(6) Refer back to matters decided upon at the last meeting and attempt to reopen the question of the advisability of that decision.

(7) Advocate "caution." Be "reasonable" and urge your fellow-conferees to be "reasonable" and avoid haste which might result in embarrassments or difficulties later on.


(8) Be worried about the propriety of any decision -raise the question of whether such action as is contemplated lies within the jurisdiction of the group or whether it might conflict with the policy of some higher echelon.


Read the full sections 11,12 and for reference, also the entire manual. As some have suggested, it reads like a modern management manual, perhaps proving that people don't change over time!

Posted by iang at 09:42 PM | Comments (1) | TrackBack

Audits V: Why did this happen to us ;-(

To summarise previous posts, what do we know? We know so far that the hallowed financial Audit doesn't seem to pick up impending financial disaster, on either a micro-level like Madoff (I) or a macro-level like the financial crisis (II). We also know we don't know anything about it (III), trying harder didn't work (II), and in all probability the problem with Audit is systemic (IV). That is, likely all of them, the system of Audits, not any particular one. The financial crisis tells us that.

Notwithstanding its great brand, Audit does not deliver. How could this happen? Why did our glowing vision of Audit turn out to be our worst nightmare? Global financial collapse, trillions lost, entire economies wallowing in the mud and slime of bankruptcy shame?

Let me establish the answer to this by means of several claims.

First, complexity . Consider what audit firm Ernst & Young told us a while back:

The economic crisis has exposed inherent weaknesses in the risk management practices of banks, but few have a well-defined vision of how to tackle the problems, according to a study by Ernst & Young.

Of 48 senior executives from 36 major banks around the world questioned by Ernst & Young, just 14% say they have a consolidated view of risk across their organisation. Organisational silos, decentralisation of resources and decision-making, inadequate forecasting, and lack of transparent reporting were all cited as major barriers to effective enterprise-wide risk management.

The point highlighted above is this: This situation is complex! In essence, the process is too complex for anyone to appreciate from the outside. I don't think this point is so controversial, but the next are.

My second claim is that in any situation, stakeholders work to improve their own position . To see this, think about the stakeholders you work with. Examine every decision that they take. In general, every decision that reduces the benefit to them will be fiercely resisted, and any decision that increases the benefit to them will be fiercely supported. Consider what competing audit firm KPMG says:

A new study put out by KPMG, an audit, tax and advisory firm said that pressure to do "whatever it takes" to achieve business goals continues as the primary driver behind corporate fraud and misconduct.

Of more than 5,000 U.S. workers polled this summer, 74 percent said they had personally observed misconduct within their organizations during the prior 12 months, unchanged from the level reported by KPMG survey respondents in 2005. Roughly half (46 percent) of respondents reported that what they observed "could cause a significant loss of public trust if discovered," a figure that rises to 60 percent among employees working in the banking and finance industry.

This is human nature, right? It happens, and it happens more than we like to admit. I suggest it is the core and prime influence, and won't bother to argue it further, although if you are unsatisfied at this claim, I suggest you read Lewis on The End (warning it's long).

As we are dealing with complexity, even insiders will not find it easy to identify the nominal, original benefit to end-users. And, if the insiders can't identify the benefit, they can't put it above their own benefit. Claims one and two, added together, give us claim three: over time, all the benefit will be transferred from the end-users to the insiders . Inevitably. And, it is done naturally, subconciously and legally.

What does this mean to Audits? Well, Auditors cannot change this situation. If anything, they might make it worse. Consider these issues:

  • the Auditor is retained by the company,
  • to investigate a company secret,
  • the examination, the notes, the results and concerns are all secret,
  • the process and the learning of audit work is surrounded by mystique and control in classical guild fashion,
  • the Auditor bills-per-hour,
  • the Auditor knows what the problems are,
  • and has integral consulting resources attached,
  • who can be introduced to solve the problems,
  • and bill-per-hour.

As against all that complexity and all that secrecy, there is a single Auditor, delivering a single report. To you. A rather single very small report, as against a rather frequent and in sum, huge series of bills.

So in all this complexity, although the Audit might suggest that they can reduce the complexity by means of compressing it all into one single "opinion", the complexity actually works to the ultimate benefit of the Auditor. Not to your benefit. It is to the Auditor's advantage to increase the complexity, and because it is all secret and you don't understand it anyway, any negative benefit to you is not observable. Given our second claim, this is indeed what they do.

Say hello to SOX, a doubling of the complexity, and a doubling of your auditor's invoice.

Say thank you, Congressmen Sarbanes and Oxley, and we hope your pension survives!

Claim Number 4: The Auditor has become the insider. Although he is the one you perceive to be an outsider, protecting your interests, in reality, the Auditor is only a nominal, pretend outsider. He is in reality a stakeholder who was given the keys to become an insider a long time ago. Is there any surprise that, with the passage of time, the profession has moved to secure its role? As stakeholder? As insider? To secure the benefit to itself?

Over time, the noble profession of Auditing has moved against your interests. Once, it was a mighty independent observer, a white knight riding forth to save your honour, your interest, your very patrimony. Audits were penetrating and meticulous!

Now, the auditor is just another incumbent stakeholder, another mercenary for hire. Test this: did any audit firm fight the rise of Sarbanes-Oxley as being unnecessary, overly costly and not delivering value for money to clients? Does any audit firm promote a product that halves the price? Halves the complexity? Has any audit firm investigated the relationship between the failed banks and the failed audits over those banks? Did any audit firm suggest that reserves weren't up to a downturn? Has any audit firm complained that mark-to-market depends on a market? Did any auditor insist on stress testing? Has ... oh never mind.

I'm honestly interested in this question. If you know the answer: posted it in comments! With luck, we can change the flow of this entire research, which awaits ... the NEXT post.

Posted by iang at 03:42 PM | Comments (3) | TrackBack

July 15, 2009

trouble in PKI land

The CA and PKI business is busy this week. CAcert, a community Certification Authority, has a special general meeting to resolve the trauma of the collapse of their audit process. Depending on who you ask, my resignation as auditor was either the symptom or the cause.

In my opinion, the process wasn't working, so now I'm switching to the other side of the tracks. I'll work to get the audit done from the inside. Whether it will be faster or easier this way is difficult to say, we only get to run the experiment once.

Meanwhile, Mike Zusman and Alex Sotirov are claiming to have breached the EV green bar thing used by some higher end websites. No details available yet, it's the normal tease before a BlabHat style presentation by academics. Rumour has it that they've exploited weaknesses in the browsers. Some details emerging:

With control of the DNS for the access point, the attackers can establish their machines as men-in-the-middle, monitoring what victims logged into the access point are up to. They can let victims connect to EV SSL sites - turning the address bars green. Subsequently, they can redirect the connection to a DV SSL sessions under a certificates they have gotten illicitly, but the browser will still show the green bar.

Ah that old chestnut: if you slice your site down the middle and do security on the left and no or lesser security on the right, guess where the attacker comes in? Not the left or the right, but up the middle, between the two. He exploits the gap. Which is why elsewhere, we say "there is only one mode and it is secure."

Aside from that, this is an interesting data point. It might be considered that this is proof that the process is working (following the GP theory), or it might be proof that the process is broken (following the sleeping-dogs-lie model of security).

Although EV represents a good documentation of what the USA/Canada region (not Europe) would subscribe as "best practices," it fails in some disappointing ways. And in some ways it has made matters worse. Here's one: because the closed proprietary group CA/B Forum didn't really agree to fix the real problems, those real problems are still there. As Extended Validation has held itself up as a sort of gold standard, this means that attackers now have something fun to focus on. We all knew that SSL was sort of facade-ware in the real security game, and didn't bother to mention it. But now that the bigger CAs have bought into the marketing campaign, they'll get a steady stream of attention from academics and press.

I would guess less so from real attackers, because there are easier pickings elsewhere, but maybe I'm wrong:

"From May to June 2009 the total number of fraudulent website URLs using VeriSign SSL certificates represented 26% of all SSL certificate attacks, while the previous six months presented only a single occurrence," Raza wrote on the Symantec Security blogs.

... MarkMonitor found more than 7,300 domains exploited four top U.S. and international bank brands with 16% of them registered since September 2008.
.... But in the latest spate of phishing attempts, the SSL certificates were legitimate because "they matched the URL of the fake pages that were mimicking the target brands," Raza wrote.

VeriSign Inc., which sells SSL certificates, points out that SSL certificate fraud currently represents a tiny percentage of overall phishing attacks. Only two domains, and two VeriSign certificates were compromised in the attacks identified by Symantec, which targeted seven different brands.

"This activity falls well within the normal variability you would see on a very infrequent occurrence," said Tim Callan, a product marketing executive for VeriSign's SSL business unit. "If these were the results of a coin flip, with heads yielding 1 and tails yielding 0, we wouldn't be surprised to see this sequence at all, and certainly wouldn't conclude that there's any upward trend towards heads coming up on the coin."

Well, we hope that nobody's head is flipped in an unsurprising fashion....

It remains to be seen whether this makes any difference. I must admit, I check the green bar on my browser when online-banking, but annoyingly it makes me click to see who signed it. For real users, Firefox says that it is the website, and this is wrong and annoying, but Mozilla has not shown itself adept at understanding the legal and business side of security. I've heard Safari has been fixed up so probably time to try that again and report sometime.

Then, over to Germany, where a snafu with a HSM ("high security module") caused a root key to be lost (also in German). Over in the crypto lists, there are PKI opponents pointing out how this means it doesn't work, and there are PKI proponents pointing out how they should have employed better consultants. Both sides are right of course, so what to conclude?

Test runs with Germany's first-generation electronic health cards and doctors' "health professional cards" have suffered a serious setback. After the failure of a hardware security module (HSM) holding the private keys for the root Certificate Authority (root CA) for the first-generation cards, it emerged that the data had not been backed up. Consequently, if additional new cards are required for field testing, all of the cards previously produced for the tests will have to be replaced, because a new root CA will have to be generated. ... Besides its use in authentication, the root CA is also important for card withdrawal (the revocation service).

The first thing to realise was that this was a test rollout and not the real thing. So the test discovered a major weakness; in that sense it is successful, albeit highly embarrassing because it reached the press.

The second thing is the HSM issue. As we know, PKI is constructed as a hierarchy, or a tree. At the root of the tree is the root key of course. If this breaks, everything else collapses.

Hence there is a terrible fear of the root breaking. This feeds into the wishes of suppliers of high security modules, who make hardware that protect the root from being stolen. But, in this case, the HSM broke, and there was no backup. So a protection for one fear -- theft -- resulted in a vulnerability to another fear -- data loss.

A moment's thought and we realise that the HSM has to have a backup. Which has to be at least as good as the HSM. Which means we then have some rather cute conundrums, based on the Alice in Wonderland concept of having one single root except we need multiple single roots... In practice, how do we create the root inside the HSM (for security protection) and get it to another HSM (for recovery protection)?

Serious engineers and architects will be reaching for one word: BRITTLE! And so it is. Yes, it is possible to do this, but only by breaking the hierarchical principle of PKI itself. It is hard to break fundamental principles, and the result is that PKI will always be brittle, the implementations will always have contradictions that are swept under the carpet by the managers, auditors and salesmen. The PKI design is simply not real world engineering, and the only thing that keeps it going is the institutional deadly embrace of governments, standards committees, developers and security companies.

Not the market demand. But, not all has been bad in the PKI world. Actually, since the bottoming out of the dotcom collapse, certs have been on the uptake, and market demand is present albeit not anything beyond compliance-driven. Here comes a minor item of success:

VeriSign, Inc. [SNIP] today reported it has topped the 1 billion mark for daily Online Certificate Status Protocol (OCSP) checks.

[SNIP] A key link in the online security chain, OCSP offers the most timely and efficient way for Web browsers to determine whether a Secure Sockets Layer (SSL) or user certificate is still valid or has been revoked. Generally, when a browser initiates an SSL session, OCSP servers receive a query to check to see if the certificate in use is valid. Likewise, when a user initiates actions such as smartcard logon, VPN access or Web authentication, OCSP servers check the validity of the user certificate that is presented. OSCP servers are operated by Certificate Authorities, and VeriSign is the world's leading Certificate Authority.

[SNIP] VeriSign is the EV SSL Certificate provider of choice for more than 10,000 Internet domain names, representing 74 percent of the entire EV SSL Certificate market worldwide.

(In the above, I've snipped the self-serving marketing and one blatant misrepresentation.)

Certificates are static statements. They can be revoked, but the old design of downloading complete lists of all revocations was not really workable (some CAs ship megabyte-sized lists). We now have a new thing whereby if you are in possession of a certificate, you can do an online check of its status, called OCSP.

The fundamental problem with this, and the reason why it took the industry so long to get around to making revocation a real-time thing, is that once you have that architecture in place, you no longer need certificates. If you know the website, you simply go to a trusted provider and get the public key. The problem with this approach is that it doesn't allow the CA business to sell certificates to web site owners. As it lacks any business model for CAs, the CAs will fight it tooth & nail.

Just another conundrum from the office of security Kafkaism.

Here's another one, this time from the world of code signing. The idea is that updates and plugins can be sent to you with a digital signature. This means variously that the code is good and won't hurt you, or someone knows who the attacker is, and you can't hurt him. Whatever it means, developers put great store in the apparent ability of the digital signature to protect themselves from something or other.

But it doesn't work with Blackberry users. Allegedly, a Blackberry provider sent a signed code update to all users in United Arab Emirates:

Yesterday it was reported by various media outlets that a recent BlackBerry software update from Etisalat (a UAE-based carrier) contained spyware that would intercept emails and text messages and send copies to a central Etisalat server. We decided to take a look to find out more.

...
Whenever a message is received on the device, the Recv class first inspects it to determine if it contains an embedded command — more on this later. If not, it UTF-8 encodes the message, GZIPs it, AES encrypts it using a static key (”EtisalatIsAProviderForBlackBerry”), and Base64 encodes the result. It then adds this bundle to a transmit queue. The main app polls this queue every five seconds using a Timer, and when there are items in the queue to transmit, it calls this function to forward the message to a hardcoded server via HTTP (see below). The call to http.sendData() simply constructs the POST request and sends it over the wire with the proper headers.

Oops! A signed spyware from the provider that copies all your private email and sends it to a server. Sounds simple, but there's a gotcha...

The most alarming part about this whole situation is that people only noticed the malware because it was draining their batteries. The server receiving the initial registration packets (i.e. “Here I am, software is installed!”) got overloaded. Devices kept trying to connect every five seconds to empty the outbound message queue, thereby causing a battery drain. Some people were reporting on official BlackBerry forums that their batteries were being depleted from full charge in as little as half an hour.

So, even though the spyware provider had a way to turn it on and off:

It doesn’t seem to execute arbitrary commands, just packages up device information such as IMEI, IMSI, phone number, etc. and sends it back to the central server, the same way it does for received messages. It also provides a way to remotely enable/disable the spyware itself using the commands “start” and “stop”.

There was something wrong with the design, and everyone's blackberry went mad. Two points: if you want to spy on your own customers, be careful, and test it. Get quality engineers on to that part, because you are perverting a brittle design, and that is tricky stuff.

Second point. If you want to control a large portion of the population who has these devices, the centralised hierarchy of PKI and its one root to bind them all principle would seem to be perfectly designed. Nobody can control it except the center, which puts you in charge. In this case, the center can use its powerful code-signing abilities to deliver whatever you trust to it. (You trust what it tells you to trust, of course.)

Which has led some wits to label the CAs as centralised vulnerability partners. Which is odd, because some organisations that should know better than to outsource the keys to their security continue to do so.

But who cares, as long as the work flows for the consultants, the committees, the HSM providers and the CAs?

Posted by iang at 07:13 AM | Comments (7) | TrackBack

July 12, 2009

Audits IV - How many rotten apples will spoil the barrel?

In the previous post on Audits (1, 2, 3) I established that you yourself cannot determine from the outside whether an audit is any good. So how do we deal with this problem?

We can take a statistical approach to the investigation. We can probably agree that some audits are not strong (the financial crisis thesis), and some are definitely part of the problem (Enron, Madoff, Satyam, Stanford) not the solution. This rules out all audits being good.

The easy question: are all audits in the bad category, and we just don't know it, or are some good and some bad? We can rule out all audits being bad, because Refco was caught by a good audit, eventually.

So we are somewhere in-between the extremes. Some good, some bad. The question then further develops into whether the ones that are good are sufficiently valuable to overcome the ones that are bad. That is, one totally fraudulent result can be absorbed in a million good results. Or, if something is audited, even badly or with a percentage chance of bad results, some things should be improved, right?

Statistically, we should still get a greater benefit.

The problem with this view is that we the outside world can't tell which is which, yet the point of the audit is to tell us: which is which. Because of the intent of the audit -- entering into the secrets of the corporate and delivering a judgment over the secrets -- there are no tools for us to distinguish. This is almost deliberate, almost by definition! The point of the audit is for us to distinguish the secretively good from the secretively bad; if we also have to distinguish amongst the audits, we have a problem.

Which is to say, auditing is highly susceptible to the rotten apples problem: a few rotten apples in a barrel quickly makes the whole barrel worthless.

How many is a few? One failed audit is not enough. But 10 might be, or 100, or 1% or 10%, it all depends. So we need to know some sort of threshold, past which, the barrel is worthless. Once we determine that some percentage of audits above the threshold are bad, all of them are dead, because confidence in the system fails and all audits become ignored by those that might have business in relying on them.

The empirical question of what that percentage would be is obviously a subject of some serious research, but I believe we can skip it by this simple check. Compare the threshold to our by now painfully famous financial crisis test. So far, in the financial crisis, all the audits failed to pick up the problem (and please, by all means post in comments any exceptions! Anonymously is fine!).

Whatever the watermark for general failure is, if the financial crisis is any guide, we've probably reached it. We are, I would claim, in the presence of material evidence that the Audit has passed the threshold for public reliance. The barrel is rotten.

But, how did we reach this terrible state of affairs? How could this happen? Let's leave that speculation for another post.

(Afterword: Since the last post on Audit, I resigned my role as Auditor over at CAcert. This moves me from slightly inside the profession to mostly outside. Does this change these views written here? So far, no, but you can be the judge.)

Posted by iang at 05:21 PM | Comments (3) | TrackBack

June 11, 2009

Bullion and Bandits: The Rise and Fall of Another Visionary

(Lynn and RAH point to) an article on the sad declines of e-gold, which I was involved with in some sense back in the period 1998 to 2000.

Bullion and Bandits: The Improbable Rise and Fall of E-Gold

Following his story, the picture that emerges of Jackson is not a portrait of a calculating criminal. Rather it is one of a naive visionary who thought his dream was bigger than any financial regulations, who got in over his head, and who finally struggled, too late, to make up for his missteps.

“There was no indication at all that anyone had a problem with what he was doing,” says Richard Timberlake, a former economics professor at the University of Georgia and author of several books on U.S. banking. Timberlake visited Jackson at his E-Gold office in 1997 and vouches for Jackson’s innocent intentions. “He was always very honest and very forthright in what he was trying to do as a business. Even the Federal Reserve believed it was legitimate.”

Well, in 1997, and indeed up until the end of 1999, it was indeed easy to believe that all was good. As we entered into 2000, the signs started popping up, and by the middle of that year, they were everywhere. It was this inability to deal with the changing makeup of the business, while always standing firm to the 1997 business model, that sewed the seeds of disaster.

It is possible to say, "naive visionary." It's also necessary to say, "responsible director." Which is, at its core, the Founder's paradox: we need that Founder to get us this far, pass the unbeatable odds, beat the regs, bash the naysayers.

Then, when he's done his job, how do we ease him aside to start running the business, as a business, and not as a mission from God?

As Jackson envisioned it, E-Gold was a private, international currency that would circulate independent of government controls, and stand impervious to the market’s highs and lows. Brimming with evangelical enthusiasm, Jackson proclaimed it a cure for the modern monetary system’s ills and described it at one point as “an epochal change in human destiny” and “probably the greatest benefit to humanity that’s ever been thought of.”...

Over the next few years, Jackson drained his retirement accounts, sold his medical practice and charged credit cards to raise more than $1 million to nurture the fledgling venture. Cynics might have considered him just another internet hustler looking to strike it rich, but those who knew him say he was a true believer. “He truly thinks that having a gold-backed currency is what’s needed in the world,” says James Clement, a libertarian attorney who met Jackson in 2003. “I don’t think anyone would have stuck with it … other than that he thinks it’s extremely important and somebody has to do this.”

Something like that. We stuck with him (and really, many many of us committed a great deal to the community!) because it was a truly great idea, and he'd done the hard work to get it off the ground. We left when it became clear that Jackson's visionary focus was going to take e-gold to disaster.

Jackson, who’d hocked his future to start E-Gold, now faced the potential of a federal prison term. He was frustrated and confused.

“It never crossed my mind that anyone could seriously want people like us in prison,” he says. “But I guess my bigger fear was that we would go bankrupt, and there would be a train wreck of people that had trusted value to us who couldn’t get their money.”

The worst part about it is that we were right, he was wrong, and the world lost the benefit of his great, original vision.

The financial innovations that came out of the 1990s were extraordinary, and e-gold was one of them. Now they are all confined to the history books, perhaps with little footnotes such as "with this, the financial crisis might have been averted." Oh well. Learning is not humanity's strong suit.

Posted by iang at 10:27 AM | Comments (4) | TrackBack

June 04, 2009

Auditor(s) to be held to account? - CardSystems and Savvis

Duane points to a Wired report that Savvis has been sued (also /., 1, 2). Savvis was the Auditor of the ill-fated payments operator CardSystems that was breached heavily, lost huge amounts of privacy data, and went bankrupt.

This is significant. The audit business has invaded the IT field, now dominating the quality aspects with a stamp of approval over security and governance of all forms. I'm in one myself (at least today, not sure about tomorrow). The way it works is that we check the systems according to some metrics like criteria, management's disclosures, and other things that are called variously best practices (worst case) or common sense (better) or core competences (best case). Then we write up an opinion. Then others attempt to use that opinion in some sense or other:

When CardSystems Solutions was hacked in 2004 in one of the largest credit card data breaches at the time, it reached for its security auditor’s report.

In theory, CardSystems should have been safe. The industry’s primary security standard, known then as CISP, was touted as a sure way to protect data. And CardSystems’ auditor, Savvis Inc, had just given them a clean bill of health three months before.

The problem arises when something goes wrong -- see last week's post on the inverted pyramid. Is the auditor responsible for failure, and how much? The issue is murky, and here are two extremes:

One view has it that the auditor's opinion is relied upon by others and that this is a fiduciary responsibility before the courts, deriving from the history and tradition of financial audits. These latter hold a privileged place in the legal system; others can rely on audits over financial statements, and they can sue the auditor if there were issues. This then applies to systems audits.

A completely contrary view is that the auditor provides a useful service for whoever asks for it, and writes a limited opinion to that person. Others rely at their peril. The opinion is written in internal language, with limitations of liability, over a snapshot of time, and would not be a sound basis for reliance. The tests are closely guarded secrets, the interpretations are interesting but not revealed, and there is absolutely no indication in the process that it is oriented to the needs of the public. That is, an audit is worth practically nothing to any outsider (and insiders don't need it because they can see what's there themselves).

My view is explored in the "Audit" series of essays (1, 2, 3). However the ultimate call may come before the judge, and whichever way it goes, I suggest it is bad news for the audit business.

“We’re at a critical juncture where we need to decide . . . whether [network security] auditing is voluntary or will have the force of law behind it,” says Andrea Matwyshyn, a law and business ethics professor at the University of Pennsylvania’s Wharton School who specializes in information security issues. “For companies to be able to rely on audits . . . there needs to be mechanisms developed to hold auditors accountable for the accuracy of their audits.”

If the court rules that the auditor can be sued, and did wrong ... then the results will ripple through the field. Auditors will reach further into their bag of tricks to cover their backs, which will make audits more difficult to rely upon. This can be seen as an economic result, because likely the court's adverse ruling will break the firm that is doing the audit. No other audit firm will like that scenario of a random bankrupcy event, and we even have the data point to show it: walk the line from Arthur Andersen to Sarbanes-Oxley to the global financial crisis.

In contrast, if the court rules that the Audit cannot be relied upon, then it is game over. Once a court rules that the process is not to be relied upon, then relying parties don't need it. The audit business collapses. Maybe we need to change jobs before the exodus...

Posted by iang at 07:13 AM | Comments (5) | TrackBack

May 28, 2009

Have the accountants sold out?

Gunnar points to an interview that echos my "Audit" series (1, 2, 3). This time from Charlie Munger:

Grundfest: As we look at the current situation, how much of the responsibility would you lay at the feet of the accounting profession?

Munger: I would argue that a majority of the horrors we face would not have happened if the accounting profession developed and enforced better accounting. They are way too liberal in providing the kind of accounting the financial promoters want. They’ve sold out, and they do not even realize that they’ve sold out.

Grundfest: Would you give an example of a particular accounting practice you Find problematic?

Munger: Take derivative trading with mark-to-market accounting, which degenerates into mark-to-model. Two firms make a big derivative trade and the accountants on both sides show a large profit from the same trade.

Grundfest: And they can’t both be right. But both of them are following the rules.

Munger: Yes, and nobody is even bothered by the folly. It violates the most elemental principles of common sense. And the reasons they do it are: (1) there’s a demand for it from the financial promoters, (2) fixing the system is hard work, and (3) they are afraid that a sensible fix might create new responsibilities that cause new litigation risks for accountants.

Yeah, I just copied Gunnar's post (including the crazy "Fi" HTML artifact!). Except this bit:

This situation is very comparable to what happens in when auditors interview infosec. Auditor asks -do you have a firewall? Infosec says yes. Check.

Its too bad but assumptions of yesteryear lead to building things on shaky foundations.

The full interview is worth reading!

Posted by iang at 08:07 AM | Comments (5) | TrackBack

May 25, 2009

The Inverted Pyramid of Identity

Let's talk about why we want Identity. There appear to be two popular reasons why Identity is useful. One is as a handle for the customer experience, so that our dear user can return day after day and maintain her context.

The other is as a vector of punishment. If something goes wrong, we can punish our user, no longer dear.

It's a sad indictment of security, but it does seem as if the state of the security nation is that we cannot design, build and roll-out secure and safe systems. Abuse is likely, even certain, sometimes relished: it is almost a business requirement for a system of value to prove itself by having the value stolen. Following the inevitable security disaster, the business strategy switches smoothly to seeking who to blame, dumping the liability and covering up the dirt.


Users have a very different perspective. Users are well aware of the upsides and downsides, they know well: Identity is for good and for bad.

Indeed, one of the persistent fears of users is that an identity system will be used to hurt them. Steal their soul, breach their privacy, hold them to unreasonable terms, ultimately hunt them down and hurt them, these are some of the thoughts that invasive systems bring to the mind of our dear user.

This is the bad side of identity: the individual and the system are "in dispute," it's man against the machine, Jane against Justice. Unlike the usage case of "identity-as-a-handle," which seems to be relatively well developed in theory and documentation, the "identity-as-punishment" metaphor seems woefully inadequate. It is little talked about, it is the domain of lawyers and investigators, police and journalists. It's not the domain of technologists. Outside the odd and forgettable area of law, disputes are a non-subject, and not covered at all where I believe it is required the most: marketing, design, systems building, customer relations, costs analysis.

Indeed, disputes are taboo for any business.


Yet, this is unsustainable. I like to think of good Internet (or similar) systems as an inverted pyramid. On the top, the mesa, is the place where users build their value. It needs to be flat and stable. Efficient, and able to expand horizontally without costs. Hopefully it won't shift around a lot.

Dig slightly down, and we find the dirty business of user support. Here, the business faces the death of a 1000 tiny support cuts. Each trivial, cheap and ignorable, except in the aggregate. Below them deeper down are the 100 interesting support issues. Deeper still, the 10 or so really serious red alerts. Of which one becomes a real dispute.

The robustness of the pyramid is based on the relationship between the dispute at the bottom, the support activity in the middle, and the top, as it expands horizontally for business and for profit.

Your growth potential is teetering on this one thing: the dispute at the apex of the pyramid. And, if you are interested in privacy, this is the front line, for a perverse reason: this is where it is most lost. Support and full-blown disputes are the front line of privacy and security. Events in this area are destroyers of trust, they are the bane of marketing, the nightmare of PR.

Which brings up some interesting questions. If support is such a destroyer of trust, why is it an afterthought in so many systems? If the dispute is such a business disaster, why is resolution not covered at all? Or hidden, taboo? Or, why do businesses think that their dispute resolution process starts with their customers' identity handles? And ends with the lawyers?


Here's a thought: If badly-handled support and dispute events are leaks of privacy, destroyers of trust, maybe well-handled events are builders of trust? Preservers of privacy?

If that is plausible, if it is possible that good support and good dispute handling build good trust ... maybe a business objective is to shift the process: support designed up front, disputes surfaced, all of it open? A mature and trusted provider might say: we love our disputes, we promote them. Come one, come all. That's how we show we care!

An imature and unstrusted provider will say: we have no disputes, we don't need them. We ask you the user to believe in our promise.

The principle that the business hums along on top of an inverted pyramid, that rests ultimately on a small powerful but brittle apex, is likely to cause some scratching of technophiliac heads. So let me close the circle, and bring it back to the Identity topic.

If you do this, if you design the dispute mechanism as a fully cross-discipline business process for the benefit of all, not only will trust go positive and privacy become aligned, you will get an extra bonus. A carefully constructed dispute resolution method frees up the identity system, as the latter no longer has to do double duty as the user handle *and* the facade of punishment. Your identity system can simply concentrate on the user's experience. The dark clouds of fear disappear, and the technology has a chance to work how the techies said it would.

We can pretty much de-link the entire identity-as-handles from the identity-as-punishment concept. Doing that removes the fear from the user's mind, because she can now analyse the dispute mechanism on its merits. It also means that the Identity system can be written only for its technical and usability merits, something that we always wanted to do but never could, quite.

(This is the rough transcript of a talk I gave at Identity & Privacy conference in London a couple of weeks ago. The concept was first introduced at LexCybernetoria, it was initially tried by WebMoney, partly explored in digital gold currencies, and finally was built in
CAcert's Arbitration project
.)

Posted by iang at 03:45 PM | Comments (6) | TrackBack

April 02, 2009

Are the "brightest minds in finance" finally onto something?

[Lynn writes somewhere else, copied without shame:]

A repeated theme in the Madoff hearing (by the person trying for a decade to get SEC to do something about Madoff) was that while new legislation and regulation was required, it was much more important to have transparency and visibility; crooks are inventive and will always be ahead of regulation.

however ... from The Quiet Coup:

But there's a deeper and more disturbing similarity: elite business interests -- financiers, in the case of the U.S. -- played a central role in creating the crisis, making ever-larger gambles, with the implicit backing of the government, until the inevitable collapse. More alarming, they are now using their influence to prevent precisely the sorts of reforms that are needed, and fast, to pull the economy out of its nosedive. The government seems helpless, or unwilling, to act against them.

From The DNA of Corruption:

While the scale of venality of Wall Street dwarfs that of the Pentagon's, I submit that many of the central qualities shaping America's Defense Meltdown (an important new book with this title, also written by insiders, can be found here) can be found in Simon Johnson's exegesis of America's even more profound Financial Meltdown.

... and related to above, Mark-to-Market Lobby Buoys Bank Profits 20% as FASB May Say Yes:

Officials at Norwalk, Connecticut-based FASB were under "tremendous pressure" and "more or less eviscerated mark-to-market accounting," said Robert Willens, a former managing director at Lehman Brothers Holdings Inc. who runs his own tax and accounting advisory firm in New York. "I'd say there was a pretty close cause and effect."

From Now-needy FDIC collected little in premiums:

The federal agency that insures bank deposits, which is asking for emergency powers to borrow up to $500 billion to take over failed banks, is facing a potential major shortfall in part because it collected no insurance premiums from most banks from 1996 to 2006.

with respect to taxes, there was roundtable of "leading expert" economists last summer about current economic mess. their solution was "flat rate" tax. the justification was:

  1. eliminates possibly majority of current graft & corruption in washington that is related to current tax code structure, lobbying and special interests
  2. picks up 3-5% productivity in GNP. current 65,000 page taxcode is reduced to 600 pages ... that frees up huge amount of people-hrs in lost productivity involved in dealing directly with the taxcode as well as lost productivity because of non-optimal business decisions.

their bottom line was that it probably would only be temporary before the special interests reestablish the current pervasive atmosphere of graft & corruption.

a semi-humorous comment was that a special interest that has lobbied against such a change has been Ireland ... supposedly because some number of US operations have been motivated to move to Ireland because of their much simpler business environment.

with respect to feedback processes ... I (Lynn) had done a lot with dynamic adaptive (feedback) control algorithms as an undergraduate in the 60s ... which was used in some products shipped in the 70s & 80s. In theearly 80s, I had a chance to meet John Boyd and sponsor his briefings. I found quite a bit of affinity to John's OODA-loop concept (observe, orient, decide, act) that is now starting to be taught in some MBA programs.

Posted by iang at 06:51 PM | Comments (3) | TrackBack

March 15, 2009

... and then granny loses her house!

A canonical question in cryptography was about how much money you could put over a digital signature, and a proposed attack would often end, "and then Granny loses her house!" It might be seen as a sort of reminder that the crypto only went so far, and needed to be backed by institutional support for a lot of things.

And now comes Darren with news that Granny is losing her house, proverbially at least. In a somewhat imprecise article (written by a lawyer?) in the Times:

... The ingenuity of the heists carried out ranges from “selling” property they do not own to “buying” property at inflated valuations and making off with the difference.

Critical to many of these scams is the use of stolen identities. According to many solicitors specialising in the field, the key context for the problem was the dash into deregulation and e-commerce earlier this decade.

“There was a view throughout the profession that the abolition of documents of title and reliance upon electronic records would contribute to fraud. And so it has proved,” Samson says. “All this information is open to view through the internet so a fraudster can see exactly who owns a property, assume his or her identity and then sell it.”

While this may sound absurd for owner-occupied homes, it is all too easy, for example, with vacant properties. “What’s more the rightful owner won’t even know that it has happened,” he adds.

So the basic fraud appears to be: find a property that is not cared for by its owner. Assume the owner's identity. Sell it. Or,

To put the hat on what seems a complete botch-up by lawmakers and regulators, the effect of the Land Registration Act 2002 was that the fraudulent purchasers are given a legal title to their “purchase”. “If the fraudster succeeds in having title registered in his name he can mortgage the property,” Samson says. “The true owner may be able to have the transfer to the fraudster reversed by rectification but he will still take the property subject to the mortgage.”

buy it! Now, within that article, there is no shortage of soliciters saying "we told you so!" But the real systemic causes of this fraud will need more digging. We can guess what the first cause is: identify theft. That is, high levels of dependency on the fictitious notion of identity as a protector of security. Yes, that will always get you, and it will likely take another decade before the British populace lose their current faith in identity.

The second cause however is more subtle. As pointed out by Eliana Morandi in a 2007 article, "The role of the notary in real estate conveyancing," problems like that do not happen in continental Europe (see _Digital Evidence and Electronic Signature Law Review," 2007). What's the difference? Whereas the English common law system requires each party to have independent representation, the continental system requires one party, the notary to secure the entire deed for both the buyer and seller. And take the full responsibility, so issues such as this are solved easily:

In cases where, for example, a lender whose mortgage is being paid off has no lawyer, the conveyancer may face claims for having not fully observed the Land Registry’s practice guide. And instead of the Land Registry paying compensation, it will look to the solicitors to reimburse the victims.

Warren Gordon, of Olswang, who sits on the Law Society’s conveyancing and land law committee, protests that it is unrealistic to expect solicitors to do a comprehensive check on someone who is not their client. “It’s unfair to put all the risk on the solicitor, including asking him or her to sign off on the identity of someone he or she does not act for,” he says.

Meanwhile, Paul Marsh, president of the Law Society, points the finger instead at the bankers who are providing fraudsters with the funds to perpetrate their dodgy deals. “At the top end we see vast bonuses being paid to bankers at board level for what turn out to be disastrous investments, while at the grass roots local bankers are under pressure to make loans — to sell money — without even the most basic procedures in place to prevent fraud,” he says. “The banks are refusing to take responsibility for this because they know that they can pin it on the solicitors.”

The bottom line of course is which system is more efficient in the long run. The European Notary may charge more money for the perfect transaction. If the English solicitors can undercut that price, and reduce the fraud such that the result is still better, it is a good deal. Which is it? The abstract to Morandi's article gives a clue:

The role of the notary in real estate conveyancing

Eliana Morandi sets out the role of the civil law notary in the context of real estate conveyancing, illustrating how more effective and less costly it is when undertaken by civil law notaries.

(Unfortunately my copy has conveyed itself into hiding.) If fraud rises in Britain, we will need changes. Now, we've seen with the rise of identity fraud in the USA that there has been zero incentive for the players to change the way identity is used, so we can predict that the Brits will not change the registry practice. Also, the likelihood of the soliciters giving up their lucrative representational practice is pretty low.

However the complicated notarial versus solicitorial versus identity versus registry war pans out in the long run, it seems that solicitors are going to have to bear increased responsibility to check the identity of their counterparty. Perhaps they should pop into the Identity and Privacy forum, 14th 15th May over in London's Charing Cross Hotel? Probably a bargain if it saves them from granny's wrath.

Posted by iang at 05:58 AM | Comments (3) | TrackBack

March 01, 2009

Audits III: we don't know enough even to know what we don't know

Are Audits going to help at all? Are they worth the cost? Are they part of the problem or can they be part of the solution? Originally, I claim they can help, especially for an organisation that has never been audited. That's my experience of one data point. But that's surely not sufficient, we need more. We need to know whether we can rely on these things, we need to know how to rely on these things, and when. And in the aftermath of the failure of Sarbanes-Oxley, we need to dismiss the easy answer of "we'll all just work harder."

In short, we need to know what it is we do know. Here is my view: we don't know enough.

Let's see if I can sustain that claim. If we read through the background of the cases of failure before us, whether Madoff, Satyam, Bear-Stearns, Lehman Brothers or all the bailouts, we will (a) find the Auditor, (b) find why he didn't pick up the failure, (c) cry foul, and say it should be like this or that, and (d) be fooled again. Why is this? We need to look beyond the superficial (tweaks like changing the auditor, rewriting the rules, or collapsing all firms down to the Big One) and go deep.

What actually do we the end-user really know about an audit? We can look at this several ways.

  1. We can read the audit opinion itself. That is, read any audit report of any bank-that-then-failed, and ask yourself what it says? Try these on for size:
    • Is there any language in there tells us it is good? Or about to fail?
    • Drill further. Do the criteria used for the examination advance your interests or not? Do you understand the criteria? Can you even find the criteria?
    • Who was the audit report delivered to? If the opinion wasn't delivered to you how do you know that it is relevant to you?
    • Are the opinions summarised, are critical disclaimers included?
    • Did the auditor tell the client what was to be provided, or did the client tell the auditor what was wanted? Were the terms of the examination stipulated? Where does it say that? Where does it say it wasn't?
    • Is it an audit, an opinion, a review, an attestation, or an attest? Is it a "trust service," an SAS70, or? Compatible with, or compliant with?
    • Was it a compliance audit or chosen by discretion? Almost certainly, it was a compliance audit, but what was it in compliance with? How useful is that goal to you?
    • Is there "audit language" in there that is only interpretable by another auditor? A "secret code," as it were, for other auditors?

    If you didn't quite follow the above, that is precisely the point. To cut a long story short, if you can successfully interpret an audit report, you are probably either very experienced, or in the business yourself. For the most part, the result of the audit is inscrutable to the outsider.

  2. There wider business issues in the audit. Some are well known signals, frequently commented on in the press: Is the auditor too small or under-resourced to do the job? Is the auditor too big to avoid the channeled result, to avoid being locked in his box? Is the reviewer licensed by a body, tested to some standard, trained to some degree or knowledgeable through street learning? Are any of these relevant? And some are more subtle, but well understood in the industry: whether there are conflicts of interest, whether the auditor was chosen for the result, or more blatantly, whether the auditor is in pocket or for hire, or an out-and-out crook?

    Just to ask that stress that last point, I asked a mate this seemingly innocent and easy question: "how do I find a dodgy auditor for hire?" Without a moment's thought, he came back with three recommendations: examine the regulatory filings, look for suspensions, and, ask a crooked lawyer. There followed a much more detailed explanation of how these things will help, which I won't bore people with here. Suffice to say, these dirty tricks reveal the existence of auditors who are easily for hire. Hopefully, they are the exception not the rule, but how do we know?

  3. It's probably also worth mentioning that the audit itself is only a very specific or narrow thing, yet most people like to think of the audit as a binary signal of saintliness. The public brand of the audit is still very good, indeed, almost unchallenged. The broader public likes to think of an audit as proof of goodliness, investment potential, security etc etc, when anyone who has been close to the situation knows that the gulf between perception and reality is so wide as to be at least wrong, definately troubling and possibly deceptive.

    Let me explain what I mean by that point. Auditors if pressed will reveal that their opinion is strictly limited by a number of caveats. Indeed, the opinion is rendered over layers of indirection, such as the management's procedures rather than the assets in question. See point 1 above. However, Auditors will not press home the real conclusions: you yourself do not understand it, nor will you spot when it is no longer useful to you. Meanwhile, those same Auditors are happy to let you believe as the wider public that the audit is a singular, all encompassing stamp of goodliness.

    In short, the Audit profession benefits by letting you believe in one very broad and saintly brand, but acts to reduce the scope of the result so far as to make that brand non-representative. To use a polite term, you understand ... the point to fixate on here is not why it is like this, or how far it is from the truth, but that this may explain why you don't really appreciate the limits of audit, let alone understand them.

My claim in today's post then is that the user cannot tell whether an audit is any use or not. Which audit is good for you, and which not, even if good for others? Which audit is good, and which is plain bad? The crux of the matter is that you yourself cannot tell what any of those pronouncements mean, unless you are an insider. You don't know whether you can rely, when to rely or how to rely.

Instead, you are offered a promise of a verified obscurity, within the comfort of a wonderful brand. In this situation, although there is a vague promise of positive results, there are also far too many circumstances in which the results can be positive for others, while negative for you, so obfuscated and confused as to be worthless, or, even as far as downright fraudulent. You will never know, and indeed, you probably can never know.

To put it in terms of the popular security media, the Audit is fully compliant with security-by-obscurity. In the security world, we would say that a tool designed to that standard is generally brittle. Once cracked, it often fails completely, and badly. This is because, although the obscurity gave a measure of protection, that same obscurity hid other weaknesses which could have been easily fixed. For that reason, we in the security field do not advise security-by-obscurity.

What that does to the concept of reliance on Audits is left for another post!

Posted by iang at 04:35 PM | Comments (4) | TrackBack

February 08, 2009

Audits II: Two more scary words: Sarbanes-Oxley

In the last post on audit, I raised the possibility that we need some fixes to the audit process, rather than just following some journo's best practices list ("use a big-4 auditor"). Is it then a possibility to rewrite the regime, to create a tougher approach? If we look a little deeper in history, we find the answer:

No, we already tried it. Say hello to two more scary words: Sarbanes-Oxley. Recall that this was a huge project by the Congress of the USA to rewrite the entire auditing requirement for public companies. It was deliberately and carefully done in the aftermath of the collapse of audited-but-unauditable Enron.

In Sarbanes-Oxley, no stone was left un-turned, no leaf un-renewed. The noble profession of Financial Auditors had, post-Enron, plenty of incentive to improve their game. Sarbanes-Oxley was written at the behest of the auditing industry. They asked for it, and they got it, cost regardless. It more or less doubled the size of the public audit.

Indeed, Sarbanes-Oxley was so fierce that, by some lights, it killed the international market for Wall Street IPOs! Given all this substantial work, and substantial cost, the paying public might therefore expect that Sarbanes-Oxley must have done some good. Fair enough?

Certainly, there have been many reports of "stronger, better" but this is one of those questions that is hard to measure objectively because we cannot run proper tests. However, we do now have would could be considered to be a highly indicative test: the financial crisis.

Let's check the record: did any audit since Sarbanes-Oxley pick up any of the problems seen in the last 18 months to do with the financial crisis?

No. Not one, not even a single one!

Yet, the basic failures in the financial crisis are so blatant that surely, even by accident at least one audit should have picked up at least one pending failure, and fixed it? No, not one, known to date. At least, as far as I know, and we should probably wait a few years before writing the final judgment. Post any examples in comments! (And yes, for the record, we are ignoring all of the regulators, central banks, finance committees, rating agencies and other checks and balances that also apparently came to nought.)

Can we pronounce the financial audit as bankrupt by its own measures? In theory, the audit should have picked up these failures, all of them. Consider this case-in-point, to prove that the theory works: the enhanced audit required on public listing did in fact pick up the Refco fraud that led quickly to its failure, and the near-failure of Bawag, a big bank in Austria that participated in the fraud. (The sorry fool who found the fraud was fired for his troubles, and only later did his reports filter out and cause questions that ultimately forced the fatal result.)

The audit theory works, then, in some sense or other. Manifestly, audits didn't work for the financial crisis. And, they so didn't work after that so-huge rewrite called Sarbanes-Oxley, that we can conclude that mere improvement is completely off the agenda.

Questions arise. And, this time they are serious, more serious than post-Enron. This time the questions cannot be answered from within, but only from without. By us, the paying public. The questions before us could be considered like this:

Why did the audit not work in practice? For the financial crisis?

Are audits delivering a benefit?

Is the benefit of audits in excess of their cost?

Are audits part of the problem rather than the solution?

What do we do about it?

In order to answer that, we need more information. What is it that we really know about that audit? That's the subject of the next post.

Posted by iang at 07:29 PM | Comments (5) | TrackBack

February 03, 2009

"No, you don't understand sheep"

Sometimes I slave over a hot keyboard for an entire weekend to get a point across. With elegant arguments, carefully constructed logic, and a full path from beginning to end. Integrated across 3 separate disciplines. If I get to QED in less than 3 pages, I'm happy!

And then Gunnar comes along and says:

A teacher asks the class, 'If there are nine sheep in the pen and one jumps out, how many are left?'

A little girl says, 'None of them are left.'

The teacher shakes her head sadly and says, 'You don't understand arithmetic.'

The girls says, 'No, you don't understand sheep.'

Posted by iang at 09:27 AM | Comments (0) | TrackBack

January 25, 2009

Audits I: A Word on the Limits -- Madoff

I had been meaning to write something on audits when this dropped into the email box from Bruce Schneier, late last year, which gave me the perfect opening:

How to Prevent Digital Snooping

[snip]
What these three incidents illustrate is not that computerized databases are vulnerable to hacking -- we already knew that, and anyway the perpetrators all had legitimate access to the systems they used -- but how important audit is as a security measure.
...
Most security against crime comes from audit. Of course we use locks and alarms, but we don't wear bulletproof vests. The police provide for our safety by investigating crimes after the fact and prosecuting the guilty: that's audit.

Audit helps ensure that people don't abuse positions of trust. The cash register, for example, is basically an audit system. Cashiers have to handle the store's money. To ensure they don't skim from the till, the cash register keeps an audit trail of every transaction. The store owner can look at the register totals at the end of the day and make sure the amount of money in the register is the amount that should be there.

Bruce Schneier presents the positive, classical case for Auditing fairly well. Audits can help, especially operations that have never been audited, which receive what amounts to a serious kick in the behind.

But, and switching away from Schneier's "world without Audit" context to the financial world, it is fairly clear that the Audit has limits. Here's a word on those limits: *Madoff*. A reasonable question would be, if Audit can save us from bad stuff, why didn't it save us from Madoff? Some apparent or alleged facts from that case:

  1. The crime had been running for years, with Madoff himself admitting that the fund was technically bankrupt for years. Allegedly.
  2. It was the most basic fraud of all: funds that were used to pay out retiring investors did not exist, and instead were being transferred from new investors. E.g., we are talking about the Numbero Uno, Absolute First Thing that a financial audit should check: solvency.
  3. There was an auditor.
  4. The Auditor spotted nothing.
  5. The SEC likewise spotted nothing.
  6. Investors spotted nothing, at least the ones that invested didn't and those that did said little.

(Note, I wrote this about a month ago, and we probably know more now... hopefully I haven't missed something key. Anyway, journalistic standards being pretty low these days, onwards and upwards!)

All these claims, alleged or claimed or assumed or otherwise, have to give pause for thought.

What's truly scary about Madoff is that when you talk to people who were ripped off you think, there but for the grace of God goes me.

Professionals feel the same way.

This from the president of a fund of fund business: "Every time one of these frauds is discovered I get scared to death it could happen to us. We do lots of things to try to ensure it doesn't, such as checking and confirming auditors and auditor changes, using a private investigator to check on managers when we first invest and the having the PI annually update the file, trying to find references which are not on someone's reference list, etc." If big investors like these could be fooled, he said, anybody can be fooled.

Audits can help, and I do one myself. It helps, I claim, and I document some of the effects. Yet we clearly have problems, there are many flaws. For example, some will say, Madoff happened because it wasn't a big auditor:

"Clearly everyone believed that someone else had done the due diligence. And by relying on some small firm that Madoff employed rather than a big independent auditor was clearly a mistake," said one person who asked not to be identified because several clients lost money with Madoff and he was not permitted to speak publicly.

If you believe that, then I have an audited bridge to sell you. There is something more endemic and more core going on here, and the answer to this is likely not as trivial as "use a big 4 auditor." Indeed, we can knock that one on the head, comprehensively, with one single fearsome word: Enron. Followed by two more scary words: Arthur Andersen.

The world's oldest and most prestigious Auditor collapsed because of the audit failure with Enron. But, for the real result in this, and what happened after those fearsome events, let's slice some more scary words off to another post.

Posted by iang at 05:38 PM | Comments (1) | TrackBack

November 25, 2008

Who would judge a contest for voting machines?

In a previous entry I suggested creating an AES-style competition for automated voting systems. The idea is to throw the design open to the world's expertise on complex systems, including universities, foundations and corporates, and manage the process in an open fashion to bring out the best result.

Several people said "Who would judge a contest for voting machines?" I thought at first blush that this wasn't an issue, but others do. Why is that? I wonder if the AES experience surfaced more good stuff than superficially apparent?

If you look at the AES competition, NIST/NSA decided who would be the winner. James points out in comments that the NSA is indeed competent to do this, but we also know that they are biased by their mission. So why did we trust them to judge honestly?

In this case, what happened is that NIST decided to start off with an open round which attracted around 30 contributions, and then whittled that down to 5 in a second round. Those 5 then went forward and battled it out under increased scrutiny. Then, on the basis of the open scrutiny, and some other not-so-open scrutiny, the NSA chose Rijndael to be the future AES standard.

Let's hypothesize that the NSA team had a solid incentive to choose the worst algorithm, and were minded to do that. What stopped them doing it?

Several things. Firstly, there were two rounds, and all the weaker algorithms were cleaned out in the first round. All of the five algorithms in the second round were more or less "good enough," so the NSA didn't have any easy material to work with. Secondly, they were up against the open scrutiny of the community. So any tricky choice was likely to cause muttering, which could spread mistrust in the future, and standards are susceptible to mistrust. Thirdly, by running a first round, and fairly whittling the algorithms done on quality, and then leading into the second round, NIST created an expectation. Positively, this encouraged everyone to get involved, including those who would normally dismiss the experiment as just another government fraud, waiting to reveal itself. At a more aggressive extreme, it created a precedent, and this exposed the competition to legal attack later on.

These mechanisms worked hand in hand. Probably, either alone was not sufficient to push the NSA into our camp, but together they locked down the choices. Once that was done, the NSA saw its natural incentives to cheat neutered by future costs and open scrutiny. As it no longer could justify the risk of cheating, its best strategy was to do the best job, in return for reputation.

The mechanism design of the competition created the incentives for the judge to vote how we wanted -- for the best algorithm -- even if he didn't want to.

So, we can turn the original question around. Instead of asking who would judge such a competition, design a mechanism such that we don't care who would judge it. Make it like the AES competition, where even if they had wanted to, the NSA's best strategy was to choose the best. Set yourself a challenge: we get the right result even when it is our worst enemy.



Posted by iang at 11:35 AM | Comments (3) | TrackBack

September 21, 2008

Success has many fathers, but failure has the US taxpayer

The USA financial mess was seen taking a brief pause, with almost 24 hours going by without another new world record in greatest failures ever. Morgan Stanley gamely held on ... But even as we speak, they are preparing the mother of all bailouts. It's the weekend, of course, and recent tradition has it that only on Sundays is it right to sell the free market. Or something.

Since the crisis began more than a year ago, the Treasury and Federal Reserve have already put nearly $1 trillion of taxpayer money on the line to help credit flows, while banks have suffered more than $500 billion of write-downs and loan losses.

A trillion here, 500 billion there. 700 billion by Monday? Pretty soon we'll be talking about real money.

The deficit for this budget year, which ends on Sept. 30, is expected to rise to $407 billion, a figure that is more than double the $161.5 billion imbalance for 2007, reflecting what the economic slowdown and this year's $168 billion economic stimulus program are already doing to the government's books. And that forecast doesn't include the $200 billion the administration committed to spending two weeks ago when it took over the nation's two biggest mortgage companies, Fannie Mae and Freddie Mac.

And it doesn't have any of the $700 billion the administration is seeking to soak up the bad mortgage-backed securities that have been at the heart of the severe credit crisis the country has been struggling with since August 2007. The legislation Congress passed this summer that gave the authority to rescue Fannie and Freddie boosted the limit on the national debt by $800 billion to $10.6 trillion.

Frankly, writing about the financial scene right now is trivially easy -- any number of sage saying will ring true. But, writing is also pointless, as the flood of diatribe might entertain us, but does nothing to take us forward.

Well, maybe it's the grief thing: we need this time to wail and gnash over lost innocence and easy profits. We seem to be in the bargaining phase, as Ben Bernanke and Henry Paulson tell various leaders, great and good, to move forward, sign the (blank) cheque and accept the master you all know you need.

In an ideal world, we could skip the depression and move onto acceptance, and rebuilding. How to rebuild? The answer to that question requires a very deep understanding of what is wrong, first and foremost. As I described earlier, I believe the failure syndrome is one of an overly complex system, in which each component works in isolation, but is too complex to analyse externally. Especially, building upwards on this shaky foundation is not safe, but continues nonetheless.

(If, by way of your example, you believe the problem is something else, you are not going to subscribe to the following. That's ok, because in the blogosphere, we still retain a free market in ideas, if little else.)


Onwards. Financial cryptography exists to reduce that complexity. One of the emerging results of financial cryptography, in all its various guises, is that the simple component is the stronger one, and the only sound basis for building to the next layer. We can build higher if we aggressively simplify the lower layers.

Let's present an example, one from Ricardo, which isn't the only system to employ these strategies, just the one I did and therefore is easier to present (another is Lynn's x9.59).

In this system, we use a thing called triple entry bookkeeping, which is digitally signed transactions stored in three places: yours, mine and the repository. Because the transactions are digitally signed and because there are 3 independently administered copies, and because all are equivalent (students of digital evidence take note) there is a very strong foundation on which to build the next layer. It might not be the best way to do transactions, per se (all those extra copies! all that superflous crypto-cycling! no two-phase commits!) but it does present the strongest foundation known to the upper layers.

So much so, that triple entry does for external accounting what double entry did for internal accounting 700 years ago. It is for reasons like this that designs like Ricardo will eventually change the financial system: they create building blocks that can be built on, and will support a massive weight, unlike the the current benchmark of cinder blocks of reinforced air.

When this system was presented to the SEC, someone at the meeting called it the third rail, which is finance-geek talk for the silver bullet. Ben Bernanke probably won't remember (he was there), but the point of this sophistication is an aggressive simplification: by knowing we can rely on every transaction being solidly recorded, we can move up to the next layer. Which we did; the whole system was really intended to resolve many of the uncertainties in today's trading, not just the lower layer accounting.


Which then raises the real question: why the innovations in FC (the above one, and for further example, the so-called blinding formula and its three orders of cost-reduction, or naked transactions de-risking strategies, or ...) did not move forward? I believe the answer is found, again, in the complexity of each incumbent building block.

Incumbents favour complexity. More complexity means more jobs, which finds more favour. Complexity means that while it takes a long time to learn it all, once you get there, you are safer. It requires extraordinary minds to understand it all, and that makes you feel good about yourself, and helps you to lord it over the rest. It gives plenty of flexibility to deliver complex claims, and cover them up when they go wrong.

In fact, it is rather hard to find a good reason not to make something complex. That's because all of these things are good for incumbents, and terrible for everyone else, and nobody asks anyone else. E.g., the customer or the taxpayer is never asked, always told, and always lied to. Every one of the great reasons for complexity is a cost, a priori, with no payback. Every little complexity helps in the long run to raise our own entrenched position, inside, and create a 'tax' on the paying classes. Otherwise we wouldn't promote it.

But what is worse is that complexity hides a greater sin: what we might call complexity fraud. When everything is a mess, nobody cares if someone is stealing the garbage. Nobody will likely notice, and if indeed you are noticed, they'll likely praise you for your help! Complexity fraud is the best fraud of all, because it is a long term cash flow, it looks legal, and anyone smart enough to spot it and understand it would probably join it rather than fight it.

For example, consider the rating agencies. They are supposed to warn of credit risks. They didn't (again), until it was too late (again). Why not? Because they are mandated. Ratings have to be done for many markets, which guarantees a steady flow of revenue as long as nobody upsets the apple cart. This might have seemed like a wise move once, but it can also be seen as a fraud born of complexity: if the complex markets are too hard to understand, then we can create a rating agency that is simple to interpret. Fine. On paper, we apparently simplified it, but in practice, we removed the observation from the real complexity, and put it across to a single number system, and we created a payout for a special person. The moment it is *mandated* then the rating agency kicks back and sucks at the teat, like everyone else, as it has absolutely no interest in upsetting its relationship with the companies that pay for their rating. (Students of incentives, take note.)

And, this is why there was not so much resistance to that early 2000s evil, Sarbanes-Oxley. As long as it was done to everyone equally, everyone made more money. Everyone who was asked, that is. Accounting doubled in size, so the auditors weren't complaining. Rules doubled, too, so the high-end complexity-crooks were happy. Large banks weren't complaining because it reduced the nibbling of the smaller banks. Democrats are always happy at more regulation. Republicans are always happy to promise a safe free market. Everyone was happy.

Who lost? The end-paying public of course. Sarbanes-Oxley was a bill to ravell fraud, but it was hopeless at unravelling. Rather than stopping Enrons, we got a rabbit-like plague of them; not directly because of Sarbanes-Oxley, but because we took our eye off of the systemic mess -- well identified in the early 2000s -- and created more complexity to hide the real problems.

Technology can help. FC can simplify things; but the leadership to put in simplifications instead of complications is strangely absent in Finance, and tech can not solve that. You might not agree that this is because of the forces I outline above; but I've yet to find another compelling explanation for this observation: simplification is rarely praised, but complexity finds many friends.

Posted by iang at 03:31 PM | Comments (4) | TrackBack

September 11, 2008

reliance on security claims: what can go wrong?

One of the perpetual threads is about how to deal with users' expectations (profit!), especially when they clash with the goal of protecting their assets (governance). In one example, people are dealing with the impossibility of CA liability versus the imponderability of universal service to browser users. In another place, security researchers are mentally edging away from life-as-seller to life-as-mentor. In user interface circles, the news is likewise not good: all the efforts look good on paper, but have trouble working in measurable practice.

Just how far is the gulf between user expectations and what the infrastructure can deliver? One airline just got a lesson:

Apparently a botched news story sparked a selloff of shares of United Airlines (UAL) yesterday. It seems that, on Sunday afternoon, the South Florida Sun-Sentinel accidentally re-ran a six year old Chicago Tribune article about United filing bankruptcy. Unfortunately, there was no date associated with the story, and Bloomberg picked it up and reported it as new information shortly before 11AM yesterday.


Not surprisingly, this blunder resulted in massive selling, driving shares of UAL down 75% from a bit over $12/share to $3/share. Here’s a screenshot of the stock chart showing the precipitous drop.

The story was pulled, and United is reportedly investigating what happened. As of right now, the stock is trading at just shy of $11/share. It’s kind of scary what an errant click of the mouse can do, isn’t it?

It is pretty clear that users can be spooked by a false story. It's also clear that the degree of spooking is inversely related to the accuracy of information; the vast number of stories that are printed in the media have approximate truth in them.

What to do about this? In practice, there is little to do. Make sure that the source of the error is fixed, and, make sure it was an innocent error. But that doesn't solve the real problem, only makes sure that the one person never makes the one exact error again.

In practice, a rogue hit can always damage. So, roll out the damage control. The answer with how to deal with these totally unexpected events then is almost always "we'll look at it when it happens," and "we have damage control for that."

(The users in the above case might have other views. But for them: investment is risky, and they can always take their dispute to the courts. I'm more interested in how it would play out in a security market where courts traditionally haven't backed up the user, and the market is supposed to be non-risky by design.)

Posted by iang at 04:30 PM | Comments (0) | TrackBack

September 09, 2008

WSJ finds someone to blame.... be skeptical, and tell the WSJ to grow up.

JPM points to the tabloid for serious teenagers, the Wall Street Journal, who finds someone to blame for Fannie Mae and Freddie Mac:

There you have the Fannie Mae problem in profile. Mr. Frank wants you to pick up the tab for its failures, while he still vows to block a reform that might prevent the same disaster from happening again.

At least the Massachusetts Democrat is consistent. His record is close to perfect as a stalwart opponent of reforming the two companies, going back more than a decade. The first concerted push to rein in Fan and Fred in Congress came as far back as 1992, and Mr. Frank was right there, standing athwart. But things really picked up this decade, and Barney was there at every turn. Let's roll the audiotape:

In 2000, then-Rep. Richard Baker proposed a bill to reform Fannie and Freddie's oversight. Mr. Frank dismissed the idea, saying concerns about the two were "overblown" and that there was "no federal liability there whatsoever."

Read the whole thing, it is hilarious or sad, depending on whether you have to pick up the check. (For the latter, consider that $200bn leveraging that $5.4 trillion of expanded credit is actually a bargain!).

Yet, blaming Mr Frank is just childish. The WSJ writes as if it were Peter Pan:

Mr. Frank has had many accomplices from both parties in his protection of Fan and Fred. But he was and is among the most vociferous and powerful. In any other area of American life, this track record would get a man run out of town.

A Congressman is just a hired gun. Perhaps suspecting that adults lurk nearby, it is admitted that, if it wasn't Mr Frank, it would be someone else. Or something else. Running him out of town might make the lost boys feel better, but it changes nothing.

The core failure in the mess is as I described yesterday, and if you want to avoid collapses of this size, then there is one solution: "don't do that!" That being, in a nutshell, interfere in a market. Sometimes known as "small government" or whatever passes for the opposite of socialism these days (now that choosing capitalism is no longer trendy).

The US government has, like all other socialist enterprises, fallen for the old trick of interfering in a market, because (a) it can, and (b) it's always easy to convince people you have a good idea, if you pay them... Of course, it's not a good idea, and the real truth is the governments do not know how the markets work, almost by definition: that's why we have markets, and if government workers knew how they worked, they would get in them and make money like everyone else.

If the population of the USA decides to run a socialist housing market, then so be it. And, there seems little doubt that this is what the population of the USA wants, as the only man who wouldn't write the check, Ron Paul, got nowhere in the recent Presidential nominations.

It's your choice! Pass the hat around, and write up another mortgage application.

Posted by iang at 06:37 AM | Comments (6) | TrackBack

September 08, 2008

The Mess: looking for someone to blame?

A slightly smaller problem than this weekend's systemic risk and the US Treasury is the continuing weakness of the security of the US retail banking sector:

They are a staple of consumer-complaint hotlines and Web sites: anguished tales about money stolen electronically from bank accounts, about unhelpful bank tellers and, finally, about unreimbursed losses.

But surely customers of the elite private banking operation at JPMorgan Chase, serving only the bank’s wealthiest clients, are safe from such problems, right? Wrong, says Guy Wyser-Pratte, an activist investor on Wall Street for more than 40 years who uses his hedge fund’s war chest of roughly $500 million to wage takeover fights and proxy battles in the United States and Europe.

In May, Mr. Wyser-Pratte learned that someone had siphoned nearly $300,000 from his personal account at the private bank through many small electronic transfers over a 15-month period. Then he was told by the bank that he could stop the theft only by closing his account and opening a new one — an enormous hassle, he said. And finally, JPMorgan Chase told him that the bank would cover only $50,000 of his losses.

Just like the other scandals, we watched this one arise, and now it is here. Warnings fell on deaf ears, so we can only wonder what is the systemic cause here of this mess.

In the case of phishing, it is relatively clear. The developers believe the PKI book. The PKI people believe in the efficacy of digital signatures to prove stuff. The cryptographers believe in the perfection of mathematics, and the security world believes in the completeness of their own learning. They are all wrong, but only at the large level of generalisations, not at the detailed level of particular claims. Any one of the claims, in isolation can be shown to be true. But, generalising these brittle claims to be solid building blocks is a completely different question. Few of the claims are strong enough to partake in a general model without severe support; the general model of secure browsing is the best evidence of how it is secure in name only.

How then is it built? By accident or by design, a series of claims meet together in a holy ring of righteous architecture. Each of the proponents claim loudly that their part is strong, but the ring has no strength. Eventually, one of the claims in the links is broken. For phishing, the browsers never did have the potential to show authenticity; not only did they not have the security strength to do it (c.f., Skype v. CSRF), they didn't even do it in practice (recall the lost padlock?), and their recent efforts to show authenticity (c.f. colour debate) reveal how far they are from understanding even the goal, let alone the implementation. Once that link was broken, and money was made, all the others revealed their weaknesses, as crooks systematically worked to breach the lot.

If we look at the wider financial collapse, now underscored by the nationalisation of the worlds biggest financiers of mortgages ($ 5.3 trillion.... or is it $ 5.4 ?), we see the same pattern. The bankers believed in their product. The originators believed in their origination, the securitizers believed in their free market and accurate price, and the holders believed in the assets. The CDO, the subprime, the other 100 special names, each was a contract. Each was clear in and of itself. But, when placed end-to-end, in a line, with a bunch of other agreements, the claims that were good in isolation were not strong enough to participate in the super-claim made of the overall edifice.

The financial system was built like a bridge; each piece rested on the previous one. And then, the clever architects bent the bridge around ... and around again, until the first piece met the last. The elegant keystone of finance was to finally lift up the first one to rest on the last.

Thus, the banks themselves invested their capital in their own product.

This weekend, the US Treasury joined in to make the ring stronger. The cunning masters of the financial universe carefully lifted up the fan-fred paper and rested them on the T-bills, which as we know are the expressions of the US economy's ability to generate taxes. These willing taxpayers are proud to place themselves and their mortgaged homes in the ring of power.

Beautiful, elegant, and hugely profitable. Just, somewhat, slightly against the laws of gravity.

The problem with this -- both the financial markets and the Internet security markets -- is that there is no-one to blame . Each is constructed in ring of claims, which eventually return to rely on themselves.

So when you read about who is to blame, be quick to be skeptical:

Long before the mortgage crisis began rocking Main Street and Wall Street, a top FBI official made a chilling, if little-noticed, prediction: The booming mortgage business, fueled by low interest rates and soaring home values, was starting to attract shady operators and billions in losses were possible.

"It has the potential to be an epidemic," Chris Swecker, the FBI official in charge of criminal investigations, told reporters in September 2004. But, he added reassuringly, the FBI was on the case. "We think we can prevent a problem that could have as much impact as the S&L crisis," he said.

Today, the damage from the global mortgage meltdown has more than matched that of the savings-and-loan bailouts of the 1980s and early 1990s. By some estimates, it has made that costly debacle look like chump change. But it's also clear that the FBI failed to avert a problem it had accurately forecast

Forget it. My experience of the mutual funds mess -- one what was *not* cleaned up despite public pronouncements to the contrary -- and other messes such as the digital gold story indicates that the FBI has zero chance of understanding the mortgage mess, let alone cleaning it up. Sure, there is fraud going on, but don't expect the FBI to understand the nature of it.

Posted by iang at 07:54 AM | Comments (2) | TrackBack

September 06, 2008

When risks go south: FM&FM to be nationalized

Not just another two scalps being counted: Fannie Mae and Freddie Mac, the huge USA mortgage lenders, are to be nationalised:

The government’s planned takeover of Fannie Mae and Freddie Mac, expected to be announced as early as this weekend, came together hurriedly after advisers poring over the companies’ books for the Treasury Department concluded that Freddie’s accounting methods had overstated its capital cushion, according to regulatory officials briefed on the matter.

Well, what else can they do? Think about how huge this is: the two of them hold or back debts of around $5.3 trillion dollars . Failure is almost certain systemic collapse: first the US housing market, then the rest.

The theory of central banking has it that the CB is the lender of last resort. And after that last resort, it owns the bank. So the Fed now will own these mortgage lenders, as a consequence of its role. No change here.

But, the theory also has it that any lending brings on the most severe punishments. Collapse and rescue by the CB then means: all shareholders are set to zero. All directors are sacked. It is then welcome to see that, in contrast to earlier wimpy efforts by Bernanke's Fed, this:

The details of the deal have not fully emerged, but it appears that investors who own the companies’ common stock will be virtually wiped out; preferred shareholders, who have priority over other shareholders, may also wind up with little. Holders of debt, including many foreign central banks, are expected to receive government backing. Top executives of both companies will be pushed out, according to those briefed on the plan.

will be pushed out? Pah! In Switzerland, it is apparently a crime to be an officer of a failed bank. Think hard here.... Who are their auditors? Who were the ratings agencies? Who were the regulators?

While others ponder the detail of rounding up the guilty, there is the wider question of how to act, systemically, and properly, if one were a CB. What caused this to happen?

Clearly, we don't know the full detailed story. We do know the US economy has been out of balance for the last many years, you pick the number. We do know that pay-up time is now. Further, it has been obvious for a long time that FM & FM have been structured on continually rising housing prices. How dumb is that?

Still, assuming a free-market, the government is wise not to tell bad investors (or companies) how to act properly. Even if it "knows" what is "right", the theory of free markets is that it knows much less than it would like to, and certainly less than how to run a business. (Otherwise it would be doing it, right?)

The mistake then is in allowing the mortgage backers to become too big to fail. That is, assuming a free-market, we must also respect the right to collapse. When there is no right to collapse, there is no free market. All else is subsidies, and the various other isms are just around the corner. Communism, nationalism, socialism, playing-fieldism:

Fannie Mae executives are likely to have resisted the proposed takeover because the company's financial condition isn't as dire as its sibling company, said Bert Ely, an Alexandria, Va.-based banking industry consultant.

But the government would still have to take over both companies, he said, to allow them to borrow money at the same rates. "In order to level the playing field between the two companies, you've got to take over both of them," said Ely, a longtime critic of the two companies.

The backing by the USG for the mortgage lenders' debt is the tactical error. Having got the systemic details off our chest, let's move to the witchhunt. Who started these monstrosities then? How did the shared guarantee from the US taxpayer come into being? Who fell for that old trick? The US taxpayer deserves to know who's stupidity she's paying for this time, no?

Fannie Mae was created by the government in 1938, and was turned into a shareholder-owned company 30 years later. Freddie Mac was established in 1970 to provide competition for Fannie.

Oops!

Posted by iang at 07:29 PM | Comments (4) | TrackBack

September 03, 2008

Yet more evidence: your CISO needs an MBA

I have in the past presented the strawman that your CISO needs an MBA. Nobody has yet succeeded in knocking it down, and it is proving surprisingly resilient. Yet more evidence comes from Bruce Schneier's blog post of yesterday:

Return on investment, or ROI, is a big deal in business. Any business venture needs to demonstrate a positive return on investment, and a good one at that, in order to be viable.

It's become a big deal in IT security, too. Many corporate customers are demanding ROI models to demonstrate that a particular security investment pays off. And in response, vendors are providing ROI models that demonstrate how their particular security solution provides the best return on investment.

It's a good idea in theory, but it's mostly bunk in practice.

Bunk is wrong. Let's drill down. It works this way: NPV (net present value) and ROI (its lesser cousin) are a mathematical tool for choosing between alternate projects. Keep the notion of comparison tightly in your mind.

The tools measure the money going in versus the money going out in a neutral way. They are entirely neutral between projects because NPV is just mathematics, and the same mathematics is used for each project. (See the top part of Richard's post.)

Obviously, any result from the model depends totally on the inputs, so there is a great deal of care and theory needed supply those proper inputs. And, it is here that security projects have the trouble, in that we don't have a good view as to how to predict attack costs. To be clear, there is no controversy about the inputs being a big problem.

But, assuming we have the theory, the process and the inputs, we can, again in principle, measure fairly across all projects.

That's how it works. As you can see above, we do not make a distinction between investment, savings, costs, returns or profits. Why not? Because NPV model and the numbers don't, either.

What then goes wrong with security people when they say ROI doesn't apply to security?

Before I get into the details, there's one point I have to make. "ROI" as used in a security context is inaccurate. Security is not an investment that provides a return, like a new factory or a financial instrument. It's an expense that, hopefully, pays for itself in cost savings. Security is about loss prevention, not about earnings. The term just doesn't make sense in this context.

Or, or here:

The bottom line is that security saves money; it does not create money.

It seems to be that they seize on the words investment and returns, etc, and realise that the words differ from costs and savings. In conceptual or balance sheet terms, they do differ, but here's the catch: to the models of NPV and ROI, it's all the same. In this sense, we could say that the title of ROI is a misnomer, or that there are several meanings to the word "investment" and you've seized on the wrong one.

If you are good at maths, consider it as simply a model that deals equally well with negative numbers as well as positive numbers. To a model, savings are just negatives of returns.

Now, if your security director had an MBA, she would know that the purpose of NPV is to compare projects, and not anything else, like generating returns. She would also know that the model is neutral, and that the ability to handle negative numbers mean that expenses and savings can be compared as well. She would further know that the problems occur in the inputs and assumptions, not in the model.

Finally, she would know how to speak in the language of finance, which is the language that the finance people use. This might sound obvious, but it isn't so clear. As a generalism, it is this last point that is probably most significant about the MBA concept: it teaches you the language of all the other specialities. It doesn't necessarily make you a whizz at finance, or human resources, or marketing. But it at least lets you talk to them in their language. And, it reminds you that the other professions do have some credibility, so if they say something, listen first before teaching them how to suck eggs.

Posted by iang at 10:09 AM | Comments (2) | TrackBack

August 14, 2008

Another gold issuer finds himself temporarily unavailable ...

What's wrong with this picture, from an affidavit filed into a random Los Angeles court concerning divorce proceedings (his emphasis):

"I personally maintain and control ALL access security codes and passwords. I have been and am the ONLY individual in the company who can physically access the building, its contents AND precious metal vaults simultaneously, twenty-four hours a day. All others have limited access that is monitored and/or time-controlled (clock-based) and recorded in security records. Alarm calls are sent directly to me at all hours. ...

... I personally designed and customized the installation of a complex, ultra-sophisticated DOUBLE REDUNDANT security system that is both physical (in the building and its parameters) and virtual (reporting to his private office network round the clock.) This custom, high security system monitors and controls the safety of the corporate headquarters and all its contents, the safety of its employees, and the active 24/7 implementation of advanced, anti-theft, crime prevention. I oversee and monitor all security issues round the clock through a Virtual Private Network set-up at my home office."

Nothing, as long as the above mentioned person is available forever. Unfortunately he is now in jail, charged with much the same situation as the e-gold founders faced over the last two years. Checking the webpage:

Dear Customer,

05 August, 2008, 1:00pm PST: The e-Bullion website will be unavailable for a period of approximately four hours while our Tech Dept. performs routine maintenance.

We apologize for any inconvenience caused by this interruption to service.

e-Bullion Management

Is this a coincidence? Maybe, but it is just another reminder that serious and professional operations do not subscribe to superhero status as described above, for any of a hundred routine and boring scenarios.

(More details might be found here, written up by Ian Lamont of the Standard. Poking around a bit there is also a complication that the other side of the divorce proceedings, his wife, was murdered, and the LA police allege that there is a connection of some form.)

Posted by iang at 04:03 PM | Comments (2) | TrackBack

August 13, 2008

When rogue system administrators lock out Managers

Over in San Francisco, we've no doubt all read about the guy who owned the city government's network deciding to ... own the network (1, 2). For the city at least there was a happy ending:

The computer network hostage crisis in San Francisco is over, thanks to the city's mayor.

Terry Childs, a network administrator for the city of San Francisco, has been in custody since July 13 on four felony charges of taking control of the city's computer network and locking administrators out. Access to much of the city's information was blocked, including law enforcement, payroll, and jail-booking records.

Childs had reportedly refused to surrender the codes to his supervisors, but after a little more than a week as a guest of the city, he apparently had a change of heart and invited Mayor Gavin Newsom to meet with him, according to a report on the San Francisco Chronicle Web site Monday night.

A secret meeting was arranged at the city jail on Monday afternoon, where Childs gave Newsom the codes to the network. The meeting reportedly was so secret that the police department and district attorney were not informed of the meeting ahead of time.

Well, he built it, right? So why can't he tell the users what to do? Right?

The serious question here is whether there is in fact a viable case where a systems administrator takes over and decides to lock his managers out:

Erin Crane, Childs' defense attorney, is expected to cite his cooperation during a court hearing on Wednesday in a bid to have his $5 million bail reduced. Crane has argued that Childs was merely protecting the network from incompetent city officials who were trying to force him out of his job.

"Mr. Childs had good reason to be protective of the password," Crane told the newspaper. "His co-workers and supervisors had in the past maliciously damaged the system themselves, hindered his ability to maintain it...and shown complete indifference to maintaining it themselves...He was the only person in that department capable of running that system."

Tough call! It is rather rare, but this is essentially what whistleblowing seeks to exploit: the insider knowledge that a manager is manipulating the system for nefarious purposes. However, for all practical purposes this is an unlikely situation. Firstly, the managers who are doing the nefarious stuff are likely to then bury he who blows the whistle. See above, $5m bail buys a lot of dirt on this guy's coffin.

Secondly, there is a huge difference between incompetence and fraud. Incompetence is routine, but also the full and proper legal and moral right of the manager. The system administrator that determines that the world should be protected from the manager's incompetence, is generally as deluded as the manager, and is technically and legally wrong. The way to do that is to write to higher-ups and lay paper evidence.

Fraud, while another consideration entirely, is equally difficult: let's start with an easy question. Please define fraud! Now prove it! If you can get that far, the fun is only just starting....

Posted by iang at 10:26 AM | Comments (2) | TrackBack

August 06, 2008

_Electronic Signatures in Law_, Stephen Mason, 2007

Electronic signatures are now present in legal cases to the extent that while they remain novel, they are not without precedence. Just about every major legal code has formed a view in law on their use, and many industries have at least tried to incorporate them into vertical applications. It is then exceedingly necessary that there be an authoritative tome on the legal issues surrounding the topic.

Electronic Signatures in Law is such a book, and I'm now the proud owner of a copy of the recent 2007 second edition, autographed no less by the author, Stephen Mason. Consider this a review, although I'm unaccustomed to such. Like the book, this review is long: intro, stats, a description of the sections, my view of the old digsig dream, and finally 4 challenges I threw at the book to measure its paces. (Shorter reviews here.)

First the headlines: This is a book that is decidedly worth it if you are seriously in the narrow market indicated by the title. For those who are writing directives or legislation, architecting software of reliance, involved in the Certificate Authority business of some form, or likely to find themselves in a case or two, this could well be the essential book.

At £130 or so, I'd have to say that the Financial Cryptographer who is not working directly in the area will possibly find the book too much for mild Sunday afternoon reading, but if you have it, it does not dive so deeply and so legally that it is impenetrable to those of us without an LLB up our sleeves. For us on the technical side, there is welcome news: although the book does not cover all of the failings and bugs that exist in the use of PKI-style digital signatures, it covers the major issues. Perhaps more importantly, those bugs identified are more or less correctly handled, and the criticism is well-ground in legal thinking that itself rests on centuries of tradition.

Raw stats: Published by Tottel publishing. ISBN 978-1-84592-425-6. At over 700 pages, it includes a comprehensive indexes of statutory instruments, legislation and cases that runs to 55 pages, by my count, and a further 10 pages on United Kingdom orders. As well, there are 54 pages on standards, correspondents, resources, glossary, followed by a 22 page index.

Description. Mason starts out with serious treatments on issues such as "what is a signature?" and "what forms a good signature?" These two hefty chapters (119 pages) are beyond comprehensive but not beyond comprehension. Although I knew that the signature was a (mere) mark of intent, and it is the intent which is the key, I was not aware of how far this simple subject could go. Mason cites case law where "Mum" can prove a will, where one person signs for another, where a usage of any name is still a good signature, and, of course, where apparent signatures are rejected due to irregularities, and others accepted regardless of irregularities.

Next, there is a fairly comprehensive (156 pages) review of country and region legal foundations, covering the major anglo countries, the European Union, and Germany in depth, with a chapter on International comparisons covering approaches, presumptions, liabilities and other complexities and a handful of other countries. Then, Mason covers electronic signatures comprehensively and then seeks to compare them to Parties and risks, liability, non-contractual issues, and evidence (230 pages). Finally, he wraps up with a discussion of digital signatures (42 pages) and data protection (12 pages).

Let me briefly summarise the financial cryptography view of the history of Digital Signatures: The concept of the digital signature had been around since the mid-1970s, firstly in the form of the writings by the public key infrastructure crowd, and secondly, popularised to a small geeky audience in the form of PGP in the early 1990s. However, deployment suffered as nobody could quite figure out the application.

When the web hit in 1994, it created a wave that digital signatures were able to ride. To pour cold water on a grand fire-side story, RSA Laboratories manage to convince Netscape that (a) credit cards needed to be saved from the evil Mallory, (b) the RSA algorithm was critical to that need, and (c) certificates were the way to manage the keys required for RSA. Verisign was a business created by (friends of) RSA for that express purpose, and Netscape was happily impressed on the need to let other friends in. For a while everything was mom's apple pie, and we'll all be rich, as, alongside VeriSign and friends, business plans claiming that all citizens would need certificates for signing purposes were floated around Wall Street, and this would set Americans back $100 a pop.

Neither the fabulous b-plans nor the digital signing dream happened, but to the eternal surprise of the technologists, some legislatures put money down on the cryptographers' dream to render evidence and signing matters "simpler, please." The State of Utah led the way, but the politicians dream is now more clearly seen in the European Directive on Electronic Signatures, and especially in the Germanic attitude that digital signatures are as strong by policy, as they are weak in implementation terms. Today, digital signatures are relegated to either tight vertical applications (e.g., Ricardian contracts), cryptographic protocol work (TLS-style key exchanges), or being unworkable misfits lumbered with the cross of law and the shackles of PKI. These latter embarrassments only survive in those areas where (a) governments have rolled out smart cards for identity on a national basis, and/or (b) governments have used industrial policy to get some of that certificate love to their dependencies.

In contrast to the above dream of digital signatures, attention really should be directed to the mere electronic signature, because they are much more in use than the cryptographic public key form, and arguably much more useful. Mason does that well, by showing how different forms are all acceptable (Chapter 10, or summarised here): Click-wrap, typing a name, PINs, email addresses, scanned manuscript signatures, and biometric forms are all contrasted against actual cases.

The digital signature, and especially the legal projects of many nations get criticised heavily. According to the cases cited, the European project of qualified certificates, with all its CAs, smart cards, infrastructure, liabilities, laws, and costs ad infinitum ... are just not needed. A PC, a word processor program and a scan of a hand signature should be fine for your ultimate document. Or, a typewritten name, or the words "signed!" Nowhere does this come out more clearly than the Chapter on Germany, where results deviate from the rest of the world.

Due to the German Government's continuing love affair with the digital signature, and the backfired-attempt by the EU to regularise the concept in the Electronic Signature Directives, digital and electronic signatures are guaranteed to provide for much confusion in the future. Germany especially mandated its courts to pursue the dream, with the result that most of the German case results deal with rejecting electronic submissions to courts if not attached with a qualified signature (6 of 8 cases listed in Chapter 7). The end result would be simple if Europeans could be trusted to use fax or paper, but consider this final case:

(h) Decision of the BGH (Federal Supreme Court, 'Bundesgerichtshof') dated 10 October 2006,...: A scanned manuscript signature is not sufficient to be qualified as 'in writing' under §130 VI ZPO if such a signature is printed on a document which is then sent by facsimile transmission. Referring to a prior decision, the court pointed out that it would have been sufficient if the scanned signature was implemented into a computer fax, or if a document was manually signed before being sent by facsimile transmission to court.

How deliciously Kafkaesque! and how much of a waste of time is being imposed on the poor, untrustworthy German lawyer. Mason's book takes on the task of documenting this confusion, and pointing some of the way forward. It is extraordinarily refreshing to find that the first to chapters, and over 100 pages, are devoted to simply describing signatures in law. It has been a frequent complaint that without an understanding of what a signature is, it is rather unlikely that any mathematical invention such as digsigs would come even close to mimicing it. And it didn't, as is seen in the 118 pages romp through the act of signing:

What has been lost in the rush to enact legislation is the fact that the function of the signature is generally determined by the nature and content of the document to which it is affixed.

Which security people should have recognised as a red flag: we would generally not expect to use the same mechanism to protect things of wildly different values.

Finally, I found myself pondering these teasers:

Athenticate. I found myself wondering what the word "authenticate" really means, and from Mason's book, I was able to divine an answer: to make an act authentic. What then does "authentic" mean and what then is an "act"? Well, they are both defined as things in law: an "act" is something that has legal significance, and it is authentic if it is required by law and is done in the proper fashion. Which, I claim, is curiously different to whatever definition the technologists and security specialists use. OK, as a caveat, I am not the lawyer, so let's wait and see if I get the above right.

Burden of Liability. The second challenge was whether the burden of liability in signing has really shifted. As we may recall, one of the selling points of digital signatures was that once properly formed, they would enable a relying party to hold the signing party to account, something which was sometimes loosely but unreliably referred to as non-repudiation.

In legal terms, this would have shifted the burden of proof and liability from the recipient to the signer, and was thought by the technologists to be a useful thing for business. Hence, a selling point, especially to big companies and banks! Unfortunately the technologists didn't understand that burden and liability are topics of law, not technology, and for all sorts of reasons it was a bad idea. See that rant elsewhere. Still, undaunted, laws and contracts were written on the advice of technologists to shift the liability. As Mason puts it (M9.27 pp270):

For obvious reasons, the liability of the recipient is shaped by the warp and weft of political and commercial obstructionism. Often, a recipient has no precise rights or obligations, but attempts are made using obscure methods to impose quasi-contractual duties that are virtually impossible to comply with. Neither governments nor commercial certification authorities wish to make explicit what they seek to achieve implicitly: that is, to cause the recipient to become a verifying party, with all the responsibilities that such a role implies....

So how successful was the attempt to shift the liability / burder in law? Mason surveys this question in several ways: presumptions, duties, and liabilities directly. For a presumption that the sender was the named party in the signature, 6 countries said yes (Israel, Japan, Argentina, Dubai, Korea, Singapore) and one said no (Australia) (M9.18 pp265) Britain used statutory instruments to give a presumption to herself, the Crown only, that the citizen was the sender (M9.27 pp270). Others were silent, which I judge an effective absence of a presumption, and a majority for no presumption.

Another important selling point was whether the CA took on any especial presumption of correctness: the best efforts seen here were that CAs were generally protected from any liability unless shown to have acted improperly, which somewhat undermines the entire concept of a trusted third party.

How then are a signer and recipient to share the liability? Australia states quite clearly that the signing party is only considered to have signed, if she signed. That is, she can simply state that she did not sign, and the burden falls on the relying party to show she did. This is simply the restatement of the principle in the English common law; and in effect states that digital signatures may be used, but they are not any more effective than others. Then, the liability is exactly as before: it is up the to relying party to check beforehand, to the extent reasonable. Other countries say that reliance is reasonable, if the relying party checks. But this is practically a null statement, as not only is it already the case, it is the common-sense situation of caveat emptor deriving from Roman times.

Although murky, I would conclude that the liability and burden for reliance on a signature is not shifted in the electronic domain, or at least governments seem to have held back from legislating any shift. In general, it remains firmly with the recipient of the signature. The best it gets in shiftyville is the British Government's bounty, which awards its citizens the special privilege of paying for their Government's blind blundering; same as it ever was. What most governments have done is a lot of hand-waving, while permitting CAs to utilise contract arrangements to put the parties in the position of doing the necessary due diligence,. Again, same as it ever was, and decidedly no benefit or joy for the relying party is seen anywhere. This is no more than the normal private right to a contract or arrangement, and no new law nor regulation was needed for that.

Digital Signing, finally, for real! The final challenge remains a work-in-progress: to construct some way to use digital signatures in a signing protocol. That is, use them to sign documents, or, in other words, what they were sold for in the first place. You might be forgiven for wondering if the hot summer sun has reached my head, but we have to recall that most of the useful software out there does not take OpenPGP, rather it takes PKI and x.509 style certificate cryptographic keys and certificates. Some of these things offer to do things called signing, but there remains a challenge to make these features safe enough to be recommended to users. For example, my Thunderbird now puts a digital signature on my emails, but nobody, not it, not Mozilla, not CAcert, not anyone can tell me what my liability is.

To address this need, I consulted the first two chapters, which lay out what a signature is, and by implication what signing is. Signing is the act of showing intent to give legal effect to a document; signatures are a token of that intention, recorded in the act of signing. In order, then, to use digital certificates in signing, we need to show a user's intent. Unfortunately, certificates cannot do that, as is repeatedly described in the book: mostly because they are applied by the software agent in a way mysterious and impenetrable to the user.

Of course, the answer to my question is not clearly laid out, but the foundations are there: create a private contract and/or arrangement between the parties, indicate clearly the difference between a signed and unsigned document, and add the digital signature around the document for its cryptographic properties (primarily integrity protection and confirmation of source).

The two chapters lay out the story for how to indicate intention in the English common law: it is simple enough to add the name, and the intention to sign, manually. No pen and ink is needed, nor more mathematics than that of ASCII, as long as the intention is clear. Hence, it suffices for me to write something like signed, iang at the bottom of my document. As the English common law will accept the addition of merely ones name as a signature, and the PKI school has hope that digital signatures can be used as legal signatures, it follows that both are required to be safe and clear in all circumstances. For the champions of either school, the other method seems like a reduction to futility, as neither seems adequate nor meaningful, but the combination may ease the transition for those who can't appreciate the other language.

Finally, I should close with a final thought: how does the book effect my notions as described in the Ricardian Contract, still one of the very few strong and clear designs in digital signing? I am happy to say that not much has changed, and if anything Mason's book confirms that the Ricardo designs were solid. Although, if I was upgrading the design, I would add the above logic. That is, as the digital signature remains impenetrable to the court, it behoves to add the words seen below somewhere in the contract. Hence, no more than a field name-change, the tiniest tweak only, is indicated:

Signed By: Ivan


Posted by iang at 10:44 AM | Comments (0) | TrackBack

June 30, 2008

Cross-border Notarisations and Digital Signatures

My notes of a presentation by Dr Ugo Bechini at the Int. Conf. on Digital Evidence, London. As it touches on many chords, I've typed it up for the blog:

The European or Civil Law Notary is a powerful agent in commerce in the civil law countries, providing a trusted control of a high value transaction. Often, this check is in the form of an Apostille which is (loosely) a stamp by the Notary on an official document that asserts that the document is indeed official. Although it sounds simple, and similar to common law Notaries Public, behind the simple signature is a weighty process that may be used for real estate, wills, etc.

It works, and as Eliana Morandi puts it, writing in the 2007 edition of the Digital Evidence and Electronic Signature Law Review:

Clear evidence of these risks can be seen in the very rapid escalation, in common law countries, of criminal phenomena that are almost unheard of in civil law countries, at least in the sectors where notaries are involved. The phenomena related to mortgage fraud is particularly important, which the Mortgage Bankers Association estimates to have caused the American system losses of 2.5 trillion dollars in 2005.

OK, so that latter number came from Choicepoint's "research" (referenced somewhere here) but we can probably agree that the grains of truth sum to many billions.

Back to the Notaries. The task that they see ahead of them is to digitise the Apostille, which to some simplification is seen as a small text with a (dig)sig, which they have tried and tested. One lament common in all European tech adventures is that the Notaries, split along national lines, use many different systems: 7 formats indicating at at least 7 softwares, frequent upgrades, and of course, ultimately, incompatibility across the Eurozone.

To make notary documents interchangeable, there are (posits Dr Bechini) two solutions:

  1. a single homogenous solution for digsigs; he calls this the "GSM" solution, whereas I thought of it as a potential new "directive failure".
  2. a translation platform; one-stop shop for all formats

A commercial alternative was notably absent. Either way, IVTF (or CNUE) has adopted and built the second solution: a website where documents can be uploaded and checked for digsigs; the system checks the signature, the certificate and the authority and translates the results into 4 metrics:

  • Signed - whether the digsig is mathematically sound
  • Unrevoked - whether the certificate has been reported compromised
  • Unexpired - whether the certificate is out of date
  • Is a notary - the signer is part of a recognised network of TTPs

In the IVTF circle, a notary can take full responsibility for a document from another notary when there are 4 green boxes above, meaning that all 4 things check out.

This seems to be working: Notaries are now big users of digsigs, 3 million this year. This is balanced by some downsides: although they cover 4 countries (Deustchland, España, France, Italy), every additional country creates additional complexity.

Question is (and I asked), what happens when the expired or revoked certificate causes a yellow or red warning?

The answer was surprising: the certificates are replaced 6 months before expiry, and the messages themselves are sent on the basis of a few hours. So, instead of the document being archived with digsig and then shared, a relying Notary goes back to the originating Notary to request a new copy. The originating Notary goes to his national repository, picks up his *original* which was registered when the document was created, adds a fresh new digsig, and forwards it. The relying notary checks the fresh signature and moves on to her other tasks.

You can probably see where we are going here. This isn't digital signing of documents, as it was envisaged by the champions of same, it is more like real-time authentication. On the other hand, it does speak to that hypothesis of secure protocol design that suggests you have to get into the soul of your application: Notaries already have a secure way to archive the documents, what they need is a secure way to transmit that confidence on request, to another Notary. There is no problem with short term throw-away signatures, and once we get used to the idea, we can see that it works.

One closing thought I had was the sensitivity of the national registry. I started this post by commenting on the powerful position that notaries hold in European commerce, the presenter closed by saying "and we want to maintain that position." It doesn't require a PhD to spot the disintermediation problem here, so it will be interesting to see how far this goes.

A second closing thought is that Morandi cites

... the work of economist Hernando de Soto, who has pointed out that a major obstacle to growth in many developing countries is the absence of efficient financial markets that allow people to transform property, first and foremost real estate, into financial capital. The problem, according to de Soto, lies not in the inadequacy of resources (which de Soto estimates at approximately 9.34 trillion dollars) but rather in the absence of a formal, public system for registering property rights that are guaranteed by the state in some way, and which allows owners to use property as collateral to obtain access to the financial captal associated with ownership.

But, Latin America, where de Soto did much of his work, follows the Civil Notary system! There is an unanswered question here. It didn't work for them, so either the European Notaries are wrong about their assertation that this is the reason for no fraud in this area, or de Soto is wrong about his assertation as above. Or?

Posted by iang at 08:02 AM | Comments (1) | TrackBack

June 17, 2008

Digital Evidence -- 26-27 June, London

Cryptographers, software and hardware architects and others in the tech world have developed a strong belief that everything can be solved with more bits and bites. Often to our benefit, but sometimes to our cost. Just so with matters of law and disputes, where inventions like digital signatures have laid a trail of havoc and confusion through security practices and tools. As we know in financial cryptography, public-key reverse encryptions -- confusingly labelled as digital signatures -- are more usefully examined within the context of the law of evidence than within that of signatures.

Now here cometh those who have to take these legal theories from the back of the technologists' napkins and make them really work: the lawyers. Stephen Mason leads an impressive line-up from many countries in a conference on Digital Evidence:

Digital evidence is ubiquitous, and to such an extent, that it is used in courts every day in criminal, family, maritime, banking, contract, planning and a range of other legal matters. It will not be long before the only evidence before most courts across the globe will all be in the form of digital evidence: photographs taken from mobile telephones, e-mails from Blackberries and laptops, and videos showing criminal behaviour on You Tube are just some of the examples. Now is the time for judges, lawyers and in-house counsel to understand (i) that they need to know some of the issues and (ii) they cannot ignore digital evidence, because the courts deal with it every day, and the amount will increase as time goes by. The aim of the conference will be to alert judges, lawyers (in-house lawyers as well as lawyers in practice), digital forensic specialists, police officers and IT directors responsible for conducting investigations to the issues that surround digital evidence.

Not digital signatures, but evidence! This is a genuinely welcome development, and well worth the visit. Here's more of the blurb:

Conference Programme International Conference on Digital Evidence

26th- 27th June 2008, The Vintner's Hall, London – UNITED KINGDOM
Conference: 26th & 27th June 2008, Vintners' Hall, London
Cocktail & Dinner: 26th June 2008, The Honourable Society of Gray's Inn

THE FIRST CONFERENCE TO TREAT DIGITAL EVIDENCE FULLY ON AN INTERNATIONAL PLATFORM...

12 CPD HOURS - ACCREDITED BY THE LAW SOCIETY & THE BAR STANDARDS BOARD
This event has also been accredited on an ad hoc basis under the Faculty's CPD Scheme and will qualify for 12 hours

Understanding the Technology: Best Practice & Principles for Judges, Lawyers, Litigants, the Accused & Information Security & Digital Evidence Specialists

MIS is hosting & developing this event in partnership with & under the guidance of Stephen Mason, Barrister & Visiting Research Fellow, Digital Evidence Research, British Institute of International and Comparative Law.
Mr. Mason is in charge of the programme's content and is the author of Electronic Signatures in Law (Tottel, 2nd edn, 2007) [This text covers 98 jurisdictions including case law from Argentina, Australia, Brazil, Canada, China, Colombia, Czech Republic, Denmark, Dominican Republic, England & Wales, Estonia, Finland, France, Germany, Greece, Hungary, Israel, Italy, Lithuania, Netherlands, Papua New Guinea, Poland, Portugal, Singapore, South Africa, Spain, Switzerland and the United States of America]. He is also an author and general editor of Electronic Evidence: Disclosure, Discovery & Admissibility (LexisNexis Butterworths, 2007) [This text covers the following jurisdictions: Australia, Canada, England & Wales, Hong Kong, India, Ireland, New Zealand, Scotland, Singapore, South Africa and the United States of America]. Register Now!

Stephen is also International Electronic Evidence, general editor, (British Institute of International and Comparative Law, 2008), ISBN 978-1-905221-29-5, covering the following jurisdictions: Argentina, Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Egypt, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Italy, Japan, Latvia, Lithuania, Luxembourg, Malta, Mexico, Netherlands, Norway, Poland, Romania, Russia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Thailand and Turkey.

Posted by iang at 09:46 AM | Comments (2) | TrackBack

June 03, 2008

Technologists on signatures: looking in the wrong place

Bruce Schneier writes about the classical technology / security view and how it applies to such oddities as the fax signature. As he shows, we have trouble making them work according to classical security & tools thinking.

In a 2003 paper, "Economics, Psychology, and Sociology of Security," Professor Andrew Odlyzko looks at fax signatures and concludes:
Although fax signatures have become widespread, their usage is restricted. They are not used for final contracts of substantial value, such as home purchases. That means that the insecurity of fax communications is not easy to exploit for large gain. Additional protection against abuse of fax insecurity is provided by the context in which faxes are used. There are records of phone calls that carry the faxes, paper trails inside enterprises and so on. Furthermore, unexpected large financial transfers trigger scrutiny. As a result, successful frauds are not easy to carry out by purely technical means.

He's right. Thinking back, there really aren't ways in which a criminal could use a forged document sent by fax to defraud me.

The problem that shakes the above comments is that signatures are not tools to make things secure, nor to stop fraud. Instead, they are signals of legal intent. The law has developed them over centuries or millenia not as tools to make contracts binding, as per the simplistic common myth, or to somehow make it hard for fraudsters, the above security myth, but signals to record the intent of the person.

These subtleties matter. When you send a fax with your signature on it, it doesn't matter that the signature can be copied; it is the act of you creating and sending the fax with signature that establishes intent. Indeed, the intent can be shown without the signature, and the source of the fax is then as important as anything else. For this reason, we generally confirm what you intended somehow. Or we should, as Bruce Schneier writes:

On October 30, 2004, Tristian Wilson was released from a Memphis jail on the authority of a forged fax message. It wasn't even a particularly good forgery. It wasn't on the standard letterhead of the West Memphis Police Department. The name of the policeman who signed the fax was misspelled. And the time stamp on the top of the fax clearly showed that it was sent from a local McDonald's.

The success of this hack has nothing to do with the fact that it was sent over by fax. It worked because the jail had lousy verification procedures. They didn't notice any discrepancies in the fax. They didn't notice the phone number from which the fax was sent. They didn't call and verify that it was official. The jail was accustomed to getting release orders via fax, and just acted on this one without thinking. Would it have been any different had the forged release form been sent by mail or courier?

It's all backwards, according to the law. There should have been an intent, but there wasn't one. It wasn't that the policeman's signature established an intent, it was that the signature should have been a final step in confirming an intent that already existed. The point of phoning the policeman wasn't to check the signature, but to establish the intent. Which the signature would have nicely confirmed, but the check on intent isn't substitutable with the check on signature. As Jeff commented on the post:

Most people don't understand that signatures don't generally perform a security function, they perform a solemnization function. At least that was the case before the mathematicians got involved and tried to convince folks of the value of digitial signatures . . .. :-)

Before they got it totally backwards, that is. Your copied signature does not show intent by you, instead, it suggests an intent by you, that should be confirmed regardless. For you, this is good, as the principle of redundancy applies: you need something much more than one signature to lock you into a contract, or get you out of prison. And this process of showing intent bounces back to the signature in a particularly powerful protocol that is used in the legal world. This is a closely held secret, but I shall now reveal it and risk censure and expulsion for breaking the code:

Ask!

That's it, just ask the question. This can happen anywhere, but is best seen in a court setting: The judge says "Did you sign this?" If you did, then you say yes. (Else you're up for perjury, which is a serious risk.) If you didn't, you deny it, and then the court has a claim that it is not yours. The court now looks further to establish who's intent was behind this act.

It is for these reasons that digital signatures failed to make any mark on the real world, when cast as some sort of analogue to the human signature. Indeed, the cryptography community got it backwards, upside down and inside out. They thought that the goal was to remove the uncertainty and simplify the procedure, when in fact the goal was to preserve and exploit the uncertainty, and to augment the procedure. They were thinking non-repudiation, yet the signature is there to entice repudiation. They thought the signature was sufficient, yet it is no more than a signal of something much more important. They thought simplicity, when redundancy is the principle.

Digital signatures were presented as a new beginning and ending for electronci contracts, and users intuitively recognised they were neither a beginning nor an ending. Digital signatures were nothing, without a custom, and within a custom were shown to be more trouble than they were worth. Case in point: this is the reason why the digital signature on Ricardian Contracts is just cryptographic sugar: the intent is better shown by the server mounting the contract, by the issuer saying "I'm selling this contract", and by the system memorialising all these events in other signed records.

You might ask, why they are there, but I'll side-step that question for now :) Instead, let us ask, how then do we move forward and use digital signatures?

We should be able to see now that it is the wrong question. The right question is firstly, how do we establish intent, and the follow-up is, intent of what? Attest to a statement, conclude a negotiation, sell a house, contract for a road to be dug up, marriage with or without a shotgun? Once we have established that, we can construct a custom (techies would say a protocol) that captures the intent _and_ the agreement, suitable for the value at hand.

We might find a way to slip in some digsigs or we might not. That's because the role is to capture intent, not the signature. Intent is obligatory, signature is not.

(Indeed, this is why we say, in financial cryptography, the cryptography is optional, which causes no end of head-scratching. What then does a poor vendor of cryptographic digsigs do with them? Simple: define the digsig as meaning nothing, legally, outside an additional custom. Nothing, nix, nada, zip! And use them purely for their cryptographic properties, only. Which happen to be useful enough, if properly designed.)

Posted by iang at 12:02 PM | Comments (4) | TrackBack

February 12, 2008

on Revocation of Signing Certs and Public Key Signing itself

Philipp pointed me to another issue that turns the good ship Digital Signature into yet another Nautilus, rapidly going down the whirlpool.

Consider compromise of my signing key. If my key is compromised, then it can be used to sign any document on behalf of the erstwhile owner (was, me). Now, a curiosity of this is that the signature can be backdated, so if I lose my signing key to you, then you can sign away my house, back date it to a few years back to when it was a valid key, and take my house for a buck.

Hence, when my key is compromised, I have to revoke the key, and also potentially revoke all the signatures. The revocation of a signing cert can result in signatures of all dates becoming invalid, or questionable, even back in time. (Apparently, some proportion of client software works this way, because once a cert is revoked, all signatures are deemed "unacceptable" and thus effectively revoked. Nautilus, meet whirlpool.)

This could even be used by myself, in a nefarious mood, to cast doubt over the my own validly-made signatures. If I was homesick, I could conceivably use this to deny a valid contract to sell my house. Hey presto, Grandma gets her house back! (For other woes in the use of public keys for signing purposes, see Signed Confusion)


So how do we solve this problem? Skip down to **** if you are fully informed on that invention known as the Ricardian Contract, which does solve this issue.

In the Ricardian Contract I solved it by taking the hash of the signed contract, making that the identifier for the contract, and then embedding that hash into every transaction that happens thereafter. So, in effect, all new transactions accept and affirm the contract; and therefore form part of the evidence over the signature; if we question the original digsig, we also question all the transactions in the issuance, which is not reasonable beyond the first few dozen transactions.

What happens in more conventional PKI-land, where wisdom is writ, and standards are dusty? As is frequently pointed out, any human-meaningful use of digital signatures would then need to be confirmed with a secure timestamp, perhaps so that any later key revocation can avoid revoking that signature. Makes some sense, and indeed, every single Ricardo transaction sums to achieve that timestamp, as it builds up a tree of timestamped, signed transactions, pyramided on the original contract and its certificate.

We could then propose a rule in the use of public key digsigs for digital signing:

digital signatures cannot be relied upon over time without secure timestamping

The problem with this is that it undermines the very architecture of PKI; if we are assuming online, authoritive entities such as timestamping or digital cash issuers, then we don't actually need PKI, as it is written. Click on lynn://frequent.rant/ at this point... or for my version, in Ricardo as described above, the strength was the fact that strong evidence of the contract was kept over time, not the digsig. In this case, the evidentiary hash over the total document is what is kept, and the digsig added no more than the sweetness of headline confirmation of intent to the picture.

Because PKI (and in this case, OpenPGP cleartext signing) established a convention of signalling an intent with a digsig, it was handy to use that signal.

But we never relied on that, and a specific requirement was that someone could steal the signing key and create a bogus contract. The real strength that captured the signing over the contract was this: we took the hash of the document, and used that hash as the identifier for the contract. We are talking about Ivan, a person who is an issuer of value, and is purporting to the world that his contract is good. Them we arrange matters so that in every statement he makes to the world, he uses a strong identifier. By including the hash of the contract in every transaction, we establish Ivan's intent, understanding, liability on the basis of strong acts by the signer himself. The subtext is that the dominating evidence of intent on the document was the hash over the document, and the transactions that embedded that hash preserved and published that evidence [1].


**** The conclusion is that the hash is a better "signature" than a public-private-key digsig, if we are talking about evidence of time, leading to intent, etc; both need to be accompanied by an infrastructure that isolates the realtime of effect of the original event, and an environment where that intent is preserved. In which case, we can take the above, spin it and say that simple hashes are as good as public key digsigs at the application known as digital signing, and better because they are cheaper. Or, if the infrastructure is present, then public key digsigs makes a good carrier of hashes, as long as their use doesn't damage the application in other ways (which unfortunately it does, c.f. revocation).


What does a timestamped hash lack? It has no indicator of who the signer is. Hence, the hash does not quite defeat the digsig on the basis of Occam's razor.

But we need that in other ways anyway, as the pure cryptographic notion of a public key signature is no better than "this set of bits saw that set of bits" and we know from practical cryptography that there is no easy way to measure and control the distance from a human (intent) to a set of bits. PKI fails to achieve this because it outsources identity to a thing called Certificate Authorities, which so far have not shown themselves to be useful harbingers of your signatory, if in part because they are more expensive than the old pen&ink method.

Let's step back then, and place this in terms of requirements. We need these things to create any system of digital signing:

  • a contract
  • who is the person(s) that is "intending" the contract
  • the time of original intent
  • the preservation of all the above

Public key signatures add very little if anything over hashes and timestamps, as the former needs independent timestamping and revocation, which means that their PKI claims of offline-checking are unravelled. Neither public key digsigs or simple hashes establishes who, easily (consider the cost of PKI infrastructures versus the low statements of reliance), and neither establishes intent.

Indeed, the requirements are so badly met that we can invent a system in 30 seconds that beats the incumbent "approved digital signing systems", hands down:

Iang is who Iang says he is.
Sha1:9dea25a24190bd2cb129cc0b8718b6cf046fe154

This is strong, because, it was me that said it, me that posted it, and this blog, google, the time machine and all the other net tricks will preserve it [2]. Oh, and the hash adds some precision.

Are public key signatures dead? In technical and legal terms, yes. Public key signatures are at least brain-dead, and should be terminated for lack of sentience. While they retain some residual value in marketing senses and in infrastructure senses, they cannot be relied upon as signatures. We'll continue to put in the cryptocandy of the OpenPGP signatures on contracts, but the strength is elsewhere.

Which also means that we do not need to worry about revocation in digsig signing applications: the PKI digsigs as signing applications already revoked themselves, and we shouldn't spend any time over the issue except to say that they are not reliable enough for reliance applications. Instead, if you want a reliable digital signing application, read the Ricardian Contract paper carefully, and construct a protocol that carries the cryptocandy of the existing infrastructure alongside a proper chain that evidences the perfection of the contract: reading/understanding/intent/delivery.


Notes [1]: To follow a digital issuance through in technical, accounting terms: in a digital currency, we start out with one transaction to create value. This is of necessity a double entry transaction that puts large positive value into a manager's account, against large negative value into a float account. Then, the freshly minted positive value is distributed to the users, resulting in more transactions. The value is probably split in the second transaction and further split and recombined in each succeeding transaction, resulting in something like a tree structure.

Each of these transactions evidence an intent to honour the contract, as they all point back by means of the same hash over the same document. Hence, the OpenPGP signature is crypto-icing over the real cake within the Ricardian contract; in this particular case at least, the OpenPGP signature adds little to what the evidentiary chain of transactions provides.

Note [2]: If you want to wrap some cleartext signing sugar onto it, try this:

----- BEGIN OpenPGP Hash-Signed Document -----
I am who I say I am.
----- BEGIN HashSIG -----
d51cb67e97ae815c662042950189c59784a1560d
----- END HashSIG -----

Note [3]: how did we do that hash? Like this:

$ openssl sha1
Hash-signing my contract is as easy as typing text and adding newline then control-D at the end
1100ff22b4e28f439c03a9557b8a88eb8a749235
$

Cut and paste the text line into a Unix terminal application, and follow the instructions. Don't forget to hit return, then hit ctrl-D. Don't include the spaces at the beginning.

Posted by iang at 10:48 AM | Comments (3) | TrackBack

February 02, 2008

SocGen - the FC solution, the core failure, and some short term hacks...

Everyone is talking about Société Générale and how they managed to mislay EUR 4.7bn. The current public line is that a rogue trader threw it all away on the market, but some of the more canny people in the business don't buy it.

One superficial question is how to avoid this dilemma?

That's a question for financial cryptographers, I say. If we imagine a hard payment system is used for the various derivative trades, we would have to model the trades as two or more back-to-back payments. As they are positions that have to be made then unwound, or cancelled off against each other, this means that each trader is an issuer of subsidiary instruments that are combined into a package that simulates the intent of the trade (theoretical market specialists will recall the zero-coupon bond concept as the basic building block).

So, Monsieur Kerviel would have to issue his part in the trades, and match them to the issued instruments of his counterparty (whos name we would dearly love to know!). The two issued instruments can be made dependent on each other, an implementation detail we can gloss over today.

Which brings us to the first part: fraudulent trades to cover other trades would not be possible with proper FC because it is not possible to forge the counterparty's position under triple-entry systems (that being the special magic of triple-entry).

Higher layer issues are harder, because they are less core rights issues and more human constructs, so they aren't as yet as amenable to cryptographic techniques, but we can use higher layer governance tricks. For example, the size of the position, the alarms and limits, and the creation of accounts (secret or bogus customers). The backoffice people can see into the systems because it is they who manage the issuance servers (ok, that's a presumption). Given the ability to tie down every transaction, we are simply left with the difficult job of correctly analysing every deviation. But, it is at least easier because a whole class of errors is removed.

Which brings us to the underlying FC question: why not? It was apparent through history, and there are now enough cases to form a pattern, that the reason for the failure of FC was fundamentally that the banks did not want it. If anything, they'd rather you dropped dead on the spot than suggest something that might improve their lives.

Which leads us to the very troubling question of why banks hate to do it properly. There are many answers, all speculation, and as far as I know, nobody has done research into why banks do not employ the stuff they should if they responded to events as other markets do. Here are some speculative suggestions:

  • banks love complexity
  • more money is made in complexity because the customer pays more, and the margins are higher for higher payments
  • complexity works as a barrier to entry
  • complexity hides funny business, which works as well for naughty banks, tricky managers, and rogue traders. It creates jobs, makes staffs look bigger. Indeed it works well for everyone, except outsiders.
  • compliance helps increase complexity, which helps everything else, so compliance is fine as long as all have to suffer the same fate.
  • banks have a tendency to adopt one compatible solution across the board, and cartels are slow to change
  • nobody is rewarded for taking a management risk (only a trading risk)
  • banks are not entrepreneurial or experimental
  • HR processes are steam-age, so there aren't the people to do it even if they wanted to.

Every one of those reasons is a completely standard malaise which strikes every company, but not other industries. The difference is competition; in every other industry, the competition would eat up the poorer players, but in banking, it keeps the poorer players alive. So the #1 fundamental reason why rogue traders will continue to eat up banks, one by one, is lack of competitive pressures to do any better.

And of course, all these issues feed into each other. Given all that, it is hard to see how FC will ever make a difference from inside; the only way is from outside, to the extent that challengers find an end-run around the rules for non-competition in banking.

What then would we propose to the bank to solve the SocGen dilemma as a short term hack? There are two possibilities that might be explored.

  1. Insurance for rogue traders. Employ an external insurer and underwriter to provide a 10bn policy on such events. Then, let the insurer dictate systems & controls. As more knowledge of how to stop the event comes in, the premiums will drop to reward those who have the better protection.

    This works because it is an independent and financially motivated check. It also helps to start the inevitable shift of moving parts of regulation from the current broken 20th century structure over to a free market governance mechanism. That is, it is aligned with the eventual future economic structure.


  2. Separate board charged with governance of risky (banking) assets. As the current board structure of banking is that the directors cannot and will not see into the real positions, due to all the above and more, it seems that as time goes on, more and more systematic and systemic conditions will build up. Managing these is more than a full time job, and more than an ordinary board can do.

    So outsource the whole lot of risk governance to specialists in a separate board-level structure. This structure should have visibility of all accounts, all SPEs, all positions, and should also be the main conduit to the regulator. It has to be equal to the business board, because it has to have the power to make it happen.

    The existing board maintains the business side: HR, markets, products, etc. This would nicely divide into two the "special" area of banking from the "general" area of business. Then, when things go wrong, it is much easier to identify who to sack, which improves the feedback to the point where it can be useful. It also puts into more clear focus the specialness of banks, and their packaged franchises, regulatory costs and other things.

Why or how these work is beyond scope of a blog. Indeed, whether they work is a difficult experiment to run, and given the Competition finding above, it might be that we do all this, and still fail. But, I'd still suggest them, as both those ideas can be rolled out in a year, and the current central banking structure has at least another decade to run, and probably two, before the penny drops, and people realise that the regulation is the problem, not the solution.

(PS: Jim invented the second one!)

Posted by iang at 06:31 PM | Comments (2) | TrackBack

January 26, 2008

When the SLippery SLope beckons

Second Life takes another step onto the slippery slope. They have previously banned gambling, and now they are banning finance.

Please read this if you operate, or have transferred L$ to, an in-world “bank” or financial company.

As of January 22, 2008, it will be prohibited to offer interest or any direct return on an investment (whether in L$ or other currency) from any object, such as an ATM, located in Second Life, without proof of an applicable government registration statement or financial institution charter. ...

This is the slippery slope. By putting a blanket ban on the operation of financial services (or, passing the buck to the old-world regulators, which amounts to the same thing), they have exited from a large sector of commerce. Expect others to follow.

The reason? In short, it is not economic for them. Linden Labs have no economic / libertarian background to understand the theory, so they cannot see a forward path. Nor do they have the necessary regulatory background or friends, so they have inherited a big and powerful enemy (or more precisely, a horde of enemies who all look the same on first glance) with no way to deal with a war.

Also, it has been recently shown by one similar venture (eBay/Paypal) that taking the slippery slope has a quid pro quo: no financial downside, indeed success and profits. Other than a lot of noisy press ("traitors to the cause"), what's the problem? The process looks on track according to modern marketing theories (ditch the early adoptors as you move to the mainstream).

Under this cloud of exit stories, sad to some, there is at least a silver lining. We extract one data point from the experiment that confirms the theories developed in the 1990s for unregulated finance providers:

You probably haven’t heard of Joshua Zarwel (Second Life’s ‘Teufel Hauptmann’), but he was the very first person I thought of when Linden Lab banned banking last week. ‘Hauptmann’ doesn’t get a lot of press. He’s never been accused of insider trading or blackmail in the Second Life Herald, he doesn’t spend much money on his avatar, he SL Bank Logodoesn’t issue cringe-inducing press releases, and he doesn’t have his name in diamonds above his virtual door. In short, he’s the kind of guy you want managing your money.

Sounds like a scam already, right? Call the Feds? The USSS should be hovering as we speak? Read on...

The fund’s web site is plain, and its entire in-world presence consists of one tiny, unremarkable virtual building. ... When Linden Lab ended banking in Second Life last week, Zarwel did something I’ve not heard of any other banker doing: he quietly announced that every single Linden Dollar in his customers’ accounts was available for immediate withdrawal. ...

For those who have memories of the unregulated gold and dollars economy:

... we tried to be as transparent as possible. If you check our website and/or in world note card you will see that we provide our real world names, addresses, backgrounds, profitability, fund allocation, etc. We had nothing to hide, nor did we ever wish to be anonymous.

This is rhyme. Indeed, it's as close to repeat as you can get, to challenge Mark Twain. We can see everything, as indeed it should be in open governance:

  • provide transparent access to account balances
  • show the governance arrangements (a.k.a. 5PM)
  • describe the business model fully
  • describe who the controllers really are (Ivan the Honourable)
  • allow the public to regulate (the fifth party)

The long and the short is that if Linden Labs had implemented the lessons of open governance, they would have likely knocked out (over time) the scams and been left with the gems (again, over time). This does not change the question of whether it would have been economic of them to pursue Austrian approaches to commerce (Hayek's open money, etc), but it does show that there was a forward path, and the place at the end of that path will stand up to scrutiny.

While we are on the finance business, let's check in to see where the regulated world are at in governing their activities:

The UK's HSBC is to use Identrust's Internet authentication network to enable its corporate customers to digitally sign electronic payments files. Identrus provides a secure digital certificate-based infrastructure for business-to-business e-commerce transactions and corporate-to-bank communications....

A select number of HSBC corporate banking clients will be issued with Identrus digital certificates so that their staff can electronically sign payment files.

Identrust-backed digital signatures are used to guarantee non-repudiable and legally binding electronic communications between banks and their corporate clients. Only one Identrus digital identity per user is needed to interact with all of a corporate client's banks, which simplifies the transaction authentication process.

(Imagine here comments about Ricardian contracts, x.509 failings, x9.59 designs, transaction economics, and a whole host of lessons that simply can't be learnt at any price.)

Posted by iang at 05:18 PM | Comments (0) | TrackBack

January 24, 2008

Break the rules of governance and lose 4.9 billion...

This would be almost boring except for the numbers involved. The Economist writes:

TROUBLE had been expected but nothing like this. Widespread concerns that Société Générale, a large French bank, had more subprime-related problems to reveal were proved right on January 24th with the announcement of a €2.05 billion ($3 billion) write-down on its exposure to mortgage-related investments and to creaking bond insurers. But those numbers were a side-show to something far more shocking.

The bank also disclosed that a single trader, Jérôme Kerviel, had racked up a further €4.9 billion loss by taking unauthorised bets on futures linked to European stockmarkets. Trading in SocGen's shares was temporarily suspended on January 24th, but punishment was bound to be severe.

How did this happen? For that we have to see what the FT wrote:

The trader joined the bank in 2000 and worked in Paris. The first three years of his career were spent in the bank’s so-called “back office” and “middle office”, where trades are settled and risk is managed. Though it did not name Mr Kerviel, SocGen said he had never worked directly in its risk control section, but remained in contact with people in those areas so he could be updated with the bank’s risk controls.

“The reasons he could succeed was because the trader knew intimately the bank’s risk controls and swiftly shifted positions to evade detection at each level of control,” Mr Bouton said.

The fraud was discovered after the trader made an error with a fictitious counterparty. Its extent became clear over the weekend, when the bank‘s management interviewed Mr Kerviel.

OK, so rule #1 in governance is to separate the decisions from the implemention. Those on the decision side (in this case, traders) can not touch the money. Those on the money side (in financial lingo, back-office) cannot make any decisions. Seems simple, right?

The flaw here is that separation of roles also has to be backed up by more than mere words. Those in the back-office are supposed to check for valid trading by some metric or other, and supervisors are supposed to watch everything and make judgement calls. Those in the front-office (traders) are supposed to be rewarded for successful trades, and those in the back-office are supposed to be rewarded for safe trades.

As we know from the Barings case (and a thousand years of history) if a person crosses the border between front and back-office, there is trouble. Nick Leeson not only traded, he was also the guru that fixed or ran the accounting system in the Singapore branch. So he knew the back-office commands to create special or secret accounts, like 88888, which came in handy to hide losses.

The same will be true here: Kervial was trained in the back office, so almost certainly he knew how to do things that were under the covers. Which points to a crazy state of affairs: how is it at all possible to do things that are below the covers?

If you need a systemic reason, it would be because the system has evolved through centuries and is full of obscure rules, quirks, paperwork, oversights and so forth. It is too complex for anyone but a few to understand, indeed, it is quicker to build a complete new governance system from scratch than it is to understand a modern trading system (I know because I've done it). We can conclude that the modern systems are opaque, by history if not by design, and that therefore the real question to ask is whether it is plausible to even understand what happens under the covers, and to stop this weakness?

We know how to solve these problems in financial cryptography. My results were confirmed by others; but we all faced the same systemic blockages in getting systems deployed. Those same blockages will probably also work to save Société Générale from the real solution, which is sacking of the entire board at minimum and sacking of the shareholders at maximum.

Top tip from anonymous observer: watch Société Générale slide in a lot of other hidden losses into this one, so as to combine all the losses into one efficient hit. This is good news for shareholders, and bad news for everyone else, but that sort of high stakes poker playing with assets can also backfire if the losses threaten real closure.

Posted by iang at 03:14 PM | Comments (4) | TrackBack

October 10, 2007

Where the US Congress is going on virtual regulation

I listened to an entire Second Life interview with Dan Miller from the Joint Economic Council, a thinktank for the USA government. Interesting stuff, because virtual world governance gives us a window on all-of-Internet governance.

  • US Congress isn't likely to pass laws, and indeed the JEC prefers less regulation;
  • But agencies might issue rules;
  • UST will probably treat trade in virtual games under the barter provisions. Also see Reuters article.
  • Laws on currency were written in post-civil war and post-Fed periods, and did not consider issues today;
  • Fed & SEC are less likely to be issuing any rules soon, they are busy elsewhere?;
  • terrorists might use games to conduct dry runs;
  • ML hasn't really taken off in virtual communities as the more round-eyed members of the press keep suggesting;
  • SL isn't the big player, WoW is much bigger;
  • Big corporations have this expectation that there will exist many platforms, all inter-communicating, and all equally available for global commerce. Can you take assets from world to another? (My view: dream on while others build on. Here's another view.)
  • youth will be totally comfortable having meetings in the game-space, whereas old people like elected politicians have trouble understanding the basics...;
  • a white paper is being written within JEC to prepare the ground for the future, but no promises;
  • anyone can send a comment to the JEC (dan underscore miller at JEC dot senate dot gov) or their member of congress.

On a slightly related question, I have one question on the efficiency of the new generation of podcasts and interviews and so forth. These new tools are seeking to simulate the old world of radio and TV as the channel of preference, but to my mind they are terribly inefficient. I had to spend an entire hour or so listening to the scratchy sound, with a drop out in a critical part, when I could have skimmed the same written content in about 2 minutes. The nice way of putting this is that it's not ready for recommendation to my business partners as yet, and a slightly less nice way is "who has time for that?"

Does anyone have any alternate experience in these podcasts, etc, that indicates it is finding a market place in real business?

(Addendum: cross-over to TV.)

Posted by iang at 07:08 AM | Comments (3) | TrackBack

September 25, 2007

Arbitration -- a community tool or a weapon?

CAcert has just approved rules for dispute resolution which, in brief, puts all before their own arbitration. (Disclosure: I was involved!)

The key in this process is the provision in the user agreement that asserts the agreement to arbitrate disputes, and the lock that matches the key is the Arbitration Act in most countries. To make it work, the Act generally says that courts must respect the intent to arbitrate. From the US:

Under the FAA, on the motion of a party, a court must stay proceedings and order the parties to arbitrate the dispute if the court finds that the parties have agreed in writing to do so. A party seeking to compel arbitration must show (1) that a valid agreement to arbitrate exists between the parties and (2) that the specific dispute falls within the scope of the agreement.

E.g., the courts will kick you back to Arbitration. But, there are some exceptions, and I took that above quote from one such, being Bragg v. Second Life, wherein Judge Robreno decided to kick out the Arbitration Clause, not the parties. As VB writes, this is a big deal. So, it is useful to check his logic, and find out if CAcert has made some of the same mistakes.

Bear in mind this is not legal writing; if you want the real story you have to read the full transcripts linked above. To stress that, I've stripped out the references, etc, so as to maintain the readability rather than the reliability.

Having said that, onwards! With some legal musing, the Court arrives at this:

Bragg claims that the arbitration agreement itself would effectively deny him access to an arbitrator, because the costs would be prohibitively expensive, a question that is more appropriately reserved for the Court to answer.

To answer the question, the Court decided to look at procedural and substantive components to the issue of unconscionability which is a get-out card generally written into Arbitration Acts, and construct a balanced view from those components. Here's a quick summary:

Contract of adhesion. The Second Life agreement is a contract of adhesion, because there is no chance to negotiate. It's a take it or leave it. Therefore, the contract meets a standard of procedural unconscionability.

"Surprise," meaning that the Arbitration intent is hidden. Again, SL has met the Court's standard of surprise, by (a) using an opaque heading and (b) not setting out the costs clearly. This is a second leg of procedural unconscionability.

"One-sidedness of the contract terms." This seems to ride on several issues:

  • Does one side have a choice in forums the other does not?
  • Does one side have a range in remedies, yet reduce the other party to less?
  • Are fees imposed in excess of a similar action in court?

The Court asserted that "the arbitration remedy must contain a “modicum of bilaterality." It also quoted a Paypal case which is likely as close as it gets in industry similarity. In short, Paypal was able to control the entire assets within by way of freezing, restricting, take ownership, and change the TOS, whereas the the user could only (presumably) arbitrate. Linden Labs had (has?) the same power:

The TOS proclaim that “Linden has the right at any time for any reason or no reason to suspend or terminate your Account, terminate this Agreement, and/or refuse any and all current or future use of the Service without notice or liability to you.” Whether or not a customer has breached the Agreement is “determined in Linden’s sole discretion.” Linden also reserves the right to return no money at all based on mere “suspicions of fraud” or other violations of law. Finally, the TOS state that “Linden may amend this Agreement . . . at any time in its sole discretion by posting the amended Agreement [on its website].”

Ouch! Which brings us to tricky issue of costs. For some reason, Linden Labs chose the ICC for Arbitration, with three Arbitrators. The Court estimated costs at $17,250 for an action of recovery of $75,000. However, the ICC rules say that costs must be shared by the parties, and that is apparently sufficient to make Arbitration unenforceable in California law. The trick here appears to be that the existence of a fee, imposed in excess of a similar court process, creates a supports the finding of unconscionability:

California law has often been applied to declare arbitration fee-sharing schemes unenforceable. Such schemes are unconscionable where they “impose[] on some consumers costs greater than those a complainant would bear if he or she would file the same complaint in court.” ... Here, even taking Defendants characterization of the fees to be accurate, the total estimate of costs and fees would be $7,500, which would result in Bragg having to advance $3,750 at the outset of arbitration. See Dfts.’ Reply at 11. The court’s own estimates place the amount that Bragg would likely have to advance at $8,625, but they could reach as high as $13,687.50. Any of these figures are significantly greater than the costs that Bragg bears by filing his action in a state or federal court. Accordingly, the arbitration costs and fee-splitting scheme together also support a finding of unconscionability.

As well as that, the Court found that all these factors helped to suggest that Arbitration was an attempt to shield liability rather than resolve disputes:

  • imposing a location for Arbitration hearings over small disputes in Carlifornia
  • imposing confidentiality on Arbitration (ICC rules)
  • no "business realities" reason was advanced for the one-sidedness

OK, so the court really went to town in striking down the Arbitration clause. When I read their agreement a couple of weeks ago, I came to the same conclusion, without the Court's care, and the tip-off was the choice of the ICC (a big, expensive French body?!) and three, that's THREE arbitrators. The ICC has to be expensive just from the name, and by Linden Labs choosing 3 times the price, it doesn't take a PhD in maths to realise this was a barrier not an aid.

It may be that Linden Labs have learnt their lesson, as the TOS has just been changed, which is what sparked this blog post. Benjamin of VB writes:

the new terms also create a special class of claims under $10,000 that are to be handled via non-appearance arbitration. This change is very good for users, as the new clause replaces one that required a full-blown arbitration proceeding before a three-person panel, which could easily cost more than $10,000 itself (that is essentially why the clause was declared unconscionable in the Bragg case). Non-appearance arbitration can actually be quite inexpensive, and, notably, it could even be conducted in Second Life. The arbitrator must be an established ADR provider, must have published guidelines for dispute resolution, and must be a “retired judge or attorney with legal expertise in the subject matter of the dispute.”

Two caveats: it seems to stop around the $10k mark, and I haven't looked at the new terms.

Now, to get back to CAcert and their new arbitration system. We can run the Court's ruler over CAcert's new user agreement (albeit, still in DRAFT). It's maybe a little premature as experience is new, and only one case has been heard. But let's see what we can find:

  • Fees: Maybe. CAcert reserves the right to impose some costs, but none are currently applied. Something to watch.
  • Contract of Adhesion: Yes. That is probably an affirmative, by the definition of such contracts and Internet business. CAcert certainly intends that the user not negotiate, and should "take it or leave it." One pleading here might be that the bound users may seek changes by either open policy processes or through Arbitration itself.
  • Surprise: No. I counted 25 references to Arbitration and the Arbitrator in 5.5 pages of their draft agreement. The heading says "3.2 Arbitration as Forum of Dispute Resolution." Also, contributory factors will be that the Assurers are to be trained in this area, and CAcert's principles would rule against "surprising" the users as a tactic.
  • Choice of forums: No. Both CAcert and the user go to Arbitration for any dispute.
  • Range of remedies: No. Only the Arbitrator may terminate an account or impose a financial penalty. Although support members may revoke, they must then refer to Arbitration for authorisation (this is unapproved CPS writings).
  • Change of TOS: No. CAcert Inc has explicitly passed the right to change the TOS across to the users themselves, by way of the policy process. While CAcert Inc retains a veto, this seems not unreasonable given the fiduciary duties.
  • Costly forum: No. Hearings are mostly conducted over email, and to address a point that the Court did not address, the process seeks to reduce costs by using senior people from within the community as advisors.
  • Abusing even a "Modicum of mutality:" No, as Arbitrators are chosen from senior and experienced Assurers. E.g., arbitration is before peers, and CAcert itself is bound by the ruling.

Now, with a nod to the other elements of the Court's ruling, and to the Appeals Court which needs to affirm the ruling, it should be borne in mind that this is a back-of-the-napkin calculation. Still, it's instructive. I'd say cautiously that CAcert made none of the mistakes that the Court found. Indeed, CAcert bent over backwards and tied itself in knots in order to present itself as approximately equal to the registered users.

(As I say, I had something to do with the process. Indeed, I have been hammering the desk for this policy, or any other, to be approved for more than a year now. The more excellent result of last week's conference, which I attended, is that CAcert is now firmly back on the rails.)

Posted by iang at 08:46 AM | Comments (3) | TrackBack

September 11, 2007

If Insurance is the Answer to Identity, what's the Question?

Over on Second Life, they (LL) are trying to solve a problem by providing an outsourced service on identity verification with a company called Integrity. This post puts it in context (warning, it's quite long, longer even than an FC post!):

So now we understand better what this is all about. In effect, Integrity does not really provide “just a verification service”. Their core business is actually far more interesting: they buy LL’s liability in case LL gets a lawsuit for letting minors to see “inappropriate content”. Even more interesting is that LL does not need to worry about what “inappropriate content” means: this is a cultural question, not a philosophic one, but LL does not need to care. Whatever lawsuits will come LL’s way, they will simply get Integrity to pay for them.

Put into other words: Integrity is an insurance company. In this day and age where parents basically don’t care what their children are doing, and blame the State for not taking care of a “children-friendly environment” by filing lawsuits against “the big bad companies who display terrible content”, a new business opportunity has arisen: selling insurance against the (albeit remote) possibility that you get a lawsuit for displaying “inappropriate content”.

(Shorter version maybe here.)

Over on Perilocity, which is a blog about the insurance world, John S. Quarterman points at the arisal of insurance to cover identity theft from a company called LifeLock.

I have to give them credit for honesty, though: LifeLock admits right out that the main four preventive things they do you could do for yourself. Beyond that, the main substance they seem to offer is essentially an insurance package:

"If your Identity is stolen while you are our client, we’re going to do whatever it takes to recover your good name. If you need lawyers, we’re going to hire the best we can find. If you need investigators, accountants, case managers, whatever, they’re yours. If you lose money as a result of the theft, we’re going to give it back to you."

For $110/year or $10/month, is such an insurance policy overpriced, underpriced, or what?

It's possible easier for the second provider to be transparent and open. After all they are selling insurance for stuff that is a validated disaster. The first provider is trying to cover a problem which is not yet a disaster, so there is a sort of nervousness about baring all.

How viable is this model? The first thing would be to ask: can't we fix the underlying problem? For identity theft, apparently not, Americans want their identity system because it gives them their credit system, and there aren't too many Americans out there that would give up the right to drive their latest SUV out of the forecourt.

On the other hand, a potential liability issue within a game would seem to be something that could be solved. After all, the game operator has all the control, and all the players are within their reach. Tonight's pop-quiz: Any suggestions on how to solve the potential for large/class-action suits circling around dodgy characters and identity?

(Manual trackbacks: Perilocity suggests we need identity insurance in the form of governments taking the problem more seriously and dealing with identity thefts more proactively when they occur.)

Posted by iang at 05:57 PM | Comments (0) | TrackBack

September 09, 2007

The Failure of the Academic Contribution to Security Science

This blog frequently presses the case for the dysfunctional family known as security, and even presents evidence. So much so, that we've gone beyond the evidence and the conclusion, and we are more interested in the why?

Today we have insights from the crypto layer. Neal Koblitz provides his thoughts in an article named "The Uneasy Relationship Between Mathematics and Cryptography" published in something called the Notices of the AMS. As perhaps everyone knows, it's mostly about money, and Koblitz identifies several threads:

  • bandwagon effect
  • NSA-supplied money
  • "the power that an aura of mathematical certainty can have over competitive solutions" a.k.a. provable security
  • the unfortunate effect of computer science on cryptography

We've certainly seen the first three, and Koblitz disposes of them well. Definately well recommended reading.

But the last thread takes me by surprise. I would have said that cryptographers have done precisely the reverse, by meddling in areas outside their competence. To leap to computer science's defence, then, permit me to turn Koblitz's evidence:

Here the word “protocol” means a specific sequence of steps that people carry out in a particular application of cryptography. From the early years of public key cryptography it has been traditional to call two users A and B of the system by the names “Alice” and “Bob.” So a description of a protocol might go as follows: “Alice sends Bob..., then Bob responds with..., then Alice responds with...,” and so on.

I don't think so! If you think that is a protocol, you are not a computer scientist. Indeed, if you look at the designs for protocols by cryptographers, that's what you get: provable security and a "protocol" that looks like Alice talking to Bob.

Computer science protocols are not about Alice and Bob, they are about errors. Errors happen to include a bunch of things, including Alice and Bob. Also, Mallory and Eve, but also many many other things. As the number of things that can go wrong far exceed the numbers of cryptographic friends on the planet, we would generally suggest that computer scientists should write protocols, so as to avoid the Alice-Bob effect.

Just to square that circle with yesterday's post, it is OK to talk about Alice-Bob protocols, in order to convey a cryptographic idea. But it should be computer scientists who put it into practice, and as early as possible. Some like to point out that cryptography is complex, and therefore you should employ cryptographers for this part. I disagree, and quote Adi Shamir's 3rd misconception. Eventually your crypto will be handled by developers, and you had better give them the simplest possible constructions they can deal with.

Back to Koblitz's drive-by shooting on computer science:

Cryptography has been heavily influenced by the disciplinary culture of computer science, which is quite different from that of mathematics. Some of the explanation for the divergence between the two fields might be a matter of time scale. Mathematicians, who are part of a rich tradition going back thousands of years, perceive the passing of time as an elephant does. In the grand scheme of things it is of little consequence whether their big paper appears this year or next. Computer science and cryptography, on the other hand, are influenced by the corporate world of high technology, with its frenetic rush to be the first to bring some new gadget to market. Cryptographers, thus, see time passing as a hummingbird does. Top researchers expect that practically every conference should include one or more quickie papers by them or their students.

Ouch! OK, that's fair point. However the underlying force here is the market, and computer science itself is not to blame, rather, the product of its work happens to locate a lot closer to the market than, say, mathematics. Koblitz goes on to say:

There’s also a difficulty that comes from the disciplinary culture of cryptography that I commented on before. People usually write papers under deadline pressure — more the way a journalist writes than the way a mathematician does. And they rarely read other authors’ papers carefully. As a result even the best researchers sometimes publish papers with serious errors that go undetected for years.

That certainly resonates. When you spot an error, and it appears embedded in an academic paper, it stays for years. Consider a random paper on my desktop today, one by Anderson and Moore, "On Information Security -- and beyond." (Announced here.) It is exceedingly well-written, and quite a useful summary of economics thought today in academic security fields. Its pedigree is the best, and it seems unassailable.

Let us then assail. It includes an error: the "lemons" myth, which has been around for years now. Indeed, someone has pointed out the flaw, but we don't know who:

In some cases, security is even worse than a lemons market: even the vendor does not know how secure its software is. So buyers have no reason to pay more for protection, and vendors are disinclined to invest in it.

In detail, "lemons" only applies when the seller knows more than the buyer, this being one of the two asymmetries referred to in asymmetrical information theory. Other things apply in the other squares of the information matrix, and as with all such matrices, we have to be careful not to play hopscotch. The onus would be on Anderson and Moore, and other fans of citric security, to show whether the vendors even know enough to qualify for lemon sales!

Which all supports Koblitz's claims at least partially. The question then is why is it that the academic world of cryptography is so divorced? Again, Anderson and Moore hint at the answer:

Economic thinkers used to be keenly aware of the interaction between economics and security; wealthy nations could afford large armies and navies. But nowadays a web search on ‘economics’ and ‘security’ turns up relatively few articles.

Ironically, their very care and attention is reflected in the list of cited references at the end of the paper: one hundred and eight references !!! Koblitz would ask if they had read all those papers. Assuming yes, they must have covered the field, right?

I scanned through quickly and found three references that were not from reputable conferences, university academics and the like. (These 3 lonely references were from popular newspapers.)

What does a references section that only references the academic world mean? Are Anderson and Moore ignoring everything outside their own academic world?

I hasten to add, this is not a particular criticism against those authors. Many if not all academic authors, and conferences, and peer-review committee chairs would plead guilty of the same crime, proudly, even. By way of example, I have on my desk a huge volume called Phishing and Countermeasures, edited by Jakobsson and Myers. The list of contributors reads like a who's who of Universities, with the occasional slippage to Microsoft, RSA Laboratories, etc.

Indeed, Koblitz himself might be bemused by this attack. Why is the science-wide devotion to academic rigour a criticism?

Because it's security, that's why. Security against real threats is the point where scientific integrity, method and rigour unravels.

Consider a current threat, phishing. The academic world turned up to phishing relatively late, later than practically everyone else. Since arriving, they've waltzed around as if they'll solve it soon, just give them time to get up to speed, and proceeded to mark out the territory. The academics have presented stuff that is sometimes interesting but rarely valuable. They've pretty much ignored all the work that was done before hand, and they've consequently missed the big picture.

Why is this? One reason is above: academic work is only serious if it quotes other academic work. The papers above are reputable because they quote, only and fulsomely, other reputable work. And the work is only rewarded to the extent that it is quoted ... again by academic work. The academics are caught in a trap: work outside academia and be rejected or perhaps worse, ignored. Or, work with academic references, and work with an irrelevant rewarding base.

And be ignored, at least by those who are monetarily connected to the field. By way of thought experiment, consider how many peer-review committees on security conferences include the experts in the field? If you scan the lists, you don't find names like "Ivan Trotsky, millionaire phisher" or perhaps "John Smith, a.k.a. Bob Jones and 32 other aliases, wanted for tera-spamming in 6 states." Would we find "Mao Tze Ling, architect for last year's Whitehouse network shakedown?"

OK, so we can't talk to the actual crooks, but it's just a matter of duplicating their knowledge, right? In theory, it's just a matter of time before the academics turn the big guns onto the threat, and duplicate the work done outside academia. They can catch up, right?

Unfortunately not. Consider anoother of Koblitz's complaints, above where cryptography is

"influenced by the corporate world of high technology, with its frenetic rush to be the first to bring some new gadget to market."

Actually, there are two forces at work here, being the market and the attacker . In short, a real attack in this field migrates in terms of a month. Even with an accelerated paper cycle of 3 months to get the work peer-reviewed and into the next party for student quickies, to use Koblitz's amusing imagery, attacks migrate faster.

The academic world of security is simply too far away from their subject. Do they know it? No, it seems not. By way of example, those in the academic world of security and economics claim that the field started only recently, in the last few years. Nonsense! It has always been there, and received massive boosts with the work of David Chaum, the cypherpunks, Digicash, the Amsterdam hackers and many others.

What was not done was to convert this work into academic papers. The literature is there, but not in conference proceedings.

What was done was to turn the academic thought process into hugely beneficial contributions to security and society. All of the work mentioned above has led directly, traceably, to the inventions we now know as PayPal, ebay, WebMoney, gold community, and slowly moving through to the mass of society in the form of NFC, mobile and so forth. (The finance and telco sectors move slowly to accomodate these innovations, but do they move more slowly than the academic sector?)

The problem is that since the arisal of the net, the literature for fast-paced work has moved out of the academic sphere into other means of distribution: shorter essays, private circulations over email, business plans, open source experiments, focussed maillists and ... of course, blogs. If you are limiting yourself to conference proceedings on security, you are dead in the water, to take a phrase from naval security of a bygone age.

So much so that when you add up all these factors, the conclusion suggested is that the academic world will possibly never be able to deal with security as a science. Not if they stick to their rules, that is. Is it possible we now live in a world where today's academia cannot practically and economically contribute to an entire sector of science? That's the claim, let's see how it pans out.

Some criticisms also apply to Koblitz. Maybe mathematics is so conveniently peaceful as to support an academic tradition, but why is it that on the first page, he waxed longingly and generously on the invention of public key cryptography, but without mentioning the authors of the paper? He might say that Diffie and Hellman did not include any mathematics in their paper, but I would say "tosh!"

Posted by iang at 02:17 PM | Comments (5) | TrackBack

August 27, 2007

Open Governance - Vini Vidi Vici (Second Life, BAWAG)

Some are skeptical that open governance can change things. I say, they just haven't seen it in action, and haven't really dug deep into the popular but less efficacious regulated alternative.

Two examples: Over on Second Life, a pretty obvious ponzi scheme called Ginko crashed and burned. It didn't do very quickly, but it did so with *plenty* of warning, so the lesson is there. Open governor Benjamin Duranske wrote:

Two weeks ago, when I started paying close attention to Ginko (full coverage here), a Second Life blogger (who I won’t name) emailed me this:
Ultimately, all do-gooders like yourself have to ask yourself what can be done *when Linden Lab itself will do nothing.*

That sounded like a challenge, and one that was worth taking up. And the answer to that question, it turns out, is “quite a bit.” Ginko is no more.

...

But what really opened depositors’ eyes? What caused the internal gears at Ginko to start turning a different direction? Talking to people. One to one. Day after day. We weren’t a few writers, we were hundreds of people ranging from newbies to three and four year residents, from bilingual users translating questions into their own language for fellow depositors with little English, to economics professors at major universities talking about issues that were over my head. We covered every segment of the Second Life populace. Some knew what was happening early, some figured it out later on, but all of us asked hard questions at the ATMs, pushed the hard issues to the front of the public’s attention, and didn’t accept lies — even well intentioned ones — as truths.

Over in BAWAG-struck Austria, Helga Seeliger sits in court and reads the law of open governance over the biggest scandal in Austrian finance. (No URL, the translation is mangled directly from a newspaper snippet from Der Standard):

On one seat, by the side of journalists, is a 67 year old Viennese woman who has not missed one day of proceedings, and that's the way it shall be until the verdict is delivered. Her name is Helga Seeliger.

She was the first pensioner in March to demand that the OeGB (Federation of Austrian Unions) continue to pay the enterprise pension that had been cancelled. For 25 years Seeliger was a union representative. For more than 10 years, she was a manager at the Union. Since April 2005, she was a pensioner. She started studying law in the 2000, and finished in 2005. Her favourite: business law.

She writes down all the questions, and all the answers. She writes it in shorthand. If asked, she explains her interest in BAWAG as being a stakeholder. "These testimonies, about how easily the union money was offered, are important for our process."

After the BAWAG crisis, the unions cancelled all the additional pensions for ex-workers, and offered them a single final payment that, depending on their age, was between 2.2 and 8.8 annual salaries. Those who didn't accept, didn't get anything.

The unions paid with this solution 60m euros. For Seeliger and her co-workers, this was too little. "You should not call it the BAWAG scandal, you should call it a union scandal."

When, on Monday, Judge Claudia Bandion-Ortnera will call the "Elsner and others" case, Seeliger will be sitting in the front row and will take her notebook out of her black briefcase and continue her work.

What does this achieve? It locks the court's options down, it preserves the justice. If a convenient settlement offers to emerge, it will only survive, knowing that someone who really cares will see all, record all, and tell all.

Open governance is that: In today's networked world, we can use many small observers to watch, write and share the information. All we need is the latin phrase to capture that, and we're set to conquer the world of governance.

(There is a Cartoon in der Standard by Oliver Schopf but it is not on his website as yet.)

Posted by iang at 07:52 PM | Comments (1) | TrackBack

August 08, 2007

Microsoft asserts itself as an uber-CA

In the PKI ("public key infrastructure") world, there is a written practice that the user, sometimes known as the relying party, should read the CPS ("certificate practice statement") and other documents before being qualified to rely on a certificate. This would qualify as industry practice and is sensible, at least on the face of it, in that the CA ("certificate authority") can not divine what you are going to use the cert for. Ergo, the logic goes, as relying party, you have to do some of the work yourself.

However, in the "PKI-lite" that is in place in x.509 browser and email world, this model has been simplified. Obviously, all of us who've come into contact with user software and the average user know that the notion of a user reading a CPS is so ludicrous that it's hardly worth discussing. Of course, we need another answer.

There are many suggestions, but the one that is in effect is that the browser, or more precisely, the software vendor, is the one who reads the CPS, on behalf of the users. One way to look at this is that this makes the browser the relying party by proxy, as, in making its assessment, it reads the CPS, measures it against own needs, and relies on audits and other issues. (By way of disclosure, I audit a CA.)

Unfortunately, it cannot be the relying party because it simply isn't a party to any transaction. The user remains the relying party, but isn't encouraged to do any of the relying and reading stuff that was mentioned above. That is, the user is encouraged to rely on the certificate, the vendor, the CA and the counter-party, all on an article of blind faith in these people and processes she has never heard of.

This dilemma is better structured as multi-tiered authorities: The CA is the authority on the certificates and their "owners." The software vendor is the authority on the CAs, by means of their CPSs, audits, etc.

Such a re-drawing of the map has fairly dramatic consequences for the PKI. The widespread perception is that the CA is highly liable -- because that's the "trust" product that they sell -- and the browser is not. In principle, and in contract law, it might be the other way around, as the browser has an agreement with the user, and the CA has not. Where the perception might find comfort is in the doctrine of duty of care but that will generally limit the CA's liability to gross negligence. Either way, the last word on this complicated arrangement might need real lawyers and eventually real courts.

It has always been somewhat controversial to suggest that the browser is in control, and therefore may need to consider risks, liabilities and obligations. But now, Paul Hoffman has published a rather serious piece of evidence that Microsoft, for its part, has taken on the R/L/O more seriously than thought:

If a user running Windows XP SP2 in its default configuration removes a root certificate that is one that Microsoft trusts, Windows will re-install that root certificate and again start to trust certificates that come from that root without alerting the user. This re-installation and renewed trust happens as soon as the user visits a SSL-based web site using Internet Explorer or any other web browser that uses the Cryptographic Application Programming Interface (CAPI) built-in to Windows; it will also happen when the user receives secure email using Outlook, Microsoft Mail, or another mail program that uses CAPI, as long as that mail is signed by a certificate that is based on that root certificate.

In effect, the user is not permitted by the software to make choices of reliance. To complete the picture, Paul was careful to mention the variations (Thunderbird and Firefox are not effected, there is an SP2 feature to disable all updates of roots, Vista has the same problem but no override...).

This supports the claim, as I suggested above, that the effective state of play -- best practices if you'll pardon the unfortunate term -- is that the software vendor is the uber-CA.

If we accept this conclusion, then we could conceivably get on and improve security within these limitations, that the user does little or nothing, and the software manufacturer decides everything they possibly can. OK, what's wrong with that? From an architectural position, nothing, especially if it is built-in up-front. Indeed this is one of the core design decisions of the best-of-security-breed applications (x9.59, Skype, SSH, Ricardo, etc. Feel free to suggest any others to the list, it's short and it's lonely.)

The problem lies in that software control is not stated up-front, and it is indeed denied by large swathes of securityland. I'd not be surprised if Microsoft themselves denied it (and maybe their lawyers would be right, given the rather traumatic link between phishing and mitm-proof-certificates...). The PKI state-of-denial leaves us in a little bit of a mess:

  • uber-CAs probably have some liability, but will likely deny it
  • users are supposed to read the CPS, then rely. But don't or won't, and do.
  • CAs claim to the users as if they have the liability, but write the CPS as if they have none.
  • developers read from the PKI practices book, and write code according to uber-policy...
  • (We can add many other issues which lead PKI into harm, but we are well past the average issue saturation point already.)

To extract from this mess probably takes some brave steps. I think I applaud Microsoft's practice, in that at least this makes that little part clearer.

They are in control, they are (I suggest) a party with risks, liabilities and obligations, so they should get on and make the product as secure as possible, as their primary goal. This includes throwing out bits of PKI best practices that we know to be worst practices.

They are not the only ones. Mozilla Foundation in recent years has completed a ground-breaking project to define their own CA processes, and this evidences great care and attention, especially in the ascension of the CA to their root list. What does this show other than they are a party of much power, exercising their duty of care?

Like Microsoft, they (only) care about their users, so they should (only) consider their users, in their security choices.

Will the CAs follow suit and create a simpler, more aligned product? Possibly not, unless pushed. As a personal remark, the criteria I use in auditing are indeed pushing dramatically in the direction of better care of risks, liabilities and obligations. The work to go there is not easy nor trivial, so it is no wonder that no CA wants to go there (and that may be an answer to those asking why it is taking so long).

Even if every CA stood forth and laid out a clear risks, liabilities and obligations statement before their relying parties, more would still need to be done. Until the uber-CAs also get on board publically with the liability shift and clearly work with the ramifications of it, we're still likely locked in the old PKI-lite paper regime or shell game that nobody ever used nor believed in.

For this reason, Microsoft is to be encouraged to make decisions that help the user. We may not like this decision, or every decision, but they are the party that should make them. Old models be damned, as the users surely are in today's insecurity, thanks in part to those very same models.

Posted by iang at 07:14 AM | Comments (4) | TrackBack

May 21, 2007

Choose your hatchet: when governance models collide

As mentioned, I advised e-gold on governance models way back when, and now we can see how the company deals with its relationship to the US government. Someone has posted a video over on YouTube of some 2006 testimony before Senate hearings on child pornography, wherein governance models are much discussed.

The video looks like hatchet job versus hatchet job, as governance of Internet child pornography collides with governance over payment integrity.

There is a wide-spread belief that the case against e-gold is likely to be fought on a battle ground of public opinion and regulated insiders, rather than that of law and public policy. Same as it ever was, perhaps, but a wider question for future FCers is what to do about it?

The governance models that were provided to e-gold were relatively sound, albeit incompletely implemented. No matter the incompleteness, the models were strong enough to preserve the gold for many years, at least to the extent that the recent seizure by the courts was able to complete. That's by way of a proof that some gold existed, although the victims of the seizure will have other choice words.

But those governance models are designed in general to deal with routine fraud of an inside nature. They are not designed to deal with the sort of difficulties facing e-gold. How then to do better in the future?

I see three lessons here for FCers at the governance layer.

1. A lot depends on the contract Ivan has with his users. We might say that an issuer should have a clear contract with its users. And, in that contract we might expect to find certain relationships with governments, law enforcement, regulators and other interested parties.

The question then would be to see whether these relationships were sustainable, stable and reasonable. In the case of e-gold, they were somewhat unbalanced at least due to its nominal offshore status, so e-gold ended up serving two or three jurisdictions instead of one. Complication, not simplification, without any offsetting protection.

2. Normal business process is to arbitrage existing structures and regulatory postures, but this is not to say that sustainable business includes simply facilitating crime. There is some grave doubt as to whether child pornography was more severe within the e-gold system than in classical banking, but there is much less doubt about ponzi schemes and pyramids. e-gold seems to have permitted these to a far greater extent than desirable, and that was unlikely to make friends in the long run.

Then, the need might be interpreted as to create a business process that delivers an overwhelming good without delivering an overwhelming bad. Truly a matter of judgement, but an easy call might be to keep clear of the more popular crimes.

3. Finally, a reasonable and sustainable dispute system is required. Neither Paypal nor e-gold achieved this, and indeed the banks are widely criticised for it (or its absence). The only payment system that seems to have achieved this is WebMoney, although the story takes on fairy tale proportions due to the lack of english documentation.

Either way, the e-gold dispute resolution system is coming in for a hammering, so this aspect should be noted well by FC community. As a matter of record, alternative dispute resolution (ADR) was well studied by the e-gold founders, who gave speeches at conferences on subjects such as arbitration, but study did not apparently transfer to implementation.

Posted by iang at 10:02 AM | Comments (0) | TrackBack

May 11, 2007

US government seizes the gold in frozen acounts

As discussed earlier, the US government, in cases against e-gold and presumably yet-to-be-charged account holders, has apparently completed seizure of some part of the gold:

In an unprecedented move on or just before Wednesday May 9th, 2007, the United States of America has forced Omnipay et al E-gold to redeem all the gold backing the 58 previously frozen accounts owned by e-gold, 1mdc, icegold and a handful of other exchangers and customers to be liquidated effective immediately to a us dollar account owned by the federal government. ...

MoneyNetNews has learned from a reliable source that e-gold has been ordered to hand over a fresh copy of the customer database when the redemption is completed.

Bear in mind this is unconfirmed at this stage. HT-RAH! I'll update this article if anything more comes to hand.

Posted by iang at 10:34 AM | Comments (3) | TrackBack

May 10, 2007

Leadership, the very definition of fraud, and the court of security ideas

It's been a bad week for security leaders. Bruce Schneier has been lambasted for asking whether we need a security industry at all, Ross Anderson published an article "commissioned by the Federal Reserve" that was riddled with errors, and now the chief security researcher of one of the leading security firms, Mikko Hyponnen, proposes a lame duck idea.

I feel very conflicted. On the one hand, I applaud these people for airing some opinions -- we need open discussion and new ideas. On the other hand, there is a serious difference between conjecturing in a scientific sense, in order to spark some serious debate, and selling snake oil.

The latter is often the result of moral hazard. As Ross Anderson complains about banks, when we sell a false statement such as "our systems are secure, so it must be your fault," then our own standards slip due to our own beliefs, and eventually we get the reverse of what we are selling.

Fair enough, but this moral hazard also applies to the writer of security ideas. I feel very strongly about this, as ordinary users are paying for this! When someone gets phished, they lose a lot. Of time, reputation, credit, etc etc. Sometimes money, and at least someone loses the money in a successful phish.

Maybe Schneier is really saying "With leadership like this, you'd be better off without a security industry?"

When a company starts selling "security" ... or merely writing about it ... then maybe we need to consider the liability for this. Class action suits are already in play, and I think it is only a matter of time before software vendors also find themselves responsible for their fraudulent sales by one means or another.

Maybe it is time to call a spade a spade. Forget snake oil. Call it fraud!

The very definition of fraud is discussed by Joseph T. Wells, perhaps America's most voluble presenter on the subject:

Under common law, three elements are required to prove fraud: a material false statement made with an intent to deceive (scienter), a victim’s reliance on the statement and damages.

I'd suggest that you read the entire article.... Several times! Meanwhile, let's cast the definition of fraud over one of the ideas facing us today, the suggestion of a .bank TLD.

Do we have a material false statement?

The Internet Corporation for Assigned Names and Numbers, the body that creates new top-level domains, should create a new, secure domain just for this reason—something like “.bank,” for example.

What is false about that? Specifically, a .bank TLD does not give any vestige of security at all, as discussed earlier. That's one tick in the box.

Showing "intent" is harder it seems, so let's refer to JTW again:

There is no such thing as an accidental fraud. What separates error from fraud is intent, the accidental from the intentional. Assume [the] statements contain material false statements: Were they caused by error or fraud? The problem with proving intent is that it requires determining a person’s state of mind. As a result, intent usually is proven circumstantially. Some of the ways we can help prove intent by circumstantial evidence include
  • motive, ...
  • opportunity, ...
  • repetitive acts, ...
  • witness statements, ...
  • concealment. ...

Only the last is clearly not present, as publication of the idea in foreign policy is pretty much out in the open :) Motive is clearly present:

Registering new domains under such a top-level domain could then be restricted to bona fide financial organizations. And the price for the domain wouldn’t be just a few dollars: It could be something like $50,000—making it prohibitively expensive to most copycats. Banks would love this. They would move their existing online banks under a more secure domain in no time.

That's an invitation for someone to make some easy money if ever I saw it. That looks like the sort of rewards only seen in crime.

Opportunity is generally open but hard, in that anyone can submit a proposal to ICANN and create a TLD, in theory. Repetitive acts ... would depend on who is doing this, and as this is simply an idea being floated, we can't pinpoint anyone. Witness statements are also dependent on the idea turning into practice.

I would then call "intent" a cautious positive. If this idea was turned into reality, we can suggest motive and opportunity.

Next, JT Wells says "a victim's reliance on the statement." Well, that seems a slam dunk, if you've ever worked with banks. As a quick generalisation, they are only capable of doing security thinking in the most extreme of contexts, and they frequently rely on outside companies with a reputation in security sales to advise them.

Finally, damages will follow in due course, in any actual phishing attacks. It isn't necessary for us to predict these, simply to say that if they occurred , the rest of the discussion will complete the claim.

This isn't a court of law, and even if it were, we are unlikely to find an idea fraudulent. However, it seems plausible that we can apply the same test that the lawyers do. In that sense, it seems that the idea of a .bank TLD, if it were taken forward as a security proposal, would run the risk of being ruled as fraud.

Posted by iang at 04:26 PM | Comments (10) | TrackBack

May 04, 2007

US moves to seize the gold

Someone pointed out that the indictment unsealed last week against e-gold, etc includes this clause:

78. As a result of the offenses alleged in Counts One and Three of this indictment, the defendants E-GOLD, LTD., GOLD & SILVER RESERVE, INC., DOUGLAS JACKSON, REID JACKSON, and BARRY DOWNEY shall forfeit to the United States any property, real or personal, involved in, or traceable to such property involved in money laundering, in violation of Title 18, United States Code, Section 1956, and in operation of an unlicensed money transmitting business, in violation of Title 18, United States Code, Section 1960; including, but not limited to the following:

(a) The sum of money equal to the total amount of property involved in, or traceable to property involved in those violations. Fed.R.Crim.P. 32.2(b)(1).

(b) All the assets, including without limitation, equipment, inventory, accounts receivable and bank accounts, of E-GOLD, LTD., and GOLD & SILVER RESERVE, INC., whether titled in those names or not, including, but not limited to all precious metals, including gold, silver, platinum, and palladium, that "back" the e-metal electronic currency of the E-GOLD operation, wherever located.

If more than one defendant is convicted of an offense, the defendants so convicted are jointly and severally liable for the amount derived from such offense. By virtue of the commission of the felony charged in Counts One and Three of this indictment, and and all interest that the defendant has in the property involved in, or traceable to property involved in money laundering is vested in the United States and hereby forfeited to the United States pursuant to Title 18, United States Code, Section 982(a)(1).

(My emphasis. I included the whole clause, intending to allow each to form their own opinions. Of course, you and I should read the whole thing...)

A little background. In the gold community, it is dictum that the US is no respecter of property rights. Twice in the 20th century, the financial rebels will point out, the US seized the gold of its private citizens, generally as a result of its own bad management of the currency, and trying to stop people from fleeing the over-inflated dollar.

In this case, the US government is seeking to seize all of the gold held within the system as reserves to the currency, without due regard to the operation of property rights for the rest of the user base. It would seem an over-broad reaching by the government, but sadly, expected and unsurprising to the digital currency community.

Whatever one thinks of e-gold, its operators and their actions, this is likely to reinforce the reputation of complete and utter disrespect that the US has for property rights around the world.

Unfortunately, this is no isolated case, but is in fact a concerted and long-lived programme by the US government to undermine property rights the world around. The US-invented Anti Money Laundering (AML) regime stretches back 20 years or more to Ronald Reagan's war on drugs, and is now sufficiently strong to destroy the effect of property laws, which latter are nothing if not strong.

AML takes implementing countries backwards in time and history. Although England and its former colonies inherited strong property rights from the days of the Magna Carta, it is as well to realise that the English experiment may have been more an exception than the rule. Consider Russia as counterpoint:

Since only the Tsar or the Party had property, no individual Russian could be sure of long-term usage of anything upon which to create wealth. And it is the poor to whom the property right matters most of all because property is the poor man's ticket into the game of wealth creation. The rich, after all, have their money and their friends to protect their holdings, while the poor must rely upon the law alone.

"The Rape of Russia" was not ancient history according to Williamson's 1999 testimony before the US House of Representatives, but living times: during the decade of the 1990s, the same group conspired with Russians to launder much of the residual value of the Russian people.

One would hope that the court is a little wise to the fact that if e-gold Ltd's system was used for crimes, then there was also use for good purposes; that is, it was the operators and some users that were responsible. Normally we would expect the system to be placed under administration, and then a wholesale cleanout of any "bad" accounts to occur, under court supervision.

If not, the author above warned the US Congress what will happen to those who dismantle what property rights there are:

Connections

In the absence of property, it was access - the opportunity to seek opportunity - and favor in which the Russians began to traffic. The connections one achieved, in turn, became the most essential tools a human being could grasp, employ and, over time, in which he might trade. Where relationships, not laws, are used to define society's boundaries, tribute must be paid. Bribery, extortion and subterfuge have been the inevitable result. What marks the Russian condition in particular is the scale of these activities, which is colossal. Russia, then, is a negotiated culture, the opposite of the openly competitive culture productive markets require.

It is fairly clear that the e-gold operation was presented to the world and operated as a property rights operation. Although not without shenanigans, the very basis of the digital gold community has been a joyful expression of the right of property, and what good it can do when it is left to run free.

Unfortunately, the US government may have learnt too much from the Russian experience. The substantial crime in the indictment is "property rights without a licence" and the fine for that is "seizing all the property." Welcome to the world of tribute; bribery, extortion and subterfuge to follow.

Posted by iang at 07:54 AM | Comments (9) | TrackBack

May 02, 2007

more Tipping Point evidence - POS vendors sued

I wrote a week or so back about the failure of liability sharing and the consequent failure in market information. In that case, it circulated around the expectation that the banks have to back up the consumer every time something goes wrong. Is the TJX case enough to trigger the long awaited pass-on of liability to the other parties who share some responsibility?

Chris at EC points to Storefront:

Following lawsuits in February against some of the nation's largest retailers for illegally revealing too much credit card information on printed receipts, two of those retailers are now suing their POS vendors.

In the initial lawsuits filed early this year, some 50 of the nation's top retailers... were accused of printing full credit numbers and expiration dates on printed customer receipts, violating a provision of the Fair and Accurate Credit Transactions Act (FACTA) ...

In the last couple of weeks, two of those retail defendants—Charlotte Russe and Shoe Pavillion—have sued their POS vendors, saying that the retailer relied on them and if the retailer is liable, then the POS vendor should pay for it.

Is this a good thing? I think, yes. The alternates are not good: the vendor has no liability for actions, a law is passed that suits nobody, and things get worse.

Nick commented "Let the suing begin!" Better to suck up some court time and create an environment where -- no matter how small -- a vendor of security stuff has to work *with the customer's and the end-customer's risk model* and also take on some of the liability when it goes wrong.

Posted by iang at 11:24 AM | Comments (1) | TrackBack

April 30, 2007

e-gold responds -- denies Criminal Charges

Ordinarily I wouldn't follow the course of a case in such detail, contenting to only pick out the big picture and the important messages for Financial Cryptography readers. However, because of the 'special circumstances' in the e-gold case, I'll post the full response by Dr Jackson on the indictment from last week.


e-gold® Founder Denies Criminal Charges
April 30, 2007
Melbourne, FL

On April 24, 2007, a Federal Grand Jury handed down an indictment charging e-gold Ltd., Gold & Silver Reserve, Inc., and the Directors of both companies with money laundering, operating an unlicensed money transmitter business, and conspiracies to commit both offenses.

Dr. Douglas Jackson, Chairman and Founder of e-gold, speaking on behalf of his fellow Directors and both companies vigorously denies the charges, taking particular exception to the allegations that either company ever turned a blind eye to payments for child pornography or for the sale of stolen identity and credit card information.

Dr. Jackson states, "With regard to child pornography, the government knows full well that their allegations are false, yet they highlight these irresponsible and purposely damaging statements in order to demonize e-gold in the eyes of the public. During the Inquisition, accusations of witchcraft and heresy were used to sanctify torture and seizures of property. In post 9-11 America, child porn and terrorism serve as the denunciations of choice. e-gold, however, as a matter of incontrovertible fact, is the most effective of all online payment systems in detecting and interdicting abuse of its system for child pornography related payments. e-gold Ltd. is a founding member of the National Center for Missing and Exploited Children's (NCMEC) Financial Coalition to Eliminate Child Pornography. e-gold is the only member institution to demonstrate with hard, auditable data a dramatic reduction of such payments to virtually zero, while billions of child porn dollars continue to flow through other (heavily regulated) payment systems. [Most members, that is, all the banks and credit card associations are utterly unable to even provide an estimate of the volume of such payments processed by their systems. eBay's PayPal subsidiary, who may have the ability to make such a determination, has refused to do so and has indicated they destroy payment records after two years.] What is worse, until August 2005 when NCMEC courageously broke ranks with US law enforcement agencies and began directly notifying e-gold of criminal sites via the CyberTipline, component agencies of the US Department of Justice purposely concealed their knowledge of child pornography abuses from e-gold's investigators, subordinating actual crime fighting to a policy agenda designed to dirty up e-gold."

In December 2005, the Secret Service (USSS) deceived a Federal
Magistrate judge with bogus testimony in order to obtain search and
seizure warrants authorizing the government to seize the US bank
accounts of Gold & Silver Reserve, Inc. The seizure, which netted the
government about $ 0.8 million, was designed to put e-gold out of
business without due process, since G&SR serves as the contractual
Operator of the e-gold system. At a subsequent emergency hearing, the
government made no effort to defend their (sealed) allegations of
lurid criminality, falling back to a position that their action was
warranted because of a licensure issue. At the hearing, G&SR described
its ongoing dialog with the Department of Treasury, initiated by
formal request of the company in Spring 2005, to determine a possible
basis for regulating the company's activities, since it was patently
clear to competent authorities that G&SR's exchange service was not
encompassed within any existing regulatory rubric [subsequently
re-confirmed by experts at the Federal Reserve]. The US Attorney for
the District of Columbia, responsible for the prosecution, was
completely unaware of this orderly proceeding, as well as Treasury
reports issued the same week that acknowledged e-gold as an innovation
not meeting definitions of a money services business or a money
transmitter.

Since this time, the government has been confronted with overwhelming
evidence that the USSS had made a horrible mistake in its attack on
the e-gold system and its repeated defamatory claims in the media that
e-gold is anonymous, untraceable, and inaccessible to US law
enforcement. They have concealed the fact that Dr. Jackson had
personally arranged to come to USSS headquarters to train the USSS
cybercrime squad in December 2004 (along with agents of the UK's
National High Tech Crime Unit, and the Australian Federal Police) on
advanced techniques, particularly in the area of efficient interaction
with e-gold's in-house investigative staff, but was prevented when
senior USSS management learned of the initiative and forbade the
training on the grounds of a policy declaring e-gold as their
designated boogey man.

The Department of Justice has had to determine whether to continue to
stand behind their component agency. Their decision to close ranks has
directly resulted in a gross misallocation of resources, with the
result that vicious criminals who might have been brought to justice
remain at large. An example of this is the Shadowcrew investigation,
hyped by the USSS as a major success in disrupting international
credit card thieves. The USSS did not subpoena records from e-gold at
any time in their investigation, or engage with e-gold's superb
in-house investigative staff, with the result that the sophisticated
hierarchy of the ring was unmolested and probably strengthened while
the USSS hauled in the low hanging fruit, "a dime a dozen and
relatively easy to track down and pop".

Similarly, there is compelling evidence that the international cartel
of commercial vendors of child pornography continues to operate
because the FBI Innocent Images Unit and Special Agents within the
Immigration and Customs Enforcement Agency have been forbidden to
follow investigative protocols developed by Dr. Jackson, apparently
for fear of further belying the party line that e-gold is itself a
nefarious operation.

With regard to allegations of money laundering, Dr. Jackson notes
"G&SR's online exchange service, OmniPay, has for years followed
stringent customer identification procedures and an absolute policy of
only accepting money payments by bank wire. If bank wires aren't
already "clean" then what is? Furthermore, e-gold Ltd. can scarcely be
construed as a money launderer since it does not accept money payments
from anyone in any form and has never owned a single dollar, yen, euro
or any other brand of legacy money. As far as the possibility of a
criminal successfully obfuscating a money trail, e-gold is a closed
system. The only way to obtain e-gold is by receiving a transfer from
someone who already has some. e-gold is also the only payment system
accessible by the public that maintains a permanent record of all
transfers."

On April 27, 2007, the government served seizure warrants on G&SR
ordering it to freeze, liquidate and turn over to the government the
operating e-gold accounts of G&SR and e-gold Ltd. The value seized,
about $762 thousand worth of e-gold from e-gold Ltd. and about $736
thousand worth of e-gold from G&SR [on top of the $0.8 million seized
from G&SR in 2005, and the approximately $1 million spent by G&SR so
far in its defense] constitutes the bulk of the liquid assets of both
companies. Perplexingly, a post-indictment restraining order states
"Nothing in the provisions of this restraining order shall be
construed as limiting the e-gold operation's ability to use its
existing funds to satisfy requests from its customers to exchange
e-gold into national currency, or its ability to sell precious metals
to accomplish the same once approval has been obtained." Having taken
virtually the entire operating funds of G&SR and e-gold Ltd., that is,
the e-gold in both companies' own e-gold accounts, it is unclear if
the government has even a basic grasp of the operations it has been
investigating for three years at a taxpayer expense in the millions.

The most remarkable element of the restraining order is that the US
government deputizes e-gold with plenipotentiary powers to act as
judge, jury and executioner against any account user e-gold itself has
deemed to be a criminal: "It is further ordered that upon receipt of
this order the defendants are required to freeze, that is, not conduct
or allow any further transactions in e-gold accounts that the e-gold
operation itself has identified as being used for criminal activity".
Although not accompanied by an outright letter of marque, this
commission (the financial equivalent to double ought status?) would
appear to be an acknowledgement that e-gold's 'Know Your Customer'
prowess far exceeds that of any regulated financial institution, who
would be obliged to rely on court orders or other legal writs to
determine if freezing an account is warranted.

Concurrent with this latest attempt to knock e-gold Ltd. and G&SR out
of business and thereby effectively deny them due process, the
government also attacked other prominent exchange services that deal
in e-gold; IceGold, The Bullion Exchange, Gitgold, Denver Gold
Exchange, AnyGoldNow, and Gold Pouch Express, plus a sophisticated and
secure alternative payment system called "1MDC". All of the listed
exchange services also follow stringent Customer Identification
Programs congruent with what would be required of a currency exchange
business, if the law supported such a classification. Two of the
services, IceGold and AnyGoldNow, are located in Europe and deal
primarily with non-US customers. As a direct and immediate result of
the seizures, these companies, all of who had built a reputation for
honoring their obligations to customers in a timely fashion, have been
disrupted, and, at least in the case of Gitgold, checks to customers
issued in fulfillment of exchanges have bounced. This is a repeat of
what happened to G&SR as a direct result of the 2005 seizure, when
over 200 checks to customers bounced and refunds had to be sorted out
with severely crippled liquidity and without a US bank account.

It must not be overlooked that the search warrant obtained by
misrepresentations before a magistrate judge in 2005 resulted in the
government helping themselves to the financial records of hundreds of
thousands of American citizens [plus citizens of virtually every other
country] who had not been accused of any wrongdoing. Since the initial
raid, the prosecutor has caused the Grand Jury to order complete dumps
of the e-gold data base on three additional occasions.

This case has nothing to do with criminal activity, at least not on
the part of e-gold Ltd., G&SR, the named individuals or these other
exchange services of high reputation. It is about a Department of
Justice that is out of control, cognizant of having made a horrible
mistake but determined at all costs to preserve its turf. In a meeting
at the US Attorney's office in Washington on December 29, 2006, a
Chief Assistant US Attorney told us that the United States knew we
weren't "bad guys" and that the United States had no interest in
sending any of us to prison or causing e-gold to go out of business.
This was in virtually the same breath as proposing that the current
defendants plead guilty to Federal felony charges.

The plain fact is that the repeated statements and actions of the
government since 2001, especially the USSS, are directly responsible
for crippling e-gold's ability to market its service to mainstream
businesses and consumers, slowing [but fortunately not stopping]
e-gold's continuous development of advanced anti-crime capabilities,
subordinating US law enforcement's cybercrime fighting efforts to the
forlorn hope of destroying e-gold, driving market share to non-US
based alternative payment systems and making the US law enforcement
community the laughingstock of competent cybercrime fighting agencies
worldwide because of its obstinate inability to back down from the
USSS's longstanding e-gold vendetta.

All inquiries should be directed to the law offices of:
http://www.fuerstlaw.com/

Posted by iang at 05:08 PM | Comments (2) | TrackBack

April 28, 2007

e-gold founders indicted

Bob Hettinga found and forwarded the press release from the Washington DC courts:

A federal grand jury in Washington, D.C. has indicted two companies operating a digital currency business and their owners on charges of money laundering, conspiracy, and operating an unlicensed money transmitting business, Assistant Attorney General Alice S. Fisher of the Criminal Division and U.S. Attorney for the District of Columbia Jeffrey A. Taylor announced today.

The four-count indictment, handed down on April 24, 2007, and unsealed today, charges E-Gold Ltd; Gold & Silver Reserve, Inc.; and their owners Dr. Douglas L. Jackson, of Satellite Beach, Fla.; Reid A. Jackson, of Melbourne, Fla.; and Barry K. Downey, of Woodbine, Md., each with one count of conspiracy to launder monetary instruments, one count of conspiracy to operate an unlicensed money transmitting business, one count of operating an unlicensed money transmitting business under federal law and one count of money transmission without a license under D.C. law.

(Or here.) This is the next chapter in a long running saga. The e-gold investigation started sometime around 2002, with three primary agencies involved: IRS, FBI and USSS. The latter, the US Secret Service, has the original mission of protecting the currency, and hence their interest in money.

The actual charges are curiously not that interesting. Obviously, it is a money operation so there will always be a charge of Money Laundering, which in today's US courts is guilty by naming. Slightly less obviously, the charge of conspiracy just implies something else criminal was done by people acting together: and of course there are several people involved. So that charge simply succeeds if the others do, else it fails by definition.

Which leaves operating an unlicensed money transmitting business. This is the core charge. As we recall, this law came in in the aftermath of 9/11, when a Hawala was found to have transmitted one of the payments needed to finance the terrorist attack (the vast majority of the funds went through normal bank transfers). This then started a war on Hawalas, and the regulations were put in place * with a clear offer: license yourself as a money transmitter or face the consequences.

e-gold declined the offer. I recall that they argued they were not a money transmitter business because e-gold was not money, and the sales operation of Omnipay just used the banks to transmit the dollars back and forth. (This is from memory, these arguments were made in public in either the press or the mailing lists. ... Addendum: read Dr Jackson's response for more details on the position taken.)

I don't know about you, but that was a ludicrous position to take then, and now. It was pretty clear that the point was, come in from out of the wild wild west, or well go and hunt you down. To argue on a technicality like that was just insane, as courts will ignore such nonsense on the basis of a "reasonable man" test.

Is e-gold more or less in the money transmitting business? A reasonable man will say yes.

This characterises the extraordinary levels of arrogance of the e-gold founders. Because they had built a business that had seemingly escaped from the jaws of defeat and the evils of the banking cartel, they were right, God-blessed and destined to change the world. From their dramatic successes around 2000, there was a persistent belief in the righteousness of their mission, and an equal belief in the willingness of the courts to defend them. Because they were right!

Such hubris has to go down. Whatever we think about David versus Goliath stories, the US Government isn't happy to be taunted that way, and the competitors aren't going to let the USG proudly ignore the taunts. Consider all the banks in the US, and all the (licensed) money transmitters. And if that isn't enough, recall all the other countries in the world that suffered, and still suffer, the indignities of Ronald Reagan's war on drugs: every time there is a criticism about money laundering, all these players are going to keep banging the table about e-gold.

"Sort out your own house, first!" There is only one end to this story. A bad end.

Disclosure: I myself was closely engaged with e-gold in the years 1998 to 2000, and locked in court battles with them from 2001 to 2003. Before those battles, however, I argued that they should take no position that puts them up against (the, any) government. Luckily, e-gold filed my arguments in court, as evidence against me.

* Footnote on Law on Money Transmitters: historically the Hawala episode was just the excuse needed. The draft law had been circulating for some time, and had been inspired directly by the success of Paypal and e-gold in bypassing the normal banking regulations.

Posted by iang at 12:12 PM | Comments (8) | TrackBack

US moves to freeze Gold payment reserves

The gold community is a-buzz with the news ... first an announcement from BullionVault (no URL):

There have been growing stresses on our relationship with Brinks Inc, the US-owned vault operator, and it has become clear that they feel uncomfortable about continuing to vault BullionVault gold.

Why this might be so I am genuinely unable to say. Their exact reasoning has not been disclosed to us.

Fortunately, there is an excellent alternative available to us in ViaMat International, the largest Swiss-owned vault operator, and one which has a full quota of internationally located professional bullion vaults.

Swiss ownership suggests an independence from some of the pressures which Brinks may have found themselves operating under recently. Also you - our users - have chosen to vault 26 times as much gold in Switzerland as in the United States, so we believe this change will be both natural and welcome.

This is an echo of the old e-gold story, where different reputable vault companies handed the e-gold reserves around like it was musical chairs. BuillionVault is a new generation gold system, not encouraging payments but instead encouraging holding, buying and selling. It's not yet clear why they would be a threat.

But then, from 1mdc, a payment system:

ATTENTION

Friday Apr 27 2007 - 4AM UTC

It appears that a U.S. Government court order has forced e-gold(R) to close down or confiscate all of 1mdc's accounts. All of 1mdc account's have been closed at e-gold by order of the US Government.

Please note that it appears the accounts of a number of the largest exchangers and largest users of e-gold have also been closed or confiscated overnight: millions of Euros of gold have been held in this event. A couple of large exchanger's accounts have been shutdown.

If the confiscation or court order in the USA is reversed, your e-gold grams remaining in 1mdc will "unbail" normally to your e-gold account.

We suggest not panicking: more will be known on Monday when there will be more activity in the courts.

You CAN spend your 1mdc back and fore to other 1mdc accounts. 1mdc is operating normally within 1mdc. However you should be aware there is the possibility your e-gold will never be released from e-gold due to the court order.

Ultimately e-gold(R) is an entirely USA-based company, owned and operated by US citizens, so, as e-gold users we must respect the decisions of US courts and the US authorities regarding the disposition of e-gold. Even though 1mdc has no connection whstsoever to the USA, and most 1mdc users are non-USA, e-gold(R) is USA based.

You are welcome to email "team@1mdc.com", thank you.

Yowsa! That's heavy. And now, BullionVault's actions make perfect sense. Brinks probably heard rumour of happenings, and BullionVault are probably sweating off those pounds right now crossing the border with rucksacks of kg of yellow ballast.

It's worth while looking at how 1mdc worked, so as to understand what all the above means. 1mdc is simply a pure-play e-gold derivative system, in that 1mdc maintained one (or some) e-gold accounts for the reserve value, and then offered an accounting system in grams for spending back and forth.

1mdc then stands out as not actually managing and reserving in gold. Instead it manages e-gold ... which manages and reserves in gold. Now, contractually, this would be quite messy, excepting that the website has fairly generally made no bones of this: 1mdc is just e-gold, handled better.

So, above, 1mdc is totally uneffected! Except all the users who held e-gold there (in 1mdc) are now totally stuffed! Well, we'll see in time what the real story is, but when this sort of thing happens, there are generally some losers.

What then was the point of 1mdc? e-gold were too stuffy in many ways. One was that they charged a lot, another was the owners of e-gold were pretty aggressive characters, and they scared a lot of their customers away. Other problems existed which resulted in a steady supply of customers over to 1mdc, who famously never charged fees.

We could speculate that 1mdc was destined for sale at some stage. And I stress, I don't actually know what the point was. In contrast to the e-gold story, 1mdc ran a fairly tight ship, printed all of their news in the open, and didn't share the strategy beyond that.

It may appear then that the US has moved to close down competition. Other than pique at not being able to see the account holders, this appeared yesterday to be a little mysterious and self-damaging. Today's news however clarifies, which I'll try and write a bit more about in another entry:

...the Department of Justice also obtained a restraining order on the defendants to prevent the dissipation of assets by the defendants, and 24 seizure warrants on over 58 accounts believed to be property involved in money laundering and operation of an unlicensed money transmitting business.
Posted by iang at 11:15 AM | Comments (5) | TrackBack

April 20, 2007

The Begining of Governance - the Egyptian Accountants

Governance is about protecting the assets of the owner. Here's an anecdote on an early development in Governance, that reflects the arisal of robust accounting and predicts redundant computing:

IN THE BEGINNING

It’s said that accountants’ predecessors were the scribes of ancient Egypt, who kept the pharaohs’ books. They inventoried grain, gold and other assets. Unfortunately, some fell victim to temptation and stole from their leader, as did other employees of the king. The solution was to have two scribes independently record each transaction (the first internal control). As long as the scribes’ totals agreed exactly, there was no problem. But if the totals were materially different, both scribes would be put to death. That proved to be a great incentive for them to carefully check all the numbers and make sure the help wasn’t stealing. In fact, fraud prevention and detection became the royal accountants’ main duty.

Accounting is both a mundane tool for telling you how much you have, and a critical tool for stopping that "how much" from shrinking through theft. Hence, it is a Governance tool as well; double-entry accounting is also a tool to achieve a governance feature, by the magical trick of clearly identifying errors and separating them from intent.

In the absence of double entry, the Egyptians solved the errors problem using redundant computers. Just like today's designs for redundant computers, errors caused the shutdown of the system, although it seems that Egyptian designs for redundant computers did not advance to voting and quorum systems.

Posted by iang at 06:33 AM | Comments (1) | TrackBack

April 09, 2007

Does non-profit mean non-governance? Evidence from the fat, rich and naive business sector

I've previously blogged on how the non-profit sector is happy hunting grounds for scams, fraud, incentives deals and all sorts of horrible deals. This caused outrage by those who believe that non-profits are somehow protected by their basic and honest goodness. Actually, they are fat, happy and ripe for fraud.

The basic conditions are these:

  • lots of money
  • lots of people from "I want to do good" background
  • little of the normal governance is necessary

Examples abound, if you know how to look. Coming from a background of reading the scams and frauds that rip apart the commercial sector, seeing it in the non-profit sector is easy, because of the super-fertile conditions mentioned above.

Here's one. In New York state in the US of A, the schools have been found taking incentives to prefer one lender over another for student loans.

[State Attorney-General] Cuomo has sent letters to and requested documents from more than a hundred schools for information about any financial incentives the schools or their administrators may have derived from doing business with certain lenders, such a gifts, junkets, and awards of stock.

A common practice exposed by Cuomo is a revenue-sharing agreement, whereby a lender pays back a school a fixed percentage of the net value loans steered its way. Lenders particularly benefit when schools place them on a short list of “preferred” lenders, since 3,200 firms nationwide are competing for market share in the $85 billion a year business.

Here's an inside tip that I picked up on my close observance of the mutual funds scandal, also brought by then NY-AG Elliot Spitzer (now Governor, an easy pick as he brought in $1.5bn in fines). If the Attorney-General writes those letters, he already has the evidence. So we can assume, for the working purposes of a learning exercise, that this is in fact what is happening.

There's lots of money ($85Bn). The money comes from somewhere. It can be used in small incentives to steer the major part in certain directions.

To narrow the options, most schools publish lists of preferred lenders for both government and private loans. They typically feature half a dozen lenders, but they might have only one. Students should always ask if the school is getting any type of payment or service from lenders on the list.

To get a loan, schools must certify that you are qualified. By law, schools can't refuse to certify a loan, nor can they cause "unreasonable delays," because you choose a nonpreferred lender. That said, many schools strongly discourage students from choosing a nonpreferred lender.

...

The University of North Carolina at Chapel Hill tells students on a form that if they choose a lender other than the school's sole preferred lender for Stafford loans, "there will be a six-week delay in the processing of your loan application" because it must be processed manually.

How do we address this? If we are a non-profit, then we can do these things:

  • pick a very solid mission.
  • build an environment that supports that mission, down to the cellular level.
  • create an open disclosure policy which allows others to help us pick up drift.
  • especially, create a solid framework for all "deals."
  • put together a team that knows governance.

It's not so exceptional. Some schools got it:

Thirty-one other schools joined Penn and NYU in adopting a code of conduct that prohibits revenue-sharing with lenders, requires schools to disclose why they chose preferred lenders, and bans financial aid officers and other school officials from receiving more than nominal gifts from lenders.

Clues in bold. How many has your big fat, rich open source non-profit got? I know one that has all of the first list, and has none of the second.

Posted by iang at 07:19 AM | Comments (3) | TrackBack

March 06, 2007

Open Governance - using the 5th Party to protect the asset

Some many years ago I created a five parties model that used the public as the fifth party to bind all the others together in governing the toughest of assets: money. 5PM is now the benchmark for digital gold issuers, and while not universally adopted, it is widely understood. While I say it myself, I think it a lot more effective, bang for governance buck, than the efforts of the national competitors.

Mostly 5PM is just classical separation of roles (sometimes known as 4 eyes principle), but it also introduced the new factor of open governance: disclosure of key facts to the public, who then audit and share their results over the Internet.

The innovation of open governance creates a dramatic shift in classical governance, as it moves tasks that were previously only possible with (expensive) audits or (backfiring) regulations across to the open market. Solutions then emerge in accord with what stakeholders want to spend, and they emerge in interesting ways.

And, oh so many interesting possibilities! John Quarterman posts:

  • Bakersfield pothole map -- Locals report seeing potholes and they get mapped.
  • U.S. Fatalities in Iraq -- Someone has taken the home of record for each U.S. fatality in Iraq and mapped it.
  • Chicago Crime Map -- This one says down at the bottom: "Important disclaimer: This site is not affiliated with the Chicago Police Department. This site uses crime data obtained from the CPD's Citizen ICAM Web site, which is a publicly available database of reported crime. Please read the Citizen ICAM disclaimer to understand the data fully."
  • Bakersfield homicide map -- "This is a map of Homicides in the Bakersfield area that occured in 2006. Locations are approximated and based on data provided by the Office of the Coroner."

In every one of those, people have identified an asset, and have created an open participatory forum for sharing information about it. Why? To protect the asset, of course.

This is a darn sight less expensive than classical forms of governance (regulations, external auditing, but also see how the above list directly challenges representational democracy and internal auditing). As those efforts move steadily, deeper into stormy weather, we can expect open governance to become more and more important in securing assets. Mark the rising star as one to watch.

Posted by iang at 05:13 PM | Comments (2) | TrackBack

February 27, 2007

Insider fraud -- innocent client networking or excessive liposuction?

Insider fraud is like an evil twin of security. From the "it could be you" department...

There has been an internal feud at the company for some time between joint owners Kevin Medina, CEO, and John Naruszewicz, vice president, which culminated in a February 12 lawsuit.

Naruszewicz sought, and received, a preliminary court injunction preventing Medina from accessing the company's funds. Naruszewicz claimed that Medina had been using corporate money to pay for a life of luxury, at the expense of the company and its customers.

Among the allegations were claims that Medina has used Registerfly's money to pay for a $10,000-a-month Miami Beach penthouse, a $9,000 escort, and $6,000 of liposuction surgery.

Many "security people" from the new, net-based culture only discover what older value institutions have known for centuries -- and then only when it happens to them.

The overall lesson that we need to bear in mind is that the twins should be kept in balance: cover the external security to the same extent as the internal security. Security proportional to risk, in other words, as having perfect security in one area is meaningless if there is a weak area elsewhere.

That's a case from the computer industry: It could be you... We can imagine that it all started out as an innocent need to network with some important clients.

(Note that the unsung hero here, the VP who challenged the fraud, will probably never be rewarded, thanked, or protected from counter-attacks.)

Posted by iang at 10:28 AM | Comments (0) | TrackBack

February 21, 2007

How to breach a company: Spies, Lies and KPMG

KPMG is in trouble again, this time for being breached. If you are one of the world's select group of targetted companies, read the whole article. Here's the teaser:

The intelligence firm was originally looking for people who fit one of two profiles for sources likely to leak the audit information, according to a Project Yucca planning memo. One personality type was a "male in his mid-20s who is somewhat bored...has a propensity to party hard, needs cash, enjoys risk, likes sports, likes women, is disrespectful of his managers, fiddles his expenses, but is patriotic." The memo described the second personality type as "a young female who is insecure, overweight, bitchy, not honest. Someone who spends money on her looks, clothes, gadgets. Has no boyfriend, and only superficial friends. Has a strong relationship with her mother." Apparently, no one on Diligence's list quite fit either profile, but the firm settled on Enright, the British-born accountant.

Do you know anyone like that in your company? Probably you do, and that is no coincidence.

There are several stock responses, pick one:

  • that would never happen to us!
  • how could that happen to an audit firm?
  • isn't that illegal?

Leaving naivete aside, consider what in your firm stops would catch this and stop it. It's a standard governance exercise.


FEBRUARY 26, 2007

INVESTIGATIONS

Spies, Lies & KPMG
An inside look at how the accounting giant was infiltrated by private intelligence firm Diligence

In the spring of 2005, Guy Enright, an accountant at KPMG Financial Advisory Services Ltd. in Bermuda, got a call from a man identifying himself in a crisp British accent as Nick Hamilton. Hamilton said he needed to see Enright about matters of utmost importance.

Over the course of two meetings, Hamilton led Enright to believe he was a British intelligence officer, according to a person familiar with the encounters. He told Enright he wanted information about a KPMG project that Hamilton said had national security implications for Britain. Soon, Enright, who was born in Britain, was depositing confidential audit documents in plastic containers at drop-off points designated by Hamilton.

But Nick Hamilton was not an agent of Her Majesty's secret service, and the documents never found their way to the British government.

Nick Hamilton was in fact Nick Day, now 38, a onetime British agent and co-founder of Diligence Inc., a Washington private intelligence firm that counts William Webster, former director of the CIA and FBI, among its advisory board members. Diligence's client was not Britain's Queen, but Barbour Griffith & Rogers, one of the most formidable lobbying firms in Washington. Barbour Griffith represented a Russian conglomerate whose archrival, IPOC International Growth Fund Ltd., was being audited by KPMG's Bermuda office.

A 2006 scandal involving Hewlett-Packard Co. (HPQ ) put the issue of corporate espionage in the headlines. Diligence's methods, revealed in court documents and interviews by BusinessWeek, show how far some in the corporate investigation business will go.

"PLAUSIBLE DENIABILITY"
Without denying this account of events in Bermuda, Diligence's Day says: "We've always respected the laws of the jurisdictions in which we operate." He adds that corporate intelligence firms like his provide an invaluable service. "We essentially help businesses deal with the risks of operating in challenging markets," Day says. "It's a role which government agencies don't necessarily have the resources or understanding to be able to fulfill."

From the start, Diligence's goal was clear, if far from simple: Infiltrate KPMG to obtain advance information about the audit of IPOC, an investment fund based in Bermuda. Russian conglomerate Alfa Group Consortium hired Barbour Griffith & Rogers through a subsidiary, and the lobbying firm in turn hired Diligence. Alfa is dueling with IPOC for a large stake in the Russian telecom company MegaFon. "We have a good chance of success on this project," Day wrote in an internal Diligence memo, referring to the Bermuda espionage effort. The memo, which BusinessWeek reviewed, added: "We are doing it in a way which gives plausible deniability, and therefore virtually no chance of discovery." Similar Diligence operations, the memo noted, had been successful before.

Within Diligence the KPMG campaign was dubbed Project Yucca, and it unfolded in stages, according to people familiar with the operation and documents filed in a court proceeding involving IPOC and Alfa in the British Virgin Islands. First, two Diligence employees contacted KPMG's Bermuda offices pretending to be organizers of a legal conference on the island, according to a person familiar with the operation. The Diligence staff members called KPMG secretaries and asked about how the office worked. Soon, Diligence had the names of a handful of KPMG employees who might have access to the IPOC data. But Diligence wanted to narrow the list.

The intelligence firm was originally looking for people who fit one of two profiles for sources likely to leak the audit information, according to a Project Yucca planning memo. One personality type was a "male in his mid-20s who is somewhat bored...has a propensity to party hard, needs cash, enjoys risk, likes sports, likes women, is disrespectful of his managers, fiddles his expenses, but is patriotic." The memo described the second personality type as "a young female who is insecure, overweight, bitchy, not honest. Someone who spends money on her looks, clothes, gadgets. Has no boyfriend, and only superficial friends. Has a strong relationship with her mother." Apparently, no one on Diligence's list quite fit either profile, but the firm settled on Enright, the British-born accountant.

Enright soon got a call from Diligence's Nick Day, posing as Nick Hamilton, according to a person familiar with the situation. The two agreed to meet for lunch near the KPMG offices in Hamilton, Bermuda. At lunch, Day, who is dark-haired and has a warm smile, said the assignment he had in mind for Enright was top secret and involved Britain's national security. Day kept the conversation vague, never mentioning IPOC or the audit, according to the person familiar with the situation. Day told the accountant he would have to undergo a British government background check to ensure that he was up to the task. Day produced an official-looking--but fake--questionnaire with a British government seal at the top and asked for information about Enright's parents, his professional background, any criminal history, and political activities, according to a copy of the questionnaire reviewed by BusinessWeek. Enright provided the information.

Several weeks later the two men met again, this time in a local bar, says the person familiar with the events. Day, still calling himself Nick Hamilton, told war stories from what he said were his days in the Royal Navy's Special Boat Service, Britain's equivalent of the U.S. Navy SEALS. He then steered the conversation toward his real interest: What did Enright know about the KPMG audit of IPOC?

Soon, Enright was handing over confidential audit documents, including transcripts of interviews KPMG had conducted in the IPOC investigation, according to court documents on file in the British Virgin Islands and the source familiar with the events. Day picked out a rock in a field along Enright's 20-minute daily commute from his home in Elbow Beach and placed a plastic container under the rock, creating what spies call a dead drop site. At appointed times, Enright slipped new material into the container, which Day later retrieved. On one occasion, Enright left documents in the storage compartment of his moped, which he parked at his home. Enright had told Diligence employees where he hid the keys to the moped. When Enright left for a trip, Day collected the papers, according to the person familiar with the situation.

Day and Diligence took elaborate precautions to make sure Enright wasn't himself a plant or a corporate spy, people familiar with the events say. Diligence employees followed Enright from his office to every meeting with Day. A Diligence employee was at each meeting spot before the men arrived to determine whether Enright was using associates for surveillance. Enright was followed to his destinations when meetings ended. When Day left the meetings with Enright, the source says, the Diligence executive followed a process spies call dry cleaning, which was designed to detect whether Day was being followed. He walked a prescribed route through several narrow "choke points" that made it possible for Diligence employees to identify anyone who might have been tailing him.

MYSTERY WHISTLEBLOWER
Diligence was paid handsomely for its work. An invoice produced in a federal court proceeding in Washington involving IPOC and Diligence shows that Barbour Griffith was billed by Diligence "For Bermuda report and Germany work--A Telecom." Diligence was paid $25,000 a month, plus $10,000 a month for expenses, according to documents reviewed by BusinessWeek and an interview with a person familiar with the matter. The company was also paid a $60,000 bonus for acquiring the first draft of KPMG's audit of IPOC. Diligence's total take couldn't be determined.

The undercover Project Yucca ended after someone--it remains unclear who--dropped a bundle of papers at the Montvale (N.J.) office of KPMG on Oct. 18, 2005. The papers included Diligence business records and e-mails with details of Project Yucca.

On Nov. 10, 2005, KPMG Financial Advisory Services sued Diligence for fraud and unjust enrichment in U.S. District Court in Washington. On June 20, 2006, the case settled. Diligence paid KPMG $1.7 million, according to a person familiar with the settlement.

On June 15, 2006, IPOC sued both Diligence and Barbour Griffith & Rogers in the same District Court, alleging civil conspiracy, unjust enrichment, and other misdeeds. That case is pending. Gavin Houlgate, a spokesman for KPMG, declined comment, as did attorneys for KPMG at the New York law firm Hughes Hubbard & Reed. Kirill Babaev, a vice-president at Alfa's telecom arm in Moscow, said in a statement when asked about Alfa's involvement in the Diligence operation: "We are...not a party in any litigation with IPOC, and therefore cannot comment on any rumours or speculations in this regard."

Barbour Griffith & Rogers' most famous co-founder is Haley Barbour, who is now governor of Mississippi. Barbour left the lobbying firm in 2003, before the Diligence operation began. Another Barbour Griffith co-founder, Ed Rogers, was an early investor in Diligence. The lobbying firm rented space at its Pennsylvania Avenue offices to Diligence. Edward MacMahon, a lawyer for Barbour Griffith, says the firm has done nothing wrong and that no one affiliated with Barbour Griffith currently has an equity stake in Diligence. A person familiar with Diligence says the firm's shareholders are CEO Day, former U.S. Ambassador to Germany Richard Burt, Edward Mathias of Washington-based private equity firm Carlyle Group, and Buenos Aires private equity firm Exxel Group. Burt confirms he is Diligence's chairman but declines to discuss Project Yucca. Mathias confirms he is an investor in Diligence but says he is unaware of the Bermuda events. Exxel Group lists Diligence among its portfolio companies on its corporate Web site but did not respond to an e-mail seeking comment.

It's unclear whether Diligence broke any British or American laws. In an interview at his Washington office, Day says he and his firm always stay within the law but have learned much since 2005: "As an organization we've changed a lot as a result of everything we've been through in the last year." He says Diligence has "spent a lot of time training our staff as to what they can and cannot do."

In a statement to BusinessWeek, IPOC director Mads Braemer-Jensen said: "The fact that Alfa hired Barbour Griffith & Rogers and Diligence to use illegal and dishonest smear tactics against IPOC just shows that Alfa is trying to change the subject away from the fact that they stole from IPOC. We hope the U.S. and Bermuda law enforcement authorities will make note of this and take appropriate action against Alfa."

Guy Enright, who now works for Deloitte & Touche in London, declined repeated requests for comment on his relationship with Nick Day and his work on the IPOC audit. The terms of Enright's departure from KPMG couldn't be determined. But he apparently didn't come away empty-handed from his encounters with Nick Day.

As Project Yucca wound down in 2005, Day, still in the guise of Nick Hamilton, gave Enright a Rolex watch worth thousands of dollars, according to two people familiar with the present. Enright was led to believe it was a thank-you gift from the British government, but it, too, came from Diligence.

By Eamon Javers

Posted by iang at 07:04 AM | Comments (4) | TrackBack

February 11, 2007

Why Linux doesn't care about governance...

The Mozilla governance debate is running hot, rejoinders flowing thick and fast. Here is a seriously good riposte by James Donald:

A successful open source project has a large effect on what large numbers of people do. The effect has a large indirect effect on various for-profit ventures, who then proceed to give handouts to the non profit open source project. Thus, for example, linux was the beneficiary of vast amounts of work by engineers employed by corporations who feared that they would be screwed by Microsoft or wintel, and urgently wanted to have an alternative, or, in the case of Sun, had to ensure that their customers had an alternative.

In that case, the big corporations were the good guys, reacting against the dangerous power of a particular big corporation, protecting everyone in the course of protecting themselves.

More nefarious activities are common: For example OpenID is backed by XRI, and tends to do things that are more in the interests of XRI rather than support the objectives of OpenID - but then there is nothing terribly wicked or nefarious about the objectives of XRI.

Getting back to the case in dispute, the various browser responses to phishing, to the internet crisis of identity and security, make more sense as a Verisign business plan than as a response to phishing, and in so doing harm security, in the sense that they are disinclined to take any effective action, for any effective action would compete with the services provided by Verisign.

We don't need to worry about governance with linux, for the interests of the contributors are well aligned - they all want free software ("free" as in "free speech", not just "free" as in "free beer") that does all the things that Microsoft's unfree software does) So we just proclaim Torvalds dictator and let him get on with it. No one cares about linux governance.

Trouble is that some of the contributors to Mozilla want to paid for security, which means that they do not want Mozilla to provide free security - neither in the sense of free speech, nor in the sense of free beer.

And Mozilla really should provide free security.

Now, we might not agree with everything written above ... but James does raise the rather good point that there is a big difference between the Linux community and the Mozilla community.

Superficially, there is tight control over both projects. In the first case by Linus, Grand Vizier and Despot Over all his Kernels and Dominions. In the second, MoFo developers are Most Benevolent and Principled Dictators, Defenders of the Freedom of all our Code in all our Repositories. To paraphrase.

Both despots, both dictators. Here is the difference. Linus only rules over the kernel; which is then fed to 100 or more secondary tier distributors, within the freedom granted by GPL. They then feed it to users.

In contrast, Mozo rules over the whole show. The user interface ("UI") is controlled by the Mozo developers, but not by Linus in his project. For Mozo the money comes flooding in like the spring melt because they have a vast user base wanting to access the lodestone of net commerce: search engines.

For the linux kernel there is no such centralised opportunity, as the UI is controlled at the remote distro level. In practical terms, the Linux commercial opportunity has been outsourced into the free market of Redhat, Ubuntu, Suse, Debian and a hundred others.

The reason that no-one cares about Linux governance is that the very structure of the Linux industry is the governance. The governance issue of regulating benefits and opportunities is solved by placing it were it is best dealt with: in the market place.

Expressed as a principle, Linus says it's ok to be a systems despot, but, please, let the UI go free.

Posted by iang at 11:34 PM | Comments (0) | TrackBack

February 07, 2007

on Governance

Governance seems to be a term that is less familiar to more than a few. So I will try and paint a picture of it. (Caveat: Governance is a huge field, so it won't be possible to give more than a small overview...)

The closest to what we mean in Financial Cryptography is what is called Corporate Governance; other uses of the term suffer from manipulation. In the corporate world, Governance is in essence the need to align the organisation's decision makers with the interests of the organisation itself. (We will come to the non-profit versus for-profit issue later.)

Let's get right back to basics and consider two people, an Owner and an Employee. The owner's interests are aligned with her decisions; if not she loses money.

However her employee has a more perverse situation: his decisions are naturally aligned with his own interests, which might be contrary to the interests of the owner.

(This is called the Principal-Agent problem, where the Principal is the owner, and the employee is an Agent of the Principal. The Agent has a conflict of interest, whereas the Principal does not, in simple terms. It is a widely studied theory.)

The Shop of Humble Things

Pretty dry stuff, so let's try an example. The canonical story is that of a small retail shop. How does the Owner structure things such that the Sales Assistant doesn't simply keep the money handed him by the customer?

Several age-old inventions created revolutions that enabled our humble shop to advance to greater things. Here's two from the Halls of Governance Fame:

1. The cash register (or till or box). These days we think the cash register is about the need to calculate change and store the cash safely from robbers, but its original success was due to something else: the creation of a separate box that created a mental and physical barrier between the Agent's money and the Principal's money.

Think here of the old shop assistant's uniform -- a huge pair of overalls with 2 grand pockets in the front, and you'll see where we are heading. The Agent can put the Customer's payment into his 2 grand pockets ... and simply forget some or all of it!

Who's to say?

Instead, by putting the money into the box clearly labelled as the Principal's cash register, a protocol was established; if any money was taken out, that was theft, and if the Customer's money didn't go in, that was also theft.

2. The receipt. Again, today, we think of the receipt as the "customer's right." No such! At least not primarily; its core purpose in life is not evidence for the customer, but evidence for the Principal. At the end of the day, the money in the cash register is counted up, and if the total of receipts didn't match the amount of money, then we have a problem.

So why does the Customer get a receipt? Because the Customer checks that the Principal gets a receipt!

In order to make both the above inventions work, the customer was signed up as an unwitting but interested participant in the purchase of Humble Things. She is encouraged to participate in the protocol by one means or another, and is encouraged to report infractions to the owner. With the receipt, we want her to make sure that the Shop Assistant fills out a copy for the Owner, so the owner rewards her with a copy as well. When she sees money going into those 2 grand overalls pockets, she is encouraged to think about rising prices due to theft.

These two inventions created a revolution in shops: they and other Governance techniques meant that it was possible to employ Agents and trust them to work unsupervised.

Corporate Governance

So what do we mean by Corporate Governance? Simply the enlarged form of the above: using techniques like the cash register to construct larger, better and more trustworthy enterprises.

Imagine your new job is Financial Controller at Enron! Do you get into the spirit of financial engineering, and shovelling of huge bundles of corporate value into obscure corporate vehicles for later profiting ... by self ... or do you work to clean all this up and make the money work for the shareholder?

Well, it all depends on how the interests are aligned. Do you get to keep the money? We all know that everyone has a price, and it only depends on the *amount* money on offer ... we also know that the equation is fundamentally one of risk and likelihood: A nigerian scam offers you millions, but you know that the chances are ridiculous, so your expectation is negative.

So, for our financial controller at Enron, it is *just* another risk calculation, and <ahem> he's very good at that, because risk is his job!

What stands in his way is: Governance. Enron was nothing but a failure in governance.

Corporate Governance, then, is the mission of establishing the shareholder as the ultimate benficiary and searching for the best way to reward that shareholder for her investment. It *specifically* looks at how we align the interests of all the players -- directors, managers, etc -- so that they all work to reward the shareholder.

And, not themselves. Governance works on the expectation that directors and managers will consider their own interests before that of the shareholders. How we deal with that is the art and science of governance; we don't eliminate it, nor even totally control it, but we search for the profitable balance, the convenient seduction, the ultimate win-win. You pick the terms, but recognise that Governance starts when you understand that the employees are on a pay-packet, and that will always be stronger than their interests in the welfare of the shareholder.

Non-profit Governance

Now, how does this all apply to an organisation without shareholders? Well, obviously, the interests cannot be aligned because there is no benchmark available -- no shareholder. Does this mean that Corporate Governance is null and void in the world of non-profits?

Not at all. It means that we start from an absence of Governance, which is a worse situation than a corporation without governance. With a corporation, the owners can always sack the board and start again, albeit with losses. With a non-profit, we can't even take that drastic step.

How we deal with this is tough. I'm no expert on non-profit governance, but I can offer some tips. First one:

Identify the stakeholders. These people can be impressed into service as proxy shareholders; in that where we would align interests to shareholders before, now we align interests to the stakeholders.

Next, identify the interests of the stakeholders. As we aren't paying them money, it will have to be something else. Money is fantastic for this purpose because each payment ("dividend") is measurable and comparable, and it will be hard to come up with something as good as money to create a feedback loop. But, it is possible.

Then, align the interests of employees to the above interests of the stakeholders. E.g., maybe your stakeholders are interested in "choice in software." If so, we could measure how many choices you offer, and what proportion of the population chooses your choice. Then, we could reward the employees on how the growth in choice pans out over time.

By way of example, consider an option on future market shares of software. Imagine you give me an option on 19% share for our product Fuxbirdie within the overall market for brailers. When Fuxbirdie reaches 19%, I get paid out a buck, and if not, it expires worthless.

Summarising the Governance of Humble Things

Governance isn't exciting. It doesn't seem to get more code written, it doesn't get your picture in Linuxworld, and there are no awards. It literally is the last and most ugly thing to work at.

It is also the thing that fewest honest people understand least well, and most crooked people understand very well. For the crooks, it is their way to their pot of gold, without even the sense of theft; it is the ultimate fraud, one that actually .. didn't happen because the crook changed the rules to make it work in his favour.

Governance is simply about identifying your core stakeholders, their interests and then aligning the business to your stakeholders and interests. Now, your interests. It's easy if you are a Corporate, as the profit motive and shareholder base are easily set up.

It's a bit harder as a non-profit; but there is an avenue in identifying stakeholders, and their interests.

Annex: Things Excluded from FC's meaning of Governance

  • Political governance, as defined by the World Bank.

  • Project governance, at least as described in wikipedia. That's what I would call standard project management, dressed up with a new name for the purpose of selling more consultancy time. Call me cynical...

  • Also, IT governance, as seen here, is not it:

    A characteristic theme of IT governance discussions is that the IT capability can no longer be a black box. The traditional handling of IT management by board-level executives is that due to limited technical experience and IT complexity, key decisions are deferred to IT professionals. IT governance implies a system in which all stakeholders, including the board, internal customers and related areas such as finance, have the necessary input into the decision making process. This prevents a single stakeholder, typically IT, being blamed for poor decisions. It also prevents users from later complaining that the system does not behave or perform as expected:

    A board needs to understand the overall architecture of its company's IT applications portfolio ... The board must ensure that management knows what information resources are out there, what condition they are in, and what role they play in generating revenue... [1]

    Again, this is an old pig called "management." Putting it in a dress and calling it governance doesn't help. I'd speculate that it is done that because telling the board that they don't understand IT isn't helpful, but telling them that it is governance might wake them up.

  • This is closer, and it might resonate for some people. "Good Governance" as applied in "development literature"

    "Simply put "governance" means: the process of decision-making and the process by which decisions are implemented (or not implemented). Governance can be used in several contexts such as corporate governance, international governance, national governance and local governance.

    Since governance is the process of decision-making and the process by which decisions are implemented, an analysis of governance focuses on the formal and informal actors involved in decision-making and implementing the decisions made and the formal and informal structures that have been set in place to arrive at and implement the decision."

    Posted by iang at 06:41 PM | Comments (1) | TrackBack
  • Stakeholders in Security

    Over on anti-fraud, Gervase asked:

    >> Perhaps you should define "stakeholder" while you are here.

    Ok, fair question. I received a huge tome entitled Phishing and Countermeasures in the post a week or so ago, and it includes lots of academic articles. In one, in a discussion of behavioural studies of phishing, it says:

    As previously stated, Smetters and Grinter [39] have made the claim that there are three groups of stakeholders to consider in the design of security technologies, namely developers, administrators, and end-users. They claim also that the latter two groups are the primary focus of most security-related research. Finally, they claim that end-users are more frequently forced to be their own systems administrators nowadays, leading to an undesirable condition in which managing security is more complex for end-users than ever.

    The notion that the stakeholders are developers, administrators, and end-users is perhaps the most obvious inventory. In a larger sense, all of society is affected by the security and trustworthiness of the online world, and we should not here discount the effects on all of society that arise when the security rights of individuals are violated. In global terms, the very notion of transactions between people and societies can be effected by the level of collective trust that depends on the reported experience of individuals.

    [discussion of personas, snipped] ... it is not enough to design a system that makes it easy for security experts to manage the security of their transactions systems, but also it is necessary to design systems that make it possible for other kinds of people to easily become aware and act compliantly.

    The full article is "Behavioural Studies," Jeffrey Bardzell, Eli Blevis, and Youn-kyung Lim.

    To complete the discussion, "stakeholder" is a term that sits in opposition to "shareholder;" it both identifies others who are important, and also asks organisations without shareholders to go through the same exercise as those with.

    See also the 2nd (managament) definition on wikipedia.

    Posted by iang at 04:09 PM | Comments (4) | TrackBack

    January 30, 2007

    EV - liability situation is SNAFU

    Over in MozoLand, they have opened up a bug track on the problems with Extended Validation certificates, as their way of carrying out the debate as to what Mozo should do. Using bug tracking systems doesn't mean "EV is a bug," it just fits the process and culture of the people concerned.

    As I'd commented before about EV, and hit on the liability issue as one big area, the following is a more clear description of the issue: possibly suitable for filing as a bug. I just find it easier to wax on in blog form when it reaches a certain level of complexity.

    Classically and simply, the certificate business is one that promises coverage of some form for MITMs (such as phishing attacks) to Internet browser users (relying parties, perhaps), while charging server users (subscribers) for the privilege. It is structured as a systemic franchise, meaning a group of interlinked but independent business units such as CAs, server vendors and browser vendors, operating to provide a single cohesive service; which term I just coined to capture the lack of transparency and potential problems incumbent in that opacity.

    In practice, the promise of "safe Internet browsing" is generally false, as evidenced by phishing. In particular, CAs more or less generally seek to reduce their liability to Internet browser users to zero, using a variety of tricks [1]. For example, in law, there is generally no liability if there is no contract or no specific legislation; so a common trick is for CAs is to hand out contracts that spell out that liability only exists if the crypto has been breached or other conditions that are statistically or security-wise irrelevant.

    The new EV Guidelines may then be viewed on whether they improve on this position, from the pov of users and other stakeholders. Some comments follow that attempt to interpret/predict any new liability position that arises for CAs to browser users under EV [2].

    The big picture within the Guidelines is at page 42. Here is my summary:

    37.(a). CA Liability

    (1) Subscribers and Relying Parties.

    A. If the CA is compliant with EVG, then it is not liable.
    B. If the CA is *not* compliant then it may seek to limit liability.
    C. But not to any lower than $2000 per customer.

    So what we have is that if CAs did the "right thing," then they are not liable, but even if they did the wrong thing, then they are only liable for up to $2000!

    Let's get specific:

    1. We know that the average phish is around $1000. Many are more, of course, and some frauds have reached towards $100,000. Now, maybe we don't want to limit liability to $100k ... but something a lot greater than twice the average phish -- data which we know have for some 3 years -- would be somewhat more impressive.

    2. It has been suggested that the base price of an EV certificate will be around twice the existing "best of class" cert. That is, around $2000 from Verisign.

    So in effect, for any one customer, the issuer is likely only liable for the same amount as the monies which they have accepted, albeit from the subscriber. This happens to be a normal watermark in both contract and law anyway.

    3. Even when phished, you aren't covered. If there is a flaw in the Guidelines, you're not covered. If there is a flaw in the browser, you're not covered (but see "Indemnification" for more confusion).

    4. Only if there is an error in the CA's actions are you covered. This could be as egregious as issuing a summer madness discount package of certs for all the Banks in in all the Americas to the Russian mobsters... and the CA still may limit liability to $2000!

    5. Further, there is no hint anywhere that CAs should take on an expected liability of $2000. This is not an insurance policy by any stretch of the imagination; quite the reverse, as the CA

    may seek to limit its liability ... by any means that the CA desires ...

    provided that the monetary amount is capped at $2000.

    What does this mean in plain words for liability? Knock yourselves out, guys: Use all those old barriers and reduce the expected liability to zero. Just state that the monetary damages upper limit is $2000.

    6. For one tiny example, the statement that CAs are not liable if they are compliant with EVG is simply that: a trick to reduce liability. EVG is no contract, it is simply yet another document to wave in front of the judge and make him or her want to clear this horrible case from the calendar.

    7. For further small example, what lawyer will take on a legal case for $2000? US attorneys won't deal, and no expert witness will testify on your behalf on whether the CA made a mistake (yes, you will need expert help, unless you actually understand the Guidelines....). And, um, how many attornies do the CAs have call on?

    8. Bottom line is that EVG has practically knocked out all possibility of an individual case. This doesn't exclude for example class-action cases ... but if that's the case, it should just say that, if there was any interest in serving users. It doesn't, and there isn't.


    To summarise. There are some benefits on behalf of the user here. It is useful for users and courts to at least know that with EV certs, there is the admission of potential liability . And with pre-EV certs, there is no admission of any useful liability at all; nix liability, zero, zip, nada, m'lord. It can then be up to a court to determine just how viable these disclaimers and limits are.

    It's also beneficial to put these above numbers in perspective. Try this free test: go to your favourite computer store, pick up any soho-grade UPS like an APS or a Belkin, and read the blurb on the box.

    (You don't need to buy to read...)

    An uninterruptible power supply (in the US at least) carries a guarantee or warranty that claims that it will pay you for damages incurred if it fails to protect your PC. The limits are something like $50,000 for a $50 unit and $100,000 for a $100 unit. ('scuse flaky memory here ...)

    Serious surge protection is needed about as frequently as lighting strikes hit your block. UPS manufacturers are prepared to cover you for the surges that fry your whole office, but EV issuers won't cover more than your laptop, and on past acturial bases, they're only paying out if you are unfortunate to be struck twice.

    If EV and the authors get away with this tailoring of our Emporer's new suit, then these benefits are so limited, so measly, so out of tune with validated threats of the real world (phishing, etc) that no user, no subscriber, and no software vendor would be thinking rationally to pay for these "benefits."

    The only business case here is is one of deception; in this case achieved by franchising out the decision of secure browsing to some august body that writes and talks well. A rational analysis, one that could see through the systemic franchise of confusion, would conclude that there be choices that are to the benefits of the users.

    The first of which is to ignore the whole thing, as it delivers insufficient benefits to users. Whether users are offered a choice in secure browsing or not is certainly an interesting question; to date, the answer is Definately Not.

    [1] For a wider but equally polemic treatment, see PKI Considered Harmful.
    [2] Disclosure: I audit a CA, and in that act I have come across these and other problems with liability.

    Posted by iang at 11:18 PM | Comments (3) | TrackBack

    January 19, 2007

    Critiquing the Mozo (draft) principles

    What follows is a long set of criticisms on the Mozilla draft principles. Like the original document, these are quite drafty; and also hypercritical.

    That's because that's what is needed now: hard words. Agreement isn't much use; it is indistinguishable from aquiescence, ignorance, and real agreement.

    1. Transparency. It may have escaped the techie community, but it hasn't escaped the business community: transparency is the way that we publically audit the operation. That is, if the deals and procedures and actions are transparent, then everyone can see through and confirm the logic.

      The reason we do this is simple: because we distrust the words of the insiders. Not because they are nasty people, but because the systems are complex, the objectives aren't clear, and there is too much money washing around. Fraud is a 'when,' not an 'if.'

      The alternate is opacity. Which means we outsiders can't see in. Which positively means that Mozo could do some tricky deals that wouldn't survive a skeptical public ... and it negatively means that deals that shouldn't survive will carry on to cause more and more complications.

      I've been there and done that. Opening yourself up to scrutiny is painful, and it is more work. But sometimes deals that I've favoured have been shot down by outsiders, and in retrospect, they've been right.

      So when I read this:

      #8. Transparent community-based development processes promote participation, accountability, and trust.

      what strikes is that *development* processes are to be transparent, but not other processes. So deals can be conducted in secret? Strike One!

      #9. Commercial involvement in the development of the Internet brings many benefits; ...

      Strike Two! "...brings many benefits" leaves out the essential truth -- that it brings many costs! How can we trust these principles when they are couched in such miserly touchy-feely words, evading the hard truth?

      Don't be subtle. Be blunt. Benefits *and* costs, please. Which leaves us to consider:

      ... a balance between commercial goals and public benefit is critical.

      Where in the mission or in the principles or anywhere is it stated that commercial deals are a necessary part of Mozilla?

      Strike Three! Take a walk. There is no assumption of commercial activity; you chose it, now explain it.

      Mozilla has a choice. It can live off donations (which are listed in the financial report, the top 5 donors all being named, thanks to IRS rules). When it chooses to accept a commercial deal from Google, and participate in their mission to swallow the whole earth, or with Yahoo, and participate in their mission whatever that is, then it behoves Mozilla to explain to the user base why this is positive, and why this is negative. And how Mozilla has protected its user interests, positively.

      Not the other way around. As written, these principles do not surface the core dilemma that Mozilla may be able to do more good towards its mission if it accepts commercial deals.

      Which begs so many questions that go unanswered: who chooses? who benefits? Where did the 54 million go? What did I personally pay in accepting the stealth search deal? Are they tracking my queries? Does Mozilla know what it has done?

      The reason they aren't answered is because they aren't admitted in the principles, which is reflective of what you admit to yourselves.

    2. A wider problem with Mozilla in its current form is that it has no other owners to exercise governance over the board. Normally a shareholder's meeting will convene and kick out the board from time to time ... but this isn't possible with an non-profit association.

      So Mozilla should be looking for ways to improve that. Looking at the published accounts for 2005, there was some $54 million flowing through, which equals a whole lot of potential for trouble. Ask yourselves this: how are you going to be keeping your eye on principles when you find the first scam diverting funds within?

      So there is a massive need for scrutiny. Who is going to be able to push the CEO out for authorising nefarious things, as happened recently at HP, more or less?

      There are many ways to do this; but they all involve opening up to outside scrutiny. That's the first emotional barrier to deal with.

    3. Security, #4. This is a difficult one, for me, personally:

      #4. Individuals’ security on the Internet is fundamental and cannot be treated as optional.

      Basically, we as a discipline do not have a good view of what the word security means. For every definition, there are people who firmly believe that it's wrong, and can show it. So in a sense, this might backfire and further entrench today's definition, whichever it is.

      In one sense, resorting to the *Individual's* security might indicate that Mozo will look at what hurts users most: phishing, spam, OS viruses, dodgy sites, etc. Which seems a good idea, but see below.

      I think the best we can say is that the more people put security on their agenda, the more likely it is that progress might be made. But you can only really put it into the Principles if you care to make it stick.

      Which indicates a weakness: maybe, if security is still a difficult area in Mozilla, then it should be taken off the list, until it is resolved. Do you or do you not want to have a security mission? Is it something special that you do, and you go all out for; or is it something you do to a "general standards level," no worse, but no better than anyone else?

      You don't want something weak and limiting to hold you back.

    4. A little further afield, let's do some scenario planning. If all the things in this shrill article come to pass -- it's a scenario, no more -- do Mozilla's principles come under attack?

      What to do? Should Mozilla prepare a new set of principles? Not worry about it too much? Leave the USA and encamp to Switzerland?

      This gets us into the area of asking just how far can we rely on Mozilla to protect us. Recent admissions from Skype, by way of example, have indicated that they can breach the security of their phone calls. Can Mozilla breach the security of some of their products? Would they? Do they have an established and documented procedure to deal with this?

      So, although the principles are full of comforting words, what I don't see is anything that helps me determine how Mozo deals with the real hard questions. E.g., reporting on Chinese dissidents, or reporting on Iranian bomb-making plans encrypted in Thunderbird email? Does it make a difference if they are their dissidents or our terrorists?

      Or consider the slippery slope of Paypal. Look at the list of things you can buy now, or auction on eBay. It's a disaster for the public mission, and it's a story that will have Mozilla's name on it, one day.

    5. On principle #1:

      #1. The Internet is an integral part of modern life ...

      No, not quite. It is only prevalent in the 1st world. Basically, the rest of the world (worlds 2, 3, and 4 depending on your geopolitics) hasn't yet got to the point of integrating the Internet.

      Now, it may be that Mozo simply isn't in that business, in the same way that the Gates' and Soros' Foundations are. However, Mozo should be careful to a least be aware of how these principles are perceived outside their bailiwick.

      I recently looked at how to extend security systems like classical CAs into poor countries. It was very tough because those countries can't afford classical identity systems, and the CA world prays at that church. Suffice to say, it was possible, but one needs some extreme mental judo to do it, and the system needs to be well tuned.

      There is no criticism intended then, in focusing on only those with incomes to pay for 1st world standard laptops and 2 mobile phones. But let's be aware of our focus, because as time goes on, it trickles down and outwards.

    6. All in all, there is a gaping absence of thought here in who the stakeholders of the process are.

      Considering that the Principles project (like so many others within Mozilla) was conducted internally, we can immediately identify the most powerful stakeholders: insiders. Then, we can identify the weaker stakeholders as those who were left until the draft was complete. That is, the users.

      Is that right? In both senses of the word...

      Further, it may be unpopular, but there do exist other stakeholders. By way of example: CAs (a topic of much currency because of the polemic EV story), the legal process (courts, LEOs, civil suits, etc), foreigners versus those who are not foreign (the term becomes harder to define with every new political revelation), independent programmers who volunteer their efforts, dependent programmers who are volunteered by corporations, the very corporations who pay for the deals, the NGOs that do some good and useful work that want help (here I'm thinking of the "access" projects that FH pursues).

      Etc etc; the list of potential stakeholders is very long. Which leads us to their conflicts:

      • If it is right, then, that Mozo should treat its users fairly, it should also treat Google fairly. When the $10m cheque (check!) arrives, Google should know what they get for their money, and as importantly, what they don't get for their money.
      • Likewise, when a privacy activist works on the crypto libraries, he doesn't find that a backdoor was snuck in to reveal the chinese dissidents that he swore to protect.
      • Does a salaried Mozo employee have an interest in signing up the latest deal? Of course, as it helps their salary; but is that more or less biased than the corporately sponsored volunteer who is pressing the same deal, for the same unstated commercial flow?

      A critical first step is to identify the stakeholders. Then, identify which are yours. Principles 2 thru 5 speak to the individual. I would guess that you want to state that your primary mission, above all else, is to serve the individual on the Internet.

      If so, say so.

      Then, with a clear conscience, it will be easy to deal with the conflicts of dealing with corporations, governments, etc, all those who do not have your stakeholders as their mission.

    7. Mozilla is musing on the notion of signing up to these principles.

      If so, make them more certain. More principled.

      a. Not this:

      #2. The Internet is a global public resource that must remain open and accessible.

      That doesn't identify the crux of any pledge; because if it fails to remain accessible, then it wasn't our fault.....

      For anyone to treat it seriously, It has to be something like:

      Mozilla pledges to keep the Internet a global and public resource, open and accessible to all.

      If you believe in something, then stick your neck out. Failing to achieve what you believe in is far more honourable than succeeding to avoid the blame for something you might or might not have said.

      These principles are full of wishy washy stuff, that makes me think that the air in California is just nicer and less invasive to our thought processes.

      b. Consider #3:

      #3. The Internet should enrich the lives of individual human beings.

      That is soooo.... pre-Netscape! Where were you guys when they made the commercial browser?

      The Internet is a shared space for all -- be they humans, corporations, NGOs, dissidents and freedom fighters, criminals & terrorists, governments, both good, bad and atrocious.

      If you mean that Mozilla concentrates on the enrichment of the experience for individuals, and *not* the commercial interests of corporations, then so be it. Say it. But you'd better explain then why you take $54m from corporations, and nothing from people. And, please *identify* who your core and leading stake holders are.

      Or, if you mean that you'll enrich the success rates of various terrorist or criminal elements, in order to empower their individuality and spread the enlightenment, then please explain how we deal with the due process of the law. Start with how you reject the NSL ...

      Which all goes to say that putting in a wishy washy "principle" might be really useful to get "consensus" and "bring us all together" and make us "feel good about ourselves" but nobody else will believe it, and even your own people won't pay attention to it after its put in place.

      But it sure makes it easier for idle critics to idly criticise.

      c. Same with #4. Either sign up to protect the Individual's security, and actually do it, or take a number. Get in the queue.

      You can blather on in press articles to your heart's content, behind Symantec, Microsoft, Oracle, Sun, the airlines, and other snake-oil salesmen. Nobody believes your words nor theirs about security any more.

      In the new world of security, only actions speak.

      d. Ditto with #7. If you believe in open source, then do it. Say:

      We only do free and open source software.

      Let others waffle on about why, and what the precise term should be.

    8. If it's a principle, it is simple, to the point, and cannot be misinterpreted. If there is room for discussion, it ain't a principle, and it's only yourselves you are fooling.

    9. Principles 1, 2, 6, 7, 10 speak to the common good. Once you identify your core stakeholder group, then these become tractable. If not, then not.

      Delving into vague goals of common good is generally not a good idea; smart people can abuse it and generally do so. It is far better to select a group and serve them than to serve a false god of a political ideal. Too many wars have been fought over capitalism versus socialist, christianity versus islam, representation versus taxation, freedom of speech versus right to live without fear of intimidation ... and it seems unwise to be diverted into those.

      Unless you are absolutely sure. Then, make it your core. If you believe you are going to protect freedom of speech, above all else, then say that. If not, then don't.

      Serving a browser alternate to the user public is a good enough mission without colouring it with such vagueries as enrichment, public benefit, etc etc.

    10. Consider:

      #8. Transparent community-based development processes promote participation, accountability, and trust.

      Right, but that's not what happened, is it?

      a. Firefox was written *after* that process failed. It was written by one guy or two guys, in frustration. Then another, and another ... but they joined *their* process, not some open blah blah feelgood exercise.

      Details of course are disputable but concentrate on the big dilemma here: your mission is to deliver the choice in browsing, etc. While as a principle, you promote open processes to enable that mission, there are exceptions.

      b. Which brings up a clash: mission versus principles. To my mind, the mission must come first. The principles come second. Where the principles get in the way of the mission, the principles are dropped, at least temporarily.

      So this entire document should headed with the Mission. And the priority should be clear.

      c. The original browser author(s) was right, of course, to go way outfield and start again. You need to accomodate all successes, in their time and place, because the mission says that delivery is more important.

      This is called "the internal marketplace" in business speak; which probably grates. But, think of your mission, not your politics.

      It's also an essential hubris -- encourage your own principles to be hacked. Because, at the end of the day, the individuals are opinionated, but the delivery is what counts.

    Well, that was long, wasn't it :) It is slight but ignorable coincidence that there are 10 criticisms for 10 principles. The most important thing is that this is a process, and this is now open. Let's get stuck in; the result can only be better.

    Posted by iang at 05:44 AM | Comments (1) | TrackBack

    January 18, 2007

    Mozo posts some draft Principles

    One of the things that has been a continual bug(bear) in the private non-profit association form that Mozilla adopted was the lack of a defined feedback loop. How do we know we are doing the right thing?

    One way to deal with this lack of feedback is to sign up to some solid principles. (Or, a mission, but let's not quibble today.) And, yesterday, Mitchell@mozo posted a draft of principles. This is a very welcome development. It isn't easy to do this, no matter how many internal naysayers and external grumblers there are:

    PRINCIPLES

    1. The Internet is an integral part of modern life -- a key component in education, communication, collaboration, business, entertainment and society as a whole.
    2. The Internet is a global public resource that must remain open and accessible.
    3. The Internet should enrich the lives of individual human beings.
    4. Individuals’ security on the Internet is fundamental and cannot be treated as optional.
    5. Individuals must have the ability to shape their own experiences on the Internet.
    6. The effectiveness of the Internet as a public resource depends upon technological interoperability, innovation and decentralized participation worldwide.
    7. Free and open source software promotes the development of the Internet as a public resource.
    8. Transparent community-based development processes promote participation, accountability, and trust.
    9. Commercial involvement in the development of the Internet brings many benefits; a balance between commercial goals and public benefit is critical.
    10. Magnifying the public benefit aspects of the Internet is an important goal, worthy of time, attention and commitment.

    Pointed to by Gervase, here, where you may be able to comment.

    I have no easy comments right now, but I'd encourage you all to think about it. The need right now is to set up a strong foundation, which will last for decades, the time for gushing is in future years when it's cast in concrete. Be critical, be very critical, future users will thank you.

    Posted by iang at 06:57 PM | Comments (0) | TrackBack

    January 05, 2007

    Non-repudiation, Evidence and TLS: another fine mess I've got you into :-(

    Back in the good old days when security people would sprout nonsense and nobody blinked, we talked about non-repudiation as a feature of public keys. Finally, we blabbered to anyone who would listen, we can prove that the bad guy is bad, through adroit application of PAIN and other suitable acronyms.

    I was put straight on this issue by a post on the cryptography list several years back (many thanks to Carl Ellison). Basically, non-repudiation is a contradiction, as there is no way to stop a person repudiating something. She simply says

    "I did not!"

    And now it is over to the two sides to prove it or otherwise. Which is to say that repudiation is a basic human act, and it is a foundational stone of our modern juridical system; one side makes a claim, the other side disputes it. In court, before an impartial judge.

    The term "non-repudiation" is nonsense. Even worse, the technology didn't even come close to that sense, because of the whole security mess known as the PC. Ellison & Schneier said simply that "it is your machine signing for another machine," which I long-windedly refer to as a failure to anthromorphise the PC: we have no good theory to relate a human to a key.

    And, in more formal legal terms, it's a straightforward case of agent-principal failure, in that there is no clear agent-principal relationship between a natural person and a PC; given the predominant security record of Microsoft and competitors, there is no real hope for ever pushing the fantasy in court that the PC is acting for the user.

    So .... as a security field, a lot of us have been beating the drum that non-repudiation does not exist in practicality, it's a hype feature only. And digital signatures aren't human signatures. And... (read my collected PKI grumble list for more).

    One small contribution I might have been responsible for was the perspective that we should be talking about evidence, not signatures. Protocols reveal evidence. As anyone who's been through the mill of the legal process will tell you, anything can be evidence, and it is up to the court to decide what is good evidence and what is bad.

    Hence, our role as architects is to think in terms of the quality of evidence. How can we improve the conclusions drawn from the events and logs? Well, one way is to use PK digital signatures, with the caveats of compromised keys and so forth. Another way is to use hash chains and entanglement, with the caveats of compromised PCs and so forth. Then there are timestamps, and written statements, and ... the list goes on.

    By way of personal example, the Ricardian Contract gets it right, because it thrusts a human readable document out there in front of ... humans! It isn't the digsig that helps, it is the fact that the human who signed cannot be unaware of the document, normal circumstances pertaining. So as time goes on, the chances of the contract issuer "repudiating" his own contract diminish dramatically. Cunning tricks like that are the meat and drink of financial cryptography -- getting into the core of the real finance application and understanding how they tick; and then designing systems to help them tick better.

    Which long preamble brings us to an Internet Draft entitled "Transport Layer Security (TLS) Evidence Extensions." This document purports to add an "evidence" extension to the venerable but ever popular TLS protocol (a.k.a. SSL, secure browsing and all that). From the introduction:

    Evidence created using this extension may also be used to audit various aspects of the TLS handshake, including the cipher suite negotiation and the use of other TLS extensions. In many cases, the evidence does not need to be validated by third parties; however, in other cases, the evidence might be validated by third parties. To accommodate all of these situations, the evidence is generated using a digital signature.

    Now ordinarily I would applaud this "single-minded approach" as a very useful employment of my hypothesis of "there is only one mode, and it is secure." But, from the Overview:

    Generating evidence is not compatible with Diffie-Hellman Ephemeral (DHE) key exchanges. DHE does not permit the same keying material to be generated for validation of the evidence after the TLS session is over. Persistent evidence requires the use of a digital signature so that it can be validated well after the TLS session is over.

    I beg to differ! As I mooted above, evidence is what you present to the court; A DHE session will do nicely thank you very much as it can log information that can be utilised for evidentiary purposes: time logs, successful password usages, etc.

    So why the need to eliminate classes of evidence? More from the body:

    Persisten[t] evidence of the TLS session content is produced by the TLS Evidence Protocol.
    [Ed: my slight correction of word persistence used in the ID.]

    What we have is a new chance at the old non-repudiation trick. That trick goes like this: First, we redefine the term "Evidence" to be what we want. Then we deliver what we want, calling it all the time Evidence. Then we force people to adopt Evidence because evidence is needed.

    Nobody notices there are two disparate definitions until it is too late and they have adopted it, but that's ok because the mission is adoption, not evidence.

    This would be OK if Evidence delivered anything useful. But, as we described above:

    When digital certificates are to be employed in evidence creations, the client must obtain the public key certificate (PKC) for the server, and the server must obtain the PKC for the client. This is most easily accomplished by using the PKCs provided in the Handshake Protocol Certificate messages. Further, both parties SHOULD have an opportunity to validate the PKC that will be used by the other party before evidence creation. Again, this is naturally accomplished using the Handshake Protocol, where the TLS session can be rejected if the PKC cannot be validated.

    Spot the problem? The client they are talking about is software, but the party they are talking about is the poor dumb victim behind the PC. Call it agency-principal failure or anthromorphism failure, it's still failure, and the security threats inherent within are unrecognised in the document despite a long history (and a very clear heading entitled 6. Security Considerations).

    So what is it that they want? It looks to me -- my personal opinion -- like the same old same old: "we" need a way to push various groups into mandating PKI key infrastructure, a la the many and various agency dreams from a decade ago. Sarbanes-Oxley and others create a need for compliance, and evidence feeds into compliance.

    The two come together: create a web of technical blah blah that leads to a claim that TLS delivers the Evidence, the whole Evidence, and nothing but the Evidence. Then convince everyone to accept this future RFC via the unimpeachable IETF standards process, those stalwart protectors of the Internet. Then take the RFC and push it before the regulators eyes -- if they have our Evidence, then they have your Compliance with Sarbanes-Oxley.

    The hope is that another bunch of suckers will be duped into pushing PKI into inappropriate places. This simply won't work. Indeed, the way it treats evidence is so callous that it probably (my LLB U.Gresham coming into play here) makes matters worse. The evidence it produces will likely not be useful nor reliable in court, and it may even be dangerous because of the false sense of security generated. E.g., there will be enough expert witnesses around to testify that it is useless, and the added complexity will cause all sorts of problems.

    And it will certainly slow down the usage of TLS or similar security processes, which is the last thing anyone wants. A security protocol used is far more secure than one not used because the barriers to adoption are too high.

    Posted by iang at 10:16 AM | Comments (4) | TrackBack

    November 12, 2006

    Extended Validation - setting the minimum liability, the CA trap, the market in browser governance

    Having read through the Extended Validation draft, it is pretty clear that this is "more of the same bad recipe." It didn't work last time, why should we expect the same recipe to work this time? Having said that, there are some interesting aspects.

    Firstly, the EV proposal, from a CA group called the CA/Browser forum, asks for, nay, *requires*, that each CA maintain general business insurance, and more specific liability insurance. Further, it goes on to say that each CA must not disclaim liability below $2000.

    They are saying, then, it's time to add some meat back into the sandwich of certificates. The "no liability" postures that were discovered about 5 minutes after the CA was invented have often rankled insiders. Wasn't the purpose of the CA to allow the public to rely?

    The problem with this was that the CA wasn't in charge, the browsers were, and are. This resulted in the browsers reducing the visibility of the CA to nothing in what was called "the real-estate wars," which meant that the CA was in the worst of positions -- all the liability, none of the glory. The end result is of course all CAs disclaimed all liability; there is no business case otherwise.

    Now, redressing that balance is tricky. Forcing the liability to $2000 is like setting the minimum wage to $2000. Are poor people now richer? No, because jobs will be reduced (where the increase doesn't justify) and prices will rise (where the job has to be done). For a perceived benefit of a small group of winners, everyone else pays, and some poor people lose more, which is bad policy and bad economics. Not to mention, it's quite nasty to the poor who lose their low paid jobs and become poorer.

    Why doesn't it work that way? Firstly, we simply don't know how to do it. Someone in some council or standards group or wannabe-cartel has "decided" $2000 is a good number. They have no clue what is a good number, they just picked it, perhaps dressing it up with lots of blah blah. Much the same applies to the rest of the "minimum standard" claim, in this particular case, although those standards developed from experience would be excluded from that criticism.

    Secondly, they don't have the control to make that number good. Who's in control? The browsers, of course. If the browser doesn't play, the game stops. So what we look for, and what we find, is that the draft is a very carefully designed request for the browsers to hand control over to the forum. Whether they consciously avoided asking the browsers to fix their problems or not, it is clear that there were few demands being made. (Notable exception in the fine print: 37(a)(2) Oops, that could cost you your job, right there.)

    In voting for this proposal, word has it that Mozilla abstained, which might mean something or might not. The Register recorded that Verisign let slip and grumbled, soon retracted. Which suggests that this is all being done behind closed doors, and nobody dare say boo in case Mozo or the other browser manufacturers wake up.

    Microsoft voted "yes" but this is a game they can play, they are better than anyone else at it, and they also have a motive: the Cardspace (was infocard) project needs friends and EV is a friend looking for friends, also. KDE would probably vote yes, as their openly stated policy is to outsource security policy. Annoying, but you have to admire their honesty. Opera is harder to predict, and Apple are not part of it.

    So what happens next? Likely the EV project will fail, due to the simple mathematics of it. Too few target sites (<<1000) and too much cost in audits, re-checks, re-issue of keys (yes, required) and so forth and so on.

    What then? Even though it looks bad business, we see the herd effect in full play. Many small and medium CAs are being dragged in, for fear of missing out. Perhaps it will be costly to join later? Perhaps they think the market will shift and people will suddenly demand quality? Perhaps they want to play with the big boys?

    But cost is the key driver, not hype. It's serious, and given the restrictions, it is likely that only Verisign can pay the price, fully, comfortably. Which means the mid-tier will waste their money. And therein lies the trap. If the mid-tier CAs spend the money, endorse the standard, but cannot make the grade, either by resource depletion or by simply failing to get through all the checks, then who looks good? Verisign, of course. And the mid-tier crumbles.

    So this is a dream ticket for the largest player in a competitive market. If it works, they own the EV field as well as extend their brand dominance within non-EV areas. If any mid-tier CAs do manage to get there, that will prove it was worthwhile, as well. If all the rest fail, and Verisign succeeds, that will prove it, too. Even if the whole project fails, it won't be possible to blame Verisign, as they tried so hard. Versiign will come out of EV smelling of roses, in all eventualities.

    Can you say "barrier to entry" ? The document bears this out:

    • There is a curious and complicated formula for a large company to self-insure, which means that Verisign might not even have to pay the insurance.
    • The Audit principle of auditing by principles not rules is breached in much the same way as Sarbanes-Oxley, which is generally correlated with auditors seeking more money from customers who can't refuse.
    • No open discussion, and a very short comment timeframe ... some were invited, others were definately not.
    • There is a curious lack of serious consideration of the today's threat scenario, which by all indications was the original point. Instead, we get the same old PKI hobby horses: must run a good OCSP, must revoke, must ...
    • Still, behind all that weighty and thoughtful consideration, there remains no benefit to relying parties. The liability limit of $2000 is a fig leaf, and it is written to support every expectation that CAs will continue to use all the other good tricks to reduce expected liability to zero.

    What then to do? *Mid-tier CAs* should not do it (or more politely, sit on the fence and state that they are implementing the good bits). It makes no sense to spend that money, risk the company, and fail. Or even succeed: there is no future in being the 2nd best after Verisign in a game Verisign designed.

    *Browsers* also should say "no." Or, should say, "sure, as long as it is an open market in governance." There is this underlying premise that the cartel known as the CA/Browser forum is the only one. No such. There is no reason why I can't form a cartel made of, say, European national CAs or open source software CAs or Internet Bank CAs or ... and simply request the colours purple, peach and turquoise.

    As long as the browsers maintain an *open market* in governance models -- something which is written into Mozilla's policy, for example -- there is absolutely no reason for the rest of the world to get our collective knickers in a knot. Ask the browsers to accept the colour purple as meaning a our standard, and go out and market it. If and when EV fails, we can simply pick up the good bits and redo it. Which should appeal to everyone, as they get the best bits for free.

    For *public policy* again the answer is "do nothing." It was suggested by one insider that the CAs are really worried about anti-trust. This is nothing more than a bunch of naughty schoolboys hoping not to be caught smoking in the toilets, it's far and away an unlikely target for anti-trust. As long as there is free entry into the market for browsers and web servers, there will be no great ability for a group to take control. If EV becomes a danger, we can write software to bypass it (as everyone has to do with browser security at the moment due to phishing).

    Posted by iang at 11:54 PM | Comments (4) | TrackBack

    October 29, 2006

    SWIFT breach - Big Brothers

    SWIFT won two Big Brother awards at last week's Austrian presentation. The first was in the "finance" category, underscoring the relationship between Orwell's despotic prediction of the future and the control of money and payments.

    Nothing in English, it seems. The second Big Brother award for SWIFT was the "public voting" category. Surprisingly, the public voted that SWIFT was the worst thing that had happened to them over the last year, against other things that the Austrian people may have had much more exposure to.

    This is somewhat significant as it signals how the SWIFT scandal is of wide-reaching impact. SWIFT has not handled it well, reacting in the worst possible way -- to suppress and deny the scandal where they could.

    As an example of that poor handling, it is slowly becoming more clear that their responses are not honest. Last blog entry I pointed at this strange comment in responses to questioning by Quintessenz's Erich Moechel:

    No, SWIFT does can not provide this type of data. It is important to understand that SWIFT does not have the means to read the information inside a message. SWIFT can only read the information necessary to route the messages across its network from bank A to bank B. In this respect SWIFT is similar to a postal service.

    I don't believe that. To check, I've now talked to others that are in the finance sector and have some view on this, and universally, nobody else believes it either. Some research however has not been able to turn up a comprehensive answer, so it is not conclusive as yet.

    If SWIFT are being honest, now's their chance to confirm. If they are spreading lies, now's the time to sack their Public Relations department, along with their security department, their privacy people, and their bank relations people.

    Heck, sack the whole board. But that would be asking Europe's banking community to show some spine. Corporate governance is not going to come from the ECB and its flock.

    Posted by iang at 11:39 AM | Comments (3) | TrackBack

    October 22, 2006

    SWIFT breach - SWIFT broke the law, the laws have changed, the ECB ducks responsibility

    European data protection authorities empanelled an investigation, alongside their companion privacy commissioners. Their verdict? SWIFT broke the law.

    The Belgian-based consortium known as Swift, which handles money transfers among banks, violated European privacy regulations when it turned over confidential transaction information to the Central Intelligence Agency and other American agencies, Belgium's privacy protection commission concluded today. ... Under European Union law, companies may not transfer confidential personal data to an entity in another country unless that country's privacy protections are deemed adequate. The union does not consider American protections adequate because the United States has never enacted comprehensive data protection laws. Under that rule, the commission found, Swift acted without a legal basis when it sent the data to the United States.

    Swift has defended the transfers on the ground that, because it has offices in the United States, it was bound by United States law, and had no choice but to turn over the data after the Treasury Department issued broad administrative subpoenas to it.

    The commission rejected this argument, saying Swift was still subject to Belgian rules, regardless of Swift's American subsidiary and its legal obligations. "Swift should have realized that exceptional measures based on American rules do not legitimize hidden, systemic violations of fundamental European principles related to data protection over a long period of time," the commission wrote.

    Others agreed. This is not helped by SWIFT's ducking and weaving. SWIFT may have provided some evidentiary information in paper form:

    Both SWIFT and the U.S. authorities say records were subpoenaed as part of targeted investigations into suspected terrorist activity. In its defense, SWIFT reiterated on Monday that it received "significant protections and assurances" that the data transferred to the U.S. was used confidentially.

    But -- rumour has it -- the subpoenas have not been supplied to EU investigators, and we already know that UST passes the information on for other purposes / investigations, as mentioned here before.

    Quintessenz points out that their answers were evasive, and I'd agree. They must think the public are muggins, but they did let some things slip out:

    No, SWIFT does can not provide this type of data. It is important to understand that SWIFT does not have the means to read the information inside a message. SWIFT can only read the information necessary to route the messages across its network from bank A to bank B. In this respect SWIFT is similar to a postal service.

    Yet, the investigation concluded that SWIFT was not simply a messaging service, and was in practice a financial institution. Is SWIFT suggesting that SWIFT can't see the content? In that case, what is the motivation of the US-Treasury interest? We already know that banks send lots of messages between each other, so this would seem to be a comment of quite extraordinary strangeness, and SWIFT's case may depend on the answer to this question.

    The investigation also concluded that SWIFT had not advised its overseers to sufficient extent, had acted independently, and had acted more as principal than as agent. In other words, SWIFT is responsible. Consider these three statements, by SWIFT, from diverse sources:

    The US Treasury cannot search the data for evidence of nonterrorist related crime. SWIFT has explicitly excluded searches for tax evasion, economic espionage, money laundering or other criminal activity.
    ...
    In a statement signed by SWIFT's CEO Leonard H. Schrank, the company said the U.S. Treasury does not have unlimited access to data stored by SWIFT, and the information it got was used only "for the exclusive purpose of terrorism investigations."
    ...
    The laws haven't changed. The environment of terrorism hasn't changed. SWIFT is well aware of the laws and regulations people are concerned about. The Board is monitoring the situation on a regular basis. Beyond that, SWIFT cannot comment.

    With the extraordinary powers Congress passed a month ago, SWIFT's agreement is no longer a barrier of any import. The laws have changed. When President Bush signed the act into law that destroys habeus corpus, Military Commissions Act, he also signed in the ability to designate anyone as a terrorist. Without recourse.

    SWIFT data may now be requested on discretion without any high degree of proof, simply on the say-so of the requestor.

    Who's looking like a muggins now? The European privacy investigation wasn't fooled, and correctly rejected the argument that SWIFT was under US law; if the compliance broke European law, then the New York office of SWIFT should not have had the data in the first place. Again, Quintessenz asks:

    As this process has been going for nearly five years why did SWIFT not cease to store all datasets in the New York headquarter?

    To ensure the reliability and resilience of its network, SWIFT has redundant systems spanning multiple continents, including operating centres located on different continents. Each operating centre is an active backup to the other and is designed to independently manage SWIFT's entire operations, if required. In other words, messages are mirrored and stored for retrieval purposes during 124 days in both operating centres. This architecture has been in place for decades.

    No muggins, that Erich Moechel ... From SWIFT again:

    "We informed the overseers. What their position was in most cases was this didn't pose a risk for the financial stability of the financial system and that's what their remit is. So they didn't need to inform others and SWIFT wasn't legally bound to inform anyone else," said the spokesman.

    "These discussions were held at the highest level between SWIFT's board and its overseers. None of them raised any objection."

    So were are the regulators in this mess? The ECB remains under pressure. As mentioned, the central banks have to be involved in this one because they are the only regulators with credibility in the area. Begging out on some pretext then must be examined with the highest degree of skepticism.

    The ECB is part of a group of central banks that oversee SWIFT informally but have no legal power to sanction it.

    "The group considered that this matter would not have financial-stability implications and therefore concluded it fell totally outside the remit of the oversight role," [ECB President] Trichet said.

    "We did not give SWIFT any blessing in their compliance with these subpoenas. SWIFT remains fully responsible for its decision," he said, adding that it was not up to the ECB, but SWIFT, to decide whether to inform European institutions.

    Yet. their mandate is only loosely financial stability; when called upon, they quite happily dive into other areas. Here's how Ben Bernanke, the new Chairman of the Federal Reserve, puts it:

    Historically, the goals of banking regulation have included the safety and soundness of bank operations, the stability of the broader financial system, the promotion of competition and efficiency in banking, assistance to law enforcement, consumer protection, and broader social objectives.

    In many of these cases, it takes a very open imagination to create the nexus between central bank activities and these areas of interest, so the hand-waving of the European Central Bank at this point is like watching a man drown, and assuming it is the lifeguard's responsibility to save him.

    This is justly called a scandal for the underhanded way in which the US Treasury breached the SWIFT databases. It wasn't that the EU wouldn't have done a deal, it was that the UST felt it necessary to keep it secret so as to not ask the Europeans.

    Secrecy is a bad policy. Kerckhoffs said it a century ago, and it remains as true today. The need to show that some enemy could benefit from seeing your operations is a flimsy excuse alongside the massive danger you do to your own side when you hide things from your own people, and let them fester.

    Which leads into that other "government secrets" case. Judge Taylor, who a month or two back ruled one of the Bush domestic spying programmes illegal, has rejected arguments to stop the programme. Instead, she has gave the government a week to get a reversal from the Appeals court, and effectively underlined the suggestion that the "government secrets" argument is being used to hide bad stuff, not good stuff.

    Normally, we try and keep clear of politics, and stick to FC. Hence, the SWIFT breach represents a fascinating case of governance gone wrong in a major system of FC import. But it wouldn't be right to exclude mention of the broader canvas such as the suspension of habeas corpus in the US of A. In the latest of a long series of bills, American lawmakers have shown themselves willing to hand over all power to an exective branch, and SWIFT is happy to comply with that.

    As we come into the November USA election madness, some might be asking, "Where the American people?" Most don't know or care. I think a comment on Bruce Schneier's blog had it best:

    "We're better than that."

    No we're not.

    Strike the American people. Strike their Congress. The only thing left is the judiciary and other nations, and I'm not holding my breath over the European's response. Judge Taylor's case and the SWIFT breach in Europe bear watching closely.

    Posted by iang at 11:14 AM | Comments (2) | TrackBack

    October 09, 2006

    Audit Follies - Atlantic differences, branding UnTrust, thumbs on Sarbanes-Oxley, alternates...

    Arthur spots a humourous post:

    But it also illustrated a fundamental difference in the way audits are conducted on both continents. In the United States, audits are about ensuring that sufficient controls are in place to mitigate risks. Thus, the audit findings tend to emphasize lapses in application and network security. In Europe, audits tend to focus on following a predefined process, being transparent in the actions taken, precisely defining policies and procedures, and adhering to international standards.

    The difference, I suggest, may depend on whether you thought audits were useful, and whether auditors could be trusted to provide checks that were useful instead of being perverted by any of a hundred tricks. For an example of "agenda" see the recent HP case where the ethics officer was apparantly quite happy to approve spying on board members.

    Would an audit have picked that up? And more importantly, what do we want in a world where an audit won't pick up those things? Value for money, right?

    A further problem is what is known as Audit Independence. Audits tend to suffer from exploitation by auditors. One sign of this is when they turn the process of governance into a branding exercise, such as eTrust or WebTrust. Is this a process to provide customer value or is it a process to earn fees?


    Abstract

    Widely-used online "trust" authorities issue certifications without substantial verification of the actual trustworthiness of recipients. Their lax approach gives rise to adverse selection: The sites that seek and obtain trust certifications are actually significantly less trustworthy than those that forego certification. I demonstrate this adverse selection empirically via a new dataset on web site characteristics and safety. I find that TRUSTe-certified sites are more than twice as likely to be untrustworthy as uncertified sites, a difference which remains statistically and economically significant when restricted to "complex" commercial sites. I also present analogous results of adverse selection in search engine advertising - finding ads at leading search engines to be more than twice as likely to be untrustworthy as corresponding organic search results for the same search terms.

    Either way, the *result* of the branding exercise is clear -- you tend to acquire better than your fair share of scams, which are willing to pay the price to hide behind the brand. The extent to which the process behind the brand adds value then becomes all-important. The brand makes it effectively more difficult, perhaps harkening back to the old days when the professions were not supposed to advertise.

    One conclusion that is emerging out of the current spate of governance failures -- mostly from the US but sometimes in Europe -- is to ask why auditors aren't picking up the frauds?

    In Enron's case (Enron's 30$bn), we know the Auditor was Arthur Andersen, and the reason they did not pick it up is that at the least, they were conflicted. More likely, they were "running cover" for the company. Bawag / Refco wasn't picked up until Refco went public, and even then it was lucky (the guy lost his job, a fitting reward for public service).

    Switching across to the *long term response* to uncontrolled auditors and rampant audit practices, we have a critical mass against Sarbanes-Oxley building up. Sir Alan Greenspan reaches out and the thumb goes down!

    The Sarbanes-Oxley Act is doing more harm than good and must be overhauled, Alan Greenspan told a technology audience here.

    "One good thing: Sarbox requires the CEO to certify the financial statement. That's new and that's helpful. Having said that, the rest we could do without. Section 404 is a nightmare."

    Sarbanes-Oxley was the legislation that approximately doubled the cost of audits in the US. Now the debate is on as to whether it is bad or good; does it deliver twice the value, or just twice the headaches? Does it deliver anything at all? Again, Sir Alan nails the key difference that likely counts above mere governance considerations:


    He said the evidence is clear that *Sarbanes-Oxley strictures are driving initial public stock offerings away* from the New York Stock Exchange and to the London Stock Exchange. Increasingly, he said, people recognize that Sarbanes-Oxley must be changed. "The pressure on getting 404 significantly altered is rising and is taking on a critical mass." But he added, "You do not get a bill altered when the two names [Sarbanes and Oxley] are in the process of retiring. People are waiting until they are gone. Then, hopefully, changes will be made. Any bill that passes both houses almost unanimously, cannot be a good piece of legislation."

    My emphasis. And don't miss that great quote at the end!

    Not all agree. In a dramatic echo of the two posts on security training of last week, Sam E. Antar suggests that Sarbanes-Oxley is worth a partial raised thumb:

    I say to you that the Sam E. Antar of twenty years ago (I am not a criminal today) would be just as successful in today’s environment.

    Other than Sarbanes-Oxley and its limited reforms (which many misguided detractors are trying to weaken today), little progress has been made in the culture and attitude of the accounting profession (in private industry or government) regarding white collar crime.

    Sam was the CFO for the Crazy Eddie fraud, so he is an expert in fraud. He now helps the other side (honest! His site was there last week, I swear!). He also bemoans the fact that accountants aren't trained enough in basic fraud. His more basic point:

    Criminals always have the initiative and the professions approach to preventing fraud (whether as CPAs ay accounting firms, accountants in government, the private sector, and nonprofit sector) is “process oriented” rather than the criminal who approaches his work in a judgmental way.

    Therefore, the criminal has the fundamental advantage against the under informed, not very well trained accounting profession in regards to combating white collar crime.

    That bears interesting comparison to the first quote above. It's worth stressing that criminals think differently, and thus always have the advantage over process; you won't hear that in white hat security classes, because it is very hard to say just how criminals think, without exposing ones hat to a certain greyness.

    Finally, I have long predicted a private class action response to the phishing and security morass (but not seen it yet). Here's a paper spotted by Adam that suggests it has merit:

    Public choice analysis suggests that a meaningful public law response to insecure databases is as unlikely now as it was in the early Industrial Age. The Industrial Age's experience can, however, help guide us to an appropriate private law remedy for the new risks and new types of harm of the early Information Age. Just as the Industrial Revolution's maturation tipped the balance in favor of early tort theorists arguing that America needed, and could afford, a Rylands solution, so too the Information Revolution's deep roots in American society and many strains of contemporary tort theory support strict liability for bursting cyber-reservoirs of personal data instead of a negligence regime overmatched by fast-changing technology.

    So which audit approach is better? Process oriented? Risks mitigation? It is clear that the value for money is sorely missing. Here's a summary of *my* thoughts, including the wider question of alternates to audits:

    • audits -- not easily trustable
    • regulation (I) -- useless and expensive, and a non-trivial possibility that the result is worse through complexity
    • regulation (II) -- forced publicity on crimes such as SB1386 can result in a "win" but that was a "lucky win," most regulation is a lottery: some headline winners but the public as a whole loses out. Better then to discourage on principle, as the failures outweight the successes.
    • private litigation -- potentially valuable overall, as at least it has inbuilt negative feedback loops. Payback to the damaged parties is far less frequent than headlines would have it, but if the public benefit is positive then maybe it's all we've got?

    We can do better by:

    • pushing systems and reporting out to reveal publically auditable information will engage the public as auditors (c.f., Enron, 5PM)
    • aggresively reducing the "secret" parts to as small as possible, and vigourously documenting those parts
    • conducting the audit process itself in as much public glare as we can stand.
    • inducting the public to audit the audit
    • pushing the liability for the risks out into the open
    • as a public principle, standing more on the voluntary release of information, less on the Kitty People approach of Sarbanes-Oxley and SB1386.

    But don't expect anything soon.

    Posted by iang at 12:23 PM | Comments (4) | TrackBack

    October 03, 2006

    The Last Link of Security

    Vlad Miller writes from Russia (translated by Daniel Nagy):

    We can invent any algorithm, develop any protocol, build any system, but, no matter how secure and reliable they are, it is the human taking the final decision that remains the last link of security. And, taking into account the pecularities of human nature, the least reliable link, at that, limiting the security of the entire system. All of this has long been an axiom, but I would like to share a curious case, which serves as yet another confirmation of this fact.

    We all visit banks. Banks, in addition to being financial organizations attracting and investing their clients' funds, are complex systems of informational, physical and economic defenses for the deposited cash and account money. Economic defenses are based on procedures of confirming and controlling transactions, informational defenses -- on measures and procedures guarding the information about transactions, personal, financial and other data, while physical defenses comprise the building and maintenance of a secure physical perimeter around the guarded objects: buildings, rooms and valuable items.

    Yet, regardless of the well-coordinated nature of the whole process, final decisions are always taken by humans: the guard decides whether or not to let the employee that forgot his ID through the checkpoint; the teller decides whether a person is indeed the owner of the passport and the account he claims to own; the cashier decides whether or not there is anything suspicious in the presented order. A failure can occur at any point, and not only as a consequence of fraudulent activities, but also due to carelessness or lack of attention on the part of the bank's employee, a link of the security system.

    Not too long ago, I was in my bank to deposit some cash on my account. The teller checked my passport, compared my looks to the photo within, took my book and signed a deposit order for the given amount. The same data were duplicated in the bank's information system and the order with my book were passed on to the cashier. Meanwhile, I was given a token with the transaction number, which I should have presented to the cashier so that she could process the corresponding order. Everybody is familiar with this procedure; it may differ a bit from bank to bank, but the general principles are the same.

    Walking over to the cashier, I have executed my part of the protocol by handing over the token to the cahsier (but I did not put the cash into the drawer before having been asked to do so). She looked at my order, affixed her signature to it and to my book and ... took a few decks of banknotes out of the safe and started feeding them to the counting machine. I got curious how long it would take for the young lady to realize the error in her actions, and did not interrupt her noble thrust. And only when she turned around to put the cash into the drawer did I delicately remark that I did not expect such a present for March 8 and that I came to deposit some cash, not to withdraw. For a few seconds, the yound lady gave me a confused look, then, after looking at the order and crossing herself, thanked me for saving her from being fired.

    The banking system relies a great deal on governmental mechanisms of prevention, control and reaction. Had I not, in computer-speak, interrupted the execution of the miscarried protocol, but instead left the bank with the doubled amount of money, it would not have lead to anything except for the confiscation of the amount of my "unfounded enrichment". The last link of security is unreliable: it fails at random and is strongly vulnerable to various interferences and influences. This is why control and reaction are no less important than prevention of attacks and failures.

    Posted by iang at 11:36 AM | Comments (0) | TrackBack

    September 21, 2006

    SWIFT breach - Roundup - Good Morning Europe, BoE got out early, Simon Davies: "we won't be fooled again."

    Collected notes on a month or so of SWIFT rumblings. European privacy regulators are taking on the investigation:

    The test is whether European law has competence over US claims to data held by European firms. It does not look at all certain whether it does, but The Register understands that the EU is planning to walk and talk like it does.

    It's a very wide geographical area, from Czech Republic to Canada:

    Results of the Czech and other probes are expected by the end of the month, Stepankova said. "The next step" will be to determine whether the SWIFT system is being used "in a way that conforms to domestic legislation" in EU countries, she said.

    As mused on before, the SWIFT breach has caught the attention of authorities where the one-way passing of confidential flight and phone data did not. Also, the industrial espionage issue of "restaurant economics" has exposed something of a dilemma in the US arguments for over-arching eurosociomonitoring. Problem is, the key regulators ducked and weaved:

    The Bank of England, one of the 10 central banks with a place on Swift's managing committee, revealed it had told the British government about the programme in 2002. "When we found out we informed the Treasury and passed the relationship over to them," Peter Rogers of the Bank said. "We also told Swift that they had to speak to the government themselves. It had nothing to do with us. It was a matter of security and not of finance. It was an issue between Swift and the government."

    In a written parliamentary answer, Gordon Brown last month confirmed the government was aware of the arrangement. Citing government policy not to comment on "specific security issues", however, the chancellor refused to say whether measures had been taken to "ensure the privacy of UK citizens who may have had their financial transactions viewed as part of US counter-terrorism investigations in conjunction with Swift". He also refused to say whether the Swift programme was "legally reconciled" with Article 8 of the European convention on human rights.

    A Home Office spokesman said the government had been given "no reason to believe the operation was unlawful", adding that it "strongly supports US efforts to target, disrupt and cut off sources of funding for terrorism". He declined to comment on the commissioner's assessment that the programme may be illegal.

    What we need now is for the authorities to recognise the governance issue of breaches. This could be called the camel's-nose-under-the-flap argument -- once a payment system starts shifting protected information out, the information is no longer protected, and breaches happen thick and fast. We're not there yet, as the BoE like others declined jurisdiction.

    This issue of Central Banks ducking responsibility for governance is made all the more poignant as they are the only agency with credibility when it comes to the task of general regulation of payment systems, no matter how much we or they approve of their position(s) or not. Hence the general quacking and phaffing around in Belgium and other halls of power as data and competition regulators try and work out what SWIFT is, where it is, and how to spell it.

    SWIFT stalled EU probe of US snooping

    For the EU to feel confident that SWIFT had not betrayed home rules, and that the US hadn't stuck its nose where it was not warranted, it had to review the subpoenas by which the US has gained access to SWIFT's records for the last five years.

    Yet if SWIFT gave this information up, it would offend the US intelligence services. If it didn't give the information up, it would offend the EU authorities.

    Bingo. Why aren't they handing over the subpoenas? Rumour has it that there aren't any; the SWIFT executives in NY were extorted to hand over the data without papers in hand. This favoured technique is used as it guarantees that the Feds (or UST in this case) can do no wrong. They are covered because the information was "volunteered" by SWIFT, and thus, the US Treasury officials concerned have broken no laws. SWIFT of course are later hung out to dry.

    Pressure is being exerted in Britain over the various and thin claims of oversight and governance:

    However, campaign group Privacy International said [assurances] were not enough. It had filed a complaint to the British data protection body, the Information Commissioner. It is worried that the Treasury was fishing through international financial records in the hope of turning up terrorist finance records. It also feared the data could be used for other purposes, including espionage.

    Swift's CEO, Leonard Schrank, flew to London to meet Privacy International on Friday. Simon Davies, a PI director, said he had told Schrank he wanted to see proof that the Treasury was only able to see records that it knew contained details of terrorist financial transactions.

    "When was the last time you were satisfied with something that was claimed without seeing proof?" said Davies. "We are not prepared to accept anybody's face value assertions that protections have been put in place," he said.

    "We won't be fooled again." Precedent is on Davies' side. The US government is on record as not operating secret overseas prisons, not wanting to re-negotiate FISA with Congress, and not wiretapping Americans without a warrant. A few weeks ago, Judge Taylor ruled illegal the wiretapping they promised they were not doing, and the Bush administration immediately turned to Congress to request re-negotiating the FISA act which they were not breaching. (The bills which hand an open cheque to the wiretappers have just been approved in committee.) Which presumptively renders factual their breach, a trend that seems more a standard than an exception.

    More snippets: it also looks as though the New York Times might have been a little faithless in not only holding the story for "a year" but in fact before the last Bush election:

    Such a delay was, in itself, unpardonable, and provoked angry criticism. Now we learn, from an interview with Executive Editor Bill Keller conducted by Calame, that internal discussions at the Times about drafts of the eventual article had been "dragging on for weeks" before the November 2, 2004, election, which resulted in a victory for Bush.

    "The process," the public editor notes, "had included talks with the Bush administration." A fresh draft was the subject of discussion at the newspaper "less than a week" before the election.

    Meanwhile, back at the mission ranch, let's consider why all this was necessary. Terrorism, that's what. Now the Foreign Affairs journal weighs in:

    Intelligence estimates in 2002 held that there were as many as 5,000 al Qaeda terrorists and supporters in the United States. However, a secret FBI report in 2005 wistfully noted that although the bureau had managed to arrest a few bad guys here and there after more than three years of intense and well-funded hunting, it had been unable to identify a single true al Qaeda sleeper cell anywhere in the country. Thousands of people in the United States have had their overseas communications monitored under a controversial warrantless surveillance program. Of these, fewer than ten U.S. citizens or residents per year have aroused enough suspicion to impel the agencies spying on them to seek warrants authorizing surveillance of their domestic communications as well; none of this activity, it appears, has led to an indictment on any charge whatever.

    In an exceedingly long article that details in painful detail how many terrorist threats failed to materialise, one of the most respected voices in US foreign policy calls the whole motivation for the SWIFT tracking ... bogus!

    Who can we trust to inform us on these issues? Politicians asked the NSA to clarify what was secret and what was not so they could get on with their job of politicking.

    On July 27, shortly after most members of the committee were briefed on the controversial surveillance program, the NSA supplied the panel's chairman, Pat Roberts (R-Kan.), with "a set of administration approved, unclassified talking points for the members to use," as described in the document.

    Among the talking points were "subjective statements that appear intended to advance a particular policy view and present certain facts in the best possible light," Sen. John D. Rockefeller IV (D-W.Va.) said in a letter to the NSA director. [...]

    Unfortunately the NSA upstaged them and did the politicking for them. Among them, this gem of advice on "what is secret":

    "It is being run in a highly disciplined way that takes great pains to protect U.S. privacy rights. There is strict oversight in place, both at the NSA and outside, now including the full congressional intelligence committees."

    Others have mentioned the tendency to answer every question with the policy and ignore the question as well as the truth, but this takes the dishonesty to a whole new level. Lying to the congressional committee when they are investigating the precise lack of any "strict oversight" has to be ineptness or chutzpa only possible with extraordinary levels of arrogance.

    Posted by iang at 03:11 AM | Comments (0) | TrackBack

    August 18, 2006

    Naming the unnamable, "We have a problem, Houston," who blinks first? and who replaces President Bush?

    Crypto-author James Bamford names the unnamable in Time:

    James Bamford, a respected author of books on the NSA and a plaintiff in the suit, called Taylor's ruling "very significant, because what you have here is a massive eavesdropping operation, the largest one in history. And it's a criminal statute that the President has violated," with jail terms dictated for violations. "Nobody's talking about impeachment," Bamford added, "but if you had opposite parties in Congress, you'd have a situation, I think, very much like Watergate."

    At this stage, we have a situation. "We have a problem, Houston" as the saying goes.

    President Bush is a few mistakes away from being charged with a crime, and it looks like a sticky one. Washington DC insiders report that negotiations have been going on all night to find a settlement. Unfortunately the negotiations seem to have been spiked as unamable administration officials have done the unbelievable -- gone to Congress to negotiate changing the law to make the wiretapping legal. (Or, speed up the Specter "everything in the shop" bill.)

    The time for changing the law is over; that would be a slap back in the face for the courts. Unfortunately, it is almost certain that the Taylor ruling of yesterday was not done in isolation, and we can expect the Supreme Court to back up Judge Taylor's ruling, especially if she gets badly treated at the hands of the administration.

    So we now have the spectre of two of the three arms of power in the US involved in a Mexican standoff. Who blinks first?

    There's only one President, and those around him are blinking like there's no tomorrow, because those at the middle layer are far more vulnerable. Judge Taylor agreed to stay the enforcement until 7th September, which might be a blink. There are many courts and many judges, including a feared majority in the Supreme Court.

    Time to think the unthinkable. The deeper question is how to see the transition, and one thing is clear: VP Cheney will not easily fill the warm seat. Where Bush goes, Cheney follows.

    Which leaves Condalezza Rice. And one mountain of a logistics problem in trying to organise succession. Frankly, I'd not want to be a Republican at the moment.

    (Ed's apologies for off-topic crazy-talk post. I should explain that I have seen this story a half dozen times before and I've put it down to Republican panic merchanting. It's just that this time, there's a court and a crime involved... Nexus with FC: the SWIFT breach IMO is the same class of activity.)

    Posted by iang at 12:49 PM | Comments (5) | TrackBack

    Privacy v. LEO interests -- too simple an approach?

    Dave Birch asks:

    One of the key issues in designing new electronic payment systems is balancing the privacy of transaction counterparties (which may be a social good, even if neither of the counterparties cares one way or the other) with the legitimate requirements of law enforcement. But the article on Money Laundering says that the biggest recent boost to global money laundering is not hawala or pre-paid mobiles, but the euro. The fact that launderers can stuff 500 euro notes in their underpants, and zoom around Europe spending and depositing, helps them enormously.

    I tried to write a comprehensive response to this important question, but it is too hard -- that is, long, involved. I suppose that is one point -- it is not possible to separate out the issues of privacy and law enforcement and present them as a balance, not in any cohesive fashion. Simplifying the question to that of a balance between these two factors will not help.

    Having said that, there are some easy pithy things to say:

    1. the "legitimate requirements" of law enforcement are handled by the law and the courts. Read the law, attend to court issued warrants. Don't get trapped in the marketing of LEOs and regulators who try to make their jobs easy at the expense of everyone else.

    2. privacy is not an absolute, and users don't demand it in the general sense. What they do demand is a deal that doesn't change, and a deal that has no secret traps. So whatever you do in a payment system, do it openly. Likewise to the above, don't get trapped in the marketing of the privacy nuts who insist that assassination-grade secrecy is necessary for everyone.

    3. the political move to monitor everything is way beyond logic or sense. Pointing out that paper notes are not controlled to the same extent is asking the political/bureaucratic body to start thinking logically and economically. To employ risk-based analysis, that is. That may happen one day (see #4 below), but it isn't likely to help any consumer or payment system in the forseeable future.

    4. In time, the economists will get around to pointing out how all the tracking, tracing, monitoring and seizures is causing costs for little return. We the people already feel it, in trying to get simple transactions through recalcitrant payment systems, but it takes serious studies to point out the transaction costs to those who's interests are limited by guaranteed salaries.

    5. The notion that a digital system does not involve tracking, tracing, monitoring is difficult to fathom. Even if we were not subject to external pressure and CYA behaviour at all levels of the business, we have substantial internal reasons to have in place sophisticated controls. How do I as an issuer know that I have issued exactly X? Only by looking at every transaction and counting them all up!

    6. A full analysis of any system will reveal many requirements and many factors. To revisit the earlier point, privacy and such interests quickly become just more ticks on the box, and not essential ones at that. For e.g., a far more important thing to people is the reliability of the money as a money, and this tends to dwarf privacy issues. That is, privacy is what's left over when all the other things have been dealt with.

    Having said all that, I know what Dave is saying -- the balance offered by "legitimate requirements" of law enforcement and the regulators is all wrong. It creates strains that can ultimately break a system (examples abound). Is there a way to get all the various external parties interested in tracking, tracing, monitoring and ultimately seizing everything to back off and stop breaking systems before they are fielded? How do we let financial cryptographers put in place systems that serve society?

    Posted by iang at 11:56 AM | Comments (3) | TrackBack

    August 17, 2006

    Slapdown - US Court rules against Bush wiretaps

    Chris points to the Court of the Honourable Anna Diggs Taylor, representing the third branch of power in the USA. Justice A. D. Taylor rules the telephone wire tapping programs out of order. That is, illegal.

    In summary, she knocked out the "states secrets" defence because all the information needed was already public, and she granted a permanent injunction based on breaches of the law -- FISA -- and the US constitution and US bill of rights.

    As the case has some bearing on the recent SWIFT breach by US Treasury (probably conducted under the same novel theories inside or outside the law), we present some snippets from Case No. 06-CV-10204:

    The President of the United States, a creature of the same Constitution which gave us these Amendments, has undisputedly violated the Fourth in failing to procure judicial orders as required by FISA, and accordingly has violated the First Amendment Rights of these Plaintiffs as well.

    ....In this case, if the teachings of Youngstown are law, the separation of powers doctrine has been violated. The President, undisputedly, has violated the provisions of FISA for a five-year
    period. ...

    VII. The Separation of Powers

    The Constitution of the United States provides that “[a]ll legislative Powers herein granted shall be vested in a Congress of the United States. . . .”43 It further provides that “[t]he executive Power shall be vested in a President of the United States of America.”44 And that “. . . he shall take care that the laws be faithfully executed . . . .”45

    .... Justice O’Connor concluded that such a citizen must be given Fifth Amendment rights to contest his classification, including notice and the opportunity to be heard by a neutral
    decisionmaker. (citation) Accordingly, [Justice O’Connor's] holding was that the Bill of Rights of the United States Constitution must be applied despite authority granted by the AUMF.


    She stated that:

    It is during our most challenging and uncertain moments that our Nation’s commitment to due process is most severely tested; and it is in those times that we must preserve our commitment at home to the principles for which we fight abroad. **** Any process in which the Executive’s factual assertions go wholly unchallenged or are simply presumed correct without any opportunity for the alleged combatant to demonstrate otherwise falls constitutionally short. Hamdi, 542 U.S. at 532, 537.

    Under Hamdi, accordingly, the Constitution of the United States must be followed.
    ...

    The duties and powers of the Chief Executive are carefully listed, including the duty to be Commander in Chief of the Army and Navy of the United States,49 and the Presidential Oath of Office is set forth in the Constitution and requires him to swear or affirm that he “will, to the best of my ability, preserve, protect and defend the Constitution of the United States.”50

    ...Not only FISA, but the Constitution itself has been violated by the Executive’s TSP. As the court states in Falvey, even where statutes are not explicit, the requirements of the Fourth Amendment must still be met.54 And of course, the Zweibon opinion of Judge Skelly Wright plainly states that although many cases hold that the President’s power to obtain foreign intelligence information is vast, none suggest that he is immune from Constitutional requirements.55
    The argument that inherent powers justify the program here in litigation must fail.

    ... Plaintiffs have prevailed, and the public interest is clear, in this matter. It is the upholding of our Constitution.

    As Justice Warren wrote in U.S. v. Robel, 389 U.S. 258 (1967):

    Implicit in the term ‘national defense’ is the notion of defending those values and ideas which set this Nation apart. . . . It would indeed be ironic if, in the name of national defense, we would sanction the subversion of . . . those liberties . . . which makes the defense of the Nation worthwhile. Id. at 264.

    IT IS SO ORDERED.



    Date: August 17, 2006s/Anna Diggs Taylor
    Detroit, MichiganANNA DIGGS TAYLOR
    UNITED STATES DISTRICT JUDGE

    Some caveats: we probably have to wait for the inevitable appeal, and we don't do law here, we just do FC. And here seems an appropriate moment to finish with Nick's observations on the wider scope:

    There is a long-standing controversy about the idea of parliamentary supremacy -- the idea that legislative law trumps all other law. That is currently the dominant theory in England, but the United States holds a contrary view -- here judges review legislative laws against a prior and higher law: a written constitution (and perhaps also against natural law, but that is a subject we won't pursue here).

    There will be multiple additional links to the precise case...

    Posted by iang at 11:11 PM | Comments (2) | TrackBack

    August 09, 2006

    Sarbanes-Oxley is what you get when you don't do FC

    Adam over at EC, responding to an entry by Phill, is banging the drum on breach data collection and distribution, which is well needed. I first saw this point in a paper from around 2004, and it has been a well trodden theme in the now popular field of Sec&Econ. All well and good. We need more breach data.

    However, collecting the data is not the be-all and end-all. It's not for example what would have saved Enron, which is what Adam alludes to:

    SarBox is what we get when we have no data with which to push back.

    Sarbanes-Oxley collects lots of data, but doesn't change the problem space, and it arguably makes the problem space worse.

    Sarbanes-Oxley is what you get when (a) systems get too complex and (b) businesses don't implement Financial Cryptography techniques to reduce and eliminate those complexities. Under these two conditions, what you get first is fraud -- keep in mind that fraud comes out of complexity and lack of reliable systems. The lack of reliability means the systems can be perverted, and the complexity means the perversions can be hidden.

    What you get second is Sarbanes-Oxley, as well-meaning accountants discover that they can set themselves up for a *lot* of work and provide a veneer of cover for frauds like Enron.

    In contrast, in FC, we have patterns and methods to tighten up all that transaction stuff. RAH's old saw about it being 2 orders of magnitude cheaper is in the right ballpark, except that it might be conservative. FC creates both reliability --- cryptographically based real time non-pervertable reliability -- and removes complexity, as whole layers at a time can be dispensed with because we can simply write automatic audit processes that show 100% conformance.

    But these aspects are also why FC didn't get implemented. In a regulated industry, there is incentive to corporate business model cloning (economists call this 'herding'), which leads to cartel behaviour (see paper for another angle) and this then leads to an incentive to raise costs, not lower costs. The banks are a canonical case, as they are so highly regulated that all banks are almost always clones of each other.

    If that doesn't make sense, consider it this way. Ask an accountant whether he would recommend a system (say, FC) that would halve his account, or whether he'd recommend a system (like Sarbanes-Oxley) that would double his account.

    Add to these effects of fraud and we find another barrier to FC: the experience of those who work at the systemic level to try to put in simpler, more cost-effective systems that eliminate fraud is that they also run slap-bang into those people who perpetuate fraud. These people are very hard to dislodge, for very good reason: they are making a lot of money out of the complexity and poor reliability systems. They are prepared to spend a lot of money keeping systems complex and unreliable.

    The answer then is not to increase regulation a la Sarbanes-Oxley, but to decrease regulation, and let things like SOX (or AADS or other similar systems) innovate and drive costs and complexity down. Every time the regulation increases, expect more complexity and therefore more fraud and more costs. Decrease regulation and expect the reverse. Simple.

    Economists have known this for decades, we don't need to re-invent the wheel in the security industry with calls for this or that regulation.

    Posted by iang at 10:21 AM | Comments (9) | TrackBack

    August 07, 2006

    Thank AOL for bringing us this example of datamining

    Readers might be mighty sick of reading how the boring non-entity SWIFT lost its data virginity in the grubby hands of the US Government. Now we have a change in melody, but the beat remains the same.

    AOL released 20 million randomised searches, indexed to 650,000 users, from its Google-rebranded search front-end as an experiment to aid researchers. Unfortunately for them, the bloggers got hold and started to research:

    ....someone typed in "borderline personality disorder" multiple times and then days later there were many queries about "men that are abused by wives." The queries seem to be coming from somewhere in Toledo, Ohio. Months later someone searched for "ohio correctional institute strkyer ohio," then for airline tickets to Detroit Wayne airport and then finally on the words "win him back."

    The Internet has been a boon to those who have needed to search difficult subjects. We all know that the doctor says, "visit me," but how many of us do? The net has the answers.

    What might not have been clear is that the net has your questions, too. How easy is it to misconstrue dangerous search requests? Well, one could argue that if one is using the net, and not asking a human, there is a good reason. Plenty of room for misinterpretation, we can assume.

    Sometimes it is clearer:

    Check out the search history for user 17556639, most recent search is at the bottom of the list.. Does this look like the search history of a user wanting to do something bad?

    17556639 how to kill your wife
    17556639 how to kill your wife
    17556639 wife killer
    17556639 how to kill a wife
    ....

    We all want to know that from time to time, but mostly we don't write down those spur of the moment thoughts. User 17556639, would you come quietly with us, please?

    The primary point here being that this data is now permanently breached. Once breached, it will be shared. And datamined. Once datamined, expect surprising results, visits by surprising people and surprising levels of abuse.

    Got governance? AOL does not, placing it in firm company with the US government. According to today's earlier post, expect firings & hirings to soar at AOL, and conspiracy theorists will suggest that the USG suggested the research angle to the witless at AOL after the subpoena debacle earlier in the year.

    Thanks to Dani for heads-up.

    Posted by iang at 08:21 PM | Comments (3) | TrackBack

    SWIFT breach - leverage v. due process, Spy v. Spy, audit v. Ajax, three questions for SWIFT

    More rumours on how the US Treasury breached SWIFT: It appears that UST knew about certain SWIFT breaches by insiders in the past and used those infractions as leverage to get access.

    This may be in contrast to claims by SWIFT itself that UST prepared warrants for seizure as extortion ploys. Indeed, it has been suggested that not only were no warrants prepared, but that the UST provided no written evidence of any form of due process at all. An interesting question to put to SWIFT, #1: show us the evidence!

    It gets better: SWIFT was breached not once, not twice, but three times!

    Rumour has it that two other agencies of unknown character had also breached the SWIFT record set independently of UST, and that they were better at it than UST in that they really knew how to use the information. The timeline of these breaches is unclear.

    At least one of these agencies has found all sorts of interesting information and has used it -- which is how the secret was outed. They apparently have done the datamining thing and fed the results into various cases. It's what you do with data, right? Then, conversations with those implicated groups (read: wall street firms) has led to a suspicion that more than just domestic data was involved. At least one company with rock-solid profitably has already proceeded on an "orderly exit from the market," after having been given "the talk." The people involved read like a who's who of the mothers of the Texas / Washington DC oil industry which raises the idle speculation of political connections and insider trading -- were there suspiciously good trading records in oil? And was this found in the SWIFT analysis? And what sort of agency takes on that power group and lives to tell the tale?

    All which rumours might point to TLA2 being a US agency with interests domestic rather than foreign. Likely candidates we could speculate on given the financial regulatory interest would be the SEC or the Federal Reserve.

    TLA3 remains obscure. But, once we get to 3 agencies, we can stop counting and also stop pretending that there is any governance in place. SWIFT is an open book for regulators in the US at least, and that makes it just another smoking gun in the never-ending Spy v. Spy game. At the least, this suggests question #2 for SWIFT: how many agencies have your data?

    In related gossip, SWIFT itself has conducted an internal audit, perhaps in response to the above rumour of leverage, or perhaps out of caution. It has apparently found additional multiple breaches across the lines -- uncovering misuses of data by employees.

    Insiders suggest a strategy of cleaning house before outside regulators come in. Do we audit then Ajax, or is it the other way around? Sustained pressure on privacy and banking regulators in Europe has made intervention a non-trivial risk; latest rumour there is that the Belgian privacy regulator is taking lead on the case for all EU privacy regulators, and they all now working through SWIFT's response to the first round of questioning. The question of whether European companies are alive to the risks of "Restaurant economics," a.k.a. industrial espionage remainsl an open one.

    Question #3 for SWIFT: why didn't your prior and no doubt expensive audits uncover signs of data abuses? (Readers of FC already know the answer to that, but SWIFT might not, so it is worth making them think about it.)

    Also, there are scurrilous suggestions that the SWIFT breach has triggered a wave of copycat audits across FIs with a wide network of users. Major banks take note -- you may want to now go through and audit how your data has been used and misused, and we ain't talking about Sarbanes Oxley. "One more time, with feeling." Many institutions are apparently already doing this, which has lead to a surge of firings and hirings where misuse of data has been found. Some of the breaches relate to USG as beneficiary, others do not, but details are of course scant. (Companies that are mentioned as having surges in firings/hriings other than SWIFT include three household names, leaders in their respective sectors.)

    [ Search for more on SWIFT breach. ]

    Posted by iang at 01:15 PM | Comments (0) | TrackBack

    August 04, 2006

    IdentityWatch: Cloning the RFID, swimming the channel on the cheap, the Russian view, AML success rate, and the genesis of Id Theft?

    "Hackers clone e-passports" from wired reports that the RFID in the new passport formfactor can be cloned for peanuts:

    Grunwald says it took him only two weeks to figure out how to clone the passport chip. Most of that time he spent reading the standards for e-passports that are posted on a website for the International Civil Aviation Organization, a United Nations body that developed the standard. He tested the attack on a new European Union German passport, but the method would work on any country's e-passport, since all of them will be adhering to the same ICAO standard.

    Lynn says that sounds somewhat akin to the "yes card" clones of sda chip&pin that started to show up in the 90s [1, 2].

    And now for something completely different:

    Confidence in the Government's immigration policy - insofar as it has one - is at rock bottom. The latest revelation was buried in a threat assessment issued by the Serious Organised Crime Agency yesterday. It revealed that the cost of a clandestine passage from France to Britain is now just £150.

    Is that with a free Identity, or don't you need one as you stride out below the white cliffs of Dover? I've postulated on the basis of this and other collected resources that $1000 is the value of your identity. Over in Russia, Vlad Miller also came up with a $1000 maximum liability number which he uses when selling identity certification. He writes (from email):

    My estimations of the liability amount was mostly based on similar indirect research of black market prices. According to the majority of my sources (paper and internet press as well as some unofficial discussions with old-hat officials from MIA) russian black market has two main fake identity (mostly domestic passports) offers:

    1. Fake real identity, that is just a counterfeit document that looks real (at glance or under a more in-detail examination). Those cost 100-800 USD depending on the quality of forgery.

    2. Real fake identity, that is a *real* and fully legal identity document issued on a *fake* name. These IDs can't be detecter with any forgery detection techniques; in some cases you can't determine this is a forgery even by inquiry to the official MIA database because this fake name is entered there too (this is resembling to real fake IDs used by undercover operatives). Such forgeries cost starting at 1200 USD (just filled on a legal blank) and may run up to 2000 USD and even more (fake information is inserted into the database).

    I've made some security risks calculations, and final $1000 came up.

    Our routine survey of fake Ids does not challenge:

    The fake IDs were for more than 20 countries including South Korea, Singapore, Germany and the United States. Police also found about 1,500 visas for Australia, Malta, Moldova, the European Union (EU), Canada, Japan and South Africa. ... The suspects admitted that the gang charged about 4,000 baht ( 105 U.S. dollars) for producing a fake passport. They added forgery had become easy with the help of high-tech digital equipment.

    Where this comes to the point is in the application of money. Here's Dani's Report from the Wild East:

    I have participated in a conference titled "Banking and Criminal Law" organized by the International Association of Penal Law (AIDP, http://www.penal.org ) where the following figures were announced for 2005 in Hungary:

    Reports by banks and law-firms concerning possible money-laundering: approx. 14000
    Investigations initiated by the police: 8
    Cases heared at court: 2
    Guilty verdicts: 0
    At the same time, the estimated volume of money laundering through the Hungarian financial system during the same year: $4 billion.

    These figures came as a shock to some of the participants (including myself). This proves that the immensely expensive snooping machinery that requires one or two full-time employees at major branches (the guy dealing with the paperwork required for reporting suspicious cash transactions), which both customers and banks hate, is completely ineffective. Banks were forced into compliance by the regulation that puts the criminal responsibility for money-laundering on the teller, if s/he failed to report it; thus, they end up reporting almost every transaction, just in case. Same for law firms and escrow agencies (these two functions are traditionally performed by the same companies in Hungary).

    On the other hand, living without a bank account is nearly impossible in Hungary (for instance, it is illegal to pay salaries in cash for a wide range of jobs) and it is becoming increasingly burdensome to transact without the banks' participation. It's getting worse year by year.

    Russia is a completely different story, where the trust in the banking sector is generally low among the general population and large parts of savings are held either at home in cash (exclusively in USD during the nineties, then in Euros and in the past two years increasingly in the local currency, roubels) or lended to trustworthy friends and relatives. Major money laundering is done through off-shore banks, mostly in the baltic states (Russian-owned Latvian banks are the favorites). Even if salaries arrive to bank accounts, people tend to visit the ATM on pay-day to get some cash (most ATMs give both roubles and USD; when ATMs first appeared in Russia, they were dollar-only). Escrow agencies (of which WebMoney is technically one) are very popular in securing p2p or b2b transactions. These are very loosely regulated, use a diverse set of communication channels, and God alone can track all the financial flows. There are just too many of them.
    Posted by: Daniel A. Nagy

    It is relatively easy to draw a line from drugs -> ML -> AML -> identity obsession -> identity theft, albeit hard to stomach for the unforseen consequences. We can now possibly calculate the losses from AML: as identity became necessary for more and more processes, including for example the expansion of the credit society, more and more stress is placed on the weak instrument of the one true identity. In this case, the AML people have paved the way for fairly massive identity theft and concomittant fraud. Last time I saw the figures it was running around $10bn per year in the US, but maye it is more:

    Nearly 10 million consumers were victimized by some form of identity theft in 2004 alone. That equals 19,178 people per day, 799 per hour and 13.3 per minute. Consumers have reportedly lost over US$5 million, and businesses have lost an estimated $50 billion or more.

    The authorities will see statistics on the uselessness of AML as more evidence that they must try harder, but economists see it differently; If we reverse the cause and effect in our minds, correlation is still found to confirm our mistakes.

    The late great President Ronald Reagan is often lauded as the most Austrian of leaders, but he made some mistakes. As instigator of the original war on drugs, he set the foundation for our current epidemic of identity theft, and his war fell victim to the law of unforseen consequences.

    Posted by iang at 08:42 AM | Comments (3) | TrackBack

    July 22, 2006

    SWIFT breach - the 'squeeze', justice not being done, the Europeans wake up to "restaurant economics" a.k.a. industrial espionage

    SWIFT was extorted to hand over the data. According to two Austrian reports:

    "Einverständnis wurde abgepresst"

    Per Gerichtsbeschluss sollte der gesamte Datenverkehr in der US-Zentrale von SWIFT beschlagnahmt werden, falls SWIFT nicht freiwillig eine bestimmte Zahl von Datensätzen liefere - "das Einverständnis wurde abgepresst", sagt Gall.

    “Agreement was squeezed off”

    By court order the entire data traffic in the US center should be seized by SWIFT, if SWIFT does not supply voluntarily a certain number of data records - “agreement was squeezed off”, says Gall.

    Also, here (left in German, right in Googlish, sorry about that) and also see earlier reports (1, 2, 3, 4, 5) ... :

    Mit Beschlagnahme gedroht

    Als sich SWIFT zunächst weigerte, drohten die Amerikaner mit der Beschlagnahme der in den USA gespeicherten SWIFT-Daten. Im US-Bundesstaat Virginia befindet sich nämlich eines der drei Hauptrechenzentren des weltweiten Finanztransaktionssystems SWIFT. Mit der Verhinderung von noch Schlimmerem begründet SWIFT nun, dass man alle gewünschten Daten freiwillig übermittelt habe.

    Threatened with seizure

    When SWIFT refused first, the Americans threatened with the seizure of the Swift data stored in the USA. In the US Federal State Virginia is one of the three main computing centres of the world-wide financial transaction system SWIFT. With the prevention of still worse one SWIFT justifies now that one conveyed all desired data voluntarily.

    SWIFT director Günther Gall made those comments at a recent "crisis meeting" held by Austrian banks. He reported that the US Treasury prepared warrants for the seizure of the entire data center, and then offered SWIFT the chance to cooperate by means of a slightly less draconian handover of data.

    There's no doubt that the US Government can have this data if it wants. It has the power, and SWIFT is an easy touch, so say at least the Swiss

    Stellt sich die Frage, wieso die Swift dem amerikanischen Finanzministerium gefügig Folge leistete. «Die Swift ist leicht erpressbar», mutmasst Mark Pieth, der bereits die Untersuchungskommission der Uno im «Oil for Food» -Skandal leitete, «denn wenn die US-Behörden der Swift die Lizenz für ihre amerikanische Niederlassung entziehen, ist sie nicht mehr funktionsfähig.» Pieth wäre auch nicht erstaunt, wenn der amerikanische Geheimdienst sich im selben Atemzug Einblick in andere Finanztransaktions-Plattformen beschafft hätte. Laut dem Bericht der «New York Times» bestätigten Offizielle der US-Behörden zudem, limitierte Abkommen mit Kreditkarten- oder Transaktionsunternehmen wie Western Union eingegangen zu sein. Die Angelegenheit stellt für Pieth jedenfalls einen eindeutigen Eingriff in die Freiheitsrechte der Bürger dar, und er ist gespannt, wie sich die Schweizer Behörden rechtfertigen werden.The question arises, why Swift had complied to the American Finance Ministry so easily. “*SWIFT is easily extortable*”, presumed Mark Pieth, which already led the inquiry of the UN in the “oil for Food” scandal, “if the US authorities withdraw the licence from SWIFT, it is no longer functional.” Pieth would not be surprised also, if the American secret service had procured itself in the same breath view of other financial transaction platforms. According to the report the “New York Time” confirmed official one of the US authorities besides, agreement with credit card or transaction enterprises limited such as Western union to have been received. The affair represents a clear interference anyhow for Pieth into the liberty rights of the citizens, and it is strained, as Swiss authorities will justify themselves.

    In this case, it used the power, and hence we now have another reason for the cover-up -- if true, the US government again exceeded the bounds of reasonable civilised behaviour. It brings to mind how Judge Lewis A. Kaplan recently ruled in the New York Southern District court:

    "Justice is not done when the government uses the threat of indictment ... to coerce companies into depriving their present and even former employees of the means of defending themselves against criminal charges in a court of law," he wrote.

    "If those whom the government suspects are culpable in fact are guilty, they should pay the price. But the determination of guilt or innocence must be made fairly _ not in a proceeding in which the government has obtained an unfair advantage long before the trial even has begun."

    There, Judge Kaplan was referring to the US Justice Department's documented technique of pressuring companies to "cooperate" by hanging their employees out to dry. Unfortunately, there was nobody at the American data center to represent the world's wire senders against the seizure "incentive."

    This is a scenario which is all too routine in the money world which is why we have rather strict banking secrecy laws. More:

    Offiziell Bescheid wusste in Österreich offenbar nur ein Manager der Raiffeisen Zentral Bank und SWIFT Aufsichtsrat Günther Gall. Er hatte bereits 2001 der Weitergabe von österreichischen Transaktionsdaten an die CIA zugestimmt. Angeblich wurden die österreichischen Banken über diese, nach österreichischem Recht illegalen Datenweitergaben, nicht informiert.

    Nach fast fünf Jahren wird es nun Zeit, dass sich die Banken darum kümmern, wie mit unseren österreichischen Finanzdaten umgegangen wird, die sie an SWIFT weitergeben. Denn es sind die Banken, die garantieren müssen, dass Dienstleister den gleichen Standard beim Datenschutz garantieren, wie sie selbst mit dem Bankgeheimnis versichern.

    Officially, only one manager in Austria know, Raiffeisen central bank and SWIFT supervisory board Günther Gall. It had already agreed 2001 of the passing on of Austrian transaction data to the CIA. Allegedly the Austrian banks were not informed about these data passing on illegal after Austrian right.

    After nearly five years it becomes now time the fact that the banks worry about how with our Austrian financial data is handled, which pass it on at SWIFT. Because there is the banks, which must guarantee that Dienstleister guarantee the same standard with the data security, how they insure with the banking secrecy.

    Which is a grumble that the Austrian responsibilities towards secrecy of data have been breached.

    There is yet another problem. Most of the world is looking at this as a privacy issue. (Indeed Privacy International is right on the case, and it needs no crystal ball to predict who's top choice for this year's Big Brother award.) Yet, this is missing the point. As I've pointed out, the lack of governance means that the information will be leaked in due course; not to you or I, as we can't affort the price of illegal data, and we may not want to anyway. But to someone; and due to strong secrecy of their operations, we won't know who it is being leaked to.

    René Pfeiffer reports in EDRIgram:

    Members of Austrian business organisations have also voiced big concerns about possible cases of industrial espionage, because it is not known who has access to the intercepted SWIFT data. Combining the data from money transfers and the disputed Passenger Name Records data enables everyone who gets these records to use them for economic advantage.

    Organisations in UK, Germany and Austria have begun to investigate the scope of the damage caused by the SWIFT tapping. Letters to local banks and SWIFT board members have been prepared and published. Every company, business and individual is advised to demand a clarification about the intercepted data on the basis of data protection laws. Furthermore legal steps are being prepared against the SWIFT board since they gave customer details away without mutual consent.

    This isn't so much about privacy of the individual, as privacy of the business. A.k.a. industrial espionage, on a state-run scale.

    If a large enough deal is being done, where some US champion (say, Boeing) is up against some European champion (say Airbus) for some large bid (say 100 A380s for China), then we can expect _governance be damned_. Maybe the US Treasury would stand up and defend Airbus's right to privacy, against Boeing's corporate survival, ... but I wouldn't be betting *my* factory on it. More:

    Wirtschaftsspionage mit EU-Finanzdaten

    Bisher wurde nur vermutet, die USA könnten ihr Überwachungssystem im Namen der Terrorabwehr auch dazu nutzen, Europas Wirtschaft auszuspionieren. Mit dem Abhören der Finanzdaten habe sich das nun betätigt, so ein Experte der Internationalen Handelskammer.

    "Für mich kommt diese Wendung nicht überraschend. Vom Überwachen des internationalen Telefonieverkehrs bis zur Kontrolle des Finanzverkehrs ist es ja nur ein kleiner Schritt. Was im ECHELON-Untersuchungsausschuss des EU-Parlaments noch Vermutung war, hat sich damit bestätigt", sagt Maximilian Burger-Scheidlin von der Internationalen Handelskammer [ICC] in Wien.

    ECHELON lässt grüßen

    Die Vermutungen im Untersuchungsausschuss, die USA würden ihr elektronisches Überwachungssystem ECHELON auch gezielt dazu benutzen, Europas Wirtschaft auszuspionieren, sind für Burger-Scheidlin mit der Affäre SWIFT nun real geworden.

    Man könne eigentlich dankbar sein, denn nun lägen handfeste Indizien vor, dass US-Geheimdienste die europäischen Finanztransfers systematisch durchsuchten. "Wir hoffen nun, dass die Regierungen Europas endlich aktiv werden, nachdem sie nun seit vielen Jahren Bescheid wissen", sagt Müller-Scheidlin, dessen Spezialgebiet bei der ICC die Abwehr von Wirtschaftsspionage ist.

    Restaurant economics with European Union financial data

    So far only one assumed, which could use the USA their monitor in the name of the terror defense also to spy of Europe economics. With the hearing of the financial data now, such an expert of the international Chamber of Commerce worked.

    “For me this idiom does not come surprisingly. From supervising the international telephone voice traffic up to control of financial traffic it is only a small step. Which in the ECHELON committee of inquiry of the European Union parliament still assumption was, thereby”, says Maximilian Burger Scheidlin was confirmed of the international Chamber of Commerce [ICC] in Vienna.

    ECHELON says "I'm not dead yet!"

    The assumptions in the committee of inquiry, which the USA its electronic monitor ECHELON also purposefully to use to spy of Europe economics are become for Burger Scheidlin with the affair SWIFT now material.

    One can be actually grateful, because now strong indications would be present that US secret services scanned the European financial transfers systematically. “We hope now that the governments of Europe become finally active, after they know, say now for many years answer” Mueller Scheidlin, whose special field is with the ICC the protection from restaurant economics.

    And More. "Restaurant economics" is googlish for "industrial espionage" it seems. Luckily, it's all in German which means the Bush Administration can wave off these funny krauts and their silly terms, and pretend this is just another case of New York Times treachery and treason.

    It remains to be seen if the International Chamber of Commerce will carry this fight to the enemy. What was last month's curiousity -- the European Commission being quite happy to sign over so much data in one-way exchanges on individuals -- is now replaced with the new curiosity of whether they will do the same to their companies.

    Posted by iang at 02:42 PM | Comments (1) | TrackBack

    July 15, 2006

    SWIFT breach - embarrassed Europeans, outrageous acting in Congress, the aggreated abuses, camelgate, and the institutionalised defrauding of American values

    I was right on the embarrassment call. First the Canadians, now the British, the Irish and even the European Parliament:

    The European Parliament demanded Thursday that European governments and European institutions in Brussels disclose how much they knew about a secret U.S. program to tap into international banking data.

    In a resolution reflecting concern among Europeans about cooperation in America's "war on terror," the Parliament voted 302 to 219, with 22 abstentions, to demand that the European Commission, the European Central Bank and the EU's 25 member states "explain fully the extent to which they were aware of the secret agreement" between Swift, an international banking consortium, and the U.S. government.

    Following the arrest in Italy on Wednesday of two Italian intelligence agents suspected of helping in the alleged CIA kidnapping of a terrorism suspect and his transfer to a third country, a process known as "extraordinary rendition," the Parliament also adopted a resolution stating that it was "implausible" that "certain European governments were not aware of the activities linked to extraordinary rendition taking place on their territory." It voted to extend its investigation into alleged CIA detention centers in Europe by six months.

    While the resolutions are not legally binding, they have "political teeth," said Friso Rascam Abbing, spokesman for the EU's justice and security commissioner, Franco Frattini.

    The European Parliament are an odd bunch. They have little power to pass laws, but when they jump up and do something, it is a hint that something's gone awray. In this case, the Commission -- where the real power lies -- has realised the writing is on the wall:

    Belgian authorities are investigating whether the Brussels-based Society for Worldwide Interbank Financial Telecommunication, or SWIFT, broke the law by passing bank transaction data to the CIA.

    Once that inquiry is concluded, European Commission officials will try to determine whether EU privacy laws were also violated.

    "There is no question of a cover-up," said Friso Roscam Abbing, a European Commission home affairs spokesman in Brussels.

    That other apparently powerless bunch of seat warmers, the US Congress, agrees:

    In a sharply worded letter, the Republican chairman of the House intelligence committee has told President Bush that the administration is angering lawmakers, and possibly violating the law, by giving Congress too little information about domestic surveillance programs.

    Rep. Peter Hoekstra (Mich.) has been a staunch defender of the administration's anti-terrorism tactics. But seven weeks ago, he wrote to Bush to report that he had heard of "alleged Intelligence Community activities" not outlined to committee members in classified briefings.

    "If these allegations are true," he wrote, "they may represent a breach of responsibility by the Administration, a violation of law and . . . a direct affront to me and the Members of this committee."

    However, one shouldn't take the noise from Congress as too scary. In a production more befitting of Hollywood than Pennsylvannia Avenue, the bill to legalise and also slip in a few more weapons of mass privacy destruction has already been written, under cover of outrage at the White House:

    The White House balked at an early draft that would have mandated the president submit the NSA program to the FISA court for review. Specter agreed to make it voluntary as long as Bush promised to submit the program if Congress passes the bill. Aides privately acknowledged it was a big concession by a president who until now has resisted judicial interference in how he wages war against terrorists.

    The White House conceded in part because it believes the NSA program will survive constitutional muster and the Specter bill will make it easier to argue that the program complies with congressional statutes as well. "We've always said it's constitutional," said one administration official who was not authorized to speak on the record.

    The language acknowledging the president's constitutional authority to conduct intelligence operations also was important to the White House. "We see it as historic because here's a statute recognizing an authority the president says he has," the administration official said.

    Still, that language alone might mean little because it did not define the scope of the authority or explicitly suggest that a president did not need to seek court approval for warrants. But at the same time, Specter agreed to repeal a section of the original FISA law that made it the exclusive statute governing such intelligence programs.

    The combination of the statement acknowledging presidential authority and the deletion of the exclusivity clause left open the interpretation that Bush has the power to conduct other surveillance outside FISA's purview, a possibility administration officials noted with approval.

    Also, added, a clause sweeping all civil suits before the FISA court. Whoops! In other words, "please tell us what bill you want written to legalise it, and we will pass it, loudly and angrily." Will this Patriot sequal outsell the Pirates of the Caribbean redux? Back to the IHT article:

    Revelations about the SWIFT operation have coincided with growing awareness of the CIA's use of clandestine prisons in Europe for terrorism suspects, the abduction of such suspects, and secret flights to transport them, often to countries where they might be tortured.

    Note that this is backtracking at rapid speed by the EC and other regulators. Earlier statements were of the ilk of "not our jurisdiction". Note also how this is being linked to the 'extraordinary rendition' issue above and in other press reports (two Italian intelligence agents arrested in recent weeks in connection...). Keeping in mind the phone tracking and the flight data, both cases where data was passed across the Atlantic without coming back the same way, Europe is now waking up to the fact that the much vaunted European privacy model has been breached on a wholesale level. For more evidence of asymmetry accepted by lame-duck politicians, consider the 3 accused Enron scapegoats:

    Lawyers for the three former bankers known as the NatWest Three confirmed yesterday that the men will complete on Thursday their fast-track extradition to America to face charges relating to an £11m fraud involving the collapsed US giant Enron.

    On the same day, the Home Secretary will dispatch a minister to Washington to try save the British Government from further humiliation by persuading US senators to drop their opposition to a reciprocal US-UK extradition treaty.

    In each case in isolation, the government(s) let it happen -- a one way deal. The question we are now looking at is whether the European Union and others such as US Congress, the Canadians, and the rest of the world will view the abuses in aggregate in a different light.

    Curiously, the Bush administrations fears may have been justified: Notwithstanding the expected nature of this particular breach, it may become the straw that broke the camel's back. In time honoured American tradition, maybe we should call the SWIFT breach Camelgate.

    Finally, we need to keep our eye on the ball here. What is the central problem? It is this: the information that is being collected is not subject to appropriate governance, something that worries as financial cryptographers. The special conditions that once applied to national intelligence activities no longer apply. That data is as we speak being moved out of the box labelled "only for counter-terrorism":

    "We can use that information for terrorism, money laundering - all sorts of law enforcement purposes," Stuart Levey, the Treasury Department's undersecretary for terrorism and financial intelligence, told the House Financial Services subcommittee on oversight and investigations. "And we can do all kinds of the things that people traditionally think about when they think about data mining in terms of looking for trend analysis, suspicious activity and the like."

    There, he is talking about a *new* program to trace all American/International wires. The only thing that is surprising is the breathtaking speed with which US Treasury are discarding the claims of only a few weeks ago.

    Now, the naive might think that the government has the data, and if you've done nothing wrong, then you have nothing to fear. Dead wrong. Because there is no governance worth spit in place, the SWIFT value will be used for nefarious purposes. Intelligence data is already being used so:

    A former ISC insider passed the dossier to the intelligence arm of the anti-corruption squad in February. The informant directed handlers to a series of ISC payments, totaling 20,000 pounds, made to a recipient identified as Detective Sergeant Gary Flood.

    United Kingdom (oops: not US) Intelligence data is now available to the highest bidder. Some will see this as a good thing -- an opportunity. Some of that data is good stuff:

    Among the critical assets in the database are Old MacDonald's Petting Zoo, a Kangaroo Conservation Center, Jay's Sporting Goods, several Wal-Mart stores, Amish Country Popcorn, and the Sweetwater Flea Market.

    The DHS Office of Inspector General found the National Asset Database, being compiled to support a variety of infrastructure protection projects, full to overflowing with "poor quality" data, such as 4,055 malls, shopping centers, and retail outlets, 224 racetracks, 539 theme or amusement parks and 163 water parks, 514 religious meeting places and 1,305 casinos.


    (spotted by 27BStroke6.)

    The USA is moving with breathtaking speed to financial tracking on a comprehensive scale, available to a wide range of interested parties. The institution known as the American Value System has been breached, and is about to be defrauded in a way that makes previous scandals (mutual funds, oil-for-food, KPMG, Enron, ...) look like quaint stories told by old-timers over sherry.

    Posted by iang at 07:07 AM | Comments (3) | TrackBack

    July 07, 2006

    SWIFT breach - canonically novel theories in law revealed

    In the breach that keeps on breaching, I suggested that the reason the Bush administration was nervous of the program was that the Europeans might be embarrassed via public opinion to put in place real governance. I was close (dead link to "Piling On the New York Times With a Scoop," Howard Kurtz, WaPo):

    Keller said he spent more than an hour in late May listening to Treasury Secretary John Snow argue against publication of the story. He said that he also got a call from Negroponte, the national intelligence czar, and that three former officials also made the case to Times editors: Tom Kean and Lee Hamilton, chairmen of the 9/11 commission, and Democratic Rep. John Murtha of Pennsylvania -- an outspoken critic of the war in Iraq.

    "The main argument they made to me, extensively and at length, besides that the program is valuable and legitimate, was that there are a lot of banks that are very sensitive to public opinion, and if this sees the light of day, they may stop cooperating," Keller said.

    What useful reason could they have for keeping it secret? If it was legal, the banks will cooperate. I think we can clearly state that banks will generally operate within the law, and will always side with the government over the interests of their customers.

    As far as the banks are concerned, their interests are covered as long as a) it is legal, and b) all banks equally have to comply. So, keeping it secret was either directed at covering up potential illegality or a lack of legality, or some particular discrimination that was going on. As there has been no real hint of any discrimination here (SWIFT by definition serving all banks), it would be the former. (And, what does he mean by "a lot of banks?")

    He acknowledged, as did the Times article, that there was no clear evidence that the banking program was illegal. But, he said, "there were officials who talked to us who were uncomfortable with the legality of this program, and others who were uncomfortable with the sense that what started as a temporary program had acquired a kind of permanence.

    So what we have here is a programme of dubious legality, where insiders know they have transgressed, and would like the law to be clarified and updated. So they themselves are not at risk, and evidently the banks feel the same way.

    "It's a tough call; it was not a decision made lightly," said Doyle McManus, the Los Angeles Times' Washington bureau chief. "The key issue here is whether the government has shown that there are adequate safeguards in these programs to give American citizens confidence that information that should remain private is being protected." ... McManus said the other factor that tipped the paper's decision to publish was the novel approach government was using to gather data in another realm without warrant or subpoena.

    "Police agencies and prosecutors get warrants all the time to search suspects' houses, and we don't write stories about that," he said. "This is different. This is new. And this is a process that has been developed that does not involve getting a specific warrant. It's a new and unfamiliar process."

    That's raising an interesting question. The question of the maybe-subpoena is addressed here:

    The Administration says the program is legal because every month the Treasury Department issues an administrative subpoena, basically a subpoena you write yourself without seeing a judge.

    Ryan Single also offered a theory on how the newspapers wrote their own administrative subpoenas. More odd remarks from the McManus of the LATimes:

    "I always start with the premise that the question is, why should we not publish? Publishing information is our job. What you really need is a reason to withhold information."

    It's a point. As we dig further we discover the old black helicopter theories surging up:

    The scandal here is not government over-reach, [Blum] tells me. The scandal is the pitiful reluctance of this administration (and others before it) to get serious about the problem. Bankers, Blum explained, "have fended off every conceivable rule that would really be effective. Why are we pandering to them if we say we are in such a desperate situation?" ... The monitoring system described by the Times seems unexceptional to Blum. Indeed, his complaint is that it's so narrowly focused that it mostly harvests empty information. "Meanwhile, the biggest purveyor of terrorist money, as everyone knows, are accounts in Saudi Arabia," Blum observes. "Nobody will deal with it because the Saudis own half of America." An exaggeration, but you get his point.

    Blum knows the offshore outposts where US corporations and wealthy Americans dodge taxes or US regulatory laws. Congress could shut them tomorrow if it chose. Instead, it keeps elaborating new loopholes that enable the invention of exotic new tax shelters for tainted fortunes. The latest to flourish, he says, are shell corporations-- freely chartered by states.

    "The GAO says this device is being used for money laundering by everyone else in the world," Blum says. "Congress ought to start there." He is not holding his breath.

    Which would be the house of cards defence. Here's another card that is showing signs of bending:

    The U.S. National Security Agency asked AT&T Inc. to help it set up a domestic call monitoring site seven months before the Sept. 11, 2001 attacks, lawyers claimed June 23 in court papers filed in New York federal court.

    The allegation is part of a court filing adding AT&T, the nation's largest telephone company, as a defendant in a breach of privacy case filed earlier this month on behalf of Verizon Communications Inc. and BellSouth Corp. customers. The suit alleges that the three carriers, the NSA and President George W. Bush violated the Telecommunications Act of 1934 and the U.S. Constitution, and seeks money damages.

    ``The Bush Administration asserted this became necessary after 9/11,'' plaintiff's lawyer Carl Mayer said in a telephone interview. ``This undermines that assertion.''

    People all around the world bent over backwards to help the USA deal with 9/11. And let's not forget a substantial number of people killed were foreigners -- expatriate workers in the towers at the time.

    If it is true that the spying programmes were begun before 9/11, that might shake the faith a bit. For the unshakebly faithful, see the relevant complaint and some skepticism here (tip to Adam and 27BStroke6):

    Within eleven (11) days of the onset of the Bush administration, and at least seven (7) months prior to the attacks of September 11, 2001, defendant ATT began development of a center for monitoring long distance calls and internet transmissions and other digital information for the exclusive use of the NSA.

    Why are we doing all this? Eavesdropping. We know it is a present danger, but the clarity lacks. We need to figure out what capabilities the agencies have and how far it spreads, in order to inform future designs.

    Posted by iang at 01:57 AM | Comments (0) | TrackBack

    July 03, 2006

    SWIFT breach - softly softly, catchee monkey?

    As predicted, the politicians in Europe are responding, albeit mildly.

    Meanwhile, Belgian Prime Minister Guy Verhofstadt issued a statement saying he has asked security officials to determine whether the U.S. program complied with Belgian laws.

    In the same Toronto Star article:

    New security powers aimed at fighting terrorism may be a "threat to privacy" and must be monitored, Canada's privacy commissioner said yesterday as she announced an inquiry into whether U.S. authorities accessed Canadian financial records.

    Commissioner Jennifer Stoddart said she anticipates making the results of her inquiries public in coming weeks, after "examining whether Canadians' financial transactions are being improperly accessed by foreign authorities."

    Fairly clearly, everyone in the financial community knew that SWIFT tracking was likely, and knew it was probably ineffective. They allegedly caught one guy, which makes it an inessential tool -- you don't take on those risks just to get one successful lead over 4-5 years. And, as we know:

    In his new offering, "The 1 Percent Doctrine," author Ron Suskind says everyone in U.S. intelligence has known for years that al-Qaida and similar groups have jettisoned electronic banking for some time. These guys aren't fools. They also use untraceable cell phones. They now use bodies to carry the cash or hide it in other packages, so the 'use' of this spying is questionable.

    The reason that terrorists aren't stupid is simple - the stupid ones get eliminated over time, an evolutionary feedback mechanism that seems unavailable in Washington D.C, no matter how desirable. Notwithstanding all that, the Bush administration chose to counter-attack the press for the 'leak':

    President George W. Bush has condemned newspapers that carried initial reports on the program last week - including the New York Times, the Los Angeles Times and the Wall Street Journal - saying the disclosure made it "harder to win the war on terror."

    The need for a message that can be explained in 25 simple words to the Republican support base is apparent, but this is verging on the ridiculous. Which raises the question -- aside from lack of evolutionary pressures -- why is Bush taking the New York Times to task on this?

    You also can't count out the White House from being political on this. Attacking the messenger, in this case the New York Times, is "red meat" to some who dislike the media and may garner members of the current administration a few votes in November.

    So, we are being asked to choose between the Republican base being too stupid to realise they are being conned again, or that they will wake up and call Bush's bluff. I don't want to go there. Also, what happens when there is a leak over an effective and agreeable tool? They'll have shot their wad. That's actually a fairly likely scenario, given the record of this administration to shoot first, think later.

    But there might be more to this than mere stupidity and electoral panic. In considering what it means to threaten prosecution over the leak of an ineffective and controversial tool, keep in mind that terrorists aren't stupid. Therefore, they are not in this picture. So, if it is not about terrorists, everything else mentioned is likely as deceptive.

    Let's consider the possibility of a deception plan. Why would Bush's team just not dampen down on it? Nobody knows who SWIFT is, and if we were to keep repeating "boring!" people would eventually get the message. The reason may have something to do with two factors:

    1. International embarressment may actually force a debate on this, and could cause the tool to be modified, or at worst withdrawn. Is the Bush administration embarrassed and caught flat-footed in front of its erstwhile international peers? Or even the Democrats?

    At a confirmation hearing Tuesday for Henry Paulson Jr., the nominee for Treasury secretary, Senator Max Baucus, Democrat of Montana, asked whether the monitoring might violate the Fourth Amendment's protection against unreasonable searches.

    "I think you'll agree that we could fight terrorism properly and adequately without having a police state in America," Baucus said.

    Paulson did not express an opinion on the propriety of the Swift monitoring but pledged to study it. "I am going to, if confirmed, be all over it, make sure I learn everything there is to learn, make sure I understand the law thoroughly," Paulson said.

    Democrats said they hoped to get a clearer idea of the legal foundations for the program, how it was monitored, and how long it would be allowed to continue under the president's invocation of emergency powers.

    I think it unlikely to be withdrawn, but it might earn some proper governance, especially if the Democrats keep embarrassing the international community into thinking about it. Which leads us to point 2:

    2. There is massive support in US Treasury for this tool, if this embarrassing tidbit is anything to go by:

    Democratic staff members said they had pressed Treasury officials in recent days for a fuller accounting of which members of Congress were briefed on the program and whether notification requirements under the International Economic Emergency Powers Act, invoked by Bush after Sept. 11, were met.

    Treasury officials have told congressional staff members that they briefed the full intelligence committees of both houses about a month ago, after inquiries by The [New York] Times, according to one Democratic aide who spoke on condition of anonymity.

    US Treasury possibly realise they now have the crown jewels in their grasp - the tool they need to chase their own subjects across the globe. Now is the time to roll out the long term strategy -- first migrate the SWIFT tracking across to drugs & ML (already started, as spotted earlier). Then on to own citizens.

    Softly softly, catchee monkey. Is this going to happen? You might as well bet your bottom dollar, because it could be your last private bet:

    A U.N. report on terrorist financing released in May 2002 noted that a "suspicious transaction report" had been filed with the U.S. government over a $69,985 wire transfer that Mohamed Atta, leader of the hijackers, received from the United Arab Emirates. The report noted that "this particular transaction was not noticed quickly enough because the report was just one of a very large number and was not distinguishable from those related to other financial crimes."
    One of the key federal agencies vacuuming the financial information long has snubbed the terrorist threat. As of 2004, the Treasury Department's Office of Foreign Assets Control had 10 times more agents assigned to track violators of the U.S. embargo on Cuba as it had tracking Osama bin Laden's money. From 1994 to 2004, this Treasury bureau collected nearly 1,000 times as much in fines for trading with Cuba as for terrorism financing.

    If you know anything about systems you can see where this going: individual queries on suspicions clarified through governance will give way to massive datamining in order to avoid the above embarrassing failures. Which leads to the earlier scenario of own citizen tracking, if we accept the principle that any (secret, ungoverned) system is eventually captured by those with the most interest.

    Fear of embarrassment and consequent proper governance may explain why the administration is taking the line that this is "government at its best." In effect, daring detractors to call them; before you can put in proper governance, you have to present the Bush Administration as bad governance.

    So watch to see how much resistance there is to proper governance and international oversight.

    Relevance to wider currency matters? If the worst case scenario comes to pass and the SWIFT breach widens, then expect a couple of competitors to SWIFT to arise. One for the Muslim world and another for the Asian sphere.

    Also, there are signs that the penny may have dropped for at least some FBI agents.

    FBI Financial Crimes Section chief Dennis Lormel and his colleagues at other intelligence agencies eventually realized that the information supplied by the company could be used not only to locate and freeze the assets of terror groups, but also to track them in real time - in other words, to follow the money trail directly to the sources and destinations of the funds.

    First Data subsidiary Western Union, with branches throughout the Arab world and a high volume of money transfers, was in a perfect position to help. American intelligence agents and company officials cooperated in tracking the data trail and in monitoring security cameras installed in Western Union branches in order to see who was picking up the funds.

    According to the book, then Shin Bet head Avi Dichter, whom Suskind calls an agent of change in the U.S. war against terror, was briefed by Lormel on the new monitoring capabilities during one of his frequent visits to Washington.

    In April 2003, Dichter called Lormel to ask for the FBI's help in this regard. Dichter told officials that the Shin Bet had information about a courier who was expected to be bringing money to Israel from Lebanon shortly. The source of the money was known, but not the identity of the person for whom its was destined.

    In early April, 2003, an Islamic Jihad activist went to a Western Union office in Lebanon and ordered a money transfer to Hebron. The Justice Department authorized Western Union to release this information to the FBI and the CIA, and eventually to the Shin Bet. According to Suskind, all this took just minutes, enabling Israeli intelligence to track the person who collected the transfer in
    Hebron and to uncover the terror cell.

    According to the book, this method was used successfully many times over the next year and a half, until autumn 2004, when Palestinian operatives realized that their Western Union transfers were being used to trap them.

    Top notch! There is potential value in the AML tool of money tracking for the anti-terrorism mission, notwithstanding the real fears of civil libertarians. But, the value is only present if the tool isn't destroyed beforehand. Seizing terrorist funds isn't likely to be effective, just as seizing drugs money isn't likely to be effective, as it just moves the committed into more committments, and gives them a good signal as to what not to do next time.

    (If you don't follow the above, consider this: terrorists do not care about money, they've already crossed the rubicon of civil society. If they need more money they will just go and steal it. So seizures don't mean a thing to them, and the next terrorist attacks in USA are likely to be self-financing. Same with drugs dealers.)

    But, as it has taken the champions of AML 20 years to work out that tracking is valuable, whereas seizures achieve nothing towards the fundamental stated goal, I wouldn't hold out much hope that Treasury will make a wise choice. They are after all a bureaucracy of many interests.

    Posted by iang at 03:29 PM | Comments (2) | TrackBack

    June 25, 2006

    Roundup on SWIFT breach -- limits claimed are already breached -- US citizens are the victims

    Snippets on the big news story of the SWIFT breach. Domestically, this sort of monitoring is perhaps mundane...

    The Treasury routinely monitors financial transactions in U.S. banks under the Bank Secrecy Act. Under that law, banks are required to report any cash transaction above $10,000 and to file a suspicious activity report on any transaction that the bank believes may be tied to criminal activity.

    U.S. banks have filed more than 2 million suspicious activity reports since 1996, according to John Hall, a spokesman for the American Bankers Association. Banks are also required to retain information on all transfers of more than $3,000.

    Should we admire the UST for their careful governance?. FinTimes says:

    He said: "We get a data set from Swift but our analysts cannot just look through that data - they have to type into a computer the targeted search they want to do."

    This search request must include the name of the targeted person or entity and the reason for believing that person could be associated with terrorism. "There is a record kept of every single search," he said. "Swift itself has people inside our facility who can monitor these searches in real time, and if they have any questions they can stop a search instantly and ask these questions."

    As a further safeguard, he said the Treasury had appointed an independent auditor to examine the log of search requests. Mr Levey said the Treasury could not see the data unless it came up in response to a specific search. "Our most recent number is 0.13 per cent of the information that we have we can access."

    According to the New York Times, some of these safeguards were introduced in 2003 after Swift threatened to pull out of the programme.

    Apparently not. News also in that the 10 major CBs all had the information, as (I am told) they are all represented on the advisory board of SWIFT.

    "We had the information in the context of our monitoring activities" of Swift (Society for Worldwide Interbank Financial Transactions), a BNB [Belgium's national bank] spokesman said, refusing to say when it had that information.

    "We were alerted informally in the framework of our contacts with this enterprise," he said. ... The BNB said it saw no ethical problem in an exchange of information between Swift and the US authorities, adding that ethical monitoring was not part of its responsibilities.

    The bank was charged with the "external surveillance" of Swift, meaning that it had to "check on a certain number of standards of proper functioning" to ensure that the overall financial sector was performing correctly.

    The news about US spying "did not call into question the correct functioning of the institutions". The giving of information was "the responsibility of the business (Swift) vis-a vis its clients. The BNB, for its part, was 'subject to professional secrecy'," the bank said.

    It added that Swift's databases were in the US and the Netherlands and their management was subject to legislation in those states.

    The major central banks are OK with it. Elsewhere it seems that major Swiss banks confirmed they knew. Also jurisidiction is established by the location of databases.

    SWIFT is headquartered in Brussels, but much of its operations are based in the United States, where knowledge of the government's secret access to its data was not widespread. Of officials at three large U.S. banks who agreed to speak about the program, only one said his institution had knowledge of it before yesterday.

    "People around here are fine with this," said the official at a major New York bank, who spoke on the condition of anonymity. "It was done right." Treasury Undersecretary for Terrorism and Financial Intelligence Stuart Levey said yesterday that the central bank governors of major industrialized nations had also been briefed, although he did not say when that occurred.

    Which all confirms my original impression -- I had simply assumed that this would have been done anyway. Why would SWIFT be immune to the data mining that is going on?

    Realpolitik aside, the real story here is this: what and where is the debate about whether this is an acceptable thing or not? What happens when the American agencies successfully breach the safeguards that were forced on them by SWIFT? As they will, in time.

    "There was one instance noted at one point in an audit that there had been one search that was done that was, in our view, inappropriate. . . . The person who conducted that search is no longer allowed to work on this program. And no information from any search that's even been questioned has ever been disseminated," Levey said. When information appeared that indicated a non-terrorist crime, such as money laundering or drug trafficking, he said the source of the information was "sanitized" before it was passed to other law enforcement agencies.

    Boom! Already, the information is being passed for ML and drugs. See how easy that was? The press will concentrate on meaningless blather like who is that poor unfortunate lamb who was sacrificed to prove the information is governed, and miss the wider significance that the system is already being breached, even as they are saying that it is only for terrorism.

    One reason the administration is engaging in so much secret surveillance is that current technology makes it so easy, suggested Paul Light, a public policy professor at New York University. "It's almost a case where the technology is leading the policy. If you can do it, why not do it?"

    "Bush and his advisers just don't see privacy rights as a particularly balancing test in making the decision to go ahead with these techniques," Light said.

    And, how is the rest of the world going to treat this? My guess is that it will be yet another nudge to all the non-friends of the USA to review their dependency on the dollar. Look to see what Russia, Iran, China and the Muslim world make of this.

    If a nudge is one more percentage points off the USD as reserve currency, then the cost is twice that in economic payback to the people of the US, who have to pay back the debt. There are some real victims, then.

    Posted by iang at 05:06 PM | Comments (1) | TrackBack

    June 24, 2006

    Sealand burnt out - aid sent by neigbour UK - security guard airlifted

    All things come to pass. Sealand, the erstwhile independent country in the Thames estuary and home of the HavenCo ISP for arbitrage businesses, burns out. Not to the waterline, but early reports have it as destroyed by a generator fire.

    Sealand had one security guard on site. It looks like they have paid the price for high aspirations and low extinguishers.

    The UK, being the nearest neighbouring country, immediately sent in disaster relief. Chances are they will probably stay to help the country back on its feet. And stay, and stay...

    Late breaking news: "Michael Bates told the Evening Star the family would not give up its ownership of the former war-time fort and wanted to carry on running it."

    Princely bow to JPM's wife who told him what's current and interesting.

    Posted by iang at 04:41 PM | Comments (1) | TrackBack

    June 19, 2006

    Black Helicopter #2 (ThreatWatch) - It's official - Internet Eavesdropping is now a present danger!

    A group of American cryptographers and Internet engineers have
    criticised the FCC for issuing an order that amounts to a wiretap instruction for all VoIP providers.

    For many people, Voice over Internet Protocol (VoIP) looks like a nimble way of using a computer to make phone calls. Download the software, pick an identifier and then wherever there is an Internet connection, you can make a phone call. From this perspective, it makes perfect sense that anything that can be done with a telephone, including the graceful accommodation of wiretapping, should be able to be done readily with VoIP as well.

    The FCC has issued an order for all ``interconnected'' and all broadband access VoIP services to comply with Communications Assistance for Law Enforcement Act (CALEA) --- without specific regulations on what compliance would mean. The FBI has suggested that CALEA should apply to all forms of VoIP, regardless of the technology involved in the VoIP implementation.

    In brief the crypto community's complaint is that it is very difficult to implement such enforced access, and to do so may introduce risks. I certainly agree with the claim of risks, as any system that has confused requirements becomes brittle. But I wouldn't bet on a company not coming out with a solution to these issues, if the right way to place the money was found. I've previously pointed out that Skype left in a Centralised Vulnerability Party (CVP, sometimes called a TTP), and last week we were reminded of the PGP Inc blunder by strange and bewildering news over in Mozilla's camp.

    So where are we? The NSA has opened up the ability to pen-trace all US phones, more or less. Anyone who believes this is as far as it goes must be disconnected from the net. The EFF's suit alleges special boxes that split out the backbone fibre and suck it down to Maryland in real time. The FBI has got the FCC to order all the VoIP suppliers into line. Mighty Skype has been brought to heel by the mighty dollar, so it's only a phone call away.

    Over in other countries - where are they, again? - there is some evidence that police in European countries have routine access to all cellphone records. There is other evidence that the EU may already have provided the same call records to the US (but not the other way around, how peculiar of those otherwise charming Europeans) in much the same way as last week the EU were found to be illegally passing private data on air travellers. To bring this into perspective, China of course leads the *public* battle for most prominent and open eavesdropper with their Cisco Specials, but one wonders whether they would be actually somewhat embarrassed if their capabilities were audited and compared?

    If you are a citizen of any country, it seems, you need not feel proud. What can we conclude?

    1. Eavesdropping has now moved to a real threat for at least email and VoIP, in some sense or other.
    2. Can we say that it is a validated threat? No, I think not. We have not measured the frequency and cost levels so we have no actuarial picture. We know it is present, but we don't know how big it is. I'll write more on this shortly.
    3. The *who* that is doing it is no longer the secure, secret world of the spooks who aren't interested in you. The who now includes the various other agencies, and they *are* interested in you.
    4. Which means we are already in a world of widespread sharing across a wide range of government agencies. (As if sharing intel has not been a headline since 9/11 !)
    5. it is only one step from open commercial access. Albeit almost certainly illegal, there isn't likely to be anything you can do about illegally shared data, because it is the very agents of the law which are responsible for the breach, and they will utter the defence of "national security," to you, and the price, to your attacker.
    6. An assault on crypto can't be that far off. The crypto wars are either already here again, or so close we can smell them.
    7. We are not arguing here, today, whether this is a good thing for the mission to keep us safe from terrorists, or a bad thing. Which is just as well, because it appears that when they are given the guy's head on a plate, the law enforcement officers still prefer to send out for takeaway.

    My prediction #1for 2006 that government will charge into cyberspace in a big way is pretty much confirmed at this stage. Obviously this was happening all along, so it was going to come out. How important is this to you the individual? Here's an answer: quite important. And here's
    some evidence:

    What is Political Intelligence?Political intelligence is information collected by the government about individuals and groups.
    Files secure under the Freedom of Information Act disclose that government officials have long been
    interested in all forms of data. Information gathered by government agents ranges from the most personal data about sexual liaisons and preferences to estimates of the strength of groups opposing U.S. policies. Over the years, groups and individuals have developed various ways of limiting the collection of information and preventing such intelligence gathering from harming their work.

    It has now become routine for political activists -- those expressing their rights under democracy -- to be investigated by the FBI. In what is a blowback to the days of J.Edgar Hoover, these activists now routinely advising their own people on how to lawfully defend themselves.

    Hence the pamphlet above. There are two reasons for gathering information on 'sexual liasons and preferences.' Firstly, blackmail or extortion. Once an investigator has secret information on someone, the investigator can blackmail -- reveal that information -- in order to extort the victim to turn on someone else. Secondly, there may be some act that is against the law somewhere, which gives a really easy weapon against the person. Actually, they are both the same reason.

    If there is anyone on the planet who thinks that such information shouldn't be protected then, I personally choose not to be persuaded by that person's logic ("I've got nothing to hide") and I believe that we now have a danger. It's not only from the harvesting by the various authorities:

    Peter G, 41, asked for a divorce from his wife of six years, Lori G, 38, in March 2001. ... Lori G filed a counterclaim alleging the following: <snip...> and wiretapping. The wiretapping charges are what make this unfortunate case relevant to Police Blotter. ... But Peter admitted to "wiretapping" Lori's computer.

    The description is general: Peter used an unspecified monitoring device to track his wife's computer transactions and record her e-mails. Lori was granted $7,500 on the wiretapping claim. ...

    This is hardly the first time computer monitoring claims have surfaced in marital spats. As previously reported by CNET News.com, a Florida court ruled last year that a wife who installed spyware on her husband's computer to secretly record evidence of an extramarital affair violated state law.

    Some hints on how to deal with that danger. Skype is probably good for the short term in talking to your loved one while he still loves you, notwithstanding their CVP, as that involves an expensive, active aggressive act which incurs a risk for the attacker. However, try and agree to keep the message history off - you have to trust each other on this, as the node and your partner's node remain at greater danger. Email remains poor because of the rather horrible integration of crypto into standard clients - so use Skype or other protected chat tools.

    Oh, and buy a Mac laptop. Although we do expect Macs to come under increased attention as they garner more market share, there is still a benefit in being part of a smaller population, and the Mac OS is based on Unix and BSD, which has approximately 30 years of attention to security. Windows has approximately 3 years, and that makes a big difference.

    (Disclosure: I do not own a Mac myself, but I do sometimes use one. I hate the GUI, and the MacMini keyboards are trash.)

    Posted by iang at 01:20 PM | Comments (1) | TrackBack

    June 09, 2006

    How cheap is it to get companies to escrow records for LEAs?

    The other day I posted criticisms and warnings about Mozilla's propensity to follow commercial programs that involve handing over their customers' data. Now, to underscore the Alice in Wonderland quality of the debate about data safety in America, we can read this over on Risks:

    Feds Continue Push For Mandated Internet Data Retention (R-24.29) Lauren Weinstein Fri, 2 Jun 2006 08:28:06 -0700 (PDT)
    The Justice Department said Thursday that it was not seeking to have the contents of e-mail archived, just information about the websites people visit and those with whom they correspond."

    "Sounding the Alarm on Government-Mandated Data Retention"

    This is a critical topic. The impracticality and cost issues associated with the new DOJ Internet data retention proposals are relatively obvious. It's difficult to even understand who would be required to comply with such demands. Only the big Web service companies? ISPs? (via packet tracking of their subscribers running their own servers?) Every small firm, organization, or even individual who operate their own e-mail and Web servers? Are the existing privacy policies of such entities instantly negated if they conflict with the DOJ wish list or data retention legislation?

    Risks is a serious, long-lived institution in publishing, dating back to the pre-popular-Internet days. It's widely read, respected, and venerable. How then could the above poster have gotten it so wrong?

    In America, the data a company has and the data their software controls is theirs to sell. That's how it is, get used to it. But this seems to be a new theme recurring over and over again, and Weinstein is not alone in misunderstanding the basic nature of data in America. (You'll note that when I posted about the issue with Mozilla, I wasn't saying "don't do that," rather I was warning of the need to manage the transition from open service to the rampant commerciality that the user base is afraid of.)

    To see why this news is ominous (and Daniel offered a counter-perspective which I have not as yet got around to addressing), let's go back the ADK story.

    I recall the day this idea of "impracticality and costs" was destroyed as an excuse for me. Actually, it was about two weeks of hard debate and thought, surrounding PGP Inc's infamous actions in introducing a way for people to escrow messages to another key. When PGP Inc decided it was going to add the feature for its customers, it ignited a firestorm of criticism over the net as apparently, "one of our own" had turned to the dark side.

    Why? Because, at the very same time as this was happening, the net community was fighting FBI director Loius Freeh in US Congress who wanted exactly that. Escrow of all messages, or keys or whatever, as long as the LEAs could read the crypto. And, the fight was being carried on with exactly the same argument as written above - it would be impractical and costly to escrow keys or add FBI keys.

    PGP Inc totally destroyed the case of expense and impracticality for the crypto and privacy lobbies. The curious fact was that they were pursuing an honest business need, one that many businesses not only need but must have by law (securities industry for example are desparate for secure but escrowed data comms). And if PGP Inc had only realised that their support base would rebel and had done something about it in advance, they could have successfully migrated that base over and still have the feature put in place.

    Are going to see a repeat of this, as the privacy community squares up against the DoJ? Difficult to predict, the times are different. On thing that is different is we might have a better understanding of how this is going to happen. The DoJ just needs to find the right economic deal.

    An organisation that sells stuff for money will do just that - sell it for money. Finding the deal was evidently workable for Firefox 2.0. Whether this deal is as bad as the fearmongers think, or whether it is benign as Daniel suggested, is irrelevant - the other interested party, the user, is not paying for the privilege of having a say, so the deal will eventually move against that user. That's economics, get used to it.

    There is now, and has been for some time, a hole in the market for an independent secure browser. A sort of OpenBSD of Mozilla, if you are aware of the brands. It's not clear who will fill this hole, I know at least one group that is looking to do this. The problem of course is that it is no small undertaking, and kudos to those who have got their big browser projects to where they are now, with minimal or no funding.

    Here's more:

    U.S. Wants Companies to Keep Web Usage Records

    By SAUL HANSELL and ERIC LICHTBLAU

    03/02/06 "New York Times" -- -- The Justice Department is asking Internet companies to keep records on the Web-surfing activities of their customers to aid law enforcement, and may propose legislationto force them to do so.

    The director of the Federal Bureau of Investigation, Robert S. Mueller III, and Attorney General Alberto R. Gonzales held a meeting in Washington last Friday where they offered a general proposal on record-keeping to a group of senior executives from Internet companies, said Brian Roehrkasse, a spokesman for the department. The meeting included representatives from America Online, Microsoft, Google, Verizon and Comcast.

    The attorney general has appointed a task force of department officials to explore the issue, and that group is holding another meeting with a broader group of Internet executives today, Mr. Roehrkasse said. The department also met yesterday with a group of privacy experts.
    ...

    Posted by iang at 09:36 AM | Comments (1) | TrackBack

    June 01, 2006

    Dodgy practices - and how to defend against them with Audits

    One of the things that we as society do to protect us against dodgy practices is to employ specialists to prepare considered reports. Often known as audits, these reports solve a particular economic problem for us - it is too expensive for all or even any of us to gain the knowledge, travel to the site and review all the requirements. So we elect a specialist who can do it for all of us, thus saving our scarce resources.

    (I stress this economic equation so that those familiar with open governance can compare & contrast.)

    The downside of the auditing approach is that we are now beholden to the quality of the audit. How do we ensure that the process is good? In principle, we let institutions such as auditor's associations provide principles, standards of quality, and ethics. In practice, we hope they are followed, but practice often lags principle because of the dramatic costs of audits, and the less than transparent information provided. In effect, the problem is shifted from the company to the audit, resulting in what amounts to being two points of failure.

    For CAs, a widely used standard is the WebTrust criteria, which have been written by bodies in the US and Canada. This backs into various other documents and standards of those bodies, but tries to narrow down the essentials for CA practice and policy.

    It is perhaps interesting to view the WebTrust against yesterday's news of VeriSign being sued on alleged misrepresentation of security levels. Here is one snippet from their "WebTrust Program for Certification Authorities:"

    Client/Engagement Acceptance
    The practitioner [auditor] should not accept an engagement where the awarding of a WebTrust seal would be misleading.
    The WebTrust seal implies that the entity is a reputable site that has reasonable disclosures and controls in a broad range of areas. Accordingly, the practitioner would avoid accepting a WebTrust engagement when the entity’s disclosures outside the scope of the engagement are known by the practitioner to be misleading, when there are known major problems with controls not directly affecting the scope of the engagement, or when the entity is a known violator of laws or regulations.

    (My emphasis.) Some have found WebTrust controversial because it is (allegedly) permissive of any procedures, as long as you document them. By way of example, it has been commented (alleged) that you can get a WebTrust for spying on your customers, as long as that is what you say you do in your CPS.

    (Whether that is true or not I have no idea.)

    But, above, it says there in black and white that misleading disclosures are not acceptable. What's more, it states it broadly - even including disclosures _outside the scope of engagement_ which is likely to be a problem for a company as large and spread as VeriSign, as there are a lot of other areas they get into.

    If the court case does find that there is misleading selling going on, there are going to be some questions to be asked. Indeed, maybe the auditor should be asking those questions now, or even in the past. Here's some of the questions that spring to my mind.

    Should an auditor necessarily be aware of those sorts of disclosures? WebTrust says that the practitioner has to get into the business model of the CA, which necessarily involves understanding the pricing and product models to at least some extent. So it's a definate maybe. I know in my work, I would need to know the different pricing arrangments to form an assessment, but that's just me. Also, as the two products are apparently discriminated in terms of higher security, that would appear to be something the auditor would look at, as the public is relying on the security if nothing else.

    Should this effect the current situation? WebTrust is determined on this issue - it is supposed to a more or less continuous engagement, with updates no more than every 12 months. Further:

    During the period between updates, the CA undertakes to inform the practitioner of any significant changes in its business policies, practices, processes, and controls, particularly if such changes might affect the CA’s ability to continue meeting the WebTrust Principles and Criteria for Certification Authorities, or the manner in which they are met. Such changes may trigger the need for an assurance update or, in some cases, removal of the seal until an update examination by the practitioner can be made. If the practitioner becomes aware of such a change in circumstances, he or she determines whether the seal needs to be removed until an update examination is completed and the updated auditor’s report is issued.

    In an actual engagement, an auditor can instruct the CA to pull the switch. "Now!" It is unlikely that the auditor will go that for, nor are they likely to pull the Seal. No auditor ever wields the stick that is written into the arrangements, they find other ways to deal with the issue, because any auditor that ever actually did that would not get another engagement. (This of course is part of the reality of auditing, something that is more evident from the Arthur Andersen experience.)

    What's more there are plenty of arguments in favour of the practice. E.g., airline seats are quite happily sold at different prices, and the old game with computers is to sell the same machine for different prices but with internal switches set at different speeds. (In the really good old days, you could pay for an engineer to come out and turn the speed doubling switch.) So there are at least some bona fide arguments why this practice is beneficial, leaving aside the fair representation question.

    What then should the Auditor do? Initiate a re-engagement? That is one plausible action. Another is simply drop the client, quietly or otherwise. A company that has to search for a new Auditors is sufficiently warned not to do it so many times that it runs out of potential suppliers. Alternatively, the auditor could simply put pressure on the company to sort out its misleading practices and also to settle any case forthwith.

    What should relying parties do? Well, purchasers will think twice, but they do anyway, and this is only likely to add to the rumble of discontent with CAs, not change anything.

    What about browser manufacturers? I think that depends on the Auditor's actions. Software manufacturers have already passed much of their reliance (but not their liability) onto the auditor by specifying the WebTrust. So they will now need to sit back and wait for the auditor to do the job, which is what the auditor wanted in the first place.

    As long as something is done. If the auditor does nothing, or equally uncompellingly, does not inform the relying parties of any actions taken, a browser manufacturer might now wonder if the auditor can be relied upon for the very role they were selected. "Just exactly what would cause the auditor to respond, if not misleading practices towards the users, the very users that we the software suppliers serve and protect?"

    Or, a software supplier might have to re-evaluate its own wider sense of duty of care. As the browsers sit in the front row of any liability for the use of SSL (by dint of embedding and hiding the certs and CAs), we could speculate how this case could spread wider. Could this be pinned on the software suppliers? Again, I can't quite see it, although if there is a rash of cases, including to do with phishing, then it is more plausible as the traditional relationship is not exactly an arms-length one.

    Finally, what about the buyout of GeoTrust? Well, GeoTrust owners are likely to want to grab their cash and run faster rather than slower, and such events might conceivably destroy the buyout - although I can't see why it would have a material effect. More importantly, if the anti-trust grumbling took root, the law suit might have more an impact.

    Of course, such musings are definately above our paygrade. But it is certainly one to watch.

    Posted by iang at 05:21 AM | Comments (0) | TrackBack

    May 31, 2006

    Verisign sued over dodgy security practices

    This may be the first of its kind. I've long predicted this response to ropey SSL industry practice, but unfortunately, today, I have no time to comment! (Note - FC is moving ... expect some disruption.)


    Firm leads $200M suit vs. VeriSign
    Alleges pricey business software is no more secure
    By Kathy Robertson Sacramento Business Journal May 28, 2006

    VeriSign Inc. faces a class-action lawsuit potentially worth more than $200 million for false and misleading advertising of the Internet-security software it sells to businesses that conduct commerce and communications with customers online.

    Sacramento law firm Kershaw Cutter & Ratinoff is the lead counsel in the case and alleges that VeriSign sells two versions of its software -- and says that one of them provides a higher level of security -- when there is no practical difference between the two.

    The law firm also alleges that the nation's largest Internet-security provider charges $546 more for the higher level of security and misleads customers into thinking they will get more protection if they buy the pricier version. The lawsuit, filed last year and certified as a class-action last month, contends that more than 400,000 Web sites nationwide use the security software.

    The case is the first of its kind to be granted court approval to proceed as a class action in a hot legal arena resulting from the tremendous growth of online transactions -- and of a security industry to protect them. VeriSign spokesman Brian O'Shaughnessy declined to comment on the suit.

    Five years of claims

    "It's essentially a rip-off," said Bill Kershaw, the local attorney who is lead counsel on the case. "When you get charged significantly more money, you expect significantly more security." The lawsuit, initially filed in Santa Clara County Superior Court in February 2005, alleges unfair competition and seeks restitution for the people or businesses that have purchased the software since January 2001.

    Mountain View-based VeriSign (Nasdaq: VRSN) operates services that enable and protect billions of online interactions daily, from sales to banking. The company reported $1.6 billion in revenue and net income of $112.4 million in the past four quarters.

    The nation's largest Internet-security provider sells two types of software, or "certificates," to businesses. Both are intended to ensure that communications between the businesses' Web sites and their customers are secure, and that personal information such as addresses, credit card and Social Security numbers are kept private through data encryption while they are being transferred over the Internet. The two versions are called Secure Site and Secure Site Pro.

    In its advertising, the company says its "Pro" version offers significantly enhanced encryption technology over the standard version and that, as a result, Web sites using it will be able to communicate with customers in a more secure fashion. The "Pro" version costs $895; the standard version, $349. About 99 percent of the time, the higher-level encryption software is provided to everybody, regardless of whether they pay the higher fee or not, Kershaw said.

    'Essentially identical'

    "Claims that these certificates provide added security are simply untrue," the plaintiffs assert in court documents. "Secure Site and Secure Site Pro provide essentially identical security for communications between businesses and their customers. It has only been through its false and misleading advertising that defendants have been able to extract a $546 premium from thousands of businesses throughout the country."

    The lead plaintiff in the case is Southeast Texas Medical Associates LLP, of Beaumont, Texas. A technical expert at the group discovered the discrepancy while working on the system, Kershaw said. "This is not something an average business owner -- or technician -- would discover. It takes some sophistication," he said, adding that the practice appears to be limited to VeriSign.

    Two Texas law firms -- Gravely & Pearson in San Antonio and Provost Umphrey in Beaumont -- asked the Kershaw firm to act as California counsel since VeriSign is based in Silicon Valley. The 4-year-old local firm is known for representing plaintiffs in class actions.

    In early 2005, Kershaw Cutter & Ratinoff -- working with lawyers from the Sacramento firm of Dreyer Babich Buccola & Calaham -- won cash refunds, plus interest, for a group of California drivers insured by Allstate Corp.

    Posted by iang at 10:13 AM | Comments (1) | TrackBack

    May 28, 2006

    British Columbia Supreme Court rules that you should lie back and enjoy it

    A little sunday morning governance nightmare. Over in Canada, a media entrepreneur sued his ex-law firm:

    Mr. Cheikes says that in 1997 [his lawyer] Mr. Strother advised him he could not legally operate his tax-shelter business because of tax rule changes. Mr. Cheikes shut operations down that fall and asked Mr. Strother to find ways to make Monarch compliant so that the company could re-open.

    A year later, he found out that Mr. Strother had become a 50% partner in a movie tax shelter business called Sentinel Hill, and that [law firm] Davis & Co. were its attorneys. Mr. Cheikes says that from 1998 to 2002, Sentinel Hill made $140-million in total profits, that Mr. Strother made $32-million for himself and that Davis & Co. had been paid $9-million in fees.

    Now, as written, this is a slam dunk, and in absence of a defence, we should be looking at what amounts to fraud here - breach of fiduciary trust, theft of trade secrets and business processes, etc etc.

    A few words on where this all comes from. Why do we regularly question audits in the governance department of financial cryptography? Partly it is because the auditor's actual product is so disconnected from what people need. But the big underlying concern - the thing that makes people weak at the news - is the potential for abuse.

    And this is much the same for your lawyer. They both get deep into your business. They are your totally trusted parties - TTPs in security lingo. This doesn't mean you trust them because you think they are trustworthy sorts, they speak with a silver toungue and you'd be happy to wave your daughter off with one of them.

    No, quite the reverse: it means you have no choice but to trust them. The correct word is vulnerability, not trust. You are totally vulnerable to your lawyer and your auditor, more so than your spouse, and if they wish to rape your business, the only thing that will stop them is if you manage to get out of there with your assets firmly buttoned up. The odds are firmly against that - you are quite seriously relying almost completely on convention, reputation and the strength of the courts here, not on your ability to detect and protect the fraud as you are with almost all other attackers.

    Which is why over time institutions have arisen to help you with your vulnerability. One of those institutions is the courts themselves, which is why this is such a shocker:

    For example, the B.C. Supreme court agreed with Mr. Strother's argument that he had no obligation to correct his mistaken legal advice even though that advice had led to the closure of Monarch.

    The lower court also agreed with Davis & Co.'s contention that it should be able to represent two competitors in a business without being obliged to tell one what the other is doing.

    What the hell are they smoking in B.C.? The Supreme Court is effectively instructing the vulnerable client to lie back and enjoy it. There is no obligation in words, and it's not because it would be silly to write down "thou shalt not rape your client," but simply because if we write it down, enterprising legal arbitrageurs will realise it's ok to rape as long as they do it using different words. It's for reasons like this that you have "reasonable man" tests - as when your Supreme Court judges are stoked up on the finest that B.C. can offer, we need something to bring them back to reality. It's for reasons like this we also have appeals courts.

    In 2003, the B.C. Supreme Court heard the case but found no wrongdoing. Two years later, however, the B.C. Court of Appeal overturned that ruling, finding the lawyer and firm guilty.

    Mr. Strother was ordered to pay back the $32-million he had made and Davis & Co. was ordered to return $7-million of the $9-million in fees to Mr. Cheikes and his partners.

    The high-stakes case was appealed again and the Supreme Court of Canada has granted leave to appeal, probably in October.

    To be fair, this article was written from one side. I'd love to hear the case for the law firm! I'd also love to hear what people in BC think about that - is that a law firm you'd go to? What does a client of that law firm think when she reads about the case over his sunday morning coffee?

    Posted by iang at 06:50 AM | Comments (1) | TrackBack

    May 19, 2006

    When they cross the line...

    One way to tell when they cross the line is to watch the comics and jokes circuit. Here's another one:

    Original source is RollCall.com, so tap their phones, not mine.

    Seriously though, the reason this scandal has "legs" is because the Democrats' hands are clean. In previous scandals, it seems that the dirt was evenly spread across the political dipole. This time, the Dems have one they can get their teeth into and not look silly.

    Posted by iang at 02:29 PM | Comments (0) | TrackBack

    This Modern World - First they say they don't collect that data....

    I wrote before:

    First, they say they don't collect the data. Then they say they don't use it, except for engineering purposes. Then, they say that there are safeguards. Then, they say they don't supply it outside the company. Then, they sell it.

    Then, they just make it up. It takes less than 10 years across the full life-cycle from total privacy to total piracy, and telcos have had a decade or two, already. Governments aren't any help.

    Click to see today's interpretation!

    From Tom Tomorrow's This Modern World, posted on cryptography by Ben Pfaff.

    Posted by iang at 10:22 AM | Comments (1) | TrackBack

    May 16, 2006

    US and EU cooperating on phone tracking

    By now, all know about Plamegate, the Valerie Plame affair. It seems that the White House leaked information in order to suppress an alternate view to the approved intelligence story. As they leaked actual intelligence information to do this, the various leakers - Libby, Rove, and potentially Cheney - are under investigation and at least the first, Libby, has been charged (or something - I don't follow that circus in detail).

    Now (following on from prior posts) comes news that many journalists are being tracked over phone calls to trace where the information leaks are coming from:

    A senior federal law enforcement official tells ABC News the government is tracking the phone numbers we (Brian Ross and Richard Esposito) call in an effort to root out confidential sources. "It's time for you to get some new cell phones, quick," the source told us in an in-person conversation.

    ABC News does not know how the government determined who we are calling, or whether our phone records were provided to the government as part of the recently-disclosed NSA collection of domestic phone calls.

    Other sources have told us that phone calls and contacts by reporters for ABC News, along with the New York Times and the Washington Post, are being examined as part of a widespread CIA leak investigation. One former official was asked to sign a document stating he was not a confidential source for New York Times reporter James Risen.

    Is it true? Or just journalists doing what they do best - hyperventilating? I don't know, but if we read the acerbic comments far enough past the calls to lynch all and sundry, we come across this one:

    "You do realize people are being paid by the Bush administration to attack the press publically on comment pages like this. I personally was offered a job doing it."

    If that's true, then the article is more or less confirmed. Find out what the Bush administration is paying to have suppressed or attacked, and that confirms it. You don't pay good money to attack something that isn't dangerous or is just false.

    I hinted in an earlier blog entry that the phone records were being made available across the atlantic - but had no documentary evidence of that. Here's an article that speaks to that:

    US authorities can get access to EU citizens' data on phone calls, sms' and emails, giving a recent EU data-retention law much wider-reaching consequences than first expected, reports Swedish daily Sydsvenskan.

    So, the US and the EU are swapping phone calls, SMS and emails so as to chase terrorists? Sounds great, except it's not quite what is happening. The data is only going one way, from east to west.

    What lopsided arrangement this is only time will tell, but it is indicative of the Wonderland politics going on at the moment. It will be I suspect a subject of many blog entries, newspaper reports and even books to speculate on what convinced EU politicians to give up Europe's fabled strong privacy regime and hand it over to the American intel, police, White House rumour control police, private investigators, credit reporting agencies, deadbeat dad chasers and other protectors of America's way of life.

    Relevance for FC? Information is dangerous. Do not keep it, unless you need it. If you keep it, then expect someone to ask for it, and that then enters into your threat model.

    I wonder if we are moving to a world where we deliberately cannot keep useful transaction, identity, personal and other sensitive data, simply because we can no longer figure out a system to protect it?

    Posted by iang at 04:11 AM | Comments (2) | TrackBack

    May 04, 2006

    Shifting the Burden - legal tactics from the contracts world

    Nick Szabo writes on how various legal devices such as promissary notes shift the burden from one party to another. The interesting question is whether such an approach applies to FC in general:

    Another way creditors shift at most of the burden of lawsuit is by having the debtor sign a promissory note. The creditor can then sell the note to a third party who is entitled to collect the note as a holder in due course, free of most defenses to payment on the original contract. Freedom from most defenses (such as fraud, failure to perform, etc.) to the original transaction makes the debt owed by the debtor to the holder in due course very clear-cut, thus greatly lowering the burden of lawsuit for the new creditor. The original creditor benefited because it could sell this unburdened debt at a higher price than a debt burdened by legal problems with the original transaction.

    ...

    At a more basic level, the burden of lawsuit is shifted by shifting actual control as well as legal possession over objects of value. "Possession is 9/10 of the law." To this end, security technology and in particular smart contracts will likely become very useful devices for shifting the burden of lawsuit in commercial transactions.

    Curiously, I came across such a case of contract burden shifting a month or two back. It seems that some certificate authorities put their root keys under copyright protection. The real reason for this -- apparently -- is that the relying party can then only use the root keys under licence. What is the licence? It is the CPS, or certificate practice statement.

    This appears to close the loop. One of the many failings of the CA concept is that the CA purports to be serving the relying party, who is a member of the public. The CA does this by means that are codified in the CPS, which might take the place of an offer of contract. Unfortunately, the relying party has no concept of the CA, no knowledge of the CPS and probably wouldn't choose to be at this party if she was fully informed or formally invited.

    Which causes some ruptions in the fabric of PKI. In this case, the CA in question advances the notion that intellectual property law brings the relying party into contact with the CPS. She is a party to the contract because it is under copyright and she has no licence otherwise.

    I don't think one needs a law degree to see the speciousness in this - if she doesn't know she cannot be a party. Period. (Recall recently well commented discussion on intent.) If she used and relied upon the certificate, then it is more likely that the CPS is not binding on her at all.

    Posted by iang at 01:01 PM | Comments (2) | TrackBack

    April 16, 2006

    Separation of Roles - an example

    Having created the five parties model for digital governance, one of the things that has persisted is the difficulty in getting this implemented. Some DGCs have adopted it completely, more or less (goldmoney and Pecunix rise to mind), others only partially (e-gold for example only did parts of the physical metal side, and even that has fallen fallow) and yet others not at all. We don't mention the ones that do not ... at least in a governance post ... because it is hard to comment on their lack of governance.

    So why is it so difficult to convince issuers of value to implement governance? Partly it is because the issuers of new value all hail from beyond the traditional accounting and banking spheres, so they simply don't know what's awaiting them. And, it is more information than people care to absorb, especially when the focus is on the customer's short term needs, not the defence against some hypothetical attacker. Partly of course, it is because it is not well explained.

    (I think the model is really simple! The Issuer creates a new role called the Mint/co-signatory who is responsible for changes in the total value of issue. Another role created is the manager, who takes that day-to-day value increase and decrease and manages it. This means the Issuer never gets his hands dirty. The Operator runs the systems, and never does numbers, so his hands are clean, too. Finally, the User is the 5th party. She monitors all, leading to the need for open governance.)

    One of the fundamentals is the centuries-old tradition of separation of roles. Here's an example of what goes wrong, talking about how 'Apparent authority' doctrine complicates credit card liability. An accounting manager went on a spending spree with her company credit card. She ordered the card, she paid the bills. When the gig was up ... $133k later ... the company argued that it gave no authority for this:

    When Kathy's fraud was finally discovered, the company sued American Express, the card issuer, seeking a refund of everything it had paid over $50. But American Express (which has had considerable experience with this sort of thing) resisted, arguing apparent authority.

    The company responded: "Nonsense. We never said anything or did anything to make American Express think Kathy had authority to use our card for personal purchases. Heck, we didn't even know she had a card. She ordered it herself."

    But American Express prevailed, convincing the court that allowing Kathy to pay the credit card bill every month over a long period of time was enough to create apparent authority in Kathy to use the card.

    Right, and that makes some sort of sense. Intiutively, the company is responsible for its employees, more or less. We can't go sticking it to the bank just because we weren't watching what was going on. But what was the one specific thing the company should have done? Here:

    There are many lessons to be learned here, but the one that leaps to mind is: Don't let the same employee review the company's credit card statements and also write the checks to pay them.

    Precisely. Separation of roles. There should always be at least two people responsible for controlling some asset - in this case the ability to order credit cards, run them up and pay them off.

    Just how far you go with this depends on the circumstances - security should be proportional to risk. In the five parties model (5PM), I suggest that you start off with the Mint being controlled by the same person as the Operator. And the Issuer can be the Manager. That's because this is how it falls out in operational terms ... Later on as the risk grows, the security needs grow, so the Issuer needs to look at expanding the number of parties from 3 to 5. And beyond, as each of those parties simply divide internally.

    But, if you do none of these things - if you implement no separation of roles, no 5PM, no governance at all - then history tells us what happens. One day, as Issuer, you'll be looking for someone to blame, and it might come as a shock to discover it is yourself.

    Posted by iang at 11:06 AM | Comments (2) | TrackBack

    April 14, 2006

    Court rules email addresses are not signatures, and signs death warrant for Digital Signatures.

    Daniel points to the Register:

    The High Court in Manchester has ruled that an email cannot be recognised as a legal written offer if it does not contain a signature or name within the body of the mail. The inclusion of a user name in the message header is not enough.

    Judge Pelling ruled that the automatic inclusion of an email address is not enough to count as a signature.

    Yes, that makes sense. The email address is like a letterhead. It itself it doesn't make for more than a mild indication as to where it was supposed to have come from.

    In this particular case, it seems that one party sent the other an email offering a personal guaruntee. But as Judge Pelling wrote in his ruling:

    9. Section 4 of the Statute of Frauds provides that "no action shall be brought ... whereby to charge the defendant upon any special promise to answer for the debt default or miscarriage of another person ... unless the agreement upon which such action shall be brought or some memorandum or note thereof shall be in writing and signed by the party to be charged therewith or some other person thereunto by him lawfully authorised ". It follows that:
    9.1. The agreement in question must be in writing or, if the agreement is made orally, there must be a memorandum or note evidencing the oral agreement; and

    9.2. The agreement or memorandum must be signed by either

    9.2.1. The guarantor, or

    9.2.2. Someone authorised by the guarantor to sign the agreement or memorandum on his behalf.

    The effect of a non compliance with Section 4 is that the contract is unenforceable.

    [FC Editorial note. I shall break with normal tradition and only use indenting to highlight the quoted words.] Right. So the question at hand is whether the email was signed. If not, the statute does not apply (although Judge Pelling was careful to write that other issues probably did apply quite happily). And here we get to the crux:

    19. As well know to anyone who uses email on a regular basis, What is relied upon is not inserted by the sender of the email in any active sense. It is inserted automatically. My knowledge of the technicalities of email is not sufficiently detailed to enable me to know whether it is inserted by the ISP with whom the sender or the recipient has his email account. ...

    Which is pretty well spot on, including the apropos injection of user confusion. The email address is inserted automatically by an agent of uncertain pedigree. Citing an 1892 precedent:

    25. It was this argument that succeeded. Cave J, said:
    "I am of opinion that the principle to be derived from the decisions is this. In the first place, there must be a memorandum of a contract, not merely a memorandum of a proposal; and secondly, there must be in the memorandum, somewhere or other, the name of the party to be charged, signed by him or by his authorized agent. Whether the name occurs in the body of the memorandum, or at the beginning, or at the end, if it is intended for a signature there is a memorandum of the agreement within the meaning of the statute. " [Emphasis supplied]

    As was emphasised by Cave J, the appearance of the name of the party to be bound must be "intended for a signature ". It is noteworthy that that this case was cited to the House of Lords in Elpis Maritime but was not disapproved by Lord Brandon. I do not think it can be said (and, in any event, there is no evidence) that either Mr Mehta's employee or the ISP either sending or receiving the e mail intended Mr Mehta's e mail address to be a signature in the sense identified above.

    A name is only a signature if it is intended to be a signature, which goes right to the core of contract law. The signature exists as evidence of intent, and it is not the signature itself that is key, but the intent.

    What then could make for a good signature, conceivably for this new invention of the typed email? Presumably in order to bolster his logic, Judge Pelling then proceeds to speculate on this question. He cites Lord Chelmsford C:

    ... It must be inserted in the writing in such a manner as to have the effect of "authenticating the instrument" or "so as to govern the whole instrument" ... The name of the party, and its application to the whole of the instrument, can alone satisfy the requisites of a signature. ...

    and Lord Westbury:

    " ... be so placed as to show that it was intended to relate and refer to, and that in fact it does relate and refer to, every part of the instrument. ... It must govern every part of the instrument. It must shew that every part of the instrument emanates from the individual so signing, and that the signature was intended to have that effect. It follows that if a signature be found in an instrument incidentally only, or having relation and reference only to a portion of the instrument, the signature cannot have legal effect and force which it must have in order to comply with the statute, and to give authenticity to the whole of the memorandum, [Emphasis supplied]

    Again, notice that it must cover the entire instrument, and it must intend to govern. It is that latter part that blows away most every so-called digital signature effort - the technology cannot and will not show intent. Digital signatures are not and never can be signatures, alone.

    Judge Pelling then closes:

    26. In the light of the dicta cited above, it seems to me that a party can sign a document for the purposes of Section 4 by using his full name or his last name prefixed by some or all of his initials or using his initials, and possibly by using a pseudonym or a combination of letters and numbers (as can happen for example with a Lloyds slip scratch), providing always that whatever was used was inserted into the document in order to give, and with the intention of giving, authenticity to it. Its inclusion must have been intended as a signature for these purposes. ...

    A typed name at the bottom of an email may constitute a good signature, if I intend for it to be so. And as a logical consequence, a "digital signature" is not and cannot be a signature, by itself. It can only be a digital signature if the user intends it to be so, but then so can a typed name.

    That might be bad news for all those suppliers of cryptographic signing blah blah out there as all of their theories were expressly intended to override any user intention in order to give recipient more reliability. Not so, says the court in Metha v. JPF. User intention cannot ever be overridden by mere theories, user intent must be shown according to the law and precedents of signatures.

    Bad news for digital signature suppliers, but good news for the rest of the world - as we can now get back to using digital signatures for their cryptographic and evidentiary properties without having to trip over the bogus human signature argument.


    Addendums.

    .
    Posted by iang at 06:46 AM | Comments (18) | TrackBack

    April 10, 2006

    Why audits are so important

    Jim points to this story Man clobbered with £126 trillion phone bill in El Reg:

    Publican Jack Harding got the shock of his life when he received his monthly phone bill from BT demanding more than £616,000.

    But if you think that's bad, spare a thought for Yahaya Wahab, a 63-year-old meat importer from Malaysia. He's just been sent a bill for 806 trillion Ringgit - about £126 trillion.

    According to Malaysia's New Straits Times, he's been given 10 days to cough up or face legal action.

    He told the paper: "If the company wants to seek legal action as mentioned in the letter, I'm ready to face it. In fact, I can't wait to face it." ®

    Posted by iang at 03:26 PM | Comments (0) | TrackBack

    Notary Publics to Cryptographers - keep yur grubby mits off!

    I've often written about how certain words are stolen and misrepresented in the field of FC. One is non-repudiation, which continues to bedevil some architectures and policies where they haven't been informed of the impossibility. Another is trust, which is more often used as a marketing plus than an admission of fundamental weakness. Yet another -- we're on a roll here -- is digital signature, which Lynn euphemistically refers to as sometimes being foolishly confused with signatures made by humans (one example v. another).

    Philipp pointed me to a 2001 American Notarization Association position paper complaining about the abuse of the term 'notary' by the tech industry.

    A Position on Misleading Usage of Notary Terms in the Electronic Age

    Notarization, Notary, and related terms are being co-opted by certain private companies and state legislatures and applied to processes that have nothing to do with valid, legally recognized notarization. These new processes either do not involve state-commissioned Notaries at all or they violate key principles involving trusted third parties, principles that form the bedrock of commerce and law.

    The repercussions of this verbal misappropriation can be devastating to consumers because, believing they are receiving certain protections from a process misrepresented as notarization, they may instead find themselves victimized by loss of valuable personal and real property without the legal assurances offered by valid notarization.

    Where I've complained about the term notary is in the OpenPGP forum where there are efforts (every 12 months or so) to bolster up the capability of that protocol to do notary stuff. My comments were quite simple - the meaning and application of the word is completely different between civil law and common law, so when you apply the term into an international, cross-jurisdictional cryptoprotocol such as OpenPGP, which were you referring to?

    Such comments were nowhere near as informed as this document, which includes a very concise, clear definition of the process, at least in US terms:

    Fundamental Components of Notarization

    In order to fully appreciate the harm caused by misleading usage of the term notarization it is necessary to understand the fundamental components of a traditional notarial act. Briefly explained, there are five essential steps in an acknowledgment;2 acknowledgment is the notarial act most often used to authenticate documents of great monetary value:

    * Personal Appearance: The document signer must appear in person before, and communicate with, the Notary Public, face to face, in the same room. Physical presence allows the Notary not only to identify the signer, but also to make observations and commonsense judgments that the individual appears willing and aware.

    * Identification: The Notary must positively identify the document signer beyond a reasonable doubt, either through personal knowledge of the individual's identity, the sworn vouching of a personally known credible witness, or reliable identification documents.

    * Acknowledgment by Signer: Personal appearance and identification are meaningless without a context, and it is the signer's active acknowledgment of a particular signature, document, and transaction that provides the context.

    * Lack of Duress: Integral to the acknowledgment is the Notary's observation that the signer was not under duress or direct physical threat at the hands of a third party.

    * Awareness: Essential as evidence of the signer's intent is the Notary's observation and judgment that the signer appears to be conscious and aware at the time of signing.

    Hot Dang! Try doing that in a remote-parties cryptoprotocol with NIST-approved blah blah. I have to admit, I'm impressed by the quality of writing in this paper. It goes right for the jugular.

    Corporate License

    Increasingly, American corporations offering Public Key Infrastructure (PKI)3 management services have been using the terms Notary and notarization to describe their services. These processes typically involve the time-date stamping of text, and they amount to notarization only in the metaphorical sense. These services do not provide the assurances associated with official notarial acts by a state-commissioned Notary Public and, for that reason, they lack the legal authority of proper notarization, which is "... to provide prima facie evidence of the truth of the facts recited in the certificate and to establish the genuineness of the signatures attached to an instrument."

    It is repeatedly asked in circles where crypto really matters what the form of statement your average CA is making. This paper points out one of the flaws in the process - a CA may well not have any legal authority to make the statements that it is purporting to make! Think the so-called digital signature laws might resolve this? Think again:

    Governmental License

    Another development is adding to the current state of confusion in the marketplace and it is potentially more harmful to the public than deceptive misuse of sensitive terms by corporate marketers; that is, poorly thought-out redefinition of notarial procedures by hasty lawmakers.

    Names are named! Not only are the States various slammed for their laws, many commercial services are given a darn good slapping. Read the whole thing, if only to see how no-nonsense rejections of poorly thought-out marketing programmes can be written. We need more of these!

    Posted by iang at 01:29 PM | Comments (3) | TrackBack

    March 07, 2006

    FraudWatch - Chip&Pin, a new tenner (USD10)

    Chip&Pin in Britain measured a nearly full year of implementation (since February) and found fraud had dropped by 13%. They say that's good. Well, it's not bad but it is a far cry from the 80% figures that I recall being touted when they were pushing it through.

    The Chip and Pin system cut plastic card fraud by 13% in 2005, according to the Association of Payment Clearing Services (Apacs). Losses due to the fraudulent use of credit and debit cards fell last year by £65m to £439m.

    Most categories of fraudulent card use dropped, except for transactions over the phone, internet or by mail. Chip and Pin cards were introduced in 2004, with their use becoming required in shops from February this year.

    The new type of card appears to have brought a decisive turnaround with fraud levels now back to the levels last seen in 2003. In 2004, as the new cards were being introduced, card fraud continued to shoot up, by 20%, costing banks and retailers more than half a billion pounds.

    Sandra Quinn of Apacs hailed the impact of Chip and Pin, which has been rolled out to most of the UK retailing and banking industries since October 2003:

    "Seeing card fraud losses come down is cast-iron proof that Chip and Pin is doing its job. Back in 2002 we forecast that fraud would have risen to £800m in 2005 if we didn't make the move to Chip and Pin so it's heartening to see total losses well beneath this figure" she said.

    So maybe if we factor in such a prediction of 800m, down now to 439, we are seeing a drop of 45%. I'd say that according to GP they moved too late and ended up with an institutionalised fraud at a high and economic level. Clawing that back is going to take some doing.

    And, also from PaymentNews, the US mint continues its sly dance to use other colours than green:

    Security Features
    The redesigned $10 note also retains three of the most important security features that were first introduced in the 1990s and are easy to check: color-shifting ink, watermark and security thread.

    Color-Shifting Ink: Tilt your ten to check that the numeral "10" in the lower right-hand corner on the face of the note changes color from copper to green. The color shift is more dramatic on the redesigned notes, making it even easier for people to check their money.

    Watermark: Hold your ten up to the light to see if a faint image of Treasury Secretary Alexander Hamilton appears to the right of his large portrait. It can be seen from both sides of the note. On the redesigned $10 note, a blank oval has been incorporated into the design to highlight the watermark's location.

    Security Thread: Hold your ten up to the light and make sure there's a small strip embedded in the paper. The words "USA TEN" and a small flag are visible in tiny print. It runs vertically to the right of the portrait and can be seen from both sides of the note. This thread glows orange when held under ultraviolet light.

    To protect our economy and your hard-earned money, the U.S. government expects to redesign its currency every seven to ten years.

    Everything is good fun about that page, even the URL!

    Posted by iang at 05:10 AM | Comments (16) | TrackBack

    March 05, 2006

    "doing the CA statement shuffle" and other dances

    The much discussed CA branding model has apparently been adopted by Microsoft, implemented in the InfoCard system, if the presentation by Cameron and Jones is anything to go by. I reviewed and critiqued that presentation last week, including relevant screenshots.

    Now, the statement as the core reason for the CA's existance is becoming more clearly accepted. It's something that got thrown out with the bath water back in 1995 or so, but it seems to be heading for something of a revival. Cameron and Jones say:

    In many cases, all that having a standard site certificate guarantees is that someone was once able to respond to e-mail sent to that site. In contrast, a higher-value certificate is the certificate authority saying, in effect, “We stake our reputation on the fact that this is a reputable merchant and they are who they claim to be”.

    I also found an RFC by Chokhani, et al, called Internet X.509 Public Key Infrastructure (RFC 3647) which throws more light on the statement:

    3.1. Certificate Policy

    When a certification authority issues a certificate, it is providing a statement to a certificate user (i.e., a relying party) that a particular public key is bound to the identity and/or other attributes of a particular entity (the certificate subject, which is usually also the subscriber). The extent to which the relying party should rely on that statement by the CA, however, needs to be assessed by the relying party or entity controlling or coordinating the way relying parties or relying party applications use certificates. Different certificates are issued following different practices and procedures, and may be suitable for different applications and/or purposes.

    The CA's statement is that the the key is bound to attributes of an entity (including Identity). So we are all agreed that the cert has or is a statement of the CA saying something. But consider the caveat there that I emphasised: the authors have recognised that relying parties typically do not control or coordinate their use of certificates. There is typically an intermediate entity that takes responsibility for this. To the extent that this entity controls or coordinates the root list, they are in the driver's seat.

    For browsing, this is the browser manufacturer, and thus the browser manufacturer is the relying party of ultimate responsibility. What this does is put browser manufacturers in a sticky position, whether they admit to it or not (and notice how you won't find any browser manufacturer clarifying who makes the statement from a manufacturered cert).

    Microsoft's position may be weak in understanding and implementation, or maybe they know full well where this is going, and are implementing an intermediate step. Leaving that aside, it does leave the interesting question as to why they have only partially implemented the model. Not only does the high-assurance program prove the point that the CA has to be branded (thanks for that!) but it also confirms that the browser is on the hook for all the other certs in the other, default, poor man's certificate regime.

    Either way, we are on the move again...

    Posted by iang at 06:23 PM | Comments (4) | TrackBack

    February 22, 2006

    High Assurance - summary of the Due Diligence

    Someone (who has requested anonymity) has been doing the research on at least some of the goings on in the "High Assurance" programme. It seems that GeoTrust/RSA/Identrus approached the ABA with the view to endorsing the programme for purpose of notarising documents -- GeoTrust's current strategic desires in e-notarisation. To this end, they are proposing signoff by bank and a lawyer (thus we see the Identrus and ABA involvement) as well as a site visit and a supplementary WebTrust audit to bring the accountants on side.

    The documents are located on the ABAnet site (over on the lower right, in the Listserv box, there is a javascript popup called Cert Issuance Standards.) The meat of the proposal seems to be enhanced Due Diligence ("DD"). Here's a summary:

    (a) Notarization of the signature on the Application for the High Assurance certificate: This establishes a face-to-face contact with a real person acting on behalf of the certificate applicant for the first time in the industry. A notary will also ask for and record a piece of reliable ID (e.g., a driver's license or passport) from the person signing the Application, which will be invaluable in tracking down a fraudster.

    (b) Obtaining an attorney opinion letter confirming important Application information: An attorney opinion letter from the Applicant's counsel will verify critical pieces of identity information
    that a public CA presently only assumes by inference, such as current corporate existence and actual authority of the person requesting the Certificate. The attorney opinion letter will also be the chief way by which public CAs can verify the legal right of an Applicant to use a trademark or logo, thereby helping to avoid commercial disputes. Verified trademarks and logos will likely be included inside TLS/SSL digital certificates in the near future for use in new applications, creating important new branding opportunities for businesses.

    (c) Confirming that the Applicant is actively engaged in business (i.e., is a "real" business) by confirming that the Applicant maintains a bank account: Consumer surveys show the public does not want to do business or share information online with imaginary business entities or shell corporations that have no real-world business existence. The High Assurance vetting process confirms that the Applicant maintains a banking relationship with a financial institution, which not only provides solid evidence of ongoing business activity but also provides an important additional confirmed point of contact in the event of a consumer complaint. Because financial institutions must follow stringent "know your customer" rules under federal regulations, they are likely to have extremely accurate information about the Applicant.

    (d) Finally, verifying that a representative of the Applicant can be located at a confirmed physical location: Consumers have also indicated they want to be able to link a web site to a physical location where the site owner can actually be found, but no such testing is done by any CA for current SSL certificates. Public CAs today could even issue an organizational certificate to an Applicant listing a particular address, only to find out later (after online fraud) that the address is a vacant lot or an anonymous mailbox service and the web site owner has vanished. The High Assurance certificate is backed by a real-world site visit to the Applicant's address with recorded information to verify that a
    representative of the Applicant can be found there, which establishes the final vital point of contact.

    The good thing about DD processes is that if yours isn't working, there's always more you can throw into it. The bad thing is that this won't necessarily improve it.

    There are several problems with the above, but probably the biggest issue is again how the big boys are doing the deals in the back rooms on their wish lists, and then expecting the net to swallow this as some sort of open consensus / rough working code. Those who are not represented in this process are the smaller CAs, the notaries, and all of the users; as suspected, my source informs me that there was no open call for wider industry participation, so some of the most obvious problems will go unaddressed until it is too late.

    See also the competing proposal by the National Notary Association (in America) as written by the able Daniel Greenwood.

    Posted by iang at 10:29 AM | Comments (1) | TrackBack

    February 14, 2006

    SSL phishing, Microsoft moves to brand, and nyms

    fm points to Brian Krebs who documents an SSL-protected phishing attack. The cert was issued by Geotrust:

    Now here's where it gets really interesting. The phishing site, which is still up at the time of this writing, is protected by a Secure Sockets Layer (SSL) encryption certificate issued by a division of the credit reporting bureau Equifax that is now part of a company called Geotrust. SSL is a technology designed to ensure that sensitive information transmitted online cannot be read by a third-party who may have access to the data stream while it is being transmitted. All legitimate banking sites use them, but it's pretty rare to see them on fraudulent sites.

    (skipping details of certificate manufacturing...)

    Once a user is on the site, he can view more information about the site's security and authenticity by clicking on the padlock located in the browser's address field. Doing so, I was able to see that the certificate was issued by Equifax Secure Global eBusiness CA-1. The certificate also contains a link to a page displaying a "ChoicePoint Unique Identifier" for more information on the issuee, which confirms that this certificate was issued to a company called Mountain America that is based in Salt Lake City (where the real Mountain America credit union is based.)

    The site itself was closed down pretty quickly. For added spice beyond the normal, it also had a ChoicePoint unique Identifier in it! Over on SANS - something called the Internet Storm Center - Handler investigates why malware became a problem and chooses phishing. He has the Choicepoint story nailed:

    I asked about the ChoicePoint information and whether it was used as verification and was surprised to learn that ChoicePoint wasn't a "source" of data for the transaction, but rather was a "recipient" of data from Equifax/GeoTrust. According to Equifax/GeoTrust, "as part of the provisioning process with QuickSSL, your business will be registered with ChoicePoint, the nation's leading provider of identification and credential verification services."

    LOL... So now we know that the idea is to get everyone to believe in trusting trust and then sell them oodles of it. Quietly forgetting that the service was supposed to be about a little something called verification, something that can happen when there is no reason to defend the brand to the public.

    Who would'a thunk it? In other news, I attended an informal briefing on Microsoft's internal security agenda recently. The encouraging news is that they are moving to put logos on the chrome of the browser, negotiate with CAs to get the logos into the certificates, and move the user into the cycle of security. Basically, Trustbar, into IE. Making the brand work. Solving the MITM in browsers.

    There are lots of indicators that Microsoft is thinking about where to go. Their marketing department is moving to deflect attention with 10 Immutable Laws of Security:

    Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore
    Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore
    Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore
    Law #4: If you allow a bad guy to upload programs to your website, it's not your website any more
    Law #5: Weak passwords trump strong security
    Law #6: A computer is only as secure as the administrator is trustworthy
    Law #7: Encrypted data is only as secure as the decryption key
    Law #8: An out of date virus scanner is only marginally better than no virus scanner at all
    Law #9: Absolute anonymity isn't practical, in real life or on the Web
    Law #10: Technology is not a panacea

    Immutable! I like that confidence, and so do the attackers. #9 is worth reading - as Microsoft are thinking very hard about identity these days. Now, on the surface, they may be thinking that if they can crack this nut about identity then they'll have a wonderful market ahead. But under the covers they are moving towards that which #9 conveniently leaves out - the key is the identity is the key, and its called psuedonymity, not anonymity. Rumour has it that Microsoft's Windows operating system is moving over to a psuedonymous base but there is little written about it.

    There was lots of other good news, too, but it was an informal briefing, so I informally didn't recall all of it. Personally, to me, this means my battle against phishing is drawing to a close - others far better financed and more powerful are carrying on the charge. Which is good because there is no shortage of battles in the future.

    To close, deliciously, from Brian (who now looks like he's been slashdotted):

    I put a call in to the Geotrust folks. Ironically, a customer service representative said most of the company's managers are presently attending a security conference in Northern California put on by RSA Security, the company that pretty much wrote the book on SSL security and whose encryption algorithms power the whole process. When I hear back from Geotrust, I'll update this post.

    That's the company that also ditched SSL as a browsing security method, recently. At least they've still got the conference business.

    Posted by iang at 06:21 AM | Comments (1) | TrackBack

    January 26, 2006

    US District Court uses digital signatures

    Highlighting an order by Judge Collyer in the previous entry, we find her order duly signed:

    ORDER

    As agreed by the parties in open court on January 13, 2006, it is hereby ORDERED that Suntrust Account Number 1000..... and Regions Bank Account Number 6709.... shall be unfrozen; however, the United States shall retain control of the funds previously seized from those accounts pursuant to the warrant issued by Magistrate Judge Facciola in Case No. 05-664 M-01 (JMF) on December 14, 2005.

    SO ORDERED.

    Date: January 13, 2006
    /s/

    ROSEMARY M. COLLYER
    United States District Judge

    The digital signature appears on the paper as /s/.

    Discuss.

    Posted by iang at 03:15 PM | Comments (0) | TrackBack

    G&SR / e-gold case in Washington DC court

    The case against G&SR, operators of the e-gold payment system, has been filed in Washington DC courts. Here are some of the filings, apparently from the PACER system, which is a US Government site for court documents.

    I've only briefly read parts, so far. The USG's case is based on the Money Transmitter Licensing requirement.

    16. Title 18, United States Code, Section 1960 provides that: (a) Whoever knowingly conducts, controls, manages, supervises, directs, or owns all or part of an unlicensed money transmitting business, shall be fined in accordance with this title or imprisoned not more than 5 years, or both. (b) As used in this section (1) the term “unlicensed money transmitting business” means a money transmitting business which affects interstate or foreign commerce in any manner or degree and (A) is operated without an appropriate money transmitting license in a State where such operation is punishable as a misdemeanor or a felony under State law, whether or not the defendant knew that the operation was required to be licensed or that the operation was so punishable; (B) fails to comply with the money transmitting business registration requirements under section 5330 of title 31, United States Code, or regulations prescribed under such section; or (C) otherwise involves the transportation or transmission of funds that are known to the defendant to have been derived from a criminal offense or are intended to be used to promote or support unlawful activity; (c) the term “money transmitting” includes transferring funds on behalf of the public by any and all means including but not limited to transfers within this country or to locations abroad by wire, check, draft, facsimile, or courier.

    Pretty broad writings! Apparently in response, G&SR published two letters, the second of which announces:

    In an emergency hearing in US District Court January 13, 2006, the freeze order on G&SR's bank accounts was lifted. Though numerous criminal claims had been made in obtaining the search and seizure warrants, the Government has not sustained these allegations and the only remaining claim is a contention that G&SR has operated as a currency exchange without the proper license. G&SR had previously proposed to the Government that e-gold be classified for regulatory purposes as a currency, enabling G&SR to register as a currency exchange. In a Treasury report released January 11, 2006, however, the Department of Treasury reaffirmed their interpretation of the USC and CFR definitions of currency as excluding e-gold.

    So G&SR would then agree that the case turns on whether they are a money transmitter or not, and they make this case more forcefully in Document 4 before the judge. However it is becoming clear that G&SR have been less than forthcoming, and have not advised their customers of the true position. Document 4 in the above list says:

    ORDER

    As agreed by the parties in open court on January 13, 2006, it is hereby ORDERED that Suntrust Account Number 1000..... and Regions Bank Account Number 6709.... shall be unfrozen; however, the United States shall retain control of the funds previously seized from those accounts pursuant to the warrant issued by Magistrate Judge Facciola in Case No. 05-664 M-01 (JMF) on December 14, 2005.

    SO ORDERED.

    Date: January 13, 2006
    /s/

    ROSEMARY M. COLLYER
    United States District Judge

    (Sidenote of FC interest - I've created a good facsimile of Judge Collyer's signature. It is literally typed in as /s/ in the PDF. Whether it is a digital signature or not turns then on whether they still use mechanical typewriters in the District courts!)

    No mention of the third bank account by the judge. And no mention by G&SR that their (accounts oops) funds remain under USG control and have been so since 14th December! (Which effectively means that G&SR is under control of the government. Oops, I grant this is no longer sustainable.)

    In the earlier 6th Jan letter from Dr Jackson, he wrote:

    There were other direct interventions as well that I am not yet at liberty to discuss that nearly crippled OmniPay's ability to honor its obligations to and on behalf of users.

    So we now have pretty clear indications that a lot is going on. Whether G&SR have been advised or instructed to keep mum is unclear (and I'm skeptical, especially given the content and tones of the letters). But at the least it makes it rather difficult to carry on business, a point G&SR makes in Document 3. Is G&SR able to deliver on its business undertaking? If it is unable to control its funds under seizure or make any statements adverse or otherwise as to its credit position, then what form of exchange can they reliably do?

    And what about e-gold in all this?

    For those wondering what the fuss is all about, a few brief remarks of explanation. e-gold, the payment system, is one of the more successful ventrures in the field. It independently re-developed and championed the centuries old approach of escrow of value as epitomised by the gold bars held in vaults. This tool makes a pretty fair stab at establishing a base of governance for issuance of digital currency.

    In the late 90s, e-gold made several moves designed to improve the standard of governance - moves that I had a lot to do with through my involvement approximately mid 1998 - mid 2000. Firstly, a co-signatory to the metal was created. Secondly, all physical assets were progressively migrated out of the filing cabinet and into secure vaults at repositories. Until this was done, the substantial part of the value was in "Macotta Delivery Orders" which were directly signable by Dr Jackson. These changes gave a separation of roles aspect that formed two of the parties in my five parties model, the independent vault and the co-signatory. To be fair, Dr Jackson had already understood the importance of the fifth party - the public - in governance by inventing his Examiner page to show his claims of the bars and metal under management.

    In addition to protection of the gold, I also considered it essential to protect the digital issuance in a like 5PM system. e-gold only started on this process, before getting sidetracked on what could be stated loosely as "offshore strategies". Although the digital systems should have been placed under independent control, they remained in-house. Although an independent Mint role for creation of new digital float should have been done, I have never heard of it being so.

    And the entire payment system should have separated from the risky business of exchange operations. Instead, e-gold Ltd was formed in Nevis, and gold was transferred under dubious legal circumstances to Trusts in Bermuda - completely at odds with the user agreement at the time. Notwithstanding all this legal manouvering, the substance of e-gold remained firmly in-house, in Florida, and firmly under control of Dr Jackson.

    If e-gold had solidly and strongly separated itself from the highly lucrative exchange business - deliberately left where the market was in the USA - then G&SR could have disappeared and e-gold would have carried on. Now however, wherefor goes G&SR, there too follows e-gold. To all intents and purposes, they are both likely locked in a deadly embrace with the USG.

    Posted by iang at 12:20 PM | Comments (11) | TrackBack

    January 23, 2006

    DigSig News - Notaries apply for an old Franchise, Colorado does PK with BRNs, old anecdote

    MIT and the National Notary Association released a white paper on how to use notaries and cryptographic digital signatures (a.k.a. digsigs). The press release is a curious throwback to a decade ago where organisations aspirated deeply and warned that unless something was done immediately, fire, flood and pestilance was sure to strike eommerce.

    Many paper-based transactions, from real estate conveyances to international adoptions to last wills and testaments, are notarized in order to prevent, detect and prosecute fraud. As government agencies and industry move toward a complete paperless workflow, electronic documents will need to receive the same level of security as their paper counterparts. However, Greenwood warns that laws and regulations to guide Notaries in the performance of electronic notarizations are lacking and must be immediately addressed to ensure the protection of property rights in the 21st century.

    "Those who regulate Notaries Public would be derelict in their duty if they failed to effect the rule-making necessary to transition to a reliable system of e-notarization," Greenwood writes. "Failing to exercise oversight and control in this area would be akin to failing to provide and enforce safety rules for hydrogen or hybrid cars because the new technology is different from the old."

    Cryptographic digsigs can work fine as indicators of human intent without laws, without notaries, and without fuss, once you get into the core of the application. On the other hand, a law put in place can set us back a decade or more. One of the reasons why we do not see digsigs used more often is because of the early franchise-building Utah models that were popularised in the mid 90s.

    To my knowledge, courts and lawyers have this all wrapped up as they know that a signature is an indicator of intent, and the intent rules, not the mark. Efforts to regulate this long-known legal principle are therefore likely no more than franchise building, and should be summarily rejected for what they are.

    Luckily the PDF that Daniel Greenwood wrote is far more clear on what a digital signature can be. Here's one fascinating snippet:

    The state of Colorado has pioneered a simple but effective solution to enable state regulation of electronic notarization.26 It is called the Document Authentication Number, or DAN, and works like this:

    In Colorado, this is an eleven-digit accounting number issued to each notary by the Secretary of State's accounting system. This number can be accessed and referenced by anybody. Like a white pages entry, it is unique but publicly accessible identification. The number will be searchable online to verify a notary's name, commission number, commission expiration date and other important information.

    Second, each notary is issued multiple random numbers generated by the Secretary of State, who keeps a copy of each such number. Unlike the first number, these are kept confidential. They should be secured, just as is the notary's seal for paper-and-ink notarizations. One of these random, confidential numbers is used by the notary to ``brand'' every discrete eNotarization. The notary also has, associated with each confidential number, the relevant data that appears on the respective official seal, such as name, title, jurisdiction and commission expiration date. When used together, the Document Authentication Number and a randomly generated number assigned by the Secretary of State constitute the notary's electronic signature for a particular notarization.

    In order to execute an eNotarization, the Colorado notary would simply affix to the electronic document both the private and public numbers, along with the pertinent commission information. This could be done by manually ``copying and pasting'' the data from a document or spreadsheet or through easy-to-use software. Thereby, the notary has tied the document to the electronic notary signature. In effect, an electronic notarization has occurred.

    Nice! Public / private digital signatures with just a bunch of big random numbers (BRNs). That shows extraordinary flair by Colorado, and one wonders how they managed to slip that one past all the franchise builders, cryptography guildsmen and other worryworts.

    I was reminded the other night of an anecdote about digsig laws. Some years ago, I was asked to (informally) advise a small nation on digital signatures. I read the two page draft law, and said, that's fine, but you don't need that, and here's why... (Insert blah blah here as above.)

    It was then explained to me that the purpose of the law was not to regulate digital signatures, but to fill the spot, as a certain other friendly but elderly country of masculine sibling nature was pushing to put in place a regime of another sort. This action was recognised as a complete agenda push by the helpful elder sibling, and therefore a defensive action was needed: "we already have a digsig law, thanks, we don't need yours."

    At which point I then understood. Fine, put in place your digsig laws, but stick to the tiny model: a digital signature should not be rejected by courts solely on the basis that it is a digital signature. End of story. Meanwhile, let the private sector get on with working out how to do this.

    Posted by iang at 10:21 PM | Comments (3) | TrackBack

    January 21, 2006

    Szabo on the Contract v. the Note

    It has often been to my regret that a fuller treatment of contracts as the keystone to financial cryptography has been beyond me. But not beyond Nick Szabo, who posts on a crucial case in the development of the negotiable instrument as a contract of money. He suggests two key differences:

    Negotiable instruments – checks, bank notes, and so on – are promises to pay or orders with an implied promise to pay, and are thus contracts. But they differ from contracts in two important ways. First is the idea of “merger.” Normally, a contract right is an abstraction that is located nowhere in particular but belongs to a party to the contract or to a person to whom that party has assigned that right. Possessing a copy of a normal contract has nothing to do with who has rights under that contract. But in a negotiable instrument, the contract right is “merged” into the document. Assignment of that right takes place simply by transferring the document (in the case of a bearer instrument) or by indorsing (signing) and transferring it.

    The second big way negotiable instruments differ from contracts is the “good faith purchaser” or “holder in due course” rule which is illustrated by Miller v. Race. In a normal sale of goods under common law, the new owner’s title to the goods is at risk to the contractual defenses of a prior owner. ...

    In short, with a normal contract, even once assigned - sold - to new parties, there are defences to get it back. Yet in the case of Miller v. Race in the halcyon days of London's note banking, Lord Mansfield declared in 1758:

    A bank-note is constantly and universally, both at home and abroad, treated as money, as cash; and paid and received, as cash; and it is necessary, for the purposes of commerce, that their currency should be established and secured.

    It is these instruments that we commonly issue on the net. Although issuers sometimes have the technical capability to return them, subject to some good case, they often declare in effect that they are indeed negotiable instruments and the current holder is "holder in due course." Especially, the digital golds and the digital cashes have so declared, to their benefit of much lower costs. Those that aren't so resolved - the Paypals of the world - inflict much higher fees on their users.

    Posted by iang at 04:39 PM | Comments (1) | TrackBack

    January 17, 2006

    Remittances - the bane of the Anti-Money Laundering Authorities

    Adam points to Ethan's musings on the dire need to move many small payments across borders. It's a good analysis, he gets it right.

    Remittances has been huge business for a long time. However it didn't burst onto the international agenda until 9/11 when it was suggested that some of the money was moved using Hawala. Whether that was found to be true or not I never heard - certainly most of it was sent through the classical banking channels. Not that it made any difference; even the Congressional committee remarked that the amounts neeeded for 9/11 were too small easily trace.

    No matter, suddenly everyone was talking about remittances. The immediate knee-jerk reaction was to shut down the Hawalas. Of course, this got a huge cheer from anti-immigrant interests, and Western Union, who provides the same service at about 5 times the cost.

    Unfortunately, shutting them down was never going to work. Remittances is such a large part of the economy it has to be recognised. The effect is so large, it is the economy in some senses and places. (I recall Ecuador numbers its exports as oil, remittances, and fruit, in some or other order. Other countries do something similar, without the oil.) Africa Unchained reports:

    According to a recent report (Migrations and Development) by the International Development Select Committee (UK), over $300 Billion was sent from developed to developing countries in 2003 by diasporas living in the developed countries. Global remittance, the report maintains is growing faster than official development assistance from the developed countries, also global remittance is the second largest source of external funding for developing countries, behind Foreign Direct Investment (FDI), and also accounts for as much as 27% of the GDP for some African countries.

    But these economies and their remittances will always now be cursed by the need to give lip service to the anti-money-laundering (AML) people. Of course money laundering (ML) will go on through those channels, but whether it is more or less than through other channels, and whether it is likely to be more obvious than not is open to question. From what I can tell, ML would be hard to hide in those systems because of the very cautious but "informal" security systems in place, and no operator wants the attention any more.

    What is not open to question is that the attention of AML will dramatically increase the costs of remittances. Consider adding a 2% burden to the cost of remittances, which is easy given the cost disparity between the cheaper forms and Western Union. If remittances happens to generate half of the cash of a country, then the AML people have just added a whole percentage point of drag to the economy of an entire underdeveloped nation.

    Gee, thanks guys! And there is another insidious development going on here, which is also mentioned above:

    Hundreds of creative efforts are underway across the developing world to solve these problems with remittance. To address safety issues, MoneyGram is offering delivery services of money transfers in the Phillipines, bringing money to your door instead of forcing you to come and collect your funds from an office in town. Alternatively, if your recipient has an ATM card, they will transfer the deposit to her account. A new remittance strategy - goods and service remittance - addresses the safety, cost and misuse issues simultaneously. Instead of sending money home, make a purchase from a store or website in the US or Europe, and powdered milk, cans of corned beef or a live goat is delivered to your relatives. Manuel Orozco, an economist with the IADB, estimates that as much as 10% of all remittance happens via goods and services.

    Mama Mike’s - a pioneer in goods remittance - offers online shoppers the ability to buy supermarket vouchers and mobile phone airtime for relatives in Kenya and Uganda, as well as more conventional gifts like flowers and cards. SuperPlus, Jamaica’s largest supermarket chain, goes even further, allowing online shoppers to fill a shopping card for their relatives and arrange for them to pick up the order in one of the SuperPlus stores around the country. SuperPlus is a partner with both Western Union and MoneyGram and has been promoting its supermarket remittance service through Western Union and MoneyGram stores in New York City, home to a large Jamaican diaspora. Goods remittance services generally don’t charge a fee, making their profit off goods sales instead.

    Spot it? The ones who benefit most from the push for AML are the large transnational corporations that come in and provide a "creative effort." They get a free pass, and help from authorities because they say all the right words. Today's pop quiz: is Western Union is more likely to stop ML than informal methods of remittances? Would Western Union be able to close down any troublesome competitor with the right noises?

    Depending on your answers, it's either the noble fight, or just another traumatic security agenda being captured and turned into a _barrier to entry_ to squeeze the small guys out of a very lucrative business.

    Posted by iang at 05:55 AM | Comments (1) | TrackBack

    January 16, 2006

    Exploit Feeds - a public service or a commodity with a price?

    Ben discusses the monetary conflicts behind disclosure entities like CERT, NISCC and Tipping Point. Several of these acquire exploits for free and ship them off to favoured friends according to some metric which isn't clear - and may not be "fair" whatever that means. Guess who these are? The non-profit ones. In contrast, the profit seekers simply pay for exploits and sell the information to their subscribers.

    So, what’s wrong with this picture? Well, my original objection to CERT and NISCC was that they obviously have to choose who gets the early announcements, and there’s no fair way to do that. Even worse, if you’re going to claim to protect criticial infrastructure, then you have to include the vendors who supply that infrastructure. Of course, these vendors then get to exploit that information commercially - it gives them an edge on their competitors. And since you don’t get to supply criticial infrastructure unless you are huge, this creates an artificial bias towards huge companies.

    Shades of Sony root kits, shades of Diamond Governance. Is paying for exploit information better than the alternate? I think it is for these reasons - it is objective, and it is available on non-discriminatory grounds. If you have a need, then pay to have that need met.

    However, that's not the worst of it, and this is what became clear to me last night. What's worse is that many of those subscribed to these early announcement services have an interest in using these exploits. In the case of the CERT/NISCC model it will be the military and TLAs that will be in the market for useful exploits. Of course, they will still have access in the commercial cases, perhaps even at reduced rates (never hurts to keep the government happy, right?) - but worse still, commercialisation of the exploit market gives easy access to criminals (I’m sure that some do even in the CERT/NISCC model, but it must be harder to get that than by simply forking out money).

    Once again, the commercial model wins, I suspect. Why? Because we know who is getting it to some extent, as the seller will perform some level of due diligence, starting with the top customers. OTOH, the CERT-like supplier of exploits will be all tangled up in other non-objective models, and won't be easily able to figure out who's using it for nefarious purposes.

    Open governance could solve this fairly easily by just revealing who is on the list and at what delay. Then, the rest of us could watch for correlations between early exploit usage and those who were told in advance. That's my call, at least; but Ben promises more comments later on this.

    Posted by iang at 02:55 PM | Comments (0) | TrackBack

    January 09, 2006

    Arbitration Arises on the net

    Daniel points to the arisal of 'Robot agents' to manage arbitration proceedings:

    "Robot agents digest all the information and make proposals to the parties. Once the arbitrator is agreed upon, the robot agent finds a suitable meeting date for everybody," said Jacques Gouimenou, managing director of Tiga Technologies, the company behind e-Dispute, speaking with ElectricNews.Net. "Our system reduces delays and costs. It is also very secure."

    As far as I can tell from the article, the author got it wrong as the agent does not do the arbitration itself. What the robot does is to automate or facilitate the case management process in an arbitration, which includes for example selecting the arbitrator. Once that is done, the arbitrator takes charge. Certainly a valuable service, but it should be borne in mind that it is unlikely that a robot could ever arbitrate human disputes (c.f., smart contracts).

    Some other quick scattered but old notes. Arbitration is starting to make its mark in small dispute resolution over the net. See The Cheese Dreams case and also WikiPedia's Arbitration Committee.

    In IP news a while back, Google won a typosquatting case (link lost) in the arbitration forums. What's news here is the appropriateness of using Arbitration for Internet disputes - see the use by WebMoney which has extended the basic model that was written but never used by e-gold.

    Daniel also wrote a while back:

    ... the most popular russian auction site at http://www.molotok.ru/ which is somewhat affiliated with WebMoney (they use the same arbitration service run by WM). PayPal/eBay refuse to do business in Russia because of the high levels of fraud and the slow and largely ineffective court system. WM's design is sound enough to accomodate for all that; their fraud levels are actually lower than those in PayPal (for obvious reasons; from a technical point of view, WM is far more secure). I'm wondering how money@mail.ru is hoping to survive with their password-based security and no arbitration service.
    Posted by iang at 10:49 AM | Comments (1) | TrackBack

    January 06, 2006

    easy call #1 - USG to maintain control of Internet

    Well, that was easy! I mentioned in my 2006 predictions that the USG controls enough of the Internet to have it's way, and it won't give that up. Now the administration has come out and defined its policy in definite terms, an unusually forthright step.

    U.S. Principles on the Internet's Domain Name and Addressing System

    The United States Government intends to preserve the security and stability of the Internet's Domain Name and Addressing System (DNS). Given the Internet's importance to the world's economy, it is essential that the underlying DNS of the Internet remain stable and secure. As such, the United States is committed to taking no action that would have the potential to adversely impact the effective and efficient operation of the DNS and will therefore maintain its historic role in authorizing changes or modifications to the authoritative root zone file.

    Etc, etc. Read the Register's commentary to see more background on who is suggesting otherwise. Curiously though, they missed one issue when they said that the US would let other countries run their own ccTLD domains. That's not what it said at all. Rather, the US has said that it recognises the other countries' interests while retaining the controlling role. (Icann falls into line.)

    Why was this an easy call? The style of the current administration might be blamed by many, but the underlying issue is that this is the make-up of Washington policy and practice, going back decades or even centuries. The Internet will not be let go. The only thing that will shake this intent is complete and utter collapse of the USG, something pretty unlikely, really, regardless of what the conspiracy buffs over at IcannWatch think.

    (For those looking for more meat, there was a Cook report on this about a decade ago. Also, see the snapshot of Internet Governance forces from a decade back in the GP4.3 case study on phishing. See also the Register on .al ccTLD.)

    Posted by iang at 11:04 AM | Comments (4) | TrackBack

    January 04, 2006

    Open governance, bicycle helmets and certifying authorities

    Over on "old thing new thing" a blogger asks whether users would know the difference between one bicycle helmet certifying authority from another.

    Microsoft should allow orgs that are peers of WHQL [to] certify drivers and allow drivers to obtain certs from any such org or set of such orgs as they choose. Over time users would know which orgs were on the ball and which had agendas.

    Would they?

    Yes, they would. But not through the mechanism that was described.

    In any market there are 90% of the people who know next to nothing about it. That's the "buy bicycle helmet with XXX certification" crowd as described in the post. These people rely on the 9% who do know.

    The 9% who do know are those who are more interested amateurs and less interested insiders. This group knows about all gossip and chitchat and what is good and what is bad and who is on the up and who is on the skids. This group is the one that warns everyone when a particular standard or organisation is "not good" and others are "good."

    Then there is the 0.9% who actually really truley know. They understand the field, in depth. These are the ones who make the determination that certain things are not good, and they write long and detailed arguments on the problem. Rants. They scan looking for facts and events and what-have-you and integrate them into the ongoing argument. They debate back and forth with their opponents until a consensus is achieved.

    Finally, this small group of critics pass the results on to the 9% who spread it more broadly.

    (The remaining 0.09% are the people who actually discover and predict the failures before anyone else ... but nobody listens to them until enough evidence has accumulated. These are the crazies who are eventually proven right, but nobody remembers that part. When the questions are raised they are there in advance with the facts and stories for the 0.9% to debate and put into a more accessible format. We don't like to admit this group exists, and we'd never credit them with influence.)

    This is called open governance. It happens when regulators are not present. It works in the unregulated currency field. And it will probably work with Certification Authorities, but only if the browsers step aside from the judgment game and put the name of the CA on the chrome.

    Only when the users have reason to ask the 9% what Verisign means, will the 9% ask the 0.9%. (Etc.) But it has to happen in a "pull" fashion, there has to be a question to ask before any debate on governance can start.

    Posted by iang at 07:54 AM | Comments (1) | TrackBack

    Non-profits and Fraud - case #1

    I took a lot of flak from the Diamond Governance story, so it behoves to move forward and make the point more clearly. The essential point is that there are less interested stakeholders in non-profits, and therefore governance likely needs to be stronger.

    Another way of putting it is that if fraud is your thing, non-profits are fertile territory. Or if you think non-profits mean trust, you are fertile territory.

    Why this is will take more than a blog entry to write up, and as Jean points out there is lots of study in governance for non-profits. However, I'm aware of a bunch of fraud patterns, and I'll post those for when I see them. Here's one I've been aware of for a couple of years. It is based on certain daft legal provisions, and would disappear in an instant if the law were changed.

    The government sued AmeriDebt and Andris Pukke two years ago, seeking $172 million in damages.

    Regulators accused the Germantown- based nonprofit of charging excessive and poorly disclosed fees to consumers seeking help managing their debt and then channeling millions to Pukke's for-profit company, DebtWorks.

    AmeriDebt once was one of the nation's largest credit counselors but is now out of business.

    AmeriDebt was a non-profit. That's because there is some stupid law that says that a non-profit can do debt consolidation and gain certain privileges over a for-profit firm in the same business. A subsidy, in other words. So, obviously at least in hindsight, a smart operator starts a non-profit, consolidates a lot of debt for a lot of stricken people, and then funnels the cash somewhere else. Here's some more hints:

    As consumer debt skyrocketed over the past two decades, a new breed of credit counselor emerged, one that relied heavily on television advertising to promote its services and toll-free telephone lines to dispense advice, replacing the person-to-person consultations offered by older firms.

    As more aggressive firms proliferated, so did consumer complaints, prompting the Internal Revenue Service to begin auditing 60 credit-counseling organizations, including AmeriDebt, in late 2003 to see if they were misusing their tax-exempt status to benefit their owners. Those audits continue.

    "Non-profit" equals no taxes, no audits, no owners. Now fill it with cash and see what happens. Likely, I will take yet more flak for this. All I would ask is, do you believe that a non-profit is safe from fraud because it is doing good works?

    Posted by iang at 05:41 AM | Comments (0) | TrackBack

    January 03, 2006

    e-gold under attack

    Troubles come in threes for e-gold, the gold payment system that dominates the field (by transactions if not reserves). On the 19th of December, the G&SR offices in Melbourne, Florida, were apparently raided by the FBI and US Secret Service. At the beginning of that month, Nevis revealed that e-gold Ltd, the company that holds the accounts for all users and metals, was struck off some 2 years ago. Ouch! Now there is a BusinessWeek feature with not one, not two, but 5 articles on the subject, to be published this coming week:

    Law enforcement officials worry that the little-known digital currency industry is becoming the money laundering machine of choice for cybercriminals. On the evening of Dec. 19, agents with the Federal Bureau of Investigation and Secret Service raided the Melbourne (Fla.) office of e-gold's parent company, Gold & Silver Reserve Inc., and the nearby home of its founder, Douglas L. Jackson. Agents copied documents and computer files, but so far no charges have been brought. The Secret Service and the FBI declined to comment on the raid. Jackson has denied any wrongdoing, though the raid isn't the first indication that federal investigators view e-gold as a magnet for online misdeeds. The FBI separately is pursuing about a dozen probes in which e-gold appears as a "common denominator," a senior agent says.

    (The above was copied from here but BW has now opened up the article to the public. See also a related story on WebMoney.)

    My conclusion - the BW spread is a hatchet job. Reading between the lines, they had access to the federales' material to the extent that they published this article about the raid before anyone else was in the know, and to this day, some 2 weeks later, it is not formally confirmed. They were told from on high what the message would be, and the questions asked of people and the articles' focus point in that direction (disclosure: I was asked some of those questions and did not respond). Read it with that in mind.

    Notwithstanding that, this "correction" has been a long time coming. October 1999, as it happens, when the first scams started to use the e-gold system. Then (more disclosure!) I was engaged in a 6 month long effort to craft a way forward in the light of this surprise customer, the Ponzi scheme.

    We started off by debating the right of adults to participate in games where they knew that the point was to scam each other. Make no mistake, the victims in Ponzi schemes are under no illusions where the gains come from and go. Who then is a payment system to police these adults, when these self-same adults are engaging in self-fraud? Furthermore, it is a matter of record that the SEC - the agency with primary responsibility for scams - does not properly regulate this patch.

    This was a debate of much heat, and in the face of such arguments, I carefully constructed my input based on what it would do to the system. I took advice from legal and regulatory experts who knew the islands (Nevis, and Anguilla where I was living at that time) and considered the issue from the point of view of threats to the system - the e-gold system. My main point was that regardless of what we thought or moralised or policed, if the policy brought heat in on the system, it was a risk to the system. Therefore, I asserted, e-gold should shut down the scams as a risk to their own system. (As an aside, it was stated to me that the islands would simply strike the company off the registry, a prediction that was borne out!)

    To their credit, e-gold did close down the first couple of scams and this is where the learning began. It was exceptionally costly to close them down and reverse all the payments. Probably too costly, and remember that it isn't the scammers that bear the cost of the massive reversal operation, but the other users.

    I was therefore wrong with my original assessment and advice. The experience also put the lie to the notion that a payment system has to police its users, at least, all the users all the time, and something more subtle was called for.

    e-gold then adopted a policy of treating all complaints as disputes and deferring to court orders. This was a stroke of genius to my mind although by then I was out of the loop. By outsourcing the customer complaint as a dispute resolution before courts, they actually managed to solve the costs problems that derive from frauds. (Ask how many customer support reps Paypal employs and you will see the light!) Also, this is more or less the same thing that the SEC and the other agencies do - they do not act without a complaint. And the SEC does not shut things down without a court order. So what's the difference?

    Probably not much in terms of policy but likely more in the implementation. Did e-gold treat all complaints and court orders equally? Did they try to keep clear of the worst business, or did they turn a blind eye in the quest for transaction revenue?

    Also, one other point, one which continues to bug me: e-gold reputedly never lifted a finger to make filing court orders easy for the small victims. There are plenty of stories about how people tried and failed.

    Could they have done better? Oh, yes! They sponsored, attended and presented at not one but two conferences called LexCybernetoria, the second of which we held at Nevis shortly after these scams turned up. At these conferences, the emphasis was on low cost dispute resolution in an open governance world. Internet disputes for unregulated payment systems, in other words! Arbitration, as is written in the terms of service, and an intent to give the small guy access to fair systems.

    What remains a mystery is why they did not adopt small arbitration model that was so talked about at the time. WebMoney went on to pioneer this very model in Russia, and it works for them.

    Posted by iang at 03:45 PM | Comments (5) | TrackBack

    December 26, 2005

    How the Chinese avoided insider fraud for over a millenium - The Chinese Remainder Theorem

    Guest poster Daniel Nagy writes me a human readable explanation of the Chinese Remainder Theorem. That's too valuable a thing to go unposted:

    > > Yes, I can agree with that. Yet, it is important to formalize the
    > > methodology. (e.g. the Chinese Remainder Theorem was used in ancient China
    > > on the basis of experience for more than a millenium before it was exactly
    > > formulated and proven.)
    >
    > Ha! I didn't know that. Yes.....

    Hmm. The Chinese Number Theorem was the first use of number theory in security. The Chinese, unlike people in India, did not have a place value system, and did not have floating-point notation, like Babylonians/Greeks either.

    However, they did trade in large quantities of stuff (bricks, pottery, etc.). When they shipped a large number of something to some other place, they would write down the remainders of several counts done in modular arithmetic, as divided by a number of small, relative prime numbers. E.g. 1,2,3,4,5,6,7, 1,2,3,4,5,6,7, 1,2,3,4,5,6,7, 1,2 would leave 2 as the remainder for 23 divided by 7. This could be done several times with different primes, like 13, 17, etc,etc.

    Now, if all the remainders from the several counts matched, the total number must have matched as well and nothing was stolen. Since addition and subtraction work in this modular arithmetic, this was a very convenient way of accounting for large quantities. This method has the rather stunning benefit that the actual counting can be done by unskilled people, who are only able to count up to a small number.

    The only drawback (when compared to place-value system used in India and later in the whole world) is that it does not preserve ordering: finding out which quantity is bigger and which one is smaller is difficult.

    Written records (actually, archived letters accompanying shipments) with such counts have been found from as early as the third century A.D. The exact formulation was given by Qin Jiushao in his commentary to the classic book called Mathematics in Nine Chapters (or something like that -- my notes on number theory are in Hungarian), which (the commentary, not the book) was written in 1247 A.D. Nine Chapters is a classic text in Chinese math, similar to Elements by Euclid.

    The statement of the theorem is that up to the product of all the moduli, the remainders are unique. Also, Qin Jiushao provided an algorithm for finding the number given the remainders. In his original example, he would make his two disciples measure the distance between his home and a river by holding hands and stepping together, one counting 23, the other counting 17. When they tell the results to their master, he can figure out the distance of three hundred-something steps.

    And perhaps as a humorous footnote, consider this: the Chinese managed to get away with using this unproven mathematics in a security system for a millenium or so...

    --
    Daniel

    Addendum: Nick comments and also points at a more mathematical treatment.

    Posted by iang at 11:56 PM | Comments (2) | TrackBack

    December 24, 2005

    A new security metric?

    I have a sort of draft paper on security metrics - things which I observe are positive in security projects. The idea is that I should be able to identify security projects, on the one hand, and on the other provide some useful tips on how to think past the press release. Another metric just leaped out and bit me from that same interview with Damien Miller:

    Why did you increase the default size of new RSA/DSA keys generated by ssh-keygen from 1024 to 2048 bits?

    Damien Miller: Firstly, increasing the default size of DSA keys was a mistake (my mistake, corrected in the next release) because unmodified DSA is limited by a 160-bit subgroup and SHA-1 hash, obviating the most of the benefit of using a larger overall key length, and because we don't accept modified DSA variants with this restriction removed. There are some new DSA standards on they way that use larger subgroups and longer hashes, which we could use once they are standardized and included in OpenSSL.

    We increased the default RSA keysize because of recommendations by the NESSIE project and others to use RSA keys of at least 1536 bits in length. Because host and user keys generated now will likely be in use for several years we picked a longer and more conservative key length. Also, 2048 is a nice round (binary) number.

    Spot it?

    Here it is again in bold:

    Damien Miller: Firstly, increasing the default size of DSA keys was a mistake (my mistake, corrected in the next release) because [some crypto blah blah]

    A mistake! Admitted in public! Without even a sense of embarrassment! If that's not a sign that the security is more important than the perception then I don't know what is...

    Still not convinced? When was the last time you ever heard anyone on the (opposing) PKI side admit a mistake?

    Posted by iang at 08:55 AM | Comments (9) | TrackBack

    December 23, 2005

    GP4.1 - Growth and Fraud - Case #1 - Mutual Funds

    As the final part of this rant-in-four-parts, I'd like to leave you with a view that this is of relatively broad significance, if it works at all (previous parts: GP1, GP2, GP3). I attempt this by putting it in context of several case studies, which are chosen for their breadth as well as their topicality. In each, I try and draw out some of the implications of the theory, but I do not especially state when GP is reached. Rather, that is left as an exercise for the reader.

    First off, the mutual funds scandal, one of the bigger frauds of recent times. This fraud happened because managers were in control of assets, but were not compensated as to how those assets performed. Rather, they are compensated according to the total size of assets. So not only do they have no incentive to perform, they are incentivised to not do so in a big way. This classical agency problem is also at the core of the recent Refco collapse. Brief digression on Refco:

    Refco were offering, so the scuttlebut went, a facility to lose a bad order on demand. It worked this way. A dodgy manager could place, say, ten good orders into Refco, and then agree with her counterpart over at Refco to call one of them a bad debt. In a sense, a pre-ordained fake trade. The insider would then send the money off somewhere, and the two conspirators would split the profits. Meanwhile, the trade would get stuck on Refco's books as a bad debt and be dealt with some other time, including being traded back and forth for its tax advantages. Of course, over time this build up of bad debt would rise to strike, but by then it was someone else's problem.

    So, how does all this happen? I suggest it is a case of post-GP insider fraud, something I first mused on when writing the testimony given by Jim before the U.S. Senate's finance subcommittee.

    When a mutual fund first starts up it faces large upfront security costs. These are similar to those we discussed earlier, but this time it is more often termed governance, and they are more by regulatory fiat than the common sense of open governance. Included are separation of roles, audits, special purpose entities, accounting systems and best practices. We put all these in place before the fund gets off the ground, and we do it properly and in the best tradition of trying to make us look squeaky clean.

    Add to that, the dramatic attention paid to every new fund! Who is it? Do they have a track record? Is there room for more funds, more ideas? Etc etc. Which results that the combined weight of all this attention both internal and external means that the security-to-value ratio is very high in the beginning.

    Ludicrously high! But over time, much of the hard external scrutiny disappears as the reputation of the fund grows. New members hear it from old members, who are very happy with returns. Glowing reports are purchased from the press and rating agencies, who have nothing to fear and everything to gain. Insiders get used to believing in their impeccable reputation, which eventually becomes the axiom to be stressed, not the result of care and diligence. Brand replaces skepticism, and observation of the Bezzle-reducing kind is diverted and neutralised.


    fig 6. Value Grows as Attention diminishes

    And, of course, value under management climbs. From the first few millions, some funds reach into the billions. All the while, as value grows the internal attention to governance decreases. Inevitably, desire for profits means aggressive attention to controlling of costs. When directed at governance, a pure cost centre, the inevitable result is that the security-to-value ratio switches from ludicriously high to ludicrously low.

    Why is it GP-apropos? Because the protection was put in place before it was needed. By the time it was needed, the protection had withered away and the fund no longer had the capability to govern itself.

    All the mutual funds that were hit by market timing were older, established funds. Their reputation was impeccable, and that should be seen as a core symptom of the underlying syndrome - when the cat went away, the mice started to play.

    Next case study: e-gold

    Posted by iang at 07:36 PM | Comments (1) | TrackBack

    December 21, 2005

    Diamond governance

    In news of a big scandal in the diamond world, the rating agency was found to be inflating valuations prior to sale. I find this a good example of what we mean when relying on "trusted third parties" means we are more vulnerable:

    The Gemological Institute of America, which grades diamonds for independent dealers and big retailers, fired four employees and shuffled top management after an internal investigation of its policies, the Wall Street Journal said.

    The institute's internal probe started after a jewelry dealer who was also the former head of retail operations at luxury jeweler Harry Winston claimed that the institute and two diamond dealers conspired to inflate the grade of two diamonds that he sold to members of the Saudi royal family.

    The diamonds, which were sold for $15 million, were taken to an independent appraiser and found to have a lower grade that made them worth much less, the paper said.

    The dealer alleged that lab workers took bribes to inflate the quality of diamonds in grading reports, according to the news report, which cited people familiar with the situation.

    Bribes, Saudi royals, diamonds, it's got it all! Only problem is, this is an old plot.

    When we create an agency of such power, we all become vulnerable to it (a point credited I believe to Mark Miller to many -- see comments). That which we call the Trusted Third Party is no more than a hack that leaves us vulnerable to the TP in exchange for maybe being secure against something else; whether that is a good exchange is highly dependent on the circumstances (see for e.g., Nick on TTPs).

    In that case, when we say "trust" we mean you have no choice but to trust this arrangement - in other words you are highly vulnerable. The business about trust being nice and warm and consumer-oriented is simply marketing designed to lull us to sleep while others sleep not. (Auditors, CAs, Issuers, take note.)

    We need to guard the guardians and watch the watchers as if they are untrustworthy. Because, frankly, if we do not, they will be. Oh, and for those who think it can't happen to them because they have structured it "properly" please take note:

    "Fees depend on a diamond's size; grading a one-carat round diamond costs about $100. In 2004, the institute, a nonprofit, had income of $104 million, the paper said.

    Non-profits are likely to have poorer governance as they have a better ability to hide information from stake holders. Why? They don't have shareholders, they only have employees. That means the guardians and watchers cannot be guarded and cannot be watched. Who'd trust a nonprofit voluntarily?

    Posted by iang at 12:15 PM | Comments (7) | TrackBack

    December 19, 2005

    GP3 - Growth and Fraud - How to Book a Table

    Previously, we talked about the Growth and Fraud's GP which is the place where growth kicks off into a self-sustained value growth machine (Parts 1,2) . Then I made some remarks on how to instruct security strategy, which lead to a rather keen need to know where this point is. That's because by the time we hit GP we really want to protect it, but not a moment earlier.

    Where is GP? Obviously in a different place for every story. But there are some patterns. Assuming again that we are talking about a value system, we can predict the following indicators of GP by looking for the arisal of these factors:

    • An independant exchange network. That is, other companies without any especial permission from the lead company engaging in arbitrage and value exchange.

    • Delivered independant super-services such as plugins to popular clients. Think Eclipse, Skype, Firefox here.

    • New business models and/or activities by third parties that were not originally envisaged by the Founders. Note here that as a founder, you don't need to admit to the world that you didn't envisage a new model arising, but you do need to admit it to yourself.

    • Participants that founders don't know find other participants that founders don't know and ... trade! What this means is that no longer is the activity dependent on you, as founder, and your core network. You've exhausted your contacts, you've beaten up your relations, blackmailed your business partners and extorted your church. And it's still growing, with people you've never met and can't quite divine how they came to be in the system.
    • Fraud!

    Noticeable among those is the absence of journalism, blog posts, coolness ratings, cute crypto features, show awards, recommendations by experts, endorsements, government regulation or permissions, what your mate thinks, etc etc. They all suck, in large part because they can all be bought, and are often negative indicators of GP, not positive ones. On the other hand what is present in all the above is:

    • Someone else's capital has been independently invested in the subsystem's potential,
    • that capital has delivered separate and persistent value exchanges,
    • and done so many times over to the extent that it is not an aberation, but more an economy.

    These things cannot be bought. The importance is to see many independent events that indicate independent traders are putting their money where their mouths are, enough times such that it would take a major mistake on the part of original founders to break it now.

    Thinking about fraudsters as investors might be confusing, but that's what they are at least as far as this analysis goes. Fraudsters invest their time and effort in a fraud, and some frauds pay off whereas others do not. Fraud is just a business where the more positive is the supply side, the more negative is the demand side.

    Fraud is also a very good indicator of success. One reason for this is that fraud has a very short cycle of gratification. Unlike honest biz, most small frauds either pay off quickly or more generally not at all, so if you see a marked and noticeable incidence of fraud, that means the frauds are paying off. Thieves are very economically tuned, they move on to the next if this one isn't working, and stay and play if it is working.

    Now that we've got a view that we can pick GP, what do we do about it? The previous section talked at length about security, so if it hasn't twigged by now, we start by ramping up our anti-fraud efforts. As we've included fraud on the list above, we are hopefully staring at the first efforts of fraudsters, so we should actually have some good, market driven data on what fraud matters and what is just crypto blah blah security hype.

    The next thing we have to worry about is ... the whole business. Before GP we had not proven the model. After GP, we have, and this apocalypse changes our entire strategy. Before GP we were doing everything possible to push the model, but we had no real reason to keep it. After GP we switch to doing everything possible to preserve the business and user base without overly slowing down the model.

    The switch is subtle, but it has quite dramatic connotations. Firstly, we now know where to spend money. So GP is the time to go for the big Venture Capital round! In fact, I'd say that the question to be asked at the VC meeting is "how do you know you've reached GP?" Anything before GP is seed money, as it is simply experimental funding to try out different ideas and different models.

    Then, when we get the money, we know where to spend it: supporting the model. Extending it, expanding it, adding to it, and very important for those security guys that are still with us: protecting it.

    Finally, this takes a very different mindset. This means a new team - in general, from a Human Resources perspective, most entrepreneurs don't cross over well from the mad chaos of pre-GP to the mindless protectionism of post-GP.

    It's probably not wise to announce GP on your own. That might be tempting fate as those deep inside their own business have a tendency to migrate their beliefs to suit their desires, and I don't want to be blamed for them getting it wrong. At some point the market - your strong and critical fans especially - will agree one day that GP is passed. At that point these same critical fans will be strongly looking for signs of management team change, security overhaul, and serious understanding of the revenue and finance model.

    They'll also be looking for people who have a bit more of a wider view than your average security geek, accountant or salesman with a great idea! And it is breadth to which we turn in our final installment (of 3 parts), in an attempt to show how relevant this concept is.


    This is Part 3 of Growth and Fraud:

    Posted by iang at 09:12 AM | Comments (2) | TrackBack

    December 17, 2005

    OpenPGP supports any Trust Model that you desire!

    [editorial note - this is a guest post by Ed Gerck]

    James A. Donald wrote:
    >     --
    > From:               Werner Koch 
    >
    >> You need to clarify the trust model.  The OpenPGP
    >> standard does not define any trust model at all.  The
    >> standard merely defines fatures useful to implement a
    >> trust model.
    >
    >
    > "Clarifying the trust model" sounds suspiciously like
    > designers telling customers to conform to designer
    > procedures.  This has not had much success in the past.
    >
    > People using PGP in practice verify keys out of band,
    > not through web of trust.


    James,

    Yes. Your observation on out-of-band PGP key verification is very important and actually exemplifies what Werner wrote. Exactly because there's no trust model defined a priori, uses can choose the model they want including one-on-one trust.

    This is important because it eliminates the need for a common root of trust -- with a significant usability improvement.

    If the web of trust is used, the sender and recipient must a priori trust each other's key signers, requiring a common root of trust -- that may not even exist to begin with.

    So, instead of worrying about what trust model PGP uses, the answer is that you can use any trust model you want -- including a hierarchical trust model as used with X.509.

    Jon Callas and I had several conversations on trust in May '97, when Jon visited me for two weeks while I was in Brazil at the time, I think before the OpenPGP WG was
    even working on these issues. This is one of the comments Jon wrote in a listserv then, with a great insight that might be useful today:

    As I understand it, then, I've been thinking about some of the wrong issues. For example, I have been wondering about how exactly the trust model works, and what trust model can possibly do all the things Dr Gerck is claiming. I think my confusion comes from my asking the wrong question. The real answer seems to be, 'what trust model would you like?' There is a built in notion (the 'archetypical model' in the abstract class) of the meta-rules that a trust model has to follow, but I might buy a trust model from someone and add that, design my own, or even augment one I bought. Thus, I can ask for a fingerprint and check it against the FBI, Scotland Yard, and Surite databases, check their PGP key to make sure that it was signed my Mother Theresa, ask for a letter of recommendation from either the Pope or the Dalai Lama (except during Ramadan, when only approval by the Taliban will do), and then reject them out of hand if I haven't had my second cup of coffee.

    Cheers,
    Ed Gerck

    Posted by iang at 12:18 PM | Comments (1) | TrackBack

    December 13, 2005

    GP2 - Growth and Fraud - Instructing Security at GP

    In the previous discourse (Meet at the Grigg Point), we discussed how growth works, and said that GP was the tipping point at which the demo became a system. From this model, we can make a number of observations, chief of which is about Security to which we now turn.

    One of the security practitioner's favourite avisos is to suggest that the security is done up front, completely, securely, with strong integration, not to mention obeisance. Imagine the fiercely wiggling finger at this point. Yet, this doctrine has proven to be a disaster and the net's security pundits are in the doldrums over it all. Let's examine some background before getting to how GP helps us with this conundrum.

    Hark to the whispering ghosts of expired security projects. Of those that took heed of the doctrine, most failed, and we do mean most. Completely and utterly, and space does not permit a long list of them, but it is fair to say that one factor (if not the sole or prime factor) is that they spent too much on security and not enough on the biz.

    Some systems succeeded though, and what of them? These divide into three:

    1. those that implemented the full model,
    2. those that implemented a patchwork or rough security system, and
    3. those that did nothing.

    Of those few systems that heeded the wiggling finger and succeeded, we now have some substantial experience. Heavily designed and integrated systems that succeeded initially went on to expose themselves to ... rather traumatic security experiences. Why? In the worst cases, when the fraud started up (around GP) it simply went around the security model, but by that time the model was so cast in mental concrete that there was no flexibility to deal with it. One could argue that these models stopped other forms of fraud, but these arguments generally come from managers who don't admit the existence of the current fraud, so it's an argument designed to be an argument, not something that pushes us forwards.

    Perversely, those systems that did nothing had an easier time of it than even those that implemented a patchwork, because they had nothing to battle.


    fig 4. Investment directs the Revenue Curve

    Why is this? I conjecture that at the beginning of a project the business model is not clear. That is, none of us really knows what to do, but darn it we're inspired! Living and dreaming in Wonderland as we are, this suggests that the business model migrates very quickly, which means that it isn't plausible to construct a security model that lasts longer than a month. Which means several interlinked things:

    • until the business model is proven, there is little point in building a security model for security per se as an unproven model doesn't deserve to be protected,
    • the more attention that is put into the security model, the more the security model kicks back and insists that the business model stop changing, dammit!,
    • the more money that is put into the security model, the less money there is available for business activity, and
    • the security system puts a cost on the whole system, slowing growth.

    Now, anyone who's aware of compounding knows where to put the value: building the business, and security rarely if ever builds business, what it does is protect business that is already there. It's the issue of compounding we turn to now. Figure 4 depicts the cost of investment down below the horizontal axis, and the growth above. Investment isn't exponential, so it's not a straight line. Initially it grows well, but then hits limits to growth which doom it to sub-exponential growth, which is probably just as well as any investor I've met prefers less than exponential growth in contributions!

    While not well depicted in that figure, consider that the pattern of investment fundamentally sets the growth model. The Orange line dictates the slope and placement of the Blue!

    Now let's fiddle a bit in figure 5. Assume that investment is fixed. But we've decided to invest upfront in a big way in security, because that's what everyone said was the only way to sleep well at nights. Now the Orange Region of total investment over time is divided into two - above the thin line is what we invest in the business, and below the line is the security. The total is still the same, so security investment has squeezed us upfront.


    fig 5. More Costs means Growth is Flatter and GP is Later

    See what happens? Because resources were directed away from business, into security, the growth curve started later, and when the security model kicked in, the curve flattened up. That's because all security has a cost. If you're lucky, and your security team is hot (and I really do mean blistering here, see what I wrote about "most" above...) the kink won't be measurable.

    Why is it so big? And why don't managers wade in there with mallet and axe and bash it back into forward growth before we can say hedonism is the lifeblood of capitalism? Oddly, the chances of a manager seeing it are pretty remote because seeing drivers to growth is a very hard art, most people just can't see things like that and assume that either today goes for ever, or tomorrow will solve everything. The end users often notice it, and respond in one of two ways: they scream and holler or they stop using the system. An example of the former is from the old SSL days when businesses screamed that it sucked up 5 times the CPU ... so they switched to hybrid SSL/raw sites. An example of the latter is available every time you click on a link and it asks you to register for your free or paid account to read an article or to respond to an article.

    Students of security will be crying foul at this point because security does good. So they say. In fact what it does is less bad: until we draw in the fraud curve which security nicely attempts to alleviate the bad done by fraud, security is just a cost. And a deadweight one at that. Which brings us to our third observation: the upfront attention to security has pushed GP way over to the right, as it must do if you agree with the principle of GP.

    So where is all this leading us? At this point we should understand that security is employed too early if employed at the beginning - the costs incur a dramatic shift of the curve of growth. Both to the right, and a flattening due to the additional drain. And we haven't even drawn in the other points above: restarts and kickback.

    This logic says that we should delay security as long as we can, but this can't go on forever. The point where the security really kicks in and does less bad is when the bad kicks in: the fraud curve that slides up and explodes after GP. Then, the ideal point in which to kick security is after GP and before the fraudulent red line runs in ink onto the balance sheet.

    Which leads us to question - finally, for some, no doubt - When is GP?. That is saved to another day :-)

    Posted by iang at 07:22 PM | Comments (1) | TrackBack

    December 11, 2005

    GP1 - Growth and Fraud - Meet at the Grigg Point

    Imagine if you will a successful FC system on the net. That means a system with value, practically, but for moment, keep close in your mind your favourite payments system. Success means solid growth, beyond some point of survival, into the area where growth is assured. It looks like this:


    fig 1. Exponential Growth

    That's an exponential curve, badly drawn by hand. It's exponential because that's what growth means; all growth and shrinkage is exponential. Let's draw that as a logarithmic curve, so we see a straight line:


    fig 2. Growth Crosses the Value Tipping Point

    I've observed in many businesses of monetary nature that there is a special tipping point. This is where the system transitions from being a working demo that is driven forwards by the keenness of its first 100 or so users, to being a system where the value in the system is inherent and cohesive. In and of itself, the value in the system is of such value that it changes the dynamics of the system.

    That's why I labelled it the Self-Sustaining Value Growth Tipping Point, or GP for short. Before this point, the system will simply stop if we the founders or we the users stop pushing. After this point, there is a sustained machine that will keep rolling on, creating more and more activity. In short, it's unstoppable, at least as compared to beforehand.

    The shortened term indicates who to blame when you reach that point, because there is something else that is going to happen here: fraud! When the system passes GP, and the value is now inherently stealable for its value, then someone will come along and try to steal it.


    fig 3. Fraud Kicks Off then Levels Off

    And that theft will probably work, if history is any judge. You'll get a rash of frauds breaking out, either insider or outsider fraud, and all will appear to be chaos. Actually, it's not chaos, it's just competition for different fraud models, and soon it will settle down to a set of best practices in fraud. At this point, when all the mistakes have been made and the surviving crooks know what they are about, fraud will rise rapidly, then asymptotically approach its long run standard level. Ask any credit card company.

    Remember that the graph above has a logarithmic vertical axis, so vertical distances of small amounts mean big distances in absolute amounts. The long run gap between those lines - red to blue - is about two if the vertical was log 10. Assuming that, 102 gives us 100 which means fraud is 1% of total at any time. 1% is a good benchmark, a great number to use if you have no other number, even if the preceeding mathematics are rather ropey. Some systems deliver less, some deliver more, it all depends, but we're in the right area for a log chart.

    Now that we have the model in place, what can we do with GP? Quite a lot, it seems, but that waits for the next exciting installment of Growth and the Big GP!


    This is Part 1 of Growth and Fraud:

    Posted by iang at 03:21 PM | Comments (4) | TrackBack

    December 08, 2005

    How much will it cost you to lose your customer's data?

    This one popped up and adds actual numbers to the debates on losses of data by companies. I can do no better than Chandler on this and will simply copy his snippets:

    The first report is a survey of 14 organizations that lost confidential customer information and had a regulatory requirement to notify the affected individuals. The 14 organizations primarily hailed from the financial services arena but also included retailers, insurance companies, telecom firms, higher education and healthcare.

    To cope and recover from a single security breach cost on average $14 million per company per breach or $140 per lost customer record. The direct costs in incremental spending for outside legal counsel, increased call-center costs and related items alone were $5 million.

    Chandler went to PGP and in a supreme irony, entered his personal details in order to get the actual reports:

    Breaches included in the survey ranged from 1,500 records to 900,000 records from 11 different industry sectors. In general, the largest breaches occurred in financial services, data integration, and retail; the smallest were in higher education and health care. Information in this study covers the costs of almost 1.4 million customer records compromised.

    Among the study's key findings:

    • Total costs to recover from a data breach averaged $14 million per company or $140 per lost customer record
    • Direct costs for incremental, out-of-pocket, unbudgeted spending averaged $5 million per company or $50 per lost customer record for outside legal counsel, mail notification letters, calls to individual customers, increased call center costs, and discounted product offers
    • Indirect costs for lost employee productivity averaged $1.5 million per company or $15 per customer record
    • Opportunity costs covering loss of existing customers and increased difficulty in recruiting new customers averaged $7.5 million per company or $75 per lost customer record. Overall customer loss averaged 2.6% of all customers and ranged as high as 11%.

    These cost estimates include recovery costs only and do not include the cost of putting in place technology and procedures to ensure such breaches do not occur in the future.

    Those are hard numbers, not in the sense that they are fixed for you, but in the sense that they can not easily be ignored in NPV calculations. Now, if we were able to calculate the risk of this breach happening then we could simply multiple the two and get the expected loss. Which then could be compared and contrasted with our security expenditure!

    Or, in simple terms, you might consider spending up to $140 per customer on security if you are 100% likely to lose the data, and your security is guaranteed to reduce that likelihood to zero. Leaves a lot of open territory, I know, but any numbers are better than no numbers.

    Posted by iang at 05:28 AM | Comments (3) | TrackBack

    November 21, 2005

    Frank Hecker goes to the Mountain - mapping the structure of the Certificate Authority

    Frank takes aim at the woeful business known as certificate authorities in an attempt to chart out their structural elements and market opportunities.

    Frank argues that CAs can be viewed as providers of one of encryption, DNS-fixes, site identity proofs, or as anti-fraud services. Depending on which you choose, this has grave ramifications for what follows next -- Frank's thesis implicitly seems to be that only one of those can be pursued, and each have severe problems, if not inescapable and intractable contradictions. In the meantime, what is a browser manufacturer supposed to do?

    For those who have followed the PKI debate this will not surprise. What is stunningly new -- as in news -- is that this is the first time to my knowledge that a PKI user organisation has come out and said "we have a problem here, folks!" Actually, Frank doesn't say that in words, but if you understand what he writes, then you'd have to be pre-neanderthalic not to detect the discord.

    What to do next is not clear -- so it would appear that this essay is simply the start of the debate. That's very welcome, albeit belated.

    Posted by iang at 06:33 PM | Comments (1) | TrackBack

    November 18, 2005

    After 10 years, a new policy on adding CAs

    Frank announces the new Mozo policy for CAs.

    This is a significant piece of news in an otherwise moribund field - there hasn't been anything happening in the CA business since Verisign bought Thwarte. In brief here's the story: since the dawn of SSL time, all browsers have more or less inherited a list of favoured buddies created by Netscape. When Mozilla started to ship significant numbers of browsers, they started to get calls for new CAs to be added.

    Looking around, it was discovered there were no rules, other than "must be WebTrust Audited!" Well, that fell by the wayside when it was pointed out that Mofo was supposed to be working in the open source world and WebTrust audits start at $50k. Not to mention serious irregularities in the WebTrust process itself, and evolving security failures of the overall browser system...

    Policy guru Frank Hecker burnt many candles to craft a compromise between the reds and the blues. Bitter debate ensued, but the end result is OK, although it does kind of highlight that Mofo (or is it Mozo?) is a meta CA and and has not or cannot escape some responsibility for the CAs that are added.

    To cap it off, rumour has it that Microsoft has also started a policy review, no doubt following the quite serious discussion on the n.p.m.crypto lists over this major issue. Last I heard, Konqueror, Opera and Safari were expecting to follow Mozo on this policy, so this may result in a minor shakeup.

    (Some minor disclosure - I have been helping the CAcert people with their policy ...)

    Posted by iang at 03:30 PM | Comments (0) | TrackBack

    October 26, 2005

    Breaking Payment Systems and other bog standard essentials

    Many people have sent me pointers to How ATM fraud nearly brought down British banking. It's well worth reading as a governance story, it's as good a one as I've ever seen! In this case, a fairly bog standard insider operation in a major brit bank (not revealed but I guess everyone knows which one) raided some 2000 user accounts and probably more. They did all this through the bank's supposedly fool proof transaction system, and the bank aided and abetted by refusing to believe there was an issue! Further, given the courts willingness to protect the banks' secrecy, one can say that the courts also aided and abetted the crooks.

    This is the story of how the UK banking system could have collapsed in the early 1990s, but for the forbearance of a junior barrister who also happened to be an expert in computer law - and who discovered that at that time the computing department of one of the banks issuing ATM cards had "gone rogue", cracking PINs and taking money from customers' accounts with abandon.

    This is bog standard. Once a system grows to a certain point, insider fraud is almost a given, and it is to this that the wiser FCer turns. As I say, this is a must-read, especially if you are new to FC. Here's news for local currency pundits on how easy it is to forge basic paper tokens.

    In a world of home laser printers and multimedia PCs, counterfeiting has become increasingly easy. With materials available at any office supply store, those with a cursory knowledge of photo-editing software can duplicate the business-card-size rewards cards once punched at Cold Stone Creamery or the stamps once given out at Subway sandwich sho........

    Steven Bellovin reports that Skype have responded to criticisms over their "secret cryptoprotocol."

    Skype has released an external security evaluation of its product; you can find it at http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf (Skype was also clueful enough to publish the PGP signature of the report, an excellent touch -- see http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf.sig) The author of the report, Tom Berson, has been in this business for many years; I have a great deal of respect for him.
    --Steven M. Bellovin, http://www.cs.columbia.edu/~smb

    Predictibly, people have pored over the report and criticised that, but most have missed the point that unless you happen to have an NSA-built phone on your desk, it's still more secure than anything else you have available. More usefully, Cubicle reports that there is an update to Skype that repairs a few bugs. As he includes some analysis of how to exploit and create some worms... it might be worth it to plan on updating:

    The Blackhat in me salivates at the prospect. It’s beautiful security judo, leveraging tools designed to protect confidentiality (crypto) and Availability (peer-to-peer) to better hide my nefarious doings. Combine it with a skype API-based payload and you’ve got a Skype worm that can leverage the implicit trust relationship of contact lists to propagate further, all potentially wrapped inside Skype’s own crypto.

    Too bad the first that most of Skype’s 60 million-and-growing users will ever hear of it will be after someone who does pay attention to these sorts of things decides they want to see if it’s possible to create a 60-million node botnet or retire after making The One Big Score with SkypeOut and toll fraud.

    Hey Skype, Ignoring Risk is Accepting Risk–NOT Avoiding it. Put this on your main page while upgrading is still prevention rather than incident response.

    A little hyperventilated, but consider yourself in need of a Skype upgrade.

    Posted by iang at 03:08 PM | Comments (1) | TrackBack

    October 20, 2005

    What happens when you don't do due diligence...

    A story doing the rounds (1, 2) shows how money laundering is now being used to open up security in banks that don't do DD. The power of the money laundering bureaucrats is now so unquestioned that mere mention of it and a plausible pretence at it allows anyone to do the craziest things to you.

    AN INGENIOUS fraudster is believed to be sunning himself on a beach after persuading leading banks to pay him more than €5 million (£3.5 million) in the belief that he was a secret service agent engaged in the fight against terrorist money-laundering. The man, described by detectives as the greatest conman they had encountered, convinced one bank manager to leave him €358,000 in the lavatories of a Parisian bar. "This man is going to become a hero if he isn't caught quickly," an officer said. "The case is exceptional, perfectly unbelievable and surreal."

    In another case he did it with wires to Estonia, but had to sacrifice his wife and mother-in-law in the process:

    A third payment of €5.18 million was made to an account in Estonia. This time Gilbert was quicker. Police identified him by tracing his calls, but by the time they caught up with him he was in Israel. They arrested his wife and mother-in-law at the family home outside Paris. They deny acting as accomplices.

    Can you hear the mother-in-law screaming "I told you he was a SCHMUCK!?!" Read the whole thing - it's a salutory lesson in how governance is done not by blindly doing what bureaucrats and experts think is a good idea, but by thinking on your feet and doing your own due diligence. In this case, it is somewhat unbelievable that the banks did not do the due diligence on this chap, but I suppose they were waiting for an invitation!

    Posted by iang at 11:30 AM | Comments (1) | TrackBack

    October 11, 2005

    It's official - doing due diligence is a criminal offence!

    I wrote before about rising barriers in security. We now have the spectre of our worst nightmare in security turned haptic: the British have convicted a security person for doing due diligence on a potential scam site. If you work at a British Financial Institution, be very very aware of how this is going to effect security.

    [writes El Reg] On December 31, 2004, Cuthbert, using an Apple laptop and Safari browser, became concerned that a website collecting credit card details for donations to the Tsunami appeal could be a phishing site. After making a donation, and not seeing a final confirmation or thank-you page, Cuthbert put ../../../ into the address line. If the site had been unprotected this would have allowed him to move up three directories.

    After running the two tests, at between 15.12 and 15.15 on New Year's Eve, Cuthbert took no further action. In fact his action set off an Intrusion Detection System at BT's offices in Edinburgh and the telco called the police.

    It may well be that the facts of the case are not well preserved in the above reporting; no journalist avoids a good story, and El Reg is no exception. A reading of other reports didn't disagree, so I'll assume the facts as written:

    [El Reg again] DC Robert Burls of the Met's Computer Crime Unit said afterwards: "We welcome today's verdict in a case which fully tested the computer crime legislation and hope it sends a reassuring message to the general public that in this particular case the appropriate security measures were in place thus enabling donations to be made securely to the Tsunami Appeal via the DEC website."

    The message is loud and clear, but it is not the one that they wanted. The Metropolitan's Computer Crime Unit is blissfully unaware of the unintended consequences it has unleashed... Let's walk through it.

    According to the testimony, the site gave some bad responses and raised red flags. A routine event, in other words. Cuthbert checked it out a little to make sure it wasn't a phishing site, and apparently found it wasn't. This would have been a very valuable act for him, as otherwise he might have had to change all his card and other details if they had been compromised by a real phishing attack (of which we have seen many).

    The 'victim' in the case was named as Disasters Emergency Committee (DEC). From Cuthbert, DEC received a 30 pound donation via donate.bt.com and then said (after he was charged):

    [more] There's no suggestion any money was stolen and the Disasters Emergency Committee has issued a statement reassuring the public that the internet remains a safe way to donate money to victims of the 26 December disaster.

    The real victim may well be the British public who now only have BT's IDS and the Metropolitan Computer Crime Unit between them and phishing. Let's imagine we are tasked to teach users or banks or whoever how to defend themselves against phishing and other Internet frauds. What is it that we'd like to suggest? Is it:

    a. be careful and look for signs of fraud by checking the domain name whois record, tracerouting to see where the server is located, probing the webserver for oddities?

    Or

    b. don't do anything that might be considered a security breach?

    Either way, the user is in trouble because the user has no capability to determine what is and what is not an "unauthorised access". Banks won't be able to look at phishing sites because that would break the law and invite prosecution; after this treatment, security professionals are going to be throwing their hands up saying, "sorry, liability insurance doesn't cover criminal behaviour." The Metropolitan Computer Crime Unit will likewise be hamstrung by not being able to breach the very laws they prosecute.

    There is a blatant choice here not only for security professionals and banks, but also for the hapless email user. Follow the law, and perform due diligence without the use of ping, traceroute, telnet, whois, or even browsers ... Or follow the protocols and send the recognised and documented requests to respond according to the letter and spirit of the RFCs, and in the meantime discover just how bona fide a site is. Tyler dug up the appropriate document in this case:

    So RFC 3986 explicitly lists this construction as a valid URL. See section 5.4.2.:

    5.4.2. Abnormal Examples

    Although the following abnormal examples are unlikely to occur in
    normal practice, all URI parsers should be capable of resolving them
    consistently. Each example uses the same base as that above.

    Parsers must be careful in handling cases where there are more ".."
    segments in a relative-path reference than there are hierarchical
    levels in the base URI's path. Note that the ".." syntax cannot be
    used to change the authority component of a URI.

    "../../../g" = "http://a/g"
    "../../../../g" = "http://a/g"

    The way the security bureaucrats are treating this war, possession of an RFC will become evidence of criminal thoughts! The battle for British cybersecurity looks over before it has begun.

    Addendum: Due diligence defined and reasonably duty of care discussed. Also see Alice in Credit-Card Land and also Phishing and Pharming and Phraud - Oh My for discussions in more depth. Also, I forgot to tip my hat to Gerv for the original link.

    Posted by iang at 11:08 PM | Comments (2) | TrackBack

    October 10, 2005

    'bonus pater familias'

    An article in the aforementioned JIBC, "Security as a legal obligation" by Edwin Jacobs, argues the current security crisis from the perspective of bonus pater familias. This legal doctrine has it that we should ask, what would the good citizen do in this case?

    What can be reasonably expected of all the actors here, assuming they were good citizens? As I argued in a recent blog entry concerning online account fraud (a.k.a. phishing), you can't blame any one party totally, and if you put all the cost on one party and none of the responsibility on the other parties then we give rise to moral hazard. That's the economics idea that anyone who is fully insured is more likely to incur the events, as they take no care.

    The current situation in most western countries is, in simple terms, if a transaction was not authorised by the account owner then the financial institution carries the risk. This is by no means cut & dry, but when push comes to shove, that's what gets written down in the laws.

    Does that mean that the FIs are already on the hook for all of phishing, identity fraud and the like? By no means, as the greater part of cost of any online fraud seems to be the cost to the individual's identity. Although the estimated heist is about $1000, I've also seen estimates of time lost to the user of 100 hours. If your time is worth more than $10 per hour, then you are now more concerned about the waste of your life; and another statistic has it that one in four never recover completely from the situation.

    So we already have risk sharing in place. Which isn't to say that it's a nice way to live and do business, but it is at least a clearly demarcatible sharing arrangment. FI's pick up the tab for the money, but your identity's your own problem.

    Where we go from here is that if there is to be any adjustment from this current risk sharing between the FIs and their users, then it has to be a better risk sharing. That is, not only does it need to better account for the economics of repairing the damage, it also has to be as easily measurable. That's a tall order, and my hat off to anyone who can do this.

    Jacobs takes Sarbanes-Oxley to task by pointing out that not only are there already many laws in Europe that cover these points (and he works through some of them), but both providers and customers have a general duty of care. Obviously in the current environment, there is no lack of examples of failure to follow this guideline, so the question arises how it is that the principle has failed to save us in this case?

    3.1. The concept of general duty of care

    The presence of specific legislation related to security and risk management should not make us forget that every person (so also customers of on line services!) and every company have a general duty of care. If the lack of appropriate security measures leads to damages for third parties, the liability of the company which omitted to apply best practices in this field (and hence to behave as the 'bonus pater familias') will automatically be involved. Contrary to the specific legal security obligations described above in the specific laws, the general liability can to a certain extent be reduced by liability disclaimers that have to be carefully drafted.

    (My emphasis.) It would seem that if one were to stereotypically cast the models as European above and American for the alternate, we could ascribe his last comment as the reason for the failure: general liability and a duty of care has been widely written out by liability disclaimers in the American model. This is no light thing, as the history of the credit card shows. When banks were aggressively marketing their cards in the mad ramp up to saturation, it was common to send cards to people who hadn't asked for them, and to stick them with the fraud bills. This blatent act of fraud on the part of the banks resulted in the regulations (Reg E?) that made the banks liable for all of any transaction not authorised, thus switching all of the risk from the consumer to the bank. At least until identity fraud took off.

    It would seem simplicity itself to write to our congresspersons and demand they write liability back in again. "Dammit!" But I fear it isn't so easy, and it may very well be that Reg E recognises bonus american pater est mortuus. The counterbalance to this dramatic accusation is that the ecommerce revolution happened in the US and only to a lesser extent in the European circles. If we looked at all the startups and IPOs, we should expect to find a massive difference, perhaps as much as an order of magnitude.

    Which meant that the value was created in the US and then exported by copycats to other farflung dominions of capitalism. All of which goes to show that making a claim for bonus pater familias as against the widespread disclaiming of same by contract is not easy: either we need to show correlation not causality with dotcom boom, or the pundits of bonus pater familias need to find something that counterbalances the 'economic miracle' argument.

    Jacob's article (and blog) is worth reading if you are trying to make sense of Choicepoint, phishing, viruses and keyloggers and the madness known as Sarbanes-Oxley. I don't think it answers everything but it does offer a perspective why the crisis in security and governance is primarily American and not elsewhere.

    Posted by iang at 09:13 AM | Comments (1) | TrackBack

    October 09, 2005

    Journal of Internet Banking and Commerce

    Vol 10 No. 2 Summer 2005 of JIBC is out now:

    General and Review Articles

    Research Papers

    Read on for abstracts....

    General and Review Articles

    BELGIUM: EEMA: Focus on Technical and Legal Issues of e-Business in the European Union
    (By Edwin Jacobs)
    http://www.aaraydev.com/commerce/JIBC/EdwinJacobs_EEMA_210705,asp

    EEMA is Europe's leading independent association for e-Business and promotes collaboration concerning all technical (ICT), legal and business aspects of e-business. EEMA puts the emphasis on today's practical issues. In this respect, EEMA's Legal Interest Group, headed by Prof. Jos Dumortier, focuses on all legal aspects of e-business, i.e. electronic signature, e-invoice, identity management, security legislation (e.g. Sarbanes Oxley in the EU), privacy, etc. On November 22nd and 23 rd this year EEMA will organise a two-day seminar about electronic invoicing and electronic archiving in Brussels.


    CHINA: Current Development Situation of e-Commerce in China
    (By Alamusi)
    http://www.arraydev.com/commerce/JIBC/2005-08/china.htm

    The Chinese government puts a great deal of emphasis on E-Commerce work extremely. Generally speaking, the China E-Commerce market contains huge commercial opportunity, the development prospect of which is extremely broad. The relevant organizations are complying with and guiding commercial transformation tendency, absorbing latest international achievement of technical platform, payment system, creditability system, platform construction and safety guarantee system in E-Commerce, further optimizing the external environment, and speeding up development and innovating application complying with national features.


    USA: B2B Marketers Integrate Precision Search to Boost Profitability and Increase Satisfaction Across the e-Commerce Value Chain
    (By Larry R. Harris)
    http://arraydev.com/commerce/JIBC/2005-08/Harris.asp

    This article will describe the central role that site search and navigation plays in B2B eCommerce, as well as the defining characteristics of a successful search implementation from both a technical and marketing perspective. This article will also outline how integrating precision search into an existing eCommerce infrastructure can result in higher productivity, streamlined processes, increased conversion rates, greater commercial buyer and partner satisfaction, and higher profits per transaction.

    Research Papers

    BELGIUM: Security as a Legal Obligation: About EU Legislation Related to Security and Sarbanes Oxley in the European Union
    (By Edwin Jacobs)
    http://www.arraydev.com/commerce/JIBC/2005-08/security.htm

    Since the Sarbanes-Oxley Act there is a worldwide focus on security issues in general. This new focus seems to emphasize that security is a new kind of legal obligation. However, security is already a legal obligation for all EU companies since the early nineties. On top of that, in electronic banking there is a whole range of legal obligations in some way related to security, that were already (and remain) applicable, notwithstanding a possible application of the Sarbanes-Oxley Act on some EU companies. The criterion of what can be 'reasonably expected' as 'bonus pater familias' from service providers, but equally also from their customers, becomes increasingly important.


    BELGIUM: The Law on Electronic Medical Prescription
    (By Francois de Clippele)
    http://www.arraydev.com/commerce/JIBC/2005-08/EMV.HTM

    Health care is one of the most important economic and business areas. The European Union has therefore worked out an e-health care strategy to achieving stronger growth and increased effectiveness of services. The application of information and communications technologies (ICT) that affect the health care sector is developing fast in Europe. In this respect various countries have launched pilot projects in order to modernize their medical prescription practices. A model of the electronic medical prescription must respect patient's rights and can only be deployed in a system of security in order to protect the confidentiality.


    CANADA: Trust and Confidence and the Digital Economy: Issues and Challenges
    (By Prabir K. Neogi and Arthur J. Cordell)
    http://www.arraydev.com/commerce/JIBC/2005-08/Negi.htm

    Globalization and technological change continue to profoundly affect economic growth and wealth creation. Information and Communications Technologies (ICTs) have been a key enabler and driver of globalization, which is likely to continue as trade and investment barriers continue to fall and communications become ever cheaper, easier and more functional. Every economy requires a physical, institutional and legal infrastructure, as well as understandable and enforceable marketplace rules, in order to function smoothly. In this paper the authors maintain that such an infrastructure must be developed for the new digital economy and society, one that provides trust and confidence for all those who operate in or are affected by it.


    INDIA: Technical and Entrepreneurial Research Information System: An Applied e-Model for Sustainable Entrepreneurship Development
    (By Dhrupad Mathur)
    http://www.arraydev.com/commerce/JIBC/2005-08/DhrupadMathur.asp

    This article stresses on the need for an e-application like Technical and Entrepreneurial Research Information System (TERIS), which enables interaction among academia, industry and various agencies related to researchers for sustainable entrepreneurship development. The functional details of the model are also discussed. This article is based on inputs with reference to the state of Rajasthan. However, the model can very well be replicated elsewhere.


    INDIA: A Framework for Evaluating e-Business Models and Productivity Analysis for Banking Sector in India
    (BY N.V.M. Rao, Prakash Singh ans Neeru Maheshwari)
    http://www.arraydev.com/commerce/JIBC/2005-08/maheshwari.htm

    This study is an effort to draw together some of the e-Business models and real-life experiments that has been circling around the e-business models. To study the sweeping changes brought about by e-initiative measures in the banking sector some banks were chosen, from public sector like SBI, BOB etc and from private sector like ICICI, HDFC etc.


    MALAYSIA: Do Foreign Banks Lead in Internet Banking Services
    (By Boon Han Yeap and Kooi Guan Cheah)
    http://www.arraydev.com/commerce/JIBC/2005-08/JIBC_yeap%20&%20cheah.asp

    Internet banking has been increasingly used as a delivery channel in retail consumer banking. As far as the provision of internet banking services in developing countries is concerned, foreign banks definitely enjoy distinct advantages over domestic banks due to their experiences in other, more advanced financial markets. This paper reports a study that examined the levels of retail internet banking services provided by foreign and domestic commercial banks in Malaysia over a period of two years. The study found that while foreign banks are marginally more sophisticated at information provision level, domestic banks offer a significantly higher level of transactional facilities in both years.


    MALYASIA: Marketing Mix: A Review of "P"
    (By Chai Lee Goi)
    http://www.arraydev.com/commerce/JIBC/2005-08/goi.HTM

    There has been a lot of debate in identifying the list of marketing mix elements. The traditional marketing mix by McCarthy (1964) has regrouped Borden's (1965) 12 elements and has comprised to four elements of product, price, promotion and place. A number of researchers have additionally suggested adding people, process and physical evidence decisions (Booms and Bitner, 1981; Fifield and Gilligan, 1996). The other suggested Ps are personnel, physical assets and procedures (Lovelock, 1996; Goldsmith, 1999); personalization (Goldsmith, 1999); publications (Melewar and Saunders, 2000); partnerships (Reppel, 2003); premium price, preference of company or product, portion of overall customer budget and permanence of overall relationship longevity (Arussy, 2005); and 2P+2C+3S formula (Otlacan, 2005), therefore personalisation, privacy, customer Service, community, site, security and sales promotion.


    QATAR: E-Banking Service Quality: Gaps in the Qatari Banking Industry
    (By Norizan M. Kassim)
    http://www.arraydev.com/commerce/JIBC/2005-08/KassimTry.asp

    Financial liberalization and technology revolution have allowed the developments of new and more efficient delivery and processing channels as well as more innovative products and services in banking industry. Banking institutions are facing competition not only from each other but also from non-bank financial intermediaries as well as from alternative sources of financing, such as the capital markets. Another strategic challenge facing banking institutions today is the growing and changing needs and expectations of consumers in tandem with increased education levels and growing wealth. Consumers are becoming increasingly discerning and have become more involved in their financial decisions. For this reason, they are demanding a broader range of products and services at more competitive prices through more efficient and convenient channels. This study investigates the discrepancy between customer's expectation and perception towards the e-banking services.


    USA/SINGAPORE: A Case Study of electronic Bill Presentment and Payment (EBPP) Integration Using the CON Mediation Technology
    (By Sajindra Jayasena and Stephane Bressan)
    http://arraydev.com/commerce/JIBC/2005-08/Jayasema.asp

    By its very nature, financial information, like the money that it represents, changes hands. Therefore the interoperation of financial information systems is the cornerstone of the financial services they support. In this paper we illustrate the nature of the problem in the Electronic Bill Presentment and Payment industry. In particular, we describe and analyze the difficulty of the integration of services using four different formats: IFX, OFX and SWIFT standards, and an example proprietary format. We then propose an improved way to accomplish this integration using the Context Interchange (COIN) framework.

    Administrative Notice

    Journal of Internet Banking and Commerce

    JIBC is a leading edge publication that informs banking and electronic commerce professionals and executives on principal developments, benchmark practices, and future trends in the Internet-based marketing practices of governments and industry. This free online interactive journal is a way to keep in touch, to share information, and to establish business contacts (networking) for worldwide professionals that specialize in electronic commerce, governance and banking
    solutions.

    In JIBC you will find informed discussion of the latest internet-based banking and electronic trends and practices from around the world. Our priority is quality, not quantity. We want to maintain JIBC as a service that provides substantial information and an effective forum for your articles, your letters, your insights and ideas.

    JIBC invites banking and electronic commerce professionals, academicians and publishers to submit important announcements, original articles, guest columns and significant feature presentations. We also welcome surveys, book reviews and letters to the Editor. Technical discussions in highly specialized areas of expertise will be kept to an absolute minimum.

    JIBC is formally issued three to four times a year when an email summary of current articles is distributed to subscribers. The full text of current articles is posted on the JIBC Web site at
    http://www.ARRAYdev.com/commerce/JIBC/current.asp.

    The publication is complemented by the Compendium of Internet Banking and Commerce Initiatives at:
    http://www.arraydev.com/frames/f-guest_comp.htm.
    We invite readers to provide brief descriptions of products, books, and services that they think others will find interesting.

    The Journal of Internet Banking and Commerce (JIBC) is provided as a service by ARRAY Development based in Ottawa, Canada. Views expressed are those of the authors and are not necessarily shared by ARRAY Development. Firms or individuals interested in sharing sponsorship of this project may contact array (at) ARRAYdev.com.

    The JIBC Web Archive
    http://www.arraydev.com/commerce/jibc/articles.htm contains all articles published to date.

    You can reach the Editor-in-Chief Nikhil Agarwal with any questions or comments by email at:
    nikhil.jibc (at) gmail.com

    Publisher Nahum Goldmann is at:
    Nahum.Goldmann (at) ARRAYdev.com.

    Editorial Board

    Publisher and Member of the Editorial Board: Nahum Goldmann

    Chief Editor: Nikhil Agarwal

    Founding Chief Editor Emeritus and Member of the Editorial Board: Gord Jenkins

    Assistant Editor: Xin "Robert" Luo

    Mailing List Managing Editor: Anne-Marie Jennings

    Contributing Editors
    U.K. Contributing Editor: David G.W.Birch
    Australia Contributing Editor: Dale Pinto
    Japan Contributing Editor: Carin Holroyd
    Nordic Countries Contributing Editor: Minna Mattila
    Legal Contributing Editor: Edwin Jacobs
    Middle East Contributing Editor: Raed Awamleh
    Africa Contributing Editor: Alemayehu Molla
    France Contributing Editor: Jean-Michel Sahut

    Please send any questions related to maintenance of this Web site to:
    array (at) ARRAYdev.com

    Information and subscription for JIBC mailing list is available via:
    http://groups.yahoo.com/group/JIBC/

    Posted by iang at 01:33 PM | Comments (0) | TrackBack

    October 07, 2005

    The Tipping Point - How Good Companies Go Bad and Executives Become Rogues

    A new book by Sayles and Smith looking at governance from the angle of Corporate Executives being the bad guys is worth a look. It may do a good job of documenting the problems occuring in US business at the moment and the first chapter is online here:

    To find their prescriptions one would presumably have to buy the book. I'm not sure I will as they are very keen to blame the executive, which isn't really going to help. Agency theory suggests that your employees do what you incentivise them to do, and executives are no different. Look instead at the incentives that have been created would be my prescription.

    By way of example, on the mutual funds scandal (one that I'm at least passingly familiar with from the US Senate hearings) they write:

    What Could Management Have Been Thinking? Here is an example of executives "shooting themselves in the foot," deception and cheating that comes back to whack the originator:

    Numerous mutual funds destroyed their reputation by allowing a small number of investors to misuse the funds (by overnight trading and buying and selling at "stale" prices). Funds earned very modest extra management fees by granting these special privileges to hedge funds and a few "select" clients. Their corrupt trading and wrongful pricing cost the other 99% of the funds’ investors dearly. When the corrupt practices were revealed, some funds lost half of the investors’ money. In one case, the value of a fund family to its owners dropped half a billion dollars in a matter of weeks.

    Yet as has been pointed out by the founder of Vanguard, John Bogle, in his testimony before the same Senate hearings the problems started when greedy investors forced mutual funds from percentage reward scales over to fixed reward scales. Bogle led Vanguard to be a dominating force in mutual funds and is to some extent viewed as the father of the post-war Mutual Funds industry; his words are worth reading:

    March 21, 2004, less than two months from today, will mark the 80th anniversary of America’s first mutual fund. Organized in Boston, Massachusetts Investors Trust (MIT) was a Massachusetts trust managed by its own trustees, who held the power “in their absolute and uncontrolled discretion” to invest its assets. The trustees were to be compensated at “the current bank rate for trustees,” 6% of the investment income earned by the trust.

    Our industry began, then, with the formation of a truly mutual mutual fund, one organized, operated and managed, not by a separate management company with its own commercial interests, but by its own trustees; compensated not on the basis of the trust’s principal, but, under traditional fiduciary standards, its income.

    Has there been any suggestion that the funds industry go back to percentage rewards and thus encourage the managers to think of the investor?

    Nope. Expect more problems then. And the emboldened question above is easily answered: Management was thinking of what you told them to think.

    Posted by iang at 11:31 AM | Comments (0) | TrackBack

    September 01, 2005

    KPMG establishes the price of the get-out-of-jail card

    The monopoly game of accounting goes on another round. A few rounds back, Arthur Andersen was knocked out, and now the KPMG is losing its houses on the plush side of the board:

    Accounting firm KPMG LLP on Monday agreed to pay $456 million and to cooperate with authorities investigating tax shelter deals. Rival Ernst & Young LLP remains under grand jury investigation for its role in selling shelters.

    which works out as $300k per partner for the get-out-of-jail card. Given how much each partner makes per year, this looks like no more than a blip in their yearly income; the more important question is ... whither accounting reputation now?

    Serious Financial Cryptographers have always known that accounting practices and audits are but a fig leaf of respectibility. Arthur Andersen seemed to blow away that paltry covering for the first time, according to the public's viewpoint. Above we see that Ernst & Young are also under investigation, and there is every reason to believe that they were all doing it, whatever it was.

    What "it" was is somewhat apropos - raking in huge fees for shady transactions. No matter your views on government, taxes and the equally shady concept of trading justice that resulted in a fine but no indictment, what is clear is that the accountants are not serving the public interest.

    Serving the public interest by means of public audits is their being and meaning in life. It is the reason they are special, the reason they have privileges and the reason they can ask high fees. It's the reason that the regulator instructs public companies to get audited. It's the reason that any difficult hidden thing gets a secret report from an auditor, for a fat fee.

    For this privilege they get to serve the public interest. It is a very easy test to apply and equally easy to see that this not terrifically high standard is not being met by the public auditors.

    For this privilege the accountants have earnt huge fees for huge periods. We can fairly comfortably agree that they got out their rewards; no partner at a big N firm could reasonably claim that too much was asked of them for too little pay.

    I have no hesitation therefore in stripping from them any specialness and calling for the end to KPMG. And the rest - society needs to move on and consider other ways in which we audit and confirm to our public that what we are doing is in the interests of our shareholders.

    I know that ignoring these words is easy - and that "jobs are at stake." But those are poor excuses for supporting a rotten system. Why does a poor job (or worse - basically theft) by the auditors mean that their jobs must be protected?

    Before the veins burst, here's today's ludicrous audit news:

    CardSystems auditor completes compliance report Thu Sep 1, 2005 11:31 AM ET NEW YORK, Sept 1 (Reuters) - Payments processor CardSystems Solutions Inc., where a security breach exposed more than 40 million credit card accounts to fraud, on Thursday said its auditor had completed a report to payment networks and concluded it complies with industry data-security standards.

    CardSystems, which handles payments for more than 119,000 merchants, in July hired AmbironTrustWave, a data security assessment firm, to review its compliance with payment card industry security standards. The report was submitted to MasterCard, Visa, American Express Co. (AXP.N: Quote, Profile, Research) and Morgan Stanley's (MWD.N: Quote, Profile, Research) Discover on Wednesday, as scheduled.

    But they already had the t-shirt that said "I got my systems audited and only exposed 40 million accounts..." No mention of what happened to the predecessor auditor. Anyways, back to the the monopoly game, I wonder who's going to pick up Mayfair?

    Posted by iang at 11:21 AM | Comments (4) | TrackBack

    July 13, 2005

    Accountancy Firms - too big to fail

    Following the Arthur Andersen collapse, regulators in Europe have made their view known to their opposite numbers in the USA:

    "Any reduction in the number of major audit firms could have negative implications, particularly for large companies in the U.K.," stated the U.K. Financial Services Authority, according to the FT. "We will be watching these developments very carefully." An unnamed European Commission official also told the publication: "It was already an issue going down to four [big accounting firms]. Obviously, having only three would be an even bigger problem."

    KPMG has been declared too big to fail, thus bringing the big 4 auditors into the very select club of state-protected firms. The problem with this is of course the message that it sends to the world of accountancy. "If we can not be stopped, then we can do what we like."

    One has to put this in context - the United States Department of Justice has taken on a tax case against KPMG. To ease the pressure against an expected DoJ indictment, KPMG has declared itself to be in the wrong (and thus made easier the costly process of civil litigation by the people they advised).

    The big question is not about the particulars of the case but in how to regulate the market. The regulators are there and regulating; that's a fact, no matter how uncomfortable free market disciples find it. One of the rationales for regulation is that poor behaviour by dominating firms needs to be brought to heel. If as in some industries such as advertising there are no dominating firms, then the market can be expected to find its own solutions because the sector is spoilt for choice. However if the choice is limited to 4 large players acting in concert, we no longer have competition. Hence, regulation, so the rationale goes.

    So in declining to bring KPMG to heel, regulators are simply undermining their own role. In choosing to not pursue KPMG to the fullest, they also choose to further weaken the viability of the audit in an efficient market by increasing the privilege available to the big 4.

    Why not simply go back to the days of state-sponsored champions and declare auditing to be a protected business? The reason for this is fairly clear - regardless of the KPMG case and its predecessor Arthur Andersen, the big 4 audit sector has lost the faith of the public to deliver a viable honest service. Audits aren't trusted and for obvious agency reasons, so why are regulators bothering with both enforcing the use of an audit and letting the firms get bigger and more powerful?

    (FC context - many systems are built with audits inserted to clean up the loose ends, as part of Governance. Now, if one starts from the point of view that audits are bad, one can actually do almost all the functions of audits internally and with ones own users, using modern FC techniques. But we still have to carry the cost of the mandated audit, which means that we are only interested in reducing the 'tax' paid to subsidised auditors.)

    Posted by iang at 08:55 AM | Comments (3) | TrackBack

    June 26, 2005

    Ian Grigg - Triple Entry Accounting

    It was widely recognised since David Chaum's designs first appeared that the new 'digital certificate' model of money was not aligned or symmetrical with accounting techniques such as double entry book keeping. Many people expected the two to compete and indeed many money systems avoided combining them; this is I believe one of the few efforts to integrate the two and show them as better in combination than apart.

    Triple Entry Accounting

    The digitally signed receipt, an innovation from financial cryptography, presents a challenge to classical double entry bookkeeping. Rather than compete, the two melded together form a stronger system. Expanding the usage of accounting into the wider domain of digital cash gives 3 local entries for each of 3 roles, the result of which we call triple entry accounting.

    This system creates bullet proof accounting systems for aggressive uses and users. It not only lowers costs by delivering reliable and supported accounting, it makes much stronger governance possible in a way that positively impacts on the future needs of corporate and public accounting.

    full paper

    Comments below as always!

    Posted by iang at 07:46 PM | Comments (13) | TrackBack

    June 01, 2005

    Two Hot Whistleblowers

    The concept of whistleblowing informs our deepest designs. We cannot secure everything, so we go to the next best thing: we document everything. Extraordinarily, we can put together extremely strong systems that use the humble message digest to create chains of signatures and time entanglement, not because this is perfect, but because we know that if someone is looking, they can find.

    As our deepest difficulties lie not in external security but in protecting against the insider, audit trails and wide dissemination of information is one of our hottest tools. For the financial cryptographer, our hope is to leave a trail so well buried and indicative that any investigator is supported with some real evidence and doesn't need to rely on anything but the evidence.

    That's an ideal, thought, and it doesn't normally happen quite so well. Sometimes spectacularly so. Here are two whistleblowing stories from the US that provide colourful background to our efforts to secure systems and processes.

    In what has turned into a festival of hand-wringing moralising, Deep Throat has revealed himself to be Mark Felt, the Deputy Director of the FBI during the Watergate Affair....

    Deep Throat was the fabled secret source who prodded the journalists and provided the crucial inside tips to keep the story alive until it swept over and destroyed the corrupt and arrogant administration of Richard Nixon. (See google.news for a squillion articles.)

    How could he, write many of Washington's finest. The act of treachery, the traitor!

    How could he not? I ask. When your administration is corrupt, what do you do? What is the press for? What is that much exported model of freedom there for if not to dig out the dirt and keep politicians honest? And is Mark Felt an employee of a corrupt administration first and always? Or is he human being, a member of a society? (Americans would ask if he was an American, but that always confuses me.)

    I think it is pretty clear that all our institutions, and also our models of financial cryptography support the concept and presence of whistle blowers. It may be hell when he's not on your team, but that's a different issue.

    And in story #2, the Arthur Andersen conviction was overturned in the US Supreme Court by a unanimous decision. Arthur Andersen went down with Enron, which was done in by a public whistleblower when other, inside whistleblowers failed to do it.

    What can done say about the Supreme Court's ruling - one of the most reputable names in accounting was wiped out by the original decision and now we are told it was wrong?


    The obvious - too late for the 28,000 workers - has been written about elsewhere, but I can't help thinking such is simply the wrong way to look at the judicial process. Did it do the right thing or the wrong thing? I can't see the wrong thing having been done here. The prosecutor had a good case, and won the conviction. But he overstepped the mark and now it has been overturned. What else is there to say?

    That's the way the process works, it's called checks and balances. If those that think this dreadful mistake means we should scrap the prosecutorial process, or "reel in the prosecution" then they need to think up a process to replace it. Regardless of the 27,000 or however many innocent workers at Arthur Andersen, that company was selling its soul.

    So we need a process to stop that, and the current process just happens to do that. Sometimes. If anything, I think we need another big N accounting firm to go down for just such another scandal, as we know they were *all* doing it (as I've oft reported, I know all but one were doing it, and I just never heard what the other one was doing...).

    Literally, yes, if the system needs to work that way, we need another 27,000 innocents to be turned onto the streets in order to get the message to the 1000 or so bad apples who will lie and cheat and basically sell their company's reputation for 30 pieces of silver. Remember, there are thousands of shareholders and the millions of california tax payers who also lost big time, and nobody's bemoaning their fate much. And nobody owns a job, whether they work for a corrupt company or an honest one.

    But I'm all ears to a better system. Many older and legacy systems think they can protect themselves with an audit, and for the sake of all those who think that, well, their only real defence is an occasional spectacular bust of those selling unreliable audits. Or, to get serious about auditing and learn about financial cryptography :-)

    Posted by iang at 09:00 AM | Comments (3) | TrackBack

    May 21, 2005

    Click-fraud goes to court

    Click-fraud - where people deliberately click on web page adverts to drive up revenue - has now been filed as a class-action case (see article in blog). Like all cases these days, you can see their site at LostClicks.com. According to these attorneys, George Reyes, CFO for Google, calls click fraud "the biggest threat to the Internet economy." He really means the Google revenue stream, but he could be forgiven for thinking that which is good for Google is good for the Internet.

    The way click-fraud works is that the big adverts suppliers - see the list of plaintiffs for names like Google and Yahoo - have it in their interest to raise the number of clicks on the adverts. It's in their interest, so there are many nefarious and tricky ways to make it so happen. One way is by paying poor students to sit in their dorms and click through adverts, and this is how I was introduced to the subject back in 1997. No doubt the world is much more efficient these days, but it still remains that the party most interested in seeing the adverts click-rate go up is the party that is also collecting the statistics and billing the buyers.

    This is a straight-forward governance case involving a straight-forward conflict of interest. What the major web site operators should do is form a cartel or alliance to collect and bill on their behalf. Open the books, purchase an auditor, and pretend for a while to be open. As they don't seem to have done this, they are facing the risk of dramatic and punitive damages for not isolating and clearing their conflict of interests.

    (Watching how this evolves is hardly interesting, except to the muggins who purchase banner-ads. But watching how American class-action attornies move through the various frauds of the Internet is apropos, as some of those frauds really need cleaning up.)


    Attorneys Seek Advertisers for Click Fraud Class Action
    ClickZ News | By Pamela Parker | May 20, 2005

    Lawyers engaged in a click fraud-related class action suit against the major search engines have employed a little online marketing of their own.

    Dallas attorneys Joel Fineberg, Dean Gresham and Stephen Malouf this week launched a site at LostClicks.com to help them find potential click fraud victims.

    The attorneys have a pending class action suit in the circuit court of Miller County, Arkansas. Plaintiffs in the case are Lane's Gifts and Collectibles and Caulfield Investigations, while the named defendants include Google, Yahoo!, Lycos, AskJeeves, FindWhat.com, Buena Vista Internet Group, LookSmart, America Online, Netscape and Time Warner. Two other plaintiffs that had originally been part of the case, U.S. Citizens for Fair Credit Card Terms and Savings 4 Merchants, have apparently dropped out.

    The lawsuit accuses the defendants of overcharging advertisers for pay-per-click advertising and concealing the overcharges.

    The LostClicks.com site exhorts visitors to help the firm with the case, urging them to e-mail "If you have information about click fraud, have not been given answers or your money back from the search engines for suspected click fraud or you suspect click fraud and need to investigate...."

    "What we'd like is for LostClicks.com to become an electronic meeting place for advertisers and individuals who are concerned about pay-per-click fraud," said Fineberg in a statement.

    A recent survey by the Search Engine Marketing Professionals Organization (SEMPO) found that 45 percent of advertisers were worried about click fraud, though they hadn't tracked it much. Meanwhile, 26 percent said it wasn't a significant concern. Only 6 percent labeled click fraud as a
    significant problem that they had tracked.

    Posted by iang at 08:08 AM | Comments (1) | TrackBack

    May 12, 2005

    Microsoft Rumours Lacking Strong Digital Signature

    I've just been reminded of Stefan's post that Microsoft are looking at blinded signatures. To add to that, I've heard related rumours. Firstly, that they are planning to introduce some sort of generic blinding signature technology in the (northern) summer browser release ("Longhorn"). That is, your IE will be capable of signing for you when you visit your bank.

    Now, anyone who's followed the travails and architectural twists and turns of the Ricardian contract - with its very complete and proven signature concepts - will appreciate that this is a hard problem. You don't just grab a cert, open a document, slap a sig on it and send it off. Doing any sort of affirming signature - one where the user or company is taking on a committment or a contract - is a serious multi-disciplinary undertaking that really challenges our FC neurons to the full. Add that to Microsoft's penchant for throwing any old tech into a box, putting shiny paint on it and calling it innovation, and I fear the worst.

    We shall see. Secondly, buried in another area (discipline?) totally, there is yet another set of rumours in interesting counterpoint. It appears that Microsoft is under the bright lights of the Attornies General of the US of A over spyware, malware, and matters general in security. (Maybe phishing, I wasn't able to tie that one down.) And this time, they have the goods - it appears that not only is Microsoft shipping insecure software, which we all knew anyway, but they are deliberately leaving back doors in for future marketing purposes, and have been caught in the act.

    Well, you know how these rumours are - everyone loves to poke fun at big guy. So probably best to write this lot down as scurrillous and woefully off the mark. Or I hope so. I fail to see how Microsoft are ever going to win back the confidence of the public if they ship signing tech with an OS full of backdoors. What do we want to sign today?

    Addendum: El Reg pointed at this amusing blog where Microsoft easily forgets what platforms out there are being hacked.

    Posted by iang at 06:59 PM | Comments (1) | TrackBack

    April 08, 2005

    KPMG warned browser manufacturers in 2002

    A PR by comodo points at an old KPMG document that discusses the risks that the unstable CA market is presenting to users, and by proxy browser manufacturers. The document itself assumes 19th century industrial policy in its support of lots of important committees and standards setting organisations running around and setting the rules; notwithstanding that, it does accept the basic fact that this will not be and is not a stable economic structure.

    The arisal of cheap-and-cheerful certs for low budget sites back in 2002 caused KPMG to realise that there is no way for the browser to show one CA's quality against that of another. Here are some of the quotes that lay down the risks that browser manufacturers have to deal with:

    "CAs generally provide different types or classes of digital certificates that have different levels if trustworthiness depending on a variety of factors, including the level of subscriber authentication performed prior to issuance. Relying parties must independently ascertain the sufficiency of these authentication procedures and the appropriateness of reliance on a given type or class of digital certification for a given application or transaction."

    "One of the core assumptions of PKI implementations is that relying parties (i.e., Internet users) are expected to assess the appropriateness of a particular type or class of certificate relative to its intended use."

    "It is incumbent on CAs and other technology providers (I.e., browser providers) to provide user-friendly automated mechanisms for users to determine whether or not they should rely on a specific certificate."

    "Browser providers should implement technical mechanisms that enable Internet users to make informed decisions regarding the trustworthiness of a particular certificate that chains to a trusted root."

    Browser manufacturers need to work on this. I don't see much activity since 2002 when the report was written (Comodo points at Opera and TrustBar, and also Firefox have implemented a yellow URL bar and domain name on the status bar). They should also have a look at Appendix D "what does an SSL certificate mean?" and ask their lawyers to compare and contrast those meanings with the development of phishing.

    (I'd add it here, but the PDF doesn't permit cut&paste and I had to type the above in by hand. Scary warnings were never meant to be free...)

    Posted by iang at 06:57 PM | Comments (2) | TrackBack

    April 07, 2005

    The Next Corporate Liability Wave?

    Your phone rings. It's Special Agent Bert Ranta. The FBI is investigating a crime ring involved in widespread identity theft. It has led to millions of dollars of credit card and loan losses for lenders, and havoc in the lives of the 10,000 victims. By identifying links between the victims, the FBI has discovered where the personal data appear to have come from: your company. The victims are some of your customers.

    Identity Theft: The Next Corporate Liability Wave?
    Toby J.F. Bishop and John Warren
    The Corporate Counsellor

    Your mind begins to whirr. Are there other customers affected who haven't been identified yet? Is it a hacker or an inside job? Is your company also a victim here, or could it be on the wrong end of a class action lawsuit?

    You recall reading that each identity theft victim will on average spend $1,495, excluding attorneys' fees, and 600 hours of their time to straighten out the mess, typically over the course of a couple of years. For out-of-pocket costs alone that is, say, $2000 per victim. Multiplying that by 10,000 customer victims equals $20 million. Adding as little as $15 per hour for the victims' time and you get $11,000 per case or $110 million in total even before fines and punitive damages are considered. And that's on top of the potential impact on your company's future sales.

    ...

    http://www.law.com/jsp/cc/pubarticleCC.jsp?id=1112090711870

    Posted by iang at 12:09 PM | Comments (3) | TrackBack

    April 06, 2005

    Lopez v. BoA leads to rising bank FUD, if not clues

    I've written before about how a major milestone in phishing was reached when Lopez sued Bank of America in Florida, USA. If you don't see that, click and read this article. It is maybe not obvious on the outside, but for once, a press journalist has talked to some people in the banking world and discovered something new: Fear.

    Regardless of what a judgement or settlement brings to the actual litigants, dotted-line association with the BofA case will likely cause financial institutions to spend at least some additional money on security to prevent fraud. And since North American banks already spend more than $1 billion per year on such technology, the notion that they're not spending it in the right place or in the right amount raises temperatures. "I just came from Washington, where I was at a meeting of 40 financial institutions, regulators and the government," says Ilieva Ageenko, director of emerging enterprise applications for Wachovia. "We all said there's a press euphoria [about on-line crime] and pretty much all institutions have a very well-defined risk management strategy that allows us to identify fraud."

    Banks are scared of the Lopez case. What does that tell us? It tells us that banks know this is not a frivolous case and furthermore banks don't know what to do about it.

    All the buzz is about 2 factor authentication tokens, but in their hearts, banking people know this isn't the answer to the problem. The reasons are several-fold: one is that they are expensive, and the banks likely will have to foot the bill - one hardware gizmo for every customer. A second reason is that the banks also suspect that the secure tokens being peddled by irresponsible companies are not a real answer to the problem, but are only a short term hack.

    The banks suspect this but the peddlers aren't telling the truth. Security people have known for a long time that these tokens are subject to phishing; all they do is force the phisher to do a dynamic real time phish instead of doing the connection to the bank in their own sweet time.

    Yes, ladies and gentlemen, the secure tokens guarantee that the user and the bank are talking together right now, but they don't guarantee someone isn't in the middle passing packets back and forth and listening happily to traffic! Spoofing - phishing - is a class of attack called man-in-the-middle (MITM) and these tokens .. fall to the MITM. Or will do when the phishers get around to it.

    So what's the solution? FCers know the solution is in bringing the user and her browser back into the security model. Banks know they can't do that (alone), but they also know that at the end of the day, they are going to have to carry the can (also alone). Even if the Lopez case goes against them, all the posturing tells us one more thing: banks know the FDIC or whoever will eventually put the onus on them to solve the problem.

    So who can solve the problem? Who do the poor phishing victims have to sue?

    "Wachovia offers the standard 128-bit encryption and requires on-line customers to have user IDs and passwords."

    Who told you that would secure your customers?


    Some more snippets: Stats suggest that users (now, still) trust online banking more then branch banking. Yet corporate customers would change banks if they could get fraud controls from a new bank (sorry, PDF).

    Posted by iang at 09:09 PM | Comments (2) | TrackBack

    April 03, 2005

    JIE - Contracts in Cyberspace

    Daniel points at the Journal of Interesting Economics, which I hadn't been aware of. It looks like an interesting experiment. There, I found David Friedman's "Contracts in Cyberspace" paper, which describes how contracts might form with anonymous and distanced parties.

    I think I would say that Friedman's paper describes well and comprehensively how people thought it might pan out given the technological mix. Since the heady days of the 90s when anything was possible with a public key and a laptop, we have had at least a little experience in some of these predictions. Here's my shot at what I see we've learnt.

    Firstly, public key cryptography is by far and away the most overrated technical enabler. It has achieved almost none of the things that were predicted, and those that were achieved were mostly done through other means. As a few examples:

    • heterogeneous contracts are formed simply from documents. If you have the document and you have the agreement then you have the contract; the signatures did not need to be digital to achieve the contract.
    • the message digest (or hash) has formed a far more powerful record of intent and control, as a digital signature, than the public key signature in contract formation. I say this based on the experiences of the Ricardian Contract, which even though it includes a public key signature, uses the hash of the contract as glue to bind the entire payment system together (also). It would be 99% as strong without the public key signature, and I personally would have plenty of confidence in running it without public key signatures as long as the hash was there - but it isn't worth the discussion to take out the public key signatures.
    • where public key signatures make a difference is in access and routine transactions (homogeneous or fungible contracts). Obviously we use them heavily in payments, and there is no way known that we could ditch them in that arena; using just hash signatures would expose the payment system to insider fraud and outsider theft.

    Having said all that, I think the public key metaphor will remain strong, and there is no need to stop using it. Practitioners and builders however want to be aware that the limits of public keys come much sooner than anyone really predicted a decade ago.

    Secondly, reputation systems have not really worked as well as people thought, IMHO. Yes, I know about eBay, but simply the record of the number of transactions has been the biggest enabler there, as because the reputation system is so intrusive on the formation of new contracts, each additional entry has been limited to a race to the top: "absolutely divine experience!!" is almost the only thing that one is likely to write.

    Other systems I have seen have suffered similar artifacts. In contrast,within the digital gold market, reputation has arisen and exists through a complex entanglement of information. Newlists, personal contacts, blogs like this one, and websites like the Craig's fee plot page have all contributed more to reputation in real markets like the digital gold market than any formal notion of collecting numbers and trying to present a reputation-in-a-digit.

    Thirdly, dispute resolution: Friedman points to the possibilities of arbitration, as being admittedly attractive on paper. Having been through one, and having seen groups struggle to set up arbitration, I'd have to say it is a slow process. Stating it doesn't seem to obviate a slow painful evolutionary process towards it.

    It may well be that arbitration will arise, but I don't see much support for that claim. Or indeed for the contrary, that it won't arise .. I feel the jury is simply out on that point.

    In the forums I've seen (again, mostly the digital gold field) it hasn't. Most disputes went either to court (including ones with complex cross-border jurisdictional problems), or were not settled at all. Indeed, those that shouted about arbitration the loudest seemed also to be those that ran fastest into court.

    Having said all that; I would say that David Friedman's paper is a good starting point. Experience points in different directions, but one can also say that it is early days yet, and I wouldn't want to commit to any of the above comments in an academic forum - we simply lack enough data to be able to be firm on where and how contracts will go in the future.

    Posted by iang at 09:49 AM | Comments (6) | TrackBack

    April 01, 2005

    Odd things going on at ICANN

    You'll already have seen the recent stories about the .net contract going back to VeriSign. The decision was made on the technical capabilities report, with the report being accepted without discussion, without input from the stakeholder public, and more disturbingly, only consultation with DNS experts, no input. (See ICANNWatch.)

    Addendum: from the report, Eric claims it was a tie and Verisign was chosen arbitrarily from the two leaders.

    It seems that ICANN does not consider overall governance issues as important in its decisions on domain renewals, as mooted in comments by ICANNWatch's Michael Froomkin.

    Further, one of the "losers", Denic, was apparently knocked out on a false claim that it has an in-house built database! That's a sad bad decision if true, and I speak as someone who builds in-house, own built databases for the most sensitive of tasks - because they are the most sensitive of tasks!

    Back over on ICANNWatch, they announced that the ITU is merging with ICANN and that WIPO lost its domain to a baby wipe company. That's about par for the course...

    In other news, two new TLDs have been launched as .travel and .jobs, and ICANN does consider itself in a position to
    charge a tax of $2 per domain. The .net contract is being re-negotiated with a 75 cents tax.

    Posted by iang at 01:47 PM | Comments (3) | TrackBack

    AIG scandal - when it's ok for a company to commit a crime

    An article "A top insurance company as the new Enron?" describes the post-Enron thinking in the world of biggest scandals. As the AIG scandal develops, the shift is away from the company and towards the individuals. Considered alongside Sarbanes-Oxley, this signals more emasculation of the shareholder rights and responsibilities - now it's ok for a company to commit crimes as long as a) it is to big to fail and b) the fall guys are easy to identify.

    A top insurance company as the new Enron?

    An accounting probe at AIG worries Wall Street, and involves some of America's richest men.

    By Ron Scherer | Staff writer of The Christian Science Monitor
    NEW YORK – American business is facing yet another major scandal involving more accounting shenanigans.

    But, this scandal has the potential to cause tsunami-sized damage: It involves a highly respected insurance company, American International Group (AIG) - which is part of the Dow Jones Industrial Average - which has now admitted to $1.7 billion in improper accounting. And, it has enveloped some legends in the financial arena: Maurice "Hank" Greenberg, forced out as chairman of AIG, and Warren Buffet, the Omaha stock market guru, who will be questioned about his possible involvement.

    Because AIG is so massive and important to the financial world, regulators will have to tread carefully. The company's main business is providing reinsurance, that is, it insures insurance companies. This helps the industry to spread its risk among many large and financially sound companies so a single event does not become a financial disaster for one company.

    Also, because of AIG's huge size, lawyers don't think the government will bring a criminal charge against the company as it did for Arthur Andersen, Enron's accountant. The criminal charge was a death sentence for the accountant.

    "There is an increased reluctance to bring criminal charges that ultimately have the effect of killing a company that otherwise employs a lot of innocent people and has lots of value to it," says Michael Gass, an expert on SEC enforcement at Palmer & Dodge, a Boston law firm. "Instead, there is an increased focus on the individuals responsible."

    Past lessons

    If the past is any indication of the future, the government will work its way up the food chain at the company. A host of executives, including the chief financial officer, have already resigned or been forced out. The government will try to pressure them to provide evidence against higher officials, particularly Mr. Greenberg.

    "I would be shocked if nothing criminal comes out of this," says Mr. Gass. "The concept that there is a $1.7 billion fraud on the stock holders and not a criminal action is ridiculous."

    Global investigation

    The investigation is likely to also expand overseas. AIG has operations offshore, particularly in Bermuda where it has used a company to provide financial rewards for its executives. "It's common for insurance companies to use offshore companies and not be public about it," says Gass. "There is nothing illegal about it unless there is misuse."

    So far, it's expected Mr. Buffet will be questioned as a possible witness, not necessarily a target. Buffet is chairman of a company called Berkshire Hathaway, which owns a company called General Re, which provides reinsurance. It agreed to a $500 million AIG deal that is now under scrutiny. Investigators are now trying to determine what Buffet knew and when he knew it.

    "With the icon of integrity and master of morality even mentioned with AIG causes some people to ask, 'Is everyone now suspect?'" asks Sam Stovall, chief investment strategist at Standard & Poor's in New York.

    The scandal links two of the world's richest men. According to Forbes Magazine, Buffet is the world's second-richest person with assets of $41 billion. Greenberg is ranked 132 in the world and 59th in the US with assets of $3.1 billion. Recently, two of Greenberg's sons, both executives in the insurance business, have also been tarnished by scandal.

    Washington connections

    Greenberg is well-known in Washington where he known for raising large amounts of money. Greenberg was one of the President Bush's "Rangers" which means he personally raked in more than $200,000 for the reelection campaign. At the same time, he is also known for his access to members of the cabinet and Congress. This access has paid-off as the administration has often supported Greenberg on a number of issues ranging from access to China to terrorism insurance.

    However, Gass says the company's influence is not likely to extend to the investigation. "No one would take the political risk of terminating a criminal investigation assuming they have the power," he says.

    Greenberg and AIG have further expanded their reach through the use of the $5 billion Starr Foundation, named after the founder of the company Cornelius Vander Starr. It supports influential groups such as the Council on Foreign Relations and the National Chamber Foundation, associated with the US Chamber of Commerce.

    Before its legal troubles, AIG had begun an advertising campaign to become more well-known to Americans. Its most recent logo is "We know money." And, it brags it is the financial organization to choose for your "great-great-great-great-great grandchild." Now, lawyers expect it is likely to be fighting class-action lawsuits and irate regulators as it battles to survive.

    Posted by iang at 09:36 AM | Comments (1) | TrackBack

    March 24, 2005

    (SEC orders that) Mutual Funds Reveal Clients' Data on Web

    In a classic case of unintended consequences, mutual funds companies are now revealing their shareholdings to the SEC and the world in public filings. Here's the WSJ's article (link to DKGroup and Emergent Chaos):

    Mutual Funds Reveal Clients' Data on Web
    Wall Street Journal

    Lois Hatten, a 60-year-old widow of a truck driver in Otsego, Mich., was astonished to find out recently that her Individual Retirement Account number was posted on the Internet, along with her name, home address and the approximate number of shares she holds in two mutual funds. Even more surprising is who made the disclosure: her mutual-fund firm, Armada Funds.

    In what appears to be a significant privacy breach, some of the nation's leading mutual-fund companies have publicly disclosed similar information about certain of their customers. The postings are readily accessible on a U.S. government Web site, and could leave these individuals vulnerable to identity theft or other crimes.

    "I was pretty shocked," said Ms. Hatten, a retired former grocery-store employee, when told by The Wall Street Journal about the posting. "Nobody should know my business."

    Among other fund companies that have made some customer account numbers publicly available: Pimco, a unit of German insurance giant Allianz AG; the Dreyfus unit of Mellon Financial Corp.; Bank of America Corp.'s Columbia Funds unit; Nuveen Investments; the First American Funds unit of U.S. Bancorp; AmSouth Bancorp's fund unit, and the CNI Charter fund unit of City National Bank of Los Angeles.

    The leaks can be traced, in part, to Securities and Exchange Commission regulations that require fund firms to disclose the name, address and percentage ownership of any owner of more than 5% of a particular class of any mutual fund. The provision is meant to let shareholders know of anybody who might be in position to control or influence the fund.

    full article on DKGroup

    Posted by iang at 01:03 PM | Comments (0) | TrackBack

    March 19, 2005

    Open Governance spotted over at ICANN?

    I checked in to ICANN to see if there was any news on the .net TLD since Adam and I wrote in some comments on conflict of interest, and lo and behold, there is! Not on the results, but on the process. ICANN has engaged Telcordia as an independent advisor to lead a team of DNS experts in evaluating the 5 contenders.

    "Telcordia's Dr. David Sincoskie will lead a team that possesses 270 years of collective industry experience, with particular emphasis in networks, information databases, security and operations. Evaluation team demographics include two IEEE Fellows; a member of the National Academy of Engineering; a multi-cultural/multi-national composition, with nationals of Croatia, Greece, Pakistan, Taiwan, the UK and the US. In addition, 60% of the team possesses PhDs, spanning CS, EE and Economics;"

    Heavy hitting!

    It certainly makes sense to engage an independent team to do this evaluation, especially given the bitchy environment and the underlying challenge to the US Department of Commerce's benevolent dictatorship. This could give new meaning to the process; taking it into an era of open governance.

    Some questions remain - it's not that easy to get scored on open governance. Who are Telcordia, and why are they independent? ICANN is again one step ahead there (are you shocked already?) and has published an "Advisory Regarding Neutrality of Independent Evaluators:"

    "Telcordia Technologies is a wholly-owned subsidiary of Science Applications International Corporation (SAIC). Previously known as Bellcore, on November 17, 1997 SAIC acquired Bellcore and renamed the company Telcordia Technologies."

    Bellcore! Related to the old AT&T Bell Labs? Or the System V guys? Well that should be just the ticket.

    But wait, who are they owned by? SAIC? Now there's a problem. If you had to pick any player who was even more locked into Beltway politics than VeriSign, it would be SAIC. So, notwithstanding that half of the disclosure is full of reasons why SAIC has nothing to do with this deal, that's a matter of concern. On the watch list.

    On balance we are still within the realms of open governance. ICANN have published their disclosure, and the more uncomfortable the disclosure is, the more valuable it becomes. That leaves three open questions:

    • who are the international DNS experts?
    • what will the recommend?
    • will the US Commerce Department interfere if the TLD goes offshore?

    The first question is actually addressed but not answered in their real FAQ on the process.

    Somewhere I saw that the end of March is the time for the report from the advisors. We haven't got long to wait to see if ICANN delivers a copybook case of open governance.

    Posted by iang at 12:49 PM | Comments (3) | TrackBack

    February 26, 2005

    Bank of America to draw heat from ChoicePoint

    ChoicePoint (Roundups from Adam: today, 25th, 24th) is to receive help from Bank of America, which has just revealed that "a small number of computer data tapes were lost during shipment to a backup data center. The missing tapes contained U.S. federal government charge card program customer and account information."

    This might seem like a silly way to run the privacy of a nation, but there is more to this than meets the eye. I've been writing on a draft paper on security, and one relevant observation seems to be that we have to get over this finger pointing, as the incentive for companies like ChoicePoint to hide and fudge their security is driven by the bad exposure, and not by the incentives related directly to the data.

    A paper by Schechter and Smith at FC2003 raised the possibility that if companies openly share their threats and breaches data, they can reduce the overall risk [1]. They show this from the pov of the attacker; who has to see his costs rise because of the reduction in openings.

    Yet, I see their suggestion as more in terms of game theory or prisoner's dilemma results, as to stand up and reveal weaknesses raises the possibility of punishment. The industry as a whole has no great understanding of the risks and threats, and the major cost they have to deal with is adverse exposure. Hence, finger pointing becomes the norm, and avoiding the blame becomes the commercial imperitive. (I develop this much more in the paper.)

    In order to share the information, and raise the knowledge of what's important and what's not, we may have to get over the finger pointing. That may mean we have to go through several ChoicePoints, if only so that it can become routine and not scandalous. Bank of America is thus timely and expected; although I don't think anyone else is likely to see it that way.


    [1] Stuart E. Schechter and Michael D. Smith, "How Much Security is Enough to Stop a Thief?", Financial Cryptography 2003 LNCS Springer-Verlag.

    Posted by iang at 10:41 AM | Comments (3) | TrackBack

    February 25, 2005

    Email no longer reliable

    Ray points to a law case in America where spam blockers knocked out an important notification. This caused the lawyer to miss the court date, and expose the case to sanctions - which would have involved dismissal of the case. My own spam blockers quietly ate the single ticketing notification from an airline recently. Luckily we had a few weeks in which to sort out the mess. If it had been a few days, I would have been grounded!

    This may mark an apogee for email. We all recall those stories about how email was used to achieve some wonderful purpose: re-unite families, serve summons, deliver real signed documents and so forth. Happy days when our net continued to change our world for better.

    Now we'll hear the monster stories of the email that got ate by the spam blockers. Every one of us will have to go through that gut-dropping feeling of experiencing the missed opportunity, the missed deadline, the missed meeting, the lost job. We will learn that email is no longer reliable enough to be the mainstay of communication.

    From a protocol engineering point of view, email is still reliable. But from a (total) systems point of view, there are now often several spam blockers competing to see which can do the most damage to the onslaught of enemy spam. We are now happy to break the reliability built into email if we can reduce our spam load. In statistics terms, we are happy to accept a few false negatives; My own thunderbird is zotting about 70% of spam, and for the price of cleaning out the rest, I can read the maybe 10 emails collected overnight.

    How we respond in the total systems sense is two-fold: firstly, we go back to the old method of layering a reliable protocol over email. That means, when the important email is sent, it is followed by a phone call. "Did you get the email?" won't sound so stupid anymore. Secondly, we go back to the old technique of using multiple means of communication. Strength in diversity, and well equiped netizens now run several different instant messaging clients concurrently.

    As I've written elsewhere, email's achilles heel is its ubiquity and standardisation. We are entering a phase of the Internet where both lose their appeal, and again, the human enters the loop as the ultimate layer of reliability.

    Posted by iang at 08:36 AM | Comments (2) | TrackBack

    February 19, 2005

    Choicepoint - "largest database on earth can't say what happened"

    Gary North lashes out with some choice snippets: "According to ChoicePoint, there was no announcement because law authorities prohibited it." OK, so maybe they wanted to set up a sting. They're the good guys, and they're in control, right?

    Well, Gary goes on to say: "Here is what is arguably the largest data base company on earth. It can't say what has or has not been breached. It is now four months after the breach took place."

    Lots of other fun stuff. It's a bit early to tell - Gary also grumbled oddly that there has been no coverage - but this has the potential of becoming a major forest fire. Right now, the brush is burning brightly, the critters are restless, and the trees are shivering in anticipation.

    Posted by iang at 02:18 PM | Comments (2) | TrackBack

    February 18, 2005

    Choicepoint - full blown scandal?

    Maybe it was the RSA security conference, but the Choicepoint heist seems to have touched a nerve. Adam pointed here, where it says that " investigators notified the company of the breach in October, but ChoicePoint did not send out the consumer warnings until last week." And now, someone sent me the below, apparently sent out on Reuters (no URL).

    SAN FRANCISCO The ChoicePoint data theft case is shaping up to be a full-blown scandal with as many as a half million people nationwide potentially vulnerable to identity theft. Earlier this week word emerged that scammers had illegally obtained detailed files on 35-thousand Californians by posing as legitimate customers of ChoicePoint.

    Now attorneys general from 19 states demanded that ChoicePoint warn any victims in their states as well.

    And security experts are calling for more federal oversight of a lightly regulated industry that gathers and sells personal data about nearly every adult American.

    The Georgia-based company maintains databases that hold 19 billion pieces of information, including Social Security numbers, credit and medical histories and motor vehicle registrations.

    Gee, if the AGs get that demand, it'll save them the cost of passing a law!

    Addendum: Gary North commented.

    Posted by iang at 10:37 PM | Comments (0) | TrackBack

    February 17, 2005

    Massive data heist at Choicepoint exposes soft underbelly

    Ever since California passed its law on notification of data loss to citizens, we've wondered what happens when the data covers other states as well? Now we know. Choicepoint, one of the larger players in the data conglomerates market, has sent out notifications to "as many as 35,000 Californians," but admits that "the number of victims nationwide could total 100,000". Those victims haven't been notified. (Worse, Adam points at reports of the LA police speculating on 400,000.)

    It appears that 50 accounts were set up by the crooks, as valid purchasers of information. That's not hacking, that's commerce! As Alan Wheeler says, "this isn't a traditional break-in and steal. Crooks set up valid companies and used the standard commercial interface to buy the information. If you aren't in the business of selling the information; you aren't vulnerable to selling information to less savoury characters." My emphasis. Anybody who doubts the industrial nature of today's threat model, please contact me as I have a splendid opportunity on a bridge.

    The real issues here are a) inside attacks are as serious or more serious than hacker attacks, b) like Sutton, the crooks will rob Choicepoint because "that's where the data is" so c) worrying about certificate issues is like trying not to spill ones drink in a torrential downpour, and d) it's going to get worse. The guy from Sun was right, Americans have no privacy, and they may as well get used to it.

    The good news is that this means that phishing is defeatable. We only need to put in some basic defences (like TrustBar) and we'll shift across the major points of attack to the insiders and the financial info warehouses. Hmm... that would be good news in a strictly relative sense, in that at least we, the net, can cover our patch.

    Posted by iang at 02:43 PM | Comments (3) | TrackBack

    February 16, 2005

    Designing Risk Transfer Instruments for Internet Risk

    John Quarterman, who runs an extreme risks blog, is talking at the RSA conference on Designing Risk Transfer Instruments for Internet Risk.

    His co-panelists are Robert Parisi, Steve Schoenberger. Good to see that risk is returning to the net.

    "When IT can't fix an Internet security problem, business losses occur. The traditional solution in other industries risk transfer via financial instruments like insurance. This session will explore how policies, assessments, sales and claims adjustment require quantification of anomalies. It will also explore why increased security requires reduction of moral hazard and adverse selection. "

    Slides

    Posted by iang at 08:47 PM | Comments (0) | TrackBack

    February 15, 2005

    Plans for Scams

    Gervase Markham has written "a plan for scams," a series of steps for different module owners to start defending. First up, the browser, and the list will be fairly agreeable to FCers: Make everything SSL, create a history of access by SSL, notify when on a new site! I like the addition of a heuristics bar (note that Thunderbird already does this).

    Meanwhile, Mozilla Foundation has decided to pull IDNs - the international domain names that were victimised by the Shmoo exploit. How they reached this decision wasn't clear, as it was taken on insider's lists, and minutes aren't released (I was informed). But Gervase announced the decision on his blog and the security group, and the responses ran hot.

    I don't care about IDNs - that's just me - but apparently some do. Axel points to Paul Hoffman, an author of IDN, who pointed out how he had IDN spoofing solutions with balance. Like him, I'm more interested in the process, and I'm also thinking of the big security risks to come and also the meta-risks. IDN is a storm in a teacup, as it is no real risk beyond what we already have (and no, the digits 0,1 in domains have not been turned off).

    Referring this back to Frank Hecker's essay on the foundation of a disclosure policy does not help, because the disclosure was already done in this case. But at the end he talks about how disclosure arguments fell into three classes:

  • Literacy: “What are the words?”
  • Numeracy: “What are the numbers?”
  • Ecolacy: “And then what?”
  • "To that end [Frank suggests] to those studying the “economics of disclosure” that we also have to study the “politics of disclosure” and the “ecology of disclosure” as well."

    Food for thought! On a final note, a new development has occurred in certs: a CA in Europe has issued certs with the critical bit set. What this means is that without the code (nominally) to deal with the cert, it is meant to be rejected. And Mozilla's crypto module follows the letter of the RFC in this.

    IE and Opera do not it seems (see #17 in bugzilla), and I'd have to say, they have good arguments for rejecting the RFC and not the cert. Too long to go into tonight, but think of the crit ("critical bit") as an option on a future attack. Also, think of the game play that can go on. We shall see, and coincidentally, this leads straight back into phishing because it is asking the browser to ... display stuff about the cert to the user!

    What stuff? In this case, the value of the liability in Euros. Now, you can't get more FC than that - it drags in about 6 layers of our stack, which leaves me with a real problem allocating a category to this post!

    Posted by iang at 10:05 PM | Comments (0) | TrackBack

    February 12, 2005

    Reg SHO Threshold Securities get Listed in Open Governance site

    In another win for open governance, Nasdaq Trader has listed all the stocks that it found has breached the "failed to deliver" limits of the SEC. How embarrassing! Which is the exact point - just how many of the trades that are floating around out there are for real? And how close to the mark is the massive Stockgate allegation that DTCC - the repository - was engaged in lending out shares that didn't exist, while pocketing a cool billion $$ a year for its trouble?

    (No URL for this story, but it seems to have come from FinancialWire)

    Stockgate: NASDAQ NM Threshold Securities Listed But Hundreds 'Missing In
    Action'

    (financialwire.net via COMTEX) -- February 7, 2005 (FinancialWire) Nanogen
    (NGEN), Netease.com (NTES), Overstock.com (OSTK) and On Track Innovations
    (OTIV) are among some 67 NASDAQ National Market companies identified on a
    recent NASDAQ "Threshold Security List" mandated by U.S. Securities and
    Exchange Commission Regulation SHO.

    The list, at http://www.nasdaqtrader.com/aspx/regsho.aspx , purportedly
    lists all those companies, for which over a period of five consecutive
    settlement days, there are aggregate "fails to deliver" at a registered
    clearing agency of 10,000 shares or more, and the levels of fails is equal
    to at least 1/2 of 1% of the issuer's total shares outstanding. The site
    has recently begun listing additional securities under separate
    spreadsheets, further confusing the true numbers.

    The list, which is the latest in the ever-widening Stockgate scandal, has
    created some controversy, with hundreds of stock symbols disappearing
    since the initial posting in mid-January, 2005, and with many detractors
    claiming the list is barely the tip of the iceberg, missing hundreds of
    companies that have been subjected to alleged naked short selling, as well
    as not consistent with a paper, "Strategic Delivery Failures in U.S.
    Equity Markets" published under the aegis of the SEC.

    The referenced working paper by University of New Mexico Professor Leslie
    Boni was initiated while the author was visiting financial economist at
    the SEC.

    She termed the "failures to deliver," which litigants have called
    "counterfeiting," as being "pervasive."

    The professor said that a whopping 42% of listed stocks at the New York
    Stock Exchange, NASDAQ and AMEX, and 47% of unlisted stocks in the OTCBB
    and Pink Sheets had persistent fails of 5 days or more with 4% being above
    the SEC's threshold limits for failures.

    The economist pointed to a study conducted by Evans, Geczy, Musto, and
    Reed in 2003 that provided evidence that while the SRO's have buy-in
    requirements, such buy-ins almost never occur. She noted that an audit of
    one market maker showed that all or a portion of shares in 69,063
    transactions during 1998-1999 were "fails to deliver."

    "The market maker was bought-in on only 86 of these positions," she stated.

    Yet NASDAQ (NDAQ) was recently listing only 123 companies on the NASDAQ,
    OTCBB and Pink Sheets, which together comprise the overwhelming bulk of
    public companies traded in the U.S. The list changes to some degree each
    day.

    The original list had identified 520 securities, including the stocks of
    57 recent PIPE issuers, according to The PIPES Report, in an article
    headlined "SHO What?." That list had 379 traded on the NASDAQ, Bulletin
    Board and Pink Sheet markets, 68 on the AMEX and 73 traded on the NYSE.

    The report quoted Merrill Lynch (MER) global equity trading specialist
    Mary Ann Bartels of suggesting "increased volatility" and "extended
    rallies" in small and mid cap stocks could result, Rhodes Analytics
    highlighted 33 NYSE and 63 NASDAQ "dangerous shorts" which analyst Bill
    Rhodes believed are "vulnerable to squeezes which could last through the
    middle of February, when the initial phase of Reg SHO-mandated buy-ins of
    threshold stocks are expected to peak?"

    But a funny thing happened. The 379 NASDAQ threshold stocks included only
    24 bulletin board stocks, along with 56 NASDAQ-traded stocks and a
    whopping 254 Pink Sheet quoted stocks, which the Dow Jones (DJ) Newswires
    was quoted as saying happened to be "every fully-reporting company traded
    on the Pink Sheets."

    Professor Boni's report showed that "during three random market days
    inlate 2003 and early 2004 that almost 60% of the stocks on the Bulletin
    Board and Pink Sheets had persistent settlement failures," according to
    The PIPES Report. "Among the 1,790 OTCBB and Pink Sheet stocks with
    failures, the average level of delivery failures equaled 1.56% of
    outstanding shares ' almost three times the level that would trigger
    threshold status under Regulation SHO."

    In a December 13 conference call, Richard Bernstein, Bear Stearns' (NYSE
    BSC) senior managing director of operations, told the firm's brokers that
    almost 800 OTCBB and Pink Sheet securities would exceed threshold levels.

    Although every single reporting Pink Sheet stock was listed, the list
    included less than 1% of the 3,200 Bulletin Board companies. And several
    de-registered companies with no trading activity were also inexplicably
    included.

    I don't really think the list is complete," Jeffrey Meyerson, vice
    president at Crown Financial was quoted as saying. "I don't think they got
    everything done in time for the deadline."

    For an explanation, an SEC spokesperson told The PIPES Report to check
    with NASDAQ, and NASDAQ pushed off queries to the NASD, who just didn't
    respond."

    An even bigger surprise than the lack of suspect companies on the list,
    however, was the sudden disappearance of 270 stocks in one day, including
    all but one on the Pink Sheets and all but nine now on the OTCBB, which,
    according to The PIPES Report, suggests "that a settlement crisis several
    years in the making, affecting the most under-regulated and least
    compliant sector of the public equity markets, had been resolved in less
    than a week without executing a single mandatory buy-in."

    General Electric's (GE) NBC Dateline, which is purportedly preparing a
    major expose of the Depository Trust and Clearing Corp., and the alleged
    almost $1 billion in "borrowed" ' some say counterfeited" ' certificates
    that have reportedly been lent out above the legal issued shares by
    hundreds of companies, and the Christian, Smith, Wukoson and Jewell, and
    OQuinn, Laminack and Pirtle legal challenges being filed for dozens of
    such companies, is also reportedly looking into the threshold securities
    that can only be described as "missing in action."

    In an appearance now archived on StreetSignals
    (http://www.streetsignals.com), Christian/O'Quinn legal expert C. Austin
    (Bud) Burrell, said that the firms have filed some 15 actions, including
    key formative lawsuits for Sedona Corp. (SDNA), NanoPierce Technologies
    (NPCT), Datascension Inc. (DSEN), Eagle Tech Communications (EATC) and
    Hyperdynamics (HYPD).

    Burrell said the lawsuits allege a vast conspiracy to manipulate all
    stocks, and "provide substantive proof of manipulation." He said that the
    suits allege 7,500 companies have been bankrupted since November, 2000, by
    illegal naked shortselling and conspiratorial manipulations, resulting in
    a loss of $17 trillion in market cap, "greater than all the losses in the
    1929 market crash."

    He said that shares are electronically counterfeited by the stock borrow
    program which the Depository Trust and Clearing Corp., owned by the New
    York Stock Exchange and the NASD, acquired in its purchase of National
    Stock Clearance, and then misused its "stock borrow program" to create,
    through its "nominal ownership provisions," a no-limit "and illegal"
    hypothecation system that results in revenues of almost $1 billion
    annually.

    He said naked short sales were outlawed by Sections 5 and 6 of the 33
    Securities Act, due to their contribution to the '29 Wall Street Crash,
    which was followed by ten years of depression.

    Burrell told the StreetSignals audience that the DTC "nominally owns $22
    trillion in stocks and bonds." He said it even lends out certificates
    acquired via ERISA and retirement accounts that are "not eligible" for
    such lending, and is a violation of Federal Reserve margin rules.

    He said the failures of oversight by the SEC and the Congress in this
    matter are massive, and continue to contribute to overseas money
    laundering, organized crime, and financing of terrorism.

    The threshold list as present constituted is both "unexplained and
    unexplainable," added Burrell. He alleged that "the SEC instructed the
    NASD to remove Pink Sheet stocks from the list," and criticized them for
    their lack of transparency or explanation.

    For up-to-the-minute news, features and links click on
    http://www.financialwire.net

    FinancialWire is an independent, proprietary news service of Investrend
    Information, a division of Investrend Communications, Inc. It is not a
    press release service and receives no compensation for its news or
    opinions. Other divisions of Investrend, however, provide shareholder
    empowerment platforms such as forums, independent research and webcasting.
    For more information or to receive the FirstAlert daily summary of news,
    commentary, research reports, webcasts, events and conference calls, click
    on http://www.investrend.com/contact.asp

    Listen to StreetSignals" (Investrend "ON-THE-AIR") "live" Saturdays from 9
    p.m. to 10 p.m. on Business TalkRadio Network stations coast-to-coast, or
    right now on the web at http://www.StreetSignals.com

    The FinancialWire NewsFeed is now available in multiple formats to your
    site or desktop, free. Click on:
    http://www.investrend.com/XmlFeeds?level=268


    http://www.financialwire.net

    (C) 2005 financialwire.net, Inc. All rights reserved.

    Posted by iang at 10:29 AM | Comments (0) | TrackBack

    February 11, 2005

    US approves National Identity Card

    Yesterday, the US house of Representatives approved the National Identity card.

    This was first created in December 2004's Intelligence bill, loosely called the Patriot II act because it snuck in provisions like this without the Representatives knowing it. The deal is basically a no-option offer to the states: either you issue all your state citizens with nationally approved cards, or all federal employees are instructed to reject access. As 'public' transport (including flying) falls under federal rules now, that means ... no travel, so it's a pretty big stick.

    If this doesn't collapse, then America has a national identity card. That means that Australia, Canada and the UK will follow suit. Other OECD countries - those in the Napoleonic code areas - already have them, and poorer countries will follow if and when they can afford them.

    This means that financial cryptography applications need to start assuming the existence of these things. How this changes the makeup of financial cryptography and financial applications is quite complex, especially in the Rights and Governance layers. Some good, some bad, but it all requires thought.

    http://tinyurl.com/4futv

    Posted by iang at 09:54 AM | Comments (5) | TrackBack

    February 10, 2005

    First case of a digital signature repudiation?

    Dan Kaminsky spotted this apparent repudiation of a "non-repudiable" digital signature. Even more interesting, it was over a Sarbanes-Oxley filing and certification, leading to the question of why the SEC thought it was OK for Penthouse founder Guccione to file a digitally signed document, and then claim his secretary did it? Is this like a get-out-of-trouble card for a Sarbanes-Oxley filing, or are we going to see digsig-fine-inflation until people stop using them?

    Here's the article. You'll have to go to the site yourself to get the pictures. I'll put the URL at the end, just to make sure.

    Penthouse's Guccione Settles with SEC

    A $1 million dollar accounting problem caused big trouble for the former chief of the bare-all magazine.

    Stephen Taub, CFO.com January 26, 2005

    The Securities and Exchange Commission settled charges against Penthouse magazine's founder, Robert Guccione, who, without admitting or denying guilt, consented to the SEC's findings. The charge was filed against Penthouse, now known as PHSL Worldwide Inc., in the U.S. District Court for the Southern District of New York.

    The commission also charged Penthouse International Inc. and two individuals formerly associated with the company with accounting fraud, reporting violations, and violations of the Sarbanes-Oxley Act certification rules.

    According to the SEC’s complaint, in the quarter ended March 31, Penthouse improperly included as revenue $1 million received as an up-front payment in connection with a five-year Web site management agreement.

    SEC officials asserted that the payment should not have been recognized in that quarter because the agreement was not actually signed until the following quarter. Further under generally accepted accounting principles, the $1 million payment should have been recognized as deferred revenue and amortized into income over the five-year life of the agreement.

    By including the $1 million payment, Penthouse boosted its reported revenue by about 9 percent, to $12.72 million, and changed a quarterly net loss of $167,000 to a purported net profit of $828,000.

    The SEC also asserts that the company's 10-Q bore an unauthorized electronic signature of Guccione -- who was Penthouse's principal executive officer and principal financial officer at the time. The signature indicated that Guccione had reviewed and signed the filing and the accompanying Sarbanes-Oxley certification. “This representation was false,” the SEC stated in its complaint.

    http://www.cfo.com/article.cfm/3597911/c_3597966?f=home_todayinfinance

    Posted by iang at 11:27 PM | Comments (0) | TrackBack

    February 09, 2005

    As the SarbOx screw tightens, the foreigners pack their bags

    Unlike the open governance we are used to where the approach to internal control is market driven and flexible, the US regulatory scene is coming under the thumb of increasing procedural controls - some of them no doubt useful, but all of them expensive. The foreign listed companies are looking at this and saying "it's not worth it."

    This article seems to cover both sides very well. So far, few have managed to leave. Maybe they won't. But it does rather look as though it isn't worth their effort to be listed on the US stock exchanges, especially as the institutional money is now quite happy to follow them to Europe. Maybe that's a trend for the future - the money will follow where the good opportunities are, rather than stay safe and warm tucked up in the home exchange.


    Goodbye, Farewell,
    Auf Wiedersehen, Adieu . . .

    By DANIEL EPSTEIN
    February 9, 2005; Page A10

    LONDON -- It's tough being a U.S. securities lawyer in Europe these days. Our hottest-selling product might just put us out of business.

    Talk to any European company with a U.S. listing right now and the discussion will soon turn to deregistration -- that is, the termination of U.S. reporting obligations and escape from corporate governance and related requirements under the Sarbanes-Oxley Act. There is unprecedented interest in this subject among European corporations, and perhaps a new sense of momentum. Currently four U.K. companies -- ITV, mmO2, Premier Farnell, and United Business Media -- are taking active steps toward deregistration, and numerous others here and on the Continent have signaled their eagerness to deregister if they can find a way to do so. Indeed, on Monday, ITV shareholders voted overwhelmingly in favor of plans to cash out unwanted U.S. shareholders as a prelude to deregistering.

    The rush to delist and deregister is, in the first instance, about money: Being a U.S. reporting company is about to get a whole lot more expensive. This is because of Section 404 of the Sarbanes-Oxley Act, which requires reporting companies to produce a detailed assessment of their internal control regime, together with an auditors' attestation report on that assessment. For non-U.S. companies, this requirement is currently due to come into force for financial years ending after July 15, 2005. The Section 404 attestation report looks to be phenomenally costly. ITV, for example, has claimed that if it succeeds in deregistering it will save £4 million this year and £3 million annually thereafter. A significant chunk of this can be traced to Section 404 compliance.

    * * *

    Sarbanes-Oxley has clearly focused the minds of Europeans. Properly speaking, the deregistration rush began last February, when a coalition of European industry groups asked the U.S. Securities and Exchange Commission to change its rules in this area. Since then a well-coordinated campaign has seen a succession of European companies and commentators hammer home the point that the U.S. reporting regime is unreasonably expensive and intrusive, and the rules governing exit from that regime unfairly restrictive.

    This has not been lost on the SEC. In a speech at the London School of Economics on Jan. 25, SEC Chairman William H. Donaldson indicated that the SEC will consider delaying the effective date of the Section 404 internal-control requirements for non-U.S. registrants -- it is now widely expected that they will be deferred beyond the end of 2005 at least. In the same speech, Mr. Donaldson signalled clearly that new SEC rules on deregistration will be forthcoming soon: "We should seek a solution that will preserve investor protections without inappropriately designing the U.S. capital market as one with no exit." His remarks appeared to be aimed at slowing the rush to deregister and persuading non-U.S. registrants to adopt a wait-and-see attitude to their U.S. listings.

    In the end, there is not very much that the SEC can do about the Section 404 requirements. Sarbanes-Oxley is a U.S. federal statute -- the work of the U.S. Congress -- and the SEC lacks authority to exempt non-U.S. companies from its scope.

    Moreover, the hard truth for Mr. Donaldson and other champions of the U.S. capital market is that it is not so much the cost as the absence of any countervailing benefit from continued U.S. listing that is spurring the rush to deregistration among European companies. A U.S. listing of American Depositary Receipts simply does not offer most of these companies anything they really need anymore. Relatively few of them are truly looking to penetrate the U.S. retail market -- it is institutional money that matters, and for the most part U.S. institutional investors now prefer to invest directly in ordinary shares in the U.K. and the euro zone because of their greater liquidity.

    MmO2 has estimated that 7.56% of its shares are held by U.S. residents in the form of London-listed ordinary shares, with only 0.64% held in NYSE-listed ADR form. By the same token, although there are notable exceptions (BT, Nokia), U.S. exchanges account for a small percentage of trading in many European equities. As a result, not only are European companies pushing to get out of the U.S. market, they are staying away in droves -- in all of 2004, there were only six new listings by European companies on the NYSE and Nasdaq.

    There are other potential benefits for non-U.S. companies of being in the U.S. market. A U.S.-listed share or ADR may be a useful acquisition currency for companies targeting acquisition opportunities in the United States. In addition, New York Stock Exchange listing may offer a certain cachet, and submitting to the discipline of U.S. disclosure standards and U.S. GAAP as applied by the tough and savvy folks at the SEC can be one way to win the confidence of investors.

    Mr. Donaldson sounded this theme in his remarks at the LSE, likening America's markets and the regulatory framework that supports them to the U.S. Marine Corps: "an elite -- the best of the best." (Many Europeans would think the comparison between U.S. securities law and the U.S. military all too apt, though they might draw the analogy somewhat differently.) But while this may have real resonance as applied to issuers from developing markets, it appears to cut little ice when the proffered alternative is, say, the discipline of EU disclosure standards and International Financial Reporting Standards as applied by the tough and savvy folks at the U.K. Listing Authority. One of the most telling features of the current deregistration rush has been the apparent indifference with which U.S. institutional investors have received the news that European companies are lining up to exit the U.S. reporting system. For example, according to press reports, ITV's two largest U.S. institutional investors, Fidelity and Artisan, have voiced support for its efforts to deregister. (Importantly, ITV's deregistration plan will leave its large U.S. institutional shareholders undisturbed; mmO2 has indicated it will pursue a similar approach.)

    Of course, it is one thing to talk about deregistering, another to achieve it. Under current SEC rules, the barriers to deregistration are formidable. Generally speaking, a non-U.S. company must be able to certify that it has fewer than 300 U.S. resident holders of its shares and ADRs to deregister. In counting U.S. shareholders, the company must "look through" brokers, banks and other nominees to find out the number of underlying U.S. accounts for which they hold shares. In many cases, active steps will need to be taken to reduce the number of U.S. holders to the necessary level, raising questions as to whether this can be done at acceptable cost and without prompting legal challenges from affected shareholders under home-country corporate or U.S. securities law. Moreover, there are some particular features of the U.K. legal landscape that make it relatively hospitable to efforts to eliminate U.S. shareholders -- things are much more difficult in many Continental jurisdictions. Thus, despite all the tough talk, only a handful of European companies have actually managed to deregister in the past year.

    * * *

    Going forward, the degree to which European companies will be successful in deregistering and exiting the U.S. market is likely to depend critically on the SEC's new rule proposals. The SEC is said to be considering a very significant increase in the threshold level of U.S. holders below which deregistration would be permitted, as well as some entirely new approaches.

    Whatever proposals are made, they will be aimed not at accommodating the demands of European companies to get out, but at persuading issuers in developing markets -- China, Russia, Latin America -- that it is safe to get in. To encourage potential new registrants in these markets to list in the United States, it is essential that there be a reasonable prospect of exiting the U.S. reporting system if their hopes for the development of a U.S. trading market in their securities do not pan out. The SEC appears to recognize this. We U.S. securities lawyers can only wish them well in their endeavors.

    Mr. Epstein is a partner in the London office of Allen & Overy LLP.

    Posted by iang at 08:51 AM | Comments (0) | TrackBack

    February 07, 2005

    1st case against bank for online banking fraud?

    What is believe to be the first suit against a bank for online banking fraud has been launched in Florida. Because of the thorny issues involved, this could become a class action suit, and could establish precendents in the future of who's liable for online banking fraud in the US.

    Posted by iang at 12:09 PM | Comments (0) | TrackBack

    February 06, 2005

    Mozilla nears formal policy on new CAs

    Mozilla Foundation is running a project to develop a policy for adding new Certificate Authorities to FireFox, Thunderbird and the like. This is so that more organisations can sign off on more certificates, so more sites can use SSL and you can be more secure in browsing. Frank Hecker, leading the project, has announced his "near ready" draft, intimating it will be slapped in front of the board any day now.

    It transpires that this whole area is a bit of a mess, with browser manufacturers having inherited a legacy root list from Netscape, and modified it through a series of ad hoc methods that suit no-one. Microsoft - being the 363kg gorilla on the block - hands the whole lot over to a thing called WebTrust, which is a cartel of accountancy firms that audit CAs and charge for the privilege. Perfectly reasonable, and perfectly expensive; it's no wonder there are so few SSL sites in existence.

    Netscape, the original and much missed by some, tried charging the CA to get added to its browser, but frankly that wasn't the answer. The whole practice of offering signed certificates is fraught with legal difficulties, and while the system wasn't under any form of attack, this lack of focus brought up all sorts of crazy notions like trying to make money in this business. Now, with phishing running rampant and certs sadly misdirected against some other enemy, getting out of selling CA additions is a Good Thing (tm). Ask your class action attorney if you are unsure on this point.

    Which confusion and absence of founding in security and rationality Mozilla Foundation recognised, to their credit. The draft policy has evolved into a balanced process requiring an external review of the CA's operating practices. That review could be a WebTrust, some technical equivalent, or an independent review by an agreed expert third party.

    Now in progress for a year, MF has added dozens of new CAs, and is proceeding on a path to add smaller non-commercial CAs like CACert, This is one of a bevy of non-"classical" CAs that use the power of the net to create their relationships network. This is the great white hope for browsing - the chance of unleashing the power of SSL to the small business and small community operators.

    To get there from where they were was quite an achievement and other browser manufacturers would do well to follow suit. Crypto wasn't ever mean to be as difficult as the browser makes it. Go Mozilla!

    Posted by iang at 03:41 PM | Comments (2) | TrackBack

    February 04, 2005

    Musing on the CA debate: ICANN, NTK, Firefox and the devaluation of Trust (tm)!

    The letter to ICANN on Verisign's conflict of interest received several additional ones agreeing, and as yet no demurrals. I'm looking forward to the response, as governance of the net is very important, and it's key that we get this conflict of interest thing before it gets us.

    NTK, which sportingly referred to the antichrist of SSL sites, also pointed at an article Verisign's strategy. This analysis has it aiming to be the infrastructure behind ... well, everything. Can't say I blame them for trying, given the money involved. (Another sighting.)

    Meanwhile, phishing is starting to enter the technical Internet community's open consciousness as 'a problem'. Verisign like everyone else is powerless to protect the market they invented, but there are good debates happening over on the Mozilla crypto group(s) about how to deal with it all. My goal: get Verisign's brand plastered all over Firefox, and then Verisign will make damn sure never to issue a dodgy cert to a phisher.

    Few agree with me, although Amir and Ahmad have pretty much proven the case in their research. Perhaps not so curiously, CAs do agree, and Verisign tried a couple of years ago to ask for this (some press release which I no longer have). All CAs benefit from the branding approach because it allows them to do some marketing in an otherwise dysfunctional market. You can't market what can't be seen and there ain't no point in securing what ain't worth marketing...

    Finally, to round out the recurring flushes of schitzophrenia derived from defending the CA's role as the trust vectors of our Internet, it transpires that our friends at Verisign have dropped the 'Trust' from their site. No longer does the logo say "The Value of Trust (tm)."

    I think this is a good thing, and I'm not referring to the truly horrible HTML. Trust was a term that led people to think that by using a cert (from them, or anyone else) they had secured their trustworthy transactions. No chance! If security was that easy, we'd all be doing it by now, and "out phishing" would mean something else.

    Posted by iang at 02:11 PM | Comments (2) | TrackBack

    February 02, 2005

    VeriSign and Conflicts of Interest

    Adam and I have written to ICANN on the VeriSign conflict of interest. ICANN - the Internet numbers and names authority - are in the throes of awarding the top level domain (TLD) of .net to an operator. Currently VeriSign holds this contract, but we are concerned about their conflict of interest with their NetDiscovery service which facilitates intercepts for law enforcement.

    Effectively, as a certificate authority (CA), they could be asked to issue false certificates in your name and eavesdrop on your communications. (More on this.) All legally of course, as per court order or subpoena, but the issue arises that they are now serving two masters - the company on whom the order is served, and you the user.

    Not only is that a conflict of interest, but it is a complete breach in the spirit of the SSL's signed certificate security architecture. As each CA is meant to be trusted - by you - this means they need to avoid such conflicts.

    Personally, I can't see any way out of this one. Either VeriSign gives up the certificate authority and TLD business, or its NetDiscovery business, or it's the end of any use of the word trust in the trusted third party concept.

    I'd encourage you all to dive over to the ICANN site and file comments. VeriSign runs the domains, and issues half the net's secure certificates. It's also angling to be the net's intercept service. Enough is enough, let's spread these critical governance roles around a bit.

    Posted by iang at 06:15 PM | Comments (3) | TrackBack

    January 31, 2005

    Schneier reports on DHS committee - hope for Open Governance yet

    Even though under NDA, Bruce Schneier reports on on his committee work with DHS' new terrorist / passenger matching system but he "can't give us the details" says Adam. Right. But he's stressed the important points, such as the system being ill conceived, so maybe internal advice can be compatible with open governance.

    Especially, "Money spent on security measures that only work against a particular terrorist tactic, forgetting that terrorists are adaptable, is largely wasted." One can't stress enough that terrorists like fraudsters are actually thinking people who ponder our defences. Which brings me to a terrorism question that I have pondered somewhat and never been fully able to answer. It's a hypothetical question, but those who are afraid of controversy or are sensitive to politics should look away now.

    If you were bin Laden, would you target the airlines in much the same way as last time, or would you target something different? Assume that both targets are equally costly to attack (that is, for all DHS' efforts, doing an airplane hit is just as costly as before)?

    Terrorists / guerillas concentrate on targets of mass morale value. They cannot defeat their enemy on his ground, so they have to sap the will of the people. I think the question swings on whether hitting the same target as last time achieves more angst than switching to another target. What is worse, the feeling that we can't even defend ourselves when we know where they'll attack? Or that they can attack us anywhere, with impunity?

    You can look back now. As I say, it's something I can't quite work out.

    Posted by iang at 09:04 PM | Comments (1) | TrackBack

    January 30, 2005

    CostaGold case Settles - Leaving Ugly Dilemma for Open Governance Issuers

    Over on the CostaGold settlement blog (yep, class action is now done by blog!) there is news that the court has granted final approval for the settlement of the seized funds. This hopefully brings the sorry episode to a close, but the black spot on G&SR and the consequent unanswered questions for the future of the sector remain.

    To briefly summarise the story (I'm being fast and furious with the facts here): Costagold started up as one of the boom games around Y2K that ploughed into e-gold's booming market. Growth in e-gold was 10 times per year, and the sky was no limit. People wanted to play, and they played anything, including what latter came to be seen as obvious Ponzis or Pyramids or variants.

    Costagold amassed a pot of e-gold from these players, and at some point got scared enough to start pulling it out. They sold through G&SR, the joined-at-the-hip exchange provider for e-gold, and that's when things went wrong: As they started exchanging, G&SR seized the e-gold and held it.

    Nominally, it was because, G&SR said, they wanted to identify the owners. Skipping the question marks about all this, G&SR now held this pot, and did ... nothing with it. Eventually, some of the nominal owners found their way out of ignomy and filed a class action suit, using a real law firm. The case wound on as these things do, and just last week a settlement was finally agreed.

    It is pretty clear that Costagold was a scam, a Ponzi, a fraud. It's also pretty clear that G&SR acted impetuously, and ended up in a very difficult position. What were they supposed to do now that they had seized the metal? Return it? Send it back? Find the original owners? Further, everyone knew it was a game all along, including G&SR and e-gold, so if they were going to act, why did they act when the money came into their reach?

    From there, G&SR just made matters worse for themselves. Instead of seeking to resolve the situation, they held on and fobbed off attempts by difficult owners to deal. They made no attempt to unravel the Ponzi, as they had done with the Advance scam a few months before. Further, they moved the gold offshore, into the hands of Bermuda lawyers, and from there, who knows where it went?

    When the class action was awarded in December 2003, instead of standing there as a disinterested party holding on to the monies of others, their actions seemed calculated to delay. G&SR filed to appeal! That was of course knocked back by the Appeals court, but still delays occurred.

    The problem with all this is that even if G&SR were doing the right thing, their actions left a bad taste in the mouth. It's not good enough to simply follow the laws of the land, and play legal games in court. An Issuer also needs to stand up there and be disinterested, and be seen to be disinterested in the monies that the Issuer has under charge.

    Which leaves us with a lesson. And a dilemma: An Issuer of Honour is faced with many challenges, and one of the chief remaining ones is how to deal with Ponzis.

    To be fairly critical to us all, I don't think we as a sector have an answer for the Ponzi as yet.

    We have much to our credit, and I shall list them: We have answers for other frauds. We've got answers for phishing, and insider fraud. Money laundering is covered, same same for terrorism and the other bogeymen. We know how to deal with theft of reserves, for example. We have privacy systems that lead the way.

    But, comprehensively, we do not have a good answer for Ponzis. (I know there are some out there that think that Goldmoney's heavy identity approach kills Ponzis, but the cure is killing the patient as well. It seems that if you trigger their systems, you can be locked out of your own money - trivial amounts, too - for 3 months. Which means it isn't money any more.)

    What the G&SR lesson has taught us is that the Issuer should not seize the funds. Even if they did all the right things, the mud will stick, and this will cost them in credibility. Which, as an Issuer, is surely the most important currency of all.

    Which brings us back to the dilemma of handling the Ponzis. Is this an unanswerable question? Is there a way where we can push real money out on the net, and not have to face the Attack of the Killer Ponzis? Or do we have to simply accept that everyone is an adult, and they have the right to be fools, parted from their money?

    I don't know the answers. But I do feel that this is one big area where the Internet money issuance business is left with an open question, and a challenge for the future.

    Posted by iang at 09:48 AM | Comments (6) | TrackBack

    January 29, 2005

    The Authur Andersen Factor - Riggs Bank

    In the governance section, often seen as squeezed between economics and grass growing in the stakes of dismality, we see an emerging trend to compare everything to Arthur Andersen. Of course, the collapsed audit house was a big (!) data point, one which everyone can agree with. So that makes it special. (Links 1, 2, 3, 4).

    But let's get real. What Arthur Andersen actually did was a) obvious and b) routine. A little bit of pre-emptive shredding? Who in their right minds thinks this is not going on? By what theory of human action or agency theory or what-have-you can we show that auditors will not take the money and do the company's bidding?

    As far as I can tell, what AA was caught for was some minor infraction. No doubt worse was going on under the covers. How can we tell? Because audits are mostly secret. (Read any audit report, and it doesn't really tell you what they did, and is covered by a whole bunch of weasel words.) If they are secret, then there are two possible reasons: one is to hide the information from you, and the other is .. to hide the information from you! Which is to say, they will tell you that it is competitively sensitive, but that's indistinguishable from "didn't do the job."

    Which leaves us with yet another case of lemons. The market doesn't really rely on the audit report, other than its binary existence. The market does its own calculations, and looks to other fraud indicators to see what's what. (When was the last time you saw a company fail, and the auditor knew and warned?)

    Which also brings us to the question of just what one is supposed to do about it. Basel II and Sarbanes-Oxley will add more and more regulation, but will not change the overall governance equation, except for the worst. That's because they make things more complex, and we are already seeing signs that boards are losing their original governance and strategic focus in a frenzy of CYA adjustment.

    They also add costs, so they are 'bads' on two counts. What then is the underlying source of the rot? I believe it to be secrecy. Corporates that practice keeping things secret set themselves up for the rot to spread internally and eventually bring themselves down. The sunlight for secrecy is called disclosure, and if you look at the Enron case, it was disclosure that triggered the event: some member of the public scrutinised the _publically accessible filings_ of the company and realised that the numbers so filed didn't accord with reality.

    In my emerging theory of open governance, anything that is disclosed is good, anything secret is bad. (How this theory stacks up against competitive intelligence is an unanswered question, for the moment!) In this sense, the existence of the SEC, FSA and various million or so filings that they mandate is a good thing. As long as they are public. Any rule that doesn't result in a public filing is a 'bad'.

    Make no mistake, this is not a satisfactory state of affairs - the government has no clue how to mandate useful disclosure. Not because others are smarter, but simple market principles indicate that no one person knows such things. Disclosure is a competitive force, like all other 'goods' and thus an open governance society would encourage differentiation. In my favoured world, one company would decide on an audit, and another would not. Let the market judge.

    (Indeed, in the evolving governance world of the 5PM, those practising it know that it costs a bundle to do it "fully," so the more realistic way is a graduated approach.)

    Which brings us to Riggs Bank. It is looking like the rot was both secrecy borne of age and influence, and also a well known form of banking cancer is lurking within. The reason I say that is mostly intuition, but also, it transpires that Riggs Bank was also a favourite bank of the CIA. What this means is that aside from the normal secrecy infection leading to rot, the bank laboured under huge conflicts of interest. The CIA has a long history of infecting banks and running their own banks, and the result is never pretty, in governance terms (think Nugan-Hand, BCCI, ...).

    Perversely, when the news of the CIA connection broke, Riggs shares rose heavily. This shows the market knows that the punishment will be relatively light, as Riggs now have a get out of jail card. This was already confirmed in the early plea bargain for a single criminal conviction - there is no way a bank would take a cop like that without fighting unless some other deal were done.

    In closing, what can we say? Governance - it's a mess. If there are secrets there, don't expect it to be pretty when the sunlight hits. And don't expect any auditor to have picked up the Riggs situation. That's just naive.

    Posted by iang at 08:37 AM | Comments (1) | TrackBack

    January 28, 2005

    OSGold's bank to be sued - should have used 5PM

    Everyone knew that OSGold was "probably a fraud." Now, writes Declan McCullogh their bank is being sued, and Judge Kaplan has said that the actions of the bank " tend to show conscious disregard or recklessness and give rise to a strong inference of fraudulent intent." The case moves forward, he says, with a headline number of $250 million.

    The reason the gold community knew in advance was a little thing called the 5PM. In the five parties model, we set up a ring of 5 players who all work together to guard the assets. The Issuer (OSGold in this case) issues the instructions, the Co-signatory would sign off on metal going out, the Repository would hold the metal. An internal Manager would deal with the grunt work of moving the bars in and out.

    The fifth party is the User. The owner of the value, she is charged with watching and checking. In order to fill her insatiable appetite for auditing information, the Issuer publishes reports on a frequent basis. By way of example, let us now do our duty as users in the 5PM and have a look at e-gold's Examiner. Today, e-gold claims that there is 1844kg of gold, 4310kg of silver, 12.4kg of Platinum and 12.3kg of Palladium in their vaults.

    Fig 1. Snippet from Examiner: e-gold's reserves

    Tomorrow it will say the same thing, more or less. Yesterday, ditto. That means if these numbers aren't correct, then the Issuer is defrauding the public. It's plain and simple. If that gold and platinum and silver and whatnot is not there in the vaults, and those pages say the metal is there, it's bona fide fraud, open and shut case.

    Fig 2. Snippet from Examiner: e-gold's statement

    This Issuer has gone out and put his word on the line. The reason we knew that OSGold was a probably fraudulent was because OSGold never ever said anything about their reserves. Nothing one could pin down, at least. OSGold did not put their honour, their livelihood and their good name on the line. It was therefore ... worthless.

    Goldmoney go one better and one worse than e-gold. Their report shows information quarterly only which in this business is enough time to do serious damage. But they do arrange for the reports from the repository itself to be issued, which is much more credible than e-gold's claims-by-self.

    I apologise for the PDF and the size of the snippet below, but again, I urge you to do your 5PM duty and check out that document. The debate rumbles on as to whether the claims of independent parties and the issuer are better or worse. My answer is simple: give me both. Because I want to lock you down both ways in case of fraud.

    In OSGold's case, there was no locking down to be done, and the metal probably never existed anyway. If the bank concerned was just plain duped, then I'll bet they'll rue they day they didn't pay attention to the 5PM.

    Fig 3. Snippet from Repository's bar report for Goldmoney

    Posted by iang at 09:29 AM | Comments (4) | TrackBack

    January 21, 2005

    Electronic Contracting (WEC '05)

    WEC '05 has announced their call for papers. You have until 28th Feb to get your submissions to them. The workshop itself is 18th July, in Munich.

    This new workshop looks at contracts on the net, and my paper on The Ricardian Contract was presented at the San Diego event last year (presentation actually given by Mark Miller!). The keynote was given by Nick Szabo, the inventor of the smart contracts concept.

    The idea of doing contracts over the net has always been there. People expected it to take off and sweep the world in the mid 90s, like every other thing. Yet very little has occurred, and my own experiences with the Ricardian Contract remained for a decade about as far forward as we had got with practical digitally signed contracts. (Recently, it seems that Estonia's national smart card system has been used for contractual negotiations, so it's a bit of a competition now.)

    I have a new perspective on why this and other things didn't take off. I'm writing it up in a paper form, but I doubt it will be ready for this conference (maybe for the one Adam just posted on). In a nutshell, the reason contracting remains a pipe dream is because we haven't got the infrastructure in place as yet. What precisely that infrastructure is, I'm writing up!



    Second IEEE International Workshop on
    Electronic Contracting (WEC '05)
    July 18, 2005, Munich, Germany
    http://www.hpl.hp.com/personal/Claudio_Bartolini/Wec05.html

    Call for Papers

    Real world commerce is largely built on a fabric of contracts. Considered abstractly, a contract is an agreed framework of rules used by separately interested parties to coordinate their plans in order to realize cooperative opportunities, while simultaneously limiting their risk from each other's misbehavior. Electronic commerce is encouraging the growth of contract-like mechanisms whose terms are partially machine understandable and enforceable.

    Building on the success of the First IEEE International Workshop on Electronic Contracting (WEC-04), this second edition is the forum to discuss innovative ideas at the interface between business, legal, and formal notions of contracts. The target audiences will be mainly researchers, scientists, software architects, but also contract lawyers, economists, and industry professionals who need to be acquainted with the state of the art technologies and the future trends in electronic contracting. The event will take place in Munich, Germany on July 18, 2005. IEEE WEC 2005 will be held in conjunction with The International Conference on Electronic Commerce (IEEE CEC 2005).

    Topics of interest include but are not limited to the following:

    Contract languages and user interfaces
    Computer aided contract design, construction, and composition
    Computer aided approaches to contract negotiation
    Role of electronic contracts in IT governance
    Relationship of electronic and legal enforcement mechanisms
    Electronic vs. legal concepts of non-repudiation
    Privacy vs. reputation and recourse
    Contracts and mechanism design

    Submissions

    Authors are invited to submit original and significant research contributions in the aforementioned areas. All submissions will be peer-reviewed by the members of the international program committee. We are negotiating to publish the proceedings in the Springer Lecture Notes in Computer Science. Full papers must not exceed 16 pages and conform to the LNCS style. We accept papers in PDF and PS format.

    Important Dates

    Paper submission: February 28, 2005
    Paper notification: April 7, 2005
    Camera-ready papers: April 30, 2005
    Workshop Date: July 18, 2005

    Workshop Chairs

    Claudio Bartolini, HP Laboratories, USA, claudio.bartolini@hp.com
    Mathias Sallé, HP Laboratories, USA, mathias.salle@hp.com

    Program Committee

    Samuil Angelov (Eindhoven University of Technology, The Netherlands)
    Boualem Benatallah (University of New South Wales, Australia)
    Asit Dan (IBM Research, USA)
    Aspassia Daskalopulu (University of Thessaly, Greece)
    Marlon Dumas (Queesland University of Technology, Australia)
    Andrew Farrell (Imperial College London, UK)
    Anthony Finkelstein (University College London, UK)
    Chiara Francalanci (Politecnico di Milano, Italy)
    Claude Godart (University Henri Poincaré Nancy 1 and INRIA, France)
    Ian Grigg (Systemics, USA)
    Alexander Keller (IBM Research, USA)
    Cuihong Li (Carnegie-Mellon University, USA)
    Heiko Ludwig (IBM Research, USA)
    Emil Lupu (Imperial College London, UK)
    Tom Maibaum (McMaster University, Canada)
    Dave Marvit (Fujitsu Laboratories, USA)
    Zoran Milosevic (DSTC, Australia)
    Enrico Nardelli (NESTOR - Universita' di Roma Tor Vergata, Italy)
    Andrea Omicini (University of Bologna, Italy)
    Barbara Pernici (Politecnico di Milano, Italy)
    Chris Preist (HP Laboratories, UK)
    Wim Van Grembergen (University of Antwerp, Belgium)
    Andreas Wombacher (University of Twente, The Netherlands)

    Posted by iang at 06:08 PM | Comments (1) | TrackBack

    The Big Lie - does it apply to 2005's security problems?

    I've been focussed on a big project that finally came together last night, so am now able to relax a little and post. Adam picked up on this comment on haplass Salman Rushdie still suffering from his maybe-fatwa. Which led to a link on the Big Lie and this definition:

    "All this was inspired by the principle - which is quite true in itself - that in the big lie there is always a certain force of credibility; because the broad masses of a nation are always more easily corrupted in the deeper strata of their emotional nature than consciously or voluntarily; and thus in the primitive simplicity of their minds they more readily fall victims to the big lie than the small lie, since they themselves often tell small lies in little matters but would be ashamed to resort to large-scale falsehoods. It would never come into their heads to fabricate colossal untruths, and they would not believe that others could have the impudence to distort the truth so infamously."

    Today's pop quiz is: Who wrote that?

    I'll let in one little hint, he was one of the great orators of the 20th century. If you are the impatient sort that can't handle a little suspense, you can click on the WikiPedia link to see, but let's analyse his theory first.

    To his big lie. The concept is breathtaking in its arrogance, but it's also difficult to deny. I'm sure you can think of a few in politics, right now, but this is an FC forum, so let's think like that. I can think of two cases where the big lie has occurred.

    The first was in the security of a payment system I worked with back in the 90s. It was totally secure, as everyone agreed. Yet it wasn't, and watching that unravel led to fascinating observations as the organisation had to face up to its deepest secrets being revealed to the world. (In this case, some bright upstart from California had patented the secrets, which should give you enough of a clue...).

    The second big lie was the secure browsing system. SSL in browsers, in other words. It was supposed to be secure, but the security started unravelling a few years back as phishing started to get going. Before that, I'd been poking at it and unwinding some of the assumptions in order to show it wasn't secure. It was a hobby, back then, as what we do in the security world is hone our skills by taking apart someone else's system.

    To little avail. And I now wonder if what I was facing was the big lie? A community of Internet security people had created the belief that it was secure. And this enabled them to ignore any particular challenge to that security. Hence if, by way of example, we pointed out that, say, a breach on any certificate authority would cause all CAs to be breached, this was easily fobbed off onto some area of the intricate web (e.g., CAs are audited, therefore...).

    Now, that area could also easily be shown to be weak as well, but by that time people had lost interest in our arguments. They had done their job, perhaps, or they simply relied on other people to assure them that those other areas were safe. My own view is that when one steps outside the discipline, all subtlety disappears and the truth becomes, well, gospel. (Auditing makes companies safe, right? That's what Sarbanes-Oxley and Basel II and all that is about!)

    Our orator from the past goes on to say:

    "Even though the facts which prove this to be so may be brought clearly to their minds, they will still doubt and waver and will continue to think that there may be some other explanation. For the grossly impudent lie always leaves traces behind it, even after it has been nailed down, a fact which is known to all expert liars in this world and to all who conspire together in the art of lying."

    Now, he conveniently pins the blame on a conspiracy of expert liars, which we'll leave for the moment. But notice how even as the lie "leaves traces behind it" the power of the mind turns to seaching for the explanation that keeps it "true." And so it is with phishing and web browser's security against a spoofed site. Even as phishing reaches and enjoys institutional scope, the basic facts of the matter - it's an attack on the secure browser - are ignored.

    There must be some other explanation! If we were to say that the browser should identify the site, and it doesn't, then that would mean that secure browsing isn't secure, and that can't be right, can it? There must be some other explanation... and all of the associations and cartels and standards organisations and committees are rushing around in ever enlarging circles proposing server software, secure hardware tokens, user education, and bigger fines.

    The big lie is an extraordinarily powerful thing. In closing, I'll post the last part of that extract, which might alert you to the author. Call it clue #2. But keep an open mind as to what he is saying, because I'll challenge you on it!

    "These people know only too well how to use falsehood for the basest purposes. From time immemorial, however, the Jews have known better than any others how falsehood and calumny can be exploited. Is not their very existence founded on one great lie, namely, that they are a religious community, where as in reality they are a race? And what a race! One of the greatest thinkers that mankind has produced has branded the Jews for all time with a statement which is profoundly and exactly true. Schopenhauer called the Jew 'The Great Master of Lies.' Those who do not realize the truth of that statement, or do not wish to believe it, will never be able to lend a hand in helping Truth to prevail."

    Now, we all know that isn't true. Or do we? Just exactly how did our orator create such a fascinating big lie, and how many people do you know that can unravel the above and work out what he did?

    Here's what I think he did. Firstly, he described the big lie. Then, he attributed the big lie to his targeted victims. In that way, he hid the fact that he himself was creating another big lie set squarely against the first one.

    So our hapless citizen has to not only unravel one big lie, but two big lies. Not only that, but the first big lie has probably been around for yonks, and just has to be true, right?

    Offering a defence to Adolf Hitler's inspiration is tough. (Yes, it was he, writing in Mein Kampf, if you haven't already guessed it. WikiPedia.) Two big lies do not a big truth make? Nice, pithy, and will not be understood by our 99% target population. It takes a big lie to defeat a big lie?

    A puzzler to be sure. For now, I'll leave you with the big thought that it's time for a big coffee.

    Posted by iang at 09:45 AM | Comments (8) | TrackBack

    January 14, 2005

    Dr. Ron Paul understands the forces behind identity theft

    It seems that no sooner than I'd got the polemic on Why Hollywood has to take one for the team off my chest, Dr Ron Paul, a Representative in the US Congress, proposed legislation to the US Congress to ban the issue of uniform and universal identifiers.



    Your number, in other words, won't exist under Dr Paul's world. This is a good thing, as we've written many times that the one true number is a Rights mechanism that is a happening disaster. His proposal is called " Identity Theft Prevention Act" and it further aims to prevent the theft of Identity by repealing the national ID card in the oddly named "intelligence reform bill", forcing the re-issue of all social security numbers, making social security numbers only usable for ... Social Security, and repealing exceptions to privacy violations that permitted the IRS and the FBI to conduct various agenda related attacks in recent times. Among other things.

    Dr Paul's Act is a frontal attack on a behemoth that will not permit it. This will not succeed of course, but Dr Paul will at least have secured his own peace of mind by standing up and being counted.

    Posted by iang at 11:49 AM | Comments (2) | TrackBack

    Schneier joins the DHS-WG - a new attack on open governance?

    Axel tipped me to an entry over on Bruce Schneier's new blog about the latter's concerns over an NDA he had to sign in order to join a working group on flight security.

    I must admit to being troubled by this. The principles of open governance have drawn a lot from the sort of open scrutiny that keeps government honest. In fact, a key component of the 5PM is to encourage the user to replace the bevy of expensive but secret auditors; and to do so in an open, shared fashion. In the fledgling gold issuance community, it has been one critical factor in letting the honest issuers stand out and be counted for what they are.

    Yet, drawing your key critics in and silencing them with money and an NDA seems to be too much of an attack on that model. I suppose the question arises rhetorically whether one can do more good on the inside than on the outside, and to be fair there must be cases where this is possible. Many outside the US pin their hopes on Colin Powell's continued presence within as a voice of reason, and it seems reasonable to postulate that the retired general would do less good on the outside.

    It has to be fair to consider the possibility at least that no good can be done on the inside. In which case, we are left with a simple calculation as to how much it costs to draw ones critics sufficiently to the inside. (Biblical monetarists could then calculate the exchange rate to the silver unit and thus get a measure of dollar inflation over the last couple of millenia.) Again over on Axel's blog is some evidence of advertising the benefits of war on terror to the skeptical Europeans. It would seem to be that the current Bush administration sees no conflict in spending public funds to shift public opinion, and democracy as we've known it in the past (where the people decide and the government acts as it is told by the people).

    Some might suggest that a single NDA wouldn't do it, and an attack of this form on Bruce Schneier, perhaps the world's leading rockstar cryptographer, would run the risk of backfiring. Shades of the early 90s battles of cause celebre, Phil Zimmerman spring to mind. I would think such confidence naive. Imagine a series of lucrative projects and NDAs. After a while it may simply become too costly to analyse the words, postings and thoughts from an NDA standpoint.

    Another possibility is that the activities of the WG and the government in general might be more founded than what we as an open society can do, so we might see some benefit coming our way from spillover security knowledge. Once upon a time, all security knowledge resided in a secret forest in Maryland called the NSA, and systems like Unix benefitted from the leakage; we all knew the apocryphal story of the Unix password salt, but did we ever wonder how that arose? Yet, today, I think we can pretty much dispose of the argument that the government knows better than the people how to secure these assets. It doesn't pass the laugh test.

    Of course such ramblings cut both ways. Who among us wouldn't like a lucrative contract to advise on security? And don't we all write blogs or books in order to attract such business? So how do we address the balance between open governance, and needing to make a crust? Today at least, I have no answer to that!

    Posted by iang at 04:32 AM | Comments (6) | TrackBack

    January 09, 2005

    Identity Theft: Why Hollywood has to take one for the team.

    The Year of the Phish has passed us by, and we can relax in our new life swimming in fear of the net. Everyone now knows about the threats, even the users, but what they don't know is what happens next. My call: it's likely to get a lot worse before it gets better. And how it gets better is not going to be life as we knew it. But more on that later.

    First... The Good News. There is some cold comfort for those not American. A recent report had British phishing loses under the millions. Most of the rich pickings are 'over there' where credit rules, and identity says 'ok'. And even there, the news could be construed as mildly positive for those in need of good cheer. A judge recently ruled a billion dollar payout against spammers who are identified in name, if not in face. We might never see their faces, but at least it feels good. AOL reported spam down by 75% but didn't say how they did it.

    Also, news that Microsoft is to charge extra for security must make us believe they have found the magic pixie dust of security, and can now deliver an OS that's really, truly secure, this time! Either that, or they've cracked the conundrum of how to avoid the liability when the masses revolt and launch the class action suit of the century.

    All this we could deal with, I guess, in time, if we could as an industry get out collective cryptographic act together and push the security models over to protecting users (one month's coding in Mozilla should do it, but oh, what a long month it's been!). But there is another problem looming, and it's ...

    The Bad News: the politicians are now champing at the bit, looking for yet another reason to whip today's hobby horse of 'identify everyone' along into more lather. Yes, we can all mangle metaphors, just as easily as we can mangle security models. Let me explain.

    The current project to identify the humanity of the world will make identity theft the crime of the century. It's really extraordinarily simple. The more everything rests on Identity, the more value will Identity have. And the more value it has, the more it will be worth to steal.

    To get a handle on why it is more valuable, put yourself in the shoes of an identity thief. Imagine our phisher is three years old, and has a sweet tooth for data.

    How much sugar can there be found in a thousand cooperating databases? Each database perfectly indexed with your one true number and bubbling over with personal details, financial details, searchable on demand. A regulatory regime that creates shared access to a thousand agencies, and that's before they start sharing with other countries?

    To me, it sounds like the musical scene in the sweets factory of Chitty Chitty Bang Bang, where the over indulgent whistle of our one true identity becomes our security and dentistry nightmare. When the balance is upset, pandemonium ensues. (I'm thinking here the Year of the Dogs, and if you've seen the movie you will understand!)

    Now, one could ask our politicians to stop it, and at once. But it's too late for that, they have the bits of digital identity between their teeth, and they are going to do it to us to save us from phishing! So we may as well be resigned to the fact that there will be a thousand interlinked identity databases, and a 100 times that number of people who have the ability to browse, manipulate, package, steal and sell that data. (This post is already too long, so I'm going to skip the naivete of asking the politicians to secure our identity, ok? )

    A world like that means credit will come tumbling down, as we know it. Once you know everything about a person, you are that person, and no amount of digital hardware tokens or special biometric blah blahs will save the individual from being abused. So what do people do when their data becomes a phisher's candyfest?

    People will withdraw from the credit system and move back to cash.This will cost them, but they will do it if they can. Further, it means that net commerce will develop more along the lines of cash trading than credit trading. In ecommerce terms, you might know this better as prepaid payment systems, but there are a variety of ways of doing it.

    But the problem with all this is that a cash transaction has no relationship to any other event. It's only just tractable for one transaction: experienced FCers know that wrapping a true cash payment into a transaction when you have no relationship to fall back to in event of a hiccup is quite a serious challenge.

    So we need a way to relate transactions, without infecting that way with human identity. Enter the nym, or more fully known as the psuedonymous identifier. This little thing can relate a bunch of things together without needing any special support.

    We already use them extensively in email, and in chat. There are nyms like iang which are short and rather tricky to use because there are more than one of us. We can turn it into an email address, and that allows you to send a message to me using one global system, email. But spam has taught us a lesson with the email address, by wiping out the ease and reliability of the email nym ... leading to hotmail and the throw away address (for both offense and defense) and now the private email system.

    Email has other problems (I predict it is dying!) which takes us to Instant Messaging (or chat or IM). The arisal of the peer-to-peer (p2p) world has taken nyms to the next level: disposable, and evolutionary.

    This much we already know. P2P is the buzzword of the last 5 years. It's where the development of user activity is taking place. (When was the last time you saw an innovation in email? In browsing?)

    Walking backwards ... p2p is developing the nym. And the nym is critical for creating the transactional framework for ecommerce. Which is getting beaten up badly by phishing, and there's an enveloping pincer movement developing in the strong human identity world.

    But - and here's the clanger - when and as the nymous and cash based community develop and overcome their little difficulties, those aforementioned forces of darkness are going to turn on it with a vengeance. For different reasons, to be sure. For obvious example, the phishers are going to attack looking for that lovely cash. They are going to get rather rabid rather quickly when they work out what the pickings are.

    Which means the mother of all security battles is looming for p2p. And unfortunately, it's one that we have to win, as otherwise, the ecommerce thing that they promised us in the late nineties is looking like a bit more like those fairy tales that don't have a happy ending. (Credit's going to be squeezed, remember.)

    The good news is that I don't see why it can't be won. The great thing about p2p is the failure of standards. We aren't going to get bogged down by some dodgy 80's security model pulled out of the back pages of a superman comic, like those Mr Universe he-man kits that the guy with the funny name sold. No, this time, when the security model goes down in flames (several already have) we can simply crawl out of the wreckage, dust off and go find another fighter to fly into battle.

    Let's reel off those battles already fought and won and lost. Napster, Kazaa, MNet, Skype, BitTorrent. There are a bunch more, I know, I just don't follow them that closely. Exeem this week, maybe I do follow them?

    They've had some bad bustups, and they've had some victories, and for those in the systems world, and the security world, the progress is quite encouraging. Nothing looks insurmoutable, especially if you've seen the landscape and can see the integration possibilities.

    But - and finally we are getting to the BIG BUT - that means whoever these guys are defeating ... is losing! Who is it? Well, it's the music industry. And hollywood.

    And here's where it all comes together: ecommerce is going to face a devastating mix of over rich identity and over rich phishers. It'll shift to cash based and nym based, on the back of p2p. But that will shift the battle royale into p2p space, which means the current skirmishes are ... practice runs.

    And now we can see why Hollywood is in such a desperate position. If the current battle doesn't see Hollywood go down for the count, that means we are in a world of pain: a troubling future for communication, a poor future for ecommerce, and a pretty stark world for the net. It means we can't beat the phisher.

    Which explains why Hollywood and the RIAA have found it so difficult to get support on their fight: everyone who is familiar with Internet security has watched and cheered, not because they like to see someone robbed, but because they know this fight is the future of security.

    I like Hollywood films. I've even bought a few kilograms of them. But the notion of losing my identity, losing my ability to trade and losing my ability to communcate securely with the many partners and friends I have over the net fills me with trepidation. I and much of the academic and security world can see the larger picture, even if we can't enunciate it clearly. I'd gladly give up another 10 years of blockbusters if I can trade with safety.

    On the scales of Internet security, we have ecommerce on one side and Hollywood on the other. Sorry, guys, you get to take one for the team!


    Addendum: I've just stumbled on a similar essay that was written 3 weeks before mine: The RIAA Succeeds Where the Cypherpunks Failed by Clay Shirky.

    Posted by iang at 05:22 PM | Comments (6) | TrackBack

    January 07, 2005

    The Case Of The Bandwidth Burglar

    For those looking for stories of connivance, perfidy and sheer desperate cunning, normally we'd refer you to detective novels and the like. But now you can find the same thing on the net, and what's more, time reading them can be billed against your budget for governance!

    Over on a blog by 'SecurityMonkey' there is a story called The Case Of The Bandwidth Burglar. SecurityMonkey is some sort of Canadian literary bdsmer who makes his readers bite their nails to the third nuckle waiting for days for the next installment. But that's all over and you can read all five installments in one pleasant saturday morning now.

    Be warned, moral dilemmas, unhealthy influence of caffeine, and system administrators seen thinking and working, ahead. Not for the squeamish.

    The Case Of The Bandwidth Burglar - Part I
    The Case Of The Bandwidth Burglar - Part II
    The Case Of The Bandwidth Burglar - Part III
    The Case Of The Bandwidth Burglar - Part IV
    The Case Of The Bandwidth Burglar - Conclusion

    Posted by iang at 04:21 PM | Comments (2) | TrackBack

    December 18, 2004

    Mexico flirts with the silver unit - a good base for digital issuance

    One sees more and more references to Islamic countries musing on gold as their base for currency; but also silver might shine again. Mexico is delving into her historical consciousness for some semblance of honesty in money.

    Whether this ever gets further along than a popular movement is unclear, but certainly the populace seems to like the idea, if an essay by Hugo Salinasthat is circulating the net is any guide (or here or here; the original spanish seems lost!). So much so that the Bank of Mexico allegedly felt the need to defend its own paper unit.

    People outside financial cryptography often get bemused by the concentration on precious metals. When outsiders see Issuers using those tired barbaric relics for currencies, they find it too easy to write off the field. What they miss needs some explanation and with Mexico's flirtation, now seems to be as good a time as any to explain.

    It's fundamentally a consequnce of open governance. To see that consequence, let's review how open governance works. For those familiar, skip these paragraphs...

    The core of issuance is about presenting a contract of value. It could be any value, really, and it is only the imagination of the Issuer that is the limit here. Currencies are one such, first proposed by David Chaum, but also financial instruments such as shares, bonds and options are equally issuable.

    Virtual issues were obvious from the very first days: loyalty systems, gaming units, gambling chips and the like were readily recognised as issuable, and there have been many proposals in this vein since Chaum first kick started the field with his blinding formula.


    Which all leads to a very tricky problem: if it is so easy to issue loyalty points and so easy to issue currency, how does a confused public tell the difference?

    Enter, for the first part, the contract. The agreement between the Issuer and the users is called a contract, and in that document it should say what the issue is. Currency, loyalty, casino chips, or options on futures of first sons; it's all written in the agreement.

    But, the canny and suspicious public says, those are just words! How do we know that the Issuer will keep his word [1]?

    Enter for the second part, the five parties model. In the 5PM as it is abbreviated, reserves can be allocated and stored with one party that is independent of the Issuer. This would be an escrow partner or a trustee. Then, a second party becomes a co-signatory, whos signature is required to release any assets. Thirdly, the Issuer appoints a manager to day to day deals, with a small float, so the Issuer himself is separated from the business aspects. That makes for four parties, all watching each other.

    And finally we enroll the public as the fifth party. She is coopted into auditing all the activities of the other parties. So the 4 insider parties publish their activities and also the status of the reserves at any one time, and the user keeps an eye on all those things.

    The 5PM reduces the issuance of value to a process and to an accounting mechanism. We have reduced the safety of an issuance to a problem of no more difficulty than counting. We've swept away all that nonsense and cost called Basel II, Sarbanes Oxley and other disasters of governance, and put the user firmly in charge.

    All she has to do is count [2].

    And this is where precious metals like gold and silver step in. Metal is easy to count. It is either here or it is not. The bars are either in the vault or they are not. Any member of the public can cope with that question.

    In contrast, every other base for issuance is more complicated. Are there dollars in your account? Where is the wire that was sent last month? Have my airmiles been credited, and are they really there if I cannot buy the flight I want? Am I a shareholder in full ownership of these shares, and what's this about the shares having been lent out? Can you explain the theft of mutual funds again, but really slowly this time [3]?

    The problems with virtual issues like currency, shares, bonds, etc etc, go on and on. Physical metal however is tractable. It stops right here: is there a bar or is there not?

    Which means that by far the most efficient thing to issue in a digital world, in the context of governance, is precious metals. It's efficient in the sense that a very small team can create a very powerful governance model and present an honest issue to their user community. Hence, startups look closely at the relic, and see not barbarity, but governability.

    So Mexico's move is good news for digital issuance. The more the silver and gold gain respect, the more users there are for a simple, robust digital issue. And the more we have a firm base in precious metals, the more issuers can get into the complicated stuff like dollars, mutual funds and shares, and provide those with the open governance that users expect. Go Mexico!


    Images are from Mobile Silver. For more interest in coins, see Austria issues 100,000 Euro coin

    [1] In financial cryptography, the Issuer is masculine, and the user is feminine. This cryptographic custom uses a trick of the english language, and may or may not make any sense in other languages.

    [2] Just to cap off this quick description of the 5PM: we now have sufficient empirical evidence that it works.

    [3] These are all real, today complaints, well beyond the ken of the user. Mutual funds in the US were raided in a complex scam by insiders that stole more value than we care to write down. And for shares, there is a complex scam alleged in courts where the manager of the shares, DTCC, was claimed to have lent out the shares without limit to those shorting the stock, again without limit.

    Posted by iang at 08:25 AM | Comments (0) | TrackBack

    December 03, 2004

    Andy Grove: CYA is now the board's main job

    As compliance grows and grows, governance shrinks and shrinks as systems based on experience and effectiveness are replaced by ones based on rules and fear. Andy Grove, the Chairman of Intel, goes even further and asserts that boards weighed down by compliance rules are now no longer doing the job they were set up to do: run the company

    In a recent speech here's how he put it:

    "If a board is preoccupied with protecting their rear-ends or talking about whether the latest member qualifies under the definition of independence and can serve on the audit committee, then the company's real business is not even being considered," said Grove, inaugural speaker in the Dean's Lecture Series at Wharton.

    "... He adds also that Grove said he suspects that many [boards] have been too distracted by the embarrassments of the last several years. In trying to make sure they don't become the next Enron or Adelphia, they are focusing on mug shots, not the big picture.

    "Since the wave of awareness started with a bunch of purportedly criminal actions, the weight of the new board activities has been to avoid being caught in criminal action. The process has been defensive - 'How do we keep out of jail? How do we keep from getting sued? How do we keep ourselves out of the newspapers?' A lot of the board activities that take place under the banner of governance are compliance actions that are far away from being strategic participation in the key decisions a company makes."

    One more observation he makes was surprising to me, but on reflection, it makes sense:

    Grove had found Intel's own board to be something of a paradox. It was a panel of esteemed, powerful people, but when they came together, some members seldom spoke. "I would see ex-CEOs join the board and not make a meaningful comment for years because they felt intimidated by the combined body," he recalls. "I had to coax them into participation. Sometimes it took five, six or seven years. I think it's the idea of the board, rather than the board itself, that creates this behavior."

    Seems like people are shy, no matter where they are.

    Posted by iang at 07:35 AM | Comments (1) | TrackBack

    November 23, 2004

    Bank coverups no longer acceptable in retail payment systems

    The tide is turning on bank responsibility for retail frauds. Two years back it was normal for banks to deny any responsibility for problems with their systems. Coverups were routine, and the computer could never ever be wrong. Phantom withdrawals just don't happen.

    That seems to have changed [1]. It's now quite routine for banks to announce that a certain group of customers have had their identities lifted. I think there are several factors behind this sea weather change; and whilst we might not be able to isolate a sole cause, I do think there is a trend based on these factors:

    Firstly, in California, in about 2001, a state law was passed that made it mandatory for companies to notify the effected customers when a system is cracked and data could have been lifted. It would seem that the effect of this was felt outside the California, possibly because many US companies would have trouble advising just their Californian customers of a breach.

    Secondly, observations have been made by security people that the banks should cooperate more and hide less [2]. We've known for a long time what happens when a company reveals a hack: the stock market and the press in all their combined ignorance downgrades the stock, as if it is a calamitous event. This sort of ignorance still pervades, but it looks increasingly ignorant, now [3].

    What we hadn't really stressed until recently is the benefits from not covering up. There is the opportunity to swap notes, to learn from each other's mistakes, and to coordinate information and patterns with a better probability of hitting the scamster. This is now happening [4].

    Thirdly, it has to be said that the massive increase in identity theft in the US, and the explosion of phishing, has made it easier for banks to be honest. It has now become institutionalised [5], which means it is no longer plausible to fob it off as something that really has no bearing on the here and now. Everyone knows about phishing, everyone knows about phantom withdrawals.

    Fourthly, efforts by the Internet community in general, and by expert witnesses such as Ross Anderson and his students, in particular, have made the coverup a weaker tool. Several times, the banks have gone to court saying such and such a breach was impossible. Several times, Ross Anderson and his team have shown them to be wrong. (The banks even have the gall to admit that they misled the courts (and their customers) by then seeking to keep the evidence secret!)

    And it is not just the courts. Information on frauds spread very quickly through the mail lists and blog spaces of small Internet merchants. Within days of a heist, the merchants know what is going on. The financial institutions can say what they like, but they can no longer rely on an unempowered clientelle to accept the spoonfed message.

    All this new found honesty is a good thing, for consumers, and for financial institutions as well. We've long known that secrecy does not breed security, it just hides the problems. The difficulty with secrecy as a security policy is that it hides the problems equally badly from the public, from the crooks, and from the secret holder itself, so all that is really gained is a lottery as to who sees through the facade first.

    One final observation is, I think, merited: All this willingness to work together and reveal the real hard facts quickly has been done by means of the market pressurising the financial institutions. Other than the California state law (which is easy enough to bypass), everything is between the customers and the banks (scammers falling somewhere vaguely in the middle).

    Which is to say that the regulators of the banks are nowhere to be seen. I think on balance this is a good thing. The perverse concentration on strong identity that leads directly to strong identity theft is primarily a creature of the regulatory bodies, so the less they do the better, if reducing fraud is our aim.

    [1] "More debit cards replaced," Richard Burnett,
    http://www.sun-sentinel.com/news/local/florida/orl-bizvisa19111904nov19,0,5005015.story?coll=sfla-news-florida

    [2] "How Much Security is Enough to Stop a Thief?," Stuart Schechter and Michael Smith, FC03
    http://www.eecs.harvard.edu/~stuart/papers/fc03.pdf

    [3] " Under Phishing Attack, British Bank Shuts Down Some Services," Gregg Keizer
    http://www.informationweek.com/story/showArticle.jhtml;jsessionid=CIGVP13WT43RMQSNDBGCKHSCJUMEKJVN?articleID=53700579

    [4] "Companies Forced to Fight Phishing," By Brian Krebs,
    http://story.news.yahoo.com/news?tmpl=story&cid=1804&e=8&u=/washpost/20041119/tc_washpost/a61916_2004nov19

    [5] "Phishing Feeds Internet Black Markets," By Brian Krebs http://story.news.yahoo.com/news?tmpl=story2&u=/washpost/20041118/tc_washpost/a59347_2004nov18

    Posted by iang at 08:50 AM | Comments (2) | TrackBack

    November 21, 2004

    Mini Research Project: Sarbanes Oxley 404 Horror Stories

    According to an unattributed source, the SANS people are looking to compile a list of Sarbanes-Oxley horror stories. They might have their work cut out for them!

    For those who don't follow governance like it effects our every minute, Sarbanes-Oxley is the Act in the USA to tighten up the rules on how a company does .. well just about everything. It's the result of the Arthur Andersens, the Worldcoms and other billion dollar collapses. It's big, it's long, it's boring, and if you have heard of it, your only friends are people who have also heard of it...

    Notwithstaning its dry accounting background, Sarbanes-Oxley has raised bureaucracy to new levels. Like a scene from Brazil, it's solution to every ill is rules and yet more rules. Understandably, people don't like it, but because it applies to all companies equally, there is little to be gained in fighting it, as it is only the customer who has to pay, and it has no bearing on competing against your competitors, only against your self.

    What makes it especially interesting is that this time the risk is entirely within the company; outsourcing of any component is no excuse! A recently seen trend is that new hires in risk management are empowered to develop their own IT teams. Why? Because they can no longer simply shift the burden onto another department; Sarbanes-Oxley requires you to be responsible for the risk, however it's done.

    And they're getting tough on compliance. This time, if your company is not up to scratch, you may well be offering yourself up as a sacrifice to a regulatory orgy of fines, inspections, naming and shaming and other terrors.

    More great news for suppliers of solutions. More fear, uncertainty and doubt, and less risk. Who could ask for more?

    Mini Research Project: Sarbanes Oxley 404 Horror Stories

    SANS is looking for evidence to support an assertion we hear a lot, that there is insufficient IT guidance in SOX 404/COSO to show that your IT systems have the needed controls to demonstrate the audit report is accurate. We have heard reports from the field talking about 2 auditors | from the same firm having opposite findings, or more commonly, organizations that can't figure out what to do so they end up buying a six figure SAS 70 to have some sort of coverage. If you have a horror story you can share that would be great, I am happy to read non-attributable statements, but what we are looking for are stories where we can name the individuals and organizations. Send your horror stories to stephen@sans.org

    Posted by iang at 09:46 AM | Comments (0) | TrackBack

    November 15, 2004

    First time a digital signature has been affirmed by court?

    The previous story tipped me to this court case last year where digital signatures as signatory evidence were disputed and then confirmed. This may be the first precendent! As far as I know this is the first time the signatures themselves were challenged (our own Ricardian contracts appeared in court in 2001, 2002, but their authenticity was not disputed).

    26.06.2003 Digital Signature Found to be Valid in Estonian Court System

    The process of court disputes becomes more convenient for participants: according to a ruling taken last week, a district court declared that documents may be sent to court by e-mail if they have a digital signature according to laws. This is the first such case in Estonia.

    The reason why the argument about digital signature came to Tallinn district court was a case between Estonian Railways, Estonian Competition Board and Valga Depot (Valga Külmutusvagunite Depoo). Andres Hallmägi, a lawyer representing the depot, sent a digitally signed document to court by e-mail. Tallinn administrative city court claimed that they are not able to read the document and thus rejected it.

    "I did not do this because of technological arrogance or bullying," said Hallmägi. "But this was a matter of principle - if you do not push the bureaucrats, they will not start innovating on their own."
    An European precedent

    The case was taken to district court, where it was ruled that digital signatures are equivalent to handwritten ones in Estonia and therefore the court should not have claimed that they cannot use it.

    The district court ruling claims: "The reception of a digitally signed document was not obstructed by the lack of appropriate software - it was and still is possible to immediately install such software at courts when necessary."

    Read on...

    Posted by iang at 10:11 AM | Comments (1) | TrackBack

    November 12, 2004

    Raising awareness in Dispute Resolution

    A critical component of a governance system is the dispute resolution component. Some would say that it is the apex on which the rest of the inverted pyramid totters. Yet, most people don't know it exists, until they find out to the displeasure.

    I've often wondered how to raise the profile of this key component, and here's an answer: sue your mum for a broken promise. Educationally speaking, I can only applaud Mum for engaging in this delicate lesson.

    Here's what the Daily Star, a Malasian paper, reported:

    Schoolboy sues mom for not buying him a PC

    HONG KONG: An 11-year-old boy in central China took his mother to court for breaking a promise to buy him a computer if he did well at school, a news report said last Monday.

    The woman told her son she would buy him a computer if he scored average marks of more than 94% for his school work, the Hong Kong edition of the China Daily reported.

    However, she welshed on the deal when he achieved an average of 97%, telling him she could not afford to buy the computer, the newspaper said.

    The schoolboy from Xingzheng, Henan province, then went to court asking a judge to make his mother honour the verbal agreement. At the hearing, the judge reconciled the mother and son.

    According to the newspaper, the boy gained his knowledge of law after helping his parents with their small business.

    See also a similar report in The Register

    Posted by iang at 09:28 AM | Comments (0) | TrackBack

    November 05, 2004

    e-gold to track Cisco extortioner

    In line with my last post about using payment systems to stupidly commit crimes, here's what's happening over in the hacker world. In brief, some thief is trying to sell some Cisco source code he has stolen, and decided to use e-gold to get the payout. Oops. Even though e-gold has a reputation for being a den of scammers, any given payment can be traced from woe to go. All you have to do is convince the Issuer to do that, and this case, e-gold has a widely known policy of accepting any court order for such work.

    The sad thing about these sorts of crooks and crimes is that we have to wait until they've evolved by self destruction to find out the really interesting ways to crack a payment system.


    E-gold Tracks Cisco Code Thief
    November 5, 2004 By Michael Myser

    The electronic currency site that the Source Code Club said it will use to accept payment for Cisco Systems Inc.'s firewall source code is confident it can track down the perpetrators.

    Dr. Douglas Jackson, chairman of E-gold Ltd., which runs www.e-gold.com, said the company is already monitoring accounts it believes belong to the Source Code Club, and there has been no activity to date. ADVERTISEMENT

    "We've got a pretty good shot at getting them in our system," said Jackson, adding that the company formally investigates 70 to 80 criminal activities a year and has been able to determine the true identity of users in every case.

    On Monday, a member of the Source Code Club posted on a Usenet group that the group is selling the PIX 6.3.1 firewall firmware for $24,000, and buyers can purchase anonymously using e-mail, PGP keys and e-gold.com, which doesn't confirm identities of its users.

    PointerClick here to read more about the sale of Cisco code.

    "Bad guys think they can cover their tracks in our system, but they discover otherwise when it comes to an actual investigation," said Jackson.

    The purpose of the e-gold system, which is based on 1.86 metric tons of gold worth the equivalent of roughly $25 million, is to guarantee immediate payment, avoid market fluctuations and defaults, and ease transactions across borders and currencies. There is no credit line, and payments can only be made if covered by the amount in the account. Like the Federal Reserve, there is a finite value in the system. There are currently 1.5 million accounts at e-gold.com, 175,000 of those Jackson considers "active."

    eWEEK.com Special Report: Internet Security To have value, or e-gold, in an account, users must receive a payment in e-gold. Often, new account holders will pay cash to existing account holders in return for e-gold. Or, in the case of SCC, they will receive payment for a service.

    The only way to cash out of the system is to pay another party for a service or cash trade, which Jackson said creates an increasingly traceable web of activity.

    He did offer a caveat, however: "There is always the risk that they are clever enough to figure out an angle for offloading their e-gold in a way that leads to a dead end, but that tends to be much more difficult than most bad guys think."

    This is all assuming the SCC actually receives a payment, or even has the source code in the first place.

    PointerDavid Coursey says securing source code must be a priority. Read about it here.

    It's the ultimate buyer beware-the code could be made up, tampered with or may not exist. And because the transaction through e-gold is instantaneous and guaranteed, there is no way for the buyer to back out.

    Next Page: Just a publicity stunt?

    Dave Hawkins, technical support engineer with Radware Inc. in Mahwah, N.J., believes SCC is merely executing a publicity stunt.

    "If they had such real code, it's more likely they would have sold it in underground forums to legitimate hackers rather than broadcasting the sale on Usenet," he said. "Anyone who did have the actual code would probably keep it secret, examining it to build private exploits. By selling it, it could find its way into the public, and all those juicy vulnerabilities [would] vanish in the next version."

    PointerFor insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzer's Weblog.

    "There's really no way to tell if this is legitimate," said Russ Cooper, senior scientist with security firm TruSecure Corp. of Herndon, Va. Cooper, however, believes there may be a market for it nonetheless. By posting publicly, SCC is able to get the attention of criminal entities they otherwise might not reach.

    "It's advertising from one extortion team to another extortion team," he said. "These DDOS [distributed denial of service] extortionists, who are trying to get betting sites no doubt would like to have more ways to do that."

    PointerCheck out eWEEK.com's Security Center for the latest security news, reviews and analysis.

    Posted by iang at 11:38 AM | Comments (1) | TrackBack

    November 03, 2004

    Using Payment Systems to avoid tax

    Here is an innovative payment system that the IRS (United States tax department) claimed (successfully) was employed to avoid tax.

    "President of Construction Company Sentenced

    "On June 24, 2004, in Billings, Montana, Ron Omo, president of Big O Construction, Inc., was sentenced to 2 years probation and ordered to pay restitution of $21,224. In addition, Omo was fined $10,000 and the Big O Corporation was fined $40,000. Omo pleaded guilty on February 5, 2004, to charges of disclosing false information on IRS Form 1096, Annual Summary of Information Returns, by not including IRS Form 1099, Miscellaneous Income, evidencing income received by persons driving vehicles for the benefit of Omo and Big O Construction.

    "Omo established a payment system for 36 truck drivers employed by Big O Construction, whereby the drivers submitted "driving slips" to bill for driving services and other miscellaneous work provided to the company. Omo and Big O Construction paid the drivers based upon the driving slips instead of time cards. Under this system, no benefits, unemployment insurance or other employment taxes were paid in connection with the driving slip payments. No year end summaries "Form 1099's" were issued to the 36 drivers with respect to the work accounted for by "driving slips." By not issuing year end summaries, Omo and Big O Construction assisted the drivers in their non-reporting of income when the drivers filed their individual tax returns. The practice of paying drivers through the use of drivers slips, failing to report the payments to the IRS, and the drivers failing to include the payments on their individual income tax returns, resulted in an aggregate federal income tax loss totaling $21,224."

    This notion that independent payment systems are useful for avoiding tax has always dogged the small payment systems operators. It's a sort of "you're different so you must be evil" slander. In my experience it is pretty rare that a) any operator thinks in these terms and b) they have any significant clientele that use payment systems to avoid tax.

    The reason for this is easy to explain: most payment systems out there provide quite clear trails to "follow the money." They have to do this; if they don't, they tend to lose money through user error, support failures, system bugs and theft. Payment systems have to first and foremost provide safe money.

    Of course, that doesn't mean that a customer can't use the payment system as an adjunct to some tax avoiding scheme (or is it tax evasion? I can never remember which is which). Sure, that goes on in a few cases, but it's fundamentally nothing different to using the banks, or cash, or any other form. On the plus side it is often easier to open accounts in net payment systems, but on the minus side, the evidence is a lot clearer.

    Then there are of course the payment systems that offer untraceable cash (sometimes called anonymous cash, but this is incorrect as all these systems have historically used identified accounts). Untraceable cash systems are unsustainable and dangerous places to leave your money; simply because when something goes wrong, you can't "follow the money" and that generally means that at some point, something will go wrong, and the system will collapse. Payment systems that can't keep their money safe don't operate for long.

    This then means that these systems can only be used for washes - quick ins and outs. This is often hard to hide, and it puts further strain on the system. For example, I came across a regular wash through a payment system where every month the money would come in to the system, and the same day, often the same hour, money would go out again. Because the wires coming in and going out went through the same bank, this would be easy to spot, and you'd only have to ask...

    Posted by iang at 06:38 AM | Comments (0) | TrackBack

    October 25, 2004

    Games being leaked by employees - where's the value?

    In other gaming news, the New Scientist discusses the insider threats to gaming companies. In short, the employees may be leaking the games ahead of time. A moment's thought will make this a reasonable result, as the best employees are probably those from the 'underground' games scene, where hacking and copying are practiced as just another game.

    So what do you do when your best employees are no respectors of intellectual property? My suggestion: stop thinking of them as employees and start thinking of them as partners. If they don't see the value in working to keep the product closely controlled until release date, maybe that's because there isn't any value in it?

    Posted by iang at 08:31 AM | Comments (2) | TrackBack

    October 11, 2004

    Great intro to social engineering - "Catch me if you can"

    Now appearing on the not-ridiculously-priced racks at your local supermarket, the film "Catch me if you can" follows the life of a young fraudster in the 1960s. Frank Abagnale followed his heart if not his elders and developed strong techniques in how to engineer his way into many a closed shop.

    Systems that he breached: medical practice, law, airline pilots, family. All systems that owed their security more to their marketing and belief systems than to good technology. Oh, yes, and he "kited" a lot of checks along the way, as the Americans would say.

    What strikes is the successful integration of different techniques into a concerted attack. Yes Abagnale presented a fraudulent cheque or two. And yes, the system was pretty darn bad in those days. But it was the way he integrated his different social engineering approaches together that made the difference, not the single issue of credit or reliance on pieces of paper.

    The film is well worth seeing for the financial cryptographer. It's integrated, balanced, and it includes little or no crypto. Just like the real world! Oh, and it's also a fun film for all the family, which makes it shareable with those who exercise patience in our lives.

    Posted by iang at 10:22 AM | Comments (1) | TrackBack

    October 07, 2004

    The Uses of Corruption

    Corruption and fraud are ever present. Either as opportunities or as activities, and no good is served by pretending to be above the study of their ways. In financial cryptography, we develop systems that do end-to-end cryptographically protected transactions not because crypto is cool, but because it protects the transactions from inside theft. And it protects the insiders from themselves.

    Here's a surprising and contrarian article by Theodore Dalrymple on corruption in Italy. The author argues that the corruption of the leviathan state is the one determining factor that propels Italians to a greater standard of living than their uncorrupted British cousins.

    It's well argued and well worth considering (albeit long). Can you unravel the justification and deconstruct the cognitive dissonance to place its views in balance? Just exactly when is corruption a good thing? A challenge!

    Posted by iang at 06:51 AM | Comments (2) | TrackBack

    October 06, 2004

    offshore recovery - now with "local jurisdiction"

    One of the issues in governance of issuance and other assets is where you site your servers. Just the act of siting your servers opens the business to jurisdictional effects. As the legal and regulatory status of independent issuance is uncertain, many issuers have gone to offshore regimes. This isn't for the popular reason of escaping harmful taxes, but for the more practical reason of seeking small and simple jurisdictions that are efficient to deal with.

    By way of example, consider the US, where there is a broad range of agencies that have some sort of interest that could lead them into regulating issuance. Perversely, even though the US is one of the most friendly countries for issuance businesses, it is practically impossible to be in compliance because there are simply too many regulators. Witness the Paypal story, which includes many wrangles with many regulators. In Europe, where there is often a catch-all financial regulator, it's much easier to figure out who one should be in compliance with, but the environment is much less friendly towards issuance (see the eMoney directive for the "like-a-bank" approach).

    Offshore islands are just so much simpler, and most of them are only worried about crooks and/or bad perception. Yet, siting offshore exposes you to other risks such as poor connectivity and poor governance. And then there are all the normal disaster issues that nobody likes to talk about.

    The Isle of Man has thought about this, and come up with the concept of home jurisdiction recovery siting. If you use an Isle of Man firm to do your disaster recovery, it seems that they will permit you to retain your home jurisdiction.

    It's a very curious concept! There are many curious angles to this, and it could well take off in directions they hadn't thought of. One to watch.

    Isle Of Man Set For Role As Global IT Disaster Recovery Hub
    by Jason Gorringe, Tax-News.com, London
    13 September 2004

    The Isle of Man government has been actively pursuing measures that could propel the Island towards assuming the mantle of the world’s IT disaster recovery hub in the field of financial services, the local media has reported.

    In a bid to achieve this, the Island’s authorities are seeking to agree memoranda of understanding (MOU) with multiple offshore jurisdictions which would allow firms using an Island-based disaster recovery service to operate under the same regulations as in their home jurisdictions, according to the Isle of Man Online.

    Legislation has been passed with the aid of the Financial Supervision Commission, and it is said that the measures are the first of their type anywhere in the world.

    The report quotes Tim Craine, director of e-business, as noting: “It was a perfect example of government working very closely with the private sector. There was an opportunity for the Isle of Man to become a world leader for disaster recovery if we could make it simple and easy for offshore companies to use.”

    He added: “The FSC was happy to comply as long as the businesses using the service were subject to adequate supervision in their own jurisdictions, in order to protect the reputation of the Island.”

    The initiative is to target offshore jurisdictions that may be vulnerable to natural disasters, such

    Posted by iang at 08:04 AM | Comments (0) | TrackBack

    September 22, 2004

    WebTrust: "It's about not causing popups..."

    WebTrust is the organisation that sets auditing standards for certificate authorities. It's motto, "It's a matter of trust," is of course the marketing message they want you to absorb, and subject to skepticism. How deliciously ironic, then, that when you go to their site, click on Contact, you get redirected to another domain that uses the wrong certificate!

    http://www.cpawebtrust.org/ is the immoral re-user of WebTrust's certificate. It's a presumption that the second domain belongs to the same organisation (the American Institute of Certified Public Accountants, AICPA), but the information in whois doesn't really clear that up due to conflicts and bad names.

    What have WebTrust discovered? That certificates are messy, and are thus costly. This little cert mess is going to cost them a few thousand to sort out, in admin time, sign-off, etc etc. Luckily, they know how to do this, because they're in the business of auditing CAs, but they might also stop to consider that this cost is being asked of millions of small businesses, and this might be why certificate use is so low.

    Posted by iang at 07:04 AM | Comments (0) | TrackBack

    September 21, 2004

    To Kill an Avatar

    "To Kill an Avatar", an article by Dan Hunter and F. Gregory Lastowka, explores how online gaming has coped with unexpected behaviour by members - fraud, murder, rape, verbal abuse, hit & run driving all get a mention.

    The gaming world bears some relationship to the world of ecommerce, in that the participants are protected from the consequences of their acts. In ecommerce, anonymous fraudsters seek to steal your identity data by tricking you into entering their counterfeit site. In the game world, a character who raped two others in public said he was just experimenting in a game.

    One solution for the gaming world is the end-user licence, but direct policing has the same effect in the gaming world as it does in digital cash issuance: it's too expensive. The cost of support calls is why we do things as we do, not because we're nice guys or bad guys. If the revenue generated by each average user is $10 over a year, that doesn't leave much for any support, however noble the Issuer, and however aggrieved the user.

    I've predicted that dispute resolution will become an outsourced role in the currency world, and in the game world they've taken it further: people have banded together and deputised posses to hunt down the miscreants, execute them and confiscate their property.

    Could a digital payments world outsource dispute resolution to the point where dodgy merchants lose their assets under sanction from their peers? Possibly. I'd personally reserve execution for spammers, but there is tantalising merit in confiscation of property. In this sense, it would mirror physical world commerce, where bonds and reserves are posted.

    There have been some efforts at associations that seek to bind their members to good behaviour. Predictably, these efforts, like the GDCA, stalled when the perpetrators got too caught up in selling their own economic model, rather than meeting the needs of their members. Like the online gaming world, it seems that every new effort is caught in the net of its own rules, so experimentation moves forward a currency at a time, a world at a time.

    Posted by iang at 04:32 AM | Comments (0) | TrackBack

    September 03, 2004

    Sarbanes-Oxley - what the insiders already know

    Sarbanes-Oxley is the act to lay down the law in financial reporting. It's causing a huge shakeup in compliance. On the face of it, better rules and more penalties should be good, but that's not the case here. Unfortunately, the original scams that brought about Sarbanes-Oxley, and its Basel-II cousin, were based on complexity - hiding stolen money in plain sight. The more complex things get the more scope there is to hide one stolen millions.

    Insiders already know this. The worry-warts have pointed it out, and been ignored. Others are silently waiting, rubbing their hands in glee at the prospects to be opened up.

    Here's another twist. In an article on how complexity and penalties will lead to more cover-ups and more rot, Paul Murphy points out that there's now an easy way to get the CFO fired - simply futz with the server and push the results around. The hapless CFO has two only two choices, cover-up or falling on his sword.

    Of course, this is possible, unless one is using the strong accounting techniques of financial cryptography ... so if you do find yourself employing this rapid promotion strategy, make sure you fix it before it's done to you!



    INDUSTRY ANALYSIS:
    Sarbanes-Oxley: More Cause Than Cure?

    By Paul Murphy LinuxInsider 07/29/04 6:00 AM PT

    From a social perspective, legal consequences tend to be associated with being caught, not with committing the action and Sarbanes-Oxley may therefore "incent" more cover-ups than compliance. From a technical perspective, little can be done without fully integrating production and reporting -- something that can't be done in any practical way with Wintel's client-server architecture.

    At a working lunch last week I had the misfortune of being seated next to some guy from Boston whining about the misery and risk introduced into his life by Sarbanes-Oxley. I kept wanting to ask him what he thought his job was as a CFO, since all Sarbanes-Oxley really does is establish a basis for legal penalties against financial executives who dishonor the job description by failing to understand, apply and maintain adequate internal financial controls.

    I didn't. In the end I told him he could always get his CIO fired rather than take the heat himself because I've never seen a company in which the CFO didn't outrank the CIO. Now, in reality, that doesn't have anything to do with the central issues raised by Sarbanes-Oxley but the idea certainly seemed to cheer him up.

    Sarbanes-Oxley provides the classic legislative response to a perceived abuse: legally defining responsibilities and setting forth penalties for failures to meet them. In doing that, however, it fails to address the underlying issue, which isn't why a few people lied, cheated and stole, but why a much larger number of people let them get away with it for so long.

    Remember, few of what we now clearly see as abuses were secret: Enron's CFO won major financial management awards for what he was doing, most wall street players used personal IPO allocations to buy customer executives, and dozens of analysts wrote about the obvious mismatch between real revenues and the financial statements underlying market valuations at companies like Global Crossing and MCI/WorldCom.

    Wider Context

    Look at this in the wider context of overall financial market management and this becomes a chicken and egg type question. It's clear that the financial market failed to self-correct with the majority of the people involved closing both eyes to abuses while deriding or ignoring those who tried to uphold previously normal standards of personal and professional integrity.

    But what made that mob response possible? Were financial market systems failures induced for personal gain, or did the players involved slide down the slippery slope to corruption because the checks and balances built into the system failed? How was it possible for some brokers to brag to literally hundreds of their colleagues about their actions without having those colleagues drum them out of the business?

    My personal opinion is that a fish rots from the head down. In this case, that the Clintons' sleazy example in the White House combined with easy money from the dot dummies to create an atmosphere of greed and accommodation in which it became easy for otherwise responsible people to rationalize their own abdication of professional responsibilities in favor of personal advantage.

    Bottom Line

    Whether that's true or not, the bottom line on Sarbanes-Oxley is that it doesn't address the major public market abuses but is likely to have some serious, although counter-intuitive, consequences.
    In establishing penalties ranging from fines to jail time and the public humiliation of the perp walk, Sarbanes-Oxley creates both incentives to cover up failures and opportunities for those with axes to grind, people to hurt, or shares to short.

    The cover-up side of this is obvious. Imagine a CFO, popular with the other executives and the board, who discovers that the financial statements have been substantially misstated for some time. In this situation the threat posed both to the individual and the organization by Sarbanes-Oxley could easily tip a decision toward covering up, either through the intentional continuation of the erroneous reporting or through some longer run corrective process.

    The incentives to attack have to be coupled with opportunities to mean anything. That's less obvious, but I admit I enjoyed my lunch rather more after imagining how little access to my tormentor's financial server Relevant Products/Services from Intel Enterprise Solutions Latest News about Servers would really be needed to send him all undeservedly to jail.

    The key enabler here, besides inside access of the kind you get by infiltration, is the separation of financial reporting from production transactions. In his case, the financial statements are drawn from a data mart that gets its input at second hand from a bunch of divisional financial systems.

    Faking business transactions is difficult and risky because there are lots of real-world correlates and you have to fake or modify a lot of them to have a material impact. That's not true, however, where the financial statements are drawn from a data warehouse disconnected from the actual transactions underlying the numbers.

    Installing a Stored Procedure

    In this situation, the external referents are difficult to track and all an attacker has to do is install a stored procedure that transfers small amounts from one of the imaginary accounts -- say, goodwill amortization -- to another every time one of the bulk updates runs.

    Over time, this will have an effect like that of the butterfly flapping its wings in China to cause storms in California, slowly and invisibly undermining the integrity of the financial reports.

    Eventually, of course, some external event will trigger an investigation. Then he's toast, and no amount of pointing at internal controls and auditors, public or otherwise, will make any difference. The system will have been turned on itself with the books balancing perfectly and all checks checking, even while the published profit and loss numbers have been getting "wronger" by the quarter.

    Once that's discovered, the company's executive will face a choice -- cover-up or mea culpa -- and either way Sarbanes-Oxley's threat of legal process will be the biggest scarecrow on the playing field.

    Integrity Guarantees

    From a social perspective, legal consequences tend to be associated with being caught, not with committing the action. Sarbanes-Oxley might therefore "incent" more cover-ups than compliance. From a technical perspective, little can be done without fully integrating production and reporting -- something that can't be done in any practical way with Wintel's client-server architecture.

    I'm really looking forward to the case law on this. After all, if a porn user can't be held responsible because Wintel's vulnerabilities mean that anyone could have put the incriminating materials on his PC, shouldn't a CFO with bad numbers have access to the same defense?

    More interestingly, what happens when a prosecutor with a sense of irony puts some Microsoft (Nasdaq: MSFT) Latest News about Microsoft experts on the stand to testify against a CFO (or porn user) who tries this defense but doesn't have Wintel installed?

    All joking aside, however, the real bottom line on Sarbanes-Oxley might well turn out to be that it weakens rather than strengthens integrity guarantees in public accounting by tilting judgment decisions toward cover-ups in the short term and may threaten Microsoft's client-server architecture in the long term.

    Paul Murphy, a LinuxInsider columnist, wrote and published The Unix Guide to Defenestration. Murphy is a 20-year veteran of the IT consulting industry, specializing in Unix and Unix-related management issues.

    Posted by iang at 05:34 AM | Comments (2) | TrackBack

    September 01, 2004

    VeriSign's conflict of interest creates new threat

    There's a big debate going on the US and Canada about who is going to pay for Internet wire tapping. In case you hadn't been keeping up, Internet wire-tapping *is* coming. The inevitability of it is underscored by the last ditched efforts of the ISPs to refer to older Supreme Court rulings that the cost should be picked up by those requiring the wire tap. I.e., it's established in US law that the cops should pay for each wiretap [1].

    I got twigged to a new issue by an article [2] that said:

    "To make wiretapping possible, Internet phone companies have to buy equipment and software as well as hire technicians, or contract with VeriSign or one of its competitors. The costs could run into the millions of dollars, depending on the size of the Internet phone company and the number of government requests."

    What caught me by surprise was the mention of Verisign. So I looked, and it seems they *are indeed* in the business of subpoena compliance [3]. I know most won't believe me, given their public image as a trusted ecommerce player, so here's the full page:

    NetDiscovery Service for CALEA Compliance

    Complete Lawful Intercept Service

    VeriSigns NetDiscovery service provides telecom network operators, cable operators, and Internet service providers with a streamlined service to help meet requirements for assisting government agencies with lawful interception and subpoena requests for subscriber records. Net Discovery is the premier turnkey service for provisioning, access, delivery, and collection of call information from operators to law enforcement agencies (LEAs).

    Reduce Operating Expenses

    Compliance also requires companies to maintain extensive records and respond to government requests for information. The NetDiscovery service converts content into required formats and delivers the data directly to LEA facilities. Streamlined administrative services handle the provisioning of lawful interception services and manage system upgrades.

    One Connection to LEAs

    Compliance may require substantial capital investment in network elements and security to support multiple intercepts and numerous law enforcement agencies (LEAs). One connection to VeriSign provides provisioning, access, and delivery of call information from carriers to LEAs.

    Industry Expertise for Continued Compliance

    VeriSign works with government agencies and LEAs to stay up-to-date with applicable requirements. NetDiscovery customers benefit from quick implementation and consistent compliance through a single provider.

    CALEA is the name of the bill that mandates law enforcement agency (LEA) access to telcos - each access should carry a cost. The cops don't want to pay for it, and neither do the suppliers. Not to mention, nobody really wants to do this. So in steps VeriSign with a managed service to handle wiretaps, eavesdropping, and other compliance tasks as directed under subpoena. On first blush, very convenient!

    Here's where the reality meter goes into overdrive. VeriSign is also the company that sells about half of the net's SSL certificates for "secure ecommerce [4]." These SSL certificates are what presumptively protect connections between consumers and merchants. It is claimed that a certificate that is signed by a certificate authority (CA) can protect against the man-in-the-middle (MITM) attack and also domain name spoofing. In security reality, this is arguable - they haven't done much of a job against phishing so far, and their protection against some other MITMs is somewhere between academic and theoretical [5].

    A further irony is that VeriSign also runs the domain name system for the .com and the .net domains. So, indeed, they do have a hand in the business of domain name spoofing; the trivial ease of mounting this attack has in many ways influenced the net's security architecture by raising domain spoofing to something that has to be protected against [6]. But so far nothing much serious has come of that [7].

    But getting back to the topic of the MITM protection afforded by those expensive VeriSign certificates. The point here is that, on the one hand, VeriSign is offering protection from snooping, and on the other hand, is offering to facilitate the process of snooping.

    The fox guarding the chicken coop?

    Nobody can argue the synergies that come from the engineering aspects of such a mix: we engineers have to know how to attack it in order to defend it. This is partly the origin of the term "hacker," being one who has to crack into machines ... so he can learn to defend.

    But there are no such synergies in governance, nor I fear in marketing. Can you say "conflict of interest?" What is one to make of a company that on the one hand offers you a "trustworthy" protection against attack, and on the other hand offers a service to a most likely attacker [8]?

    Marketing types, SSL security apologists and other friends of VeriSign will all leap to their defence here and say that no such is possible. Or even if it was, there are safeguards. Hold on to that thought for a moment, and let's walk through it.

    How to MITM the CA-signed Cert, in one easy lesson

    Discussions on the cryptography list recently brought up the rather stunning observation that the Certificate Authority (CA) can always issue a forged certificate and there is no way to stop this. Most attack models on the CA had assumed an external threat; few consider the insider threat. And fair enough, why would the CA want to issue a bogus cert?

    In fact the whole point of the PKI exercise was that the CA is trusted. All of the assumptions within secure browsing point at needing a trusted third party to intermediate between two participants (consumer and merchant), so the CA was designed by definition to be that trusted party.

    Until we get to VeriSign's compliance division that is. Here, VeriSign's role is to facilitate the "provisioning of lawful interception services" with its customers, ISPs amongst them [9]. Such services might be invoked from a subpoena to listen to the traffic of some poor Alice, even if said traffic is encrypted.

    Now, we know that VeriSign can issue a certificate for any one of their customers. So if Alice is protected by a VeriSign cert, it is an easy technical matter for VeriSign, pursuant to subpoena or other court order, to issue a new cert that allows them to man-in-the-middle the naive and trusting Alice [10].

    It gets better, or worse, depending on your point of view. Due to a bug in the PKI (the public key infrastructure based on x.509 keys that manages keys for SSL), all CAs are equally trusted. That is, there is no firewall between one certificate authority and another, so VeriSign can issue a cert to MITM *any* other CA-issued cert, and every browser will accept it without saying boo [11].

    Technically, VeriSign has the skills, they have the root certificate and now they are in the right place. MITM never got any easier [12]. Conceivably, under orders from the court Verisign would now be willing to conduct an MITM against its own customers and its own certs, in every place that it has a contract for LEA compliance.

    Governance? What Governance?

    All that remains is the question of whether VeriSign would do such a thing. The answer is almost certainly yes: Normally, one would say that the user's contract, the code of practice, and the WebTrust audit would prevent such a thing. After all, that was the point of all the governance and contracts and signing laws that VeriSign wrote back in the mid 90s - to make the CA into a trusted third party.

    But, a court order trumps all that. Judges strike down contract clauses, and in the English common law and the UCC, which is presumably what VeriSign uses, a judge can strike out clauses in the law or even write an entire law down.

    Further, the normal way to protect against over zealous insiders or conflicts of interests is to split the parties: one company issues the certs, and another breaches them. Clearly, the first company works for its clients and has a vested interest in protecting the clients. Such a CA will go to the judge and argue against a cert being breached, if it wants to keep selling its wares [13].

    Yet, in VeriSign's case, it's also the agent for the ISP / telco - and they are the ones who get it in the neck. They are paying a darn sight more money to VeriSign to make this subpoena thing go away than ever Alice paid for her cert. So it comes down to "big ISP compliance contract" versus "one tiny little cert for a dirtbag who's probably a terrorist."

    The subpoena wins all ways, well assisted by economics. If the company is so ordered, it will comply, because it is its stated goal and mission to comply, and it's paid more to comply than to not comply.

    All that's left, then, is to trust in the fairness of the American juridical system. Surely such a fight of conscience would be publically viewed in the courts? Nope. All parties except the victim are agreed on the need to keep the interception secret. VeriSign is protected in its conflict of interest by the judge's order of silence on the parties. And if you've been following the news about PATRIOT 1,2, National Security Letters, watchlists, no-fly lists, suspension of habeus corpus, the Plame affair, the JTTF's political investigations and all the rest, you'll agree there isn't much hope there.

    What's are we to do about it?

    Then, what's VeriSign doing issuing certs? What's it doing claiming that users can trust it? And more apropos, do we care?

    It's pretty clear that all three of the functions mentioned today are real functions in the Internet market place. They will continue, regardless of our personal distaste. It's just as clear that a world of Internet wire-tapping is a reality.

    The real conflict of interest here is in a seller of certs also being a prime contractor for easy breachings of certs. As its the same company, and as both functions are free market functions, this is strictly an issue for the market to resolve. If conflict of interest means anything to you, and you require your certs to be issued by a party you can trust, then buy from a supplier that doesn't also work with LEAs under contract.

    At least then, when the subpoena hits, your cert signer will be working for you, and you alone, and may help by fighting the subpoena. That's what is meant by "conflict of interest."

    I certainly wouldn't recommend that we cry for the government to fix this. If you look at the history of these players, you can make a pretty fair case that government intervention is what got us here in the first place. So, no rulings from the Department of Commerce or the FCC, please, no antitrust law suits, and definitely no Star Chamber hearings!

    Yet, there are things that can be done. One thing falls under the rubric of regulation: ICANN controls the top level domain names, including .net and .com which are currently contracted to VeriSign. At least, ICANN claims titular control, and it fights against VeriSign, the Department of Commerce, various other big players, and a squillion lobbyists in exercising that control [14].

    It would seem that if conflict of interest counts for anything, removing the root server contracts from VeriSign would indicate displeasure at such a breach of confidence. Technically, this makes sense: since when did we expect DNS to be anything but a straight forward service to convert domain names into numbers? The notion that the company now has a vested interest in engaging in DNS spoofing raises a can of worms that I suspect even ICANN didn't expect. Being paid to spoof doesn't seem like it would be on the list of suitable synergies for a manager of root servers.

    Alternatively, VeriSign could voluntarily divest one or other of the snooping / anti-snooping businesses. The anti-snooping business would be then a potential choice to run the DNS roots, reflecting their natural alignments of interest.


    Addendum: 2nd February 2005. Adam Shostack and Ian Grigg have written to ICANN to stress the dangers in conflict of interest in selection of the new .net TLD.

    [1] This makes only sense. If the cops didn't pay, they'd have no brake on their activity, and they would abuse the privilege extended by the law and the courts.

    [2] Ken Belson, Wiretapping on the Net: Who pays? New York Times, http://www.iht.com/articles/535224.htm

    [3] VeriSign's pages on Calea Compliance and also Regulatory Compliance.

    [4] Check the great statistics over at SecuritySpace.com.

    [5] In brief, I know of these MITMs: phishing, click-thru-syndrome, CA-substitution. The last has never been exploited, to my knowledge, as most attacks bypass certificates, and attack the secure browsing system at the browser without presenting an SSL certificate.

    [6] , D. Atkins, R. Austein, Threat Analysis of the Domain Name System (DNS), RFC 3833.

    [7] There was the famous demonstration by some guy trying to get into the DNS business.

    [8] Most likely? 'fraid so. The MITM is extraordinarily rare - so rare that it is unmeasurable and to all practical intents and purposes, not a practical threat. But, as we shall see, this raises the prospects of a real threat.

    [9] VeriSign, op cit.

    [10] I'm skipping here the details of who Alice is, etc as they are not relevent. For the sake of the exercise, consider a secure web mail interface that is hosted in another country.

    [11] Is the all-CAs-are-equal bug written up anywhere?

    [12] There is an important point which I'm skipping here, that the MITM is way too hard under ordinary Internet circumstances to be a threat. For more on that, see Who's afraid of Mallory Wolf?.

    [13] This is what is happening in the cases of RIAA versus the ISPs.

    [14] Just this week: VeriSign to fight on after ICANN suit dismissed
    U.S. Federal District Court Dismisses VeriSign's Anti-Trust Claim Against ICANN with Prejudice and the Ruling from the Court.
    Today: VeriSign suing ICANN again

    Posted by iang at 06:20 AM | Comments (5) | TrackBack

    July 31, 2004

    Geeks take Sarbanes-Oxley to task?

    In a curious crossover reminiscent of financial cryptography (!), here's an article from LinuxInsider that deals with all that good governance stuff coming out of the Sarbanes-Oxley mess. Even more curious, I don't disagree that much with what Paul Murphy had to say.

    Sarbanes-Oxley: More Cause Than Cure?

    Nothing more to say ... check it out if you are into governance.

    Posted by iang at 11:20 AM | Comments (0) | TrackBack

    July 18, 2004

    Trust and Trustees

    Over in the US of A, the mutual funds scandal continues to rumble on. In this case, a new article "Regulators overstep with mutual fund trustees" brings out one of the conundrums in the structure that is in place. In short, the Bank of America, as part of its $375 million settlement with Elliot Spitzer's office, also decided to sack the Trustees of its funds.

    Now people are wondering how it is possible for a manager to sack the Trustee. As the trade group wrote:

    ''By accepting the proposition that Bank of America has the capacity to settle charges by causing the replacement of mutual fund trustees, the Commission would be suggesting that Bank of America, not the trustees, controls the funds, ..."

    Well, it's a good point, isn't it! Reading the article in full and considering every action and event, it is clear that Bank of America, the manager, and the regulators, New York Attorney General and the SEC, have all quite happily ignored the Trustees. Until it is time to sack them, of course.

    Trusts are nominally owned by their Trustees, and the Trustee is in charge of all management and governance decisions. He can't be sacked by the manager, but in the Trust documents, there is often provision for a Trust Protector. This person can generally sack the Trustee, and do all sorts of other things, as laid out in the Trust document. Or, at the least, there will be a way to sort out these issues, if only because Trustees are often old, and check out of their own accord.

    So, skipping that storm in a teacup, what was the substance of the Trustees' claim to control the management and to guard the funds? Here it is:

    ".... In a meeting in May 2002, [the Trustees] voted to take action against short-term traders, called market timers. These traders buy and sell shares of foreign funds overnight, to lock in quick profits at the expense of other investors. The board instituted a 2 percent penalty fee for anyone holding shares less than 90 days, in order to dilute any profits from timing.
    "But at that same meeting, according to Spitzer's allegations, Nations Fund managers persuaded the trustees to give one elite client a free ride. According to the minutes of the meeting reviewed by Spitzer's investigators, Bank of America wanted to let a hedge fund, Canary Capital Partners, market-time at will, without paying the fees. The eight trustees present at the meeting (two missed the session) agreed to the arrangement, Spitzer said.

    Whoops-a-daisy! The Trustees gave a free pass to Canary Capital, which was the market timer that started the whole schamozzle. So the more likely future for the Trustees is that they have to face criminal or civil proceedings for all that money that they let slip by. It may be that being sacked when they can't be sacked is the best thing that ever happened to them.

    What I don't understand about this part is why people expect these appointments to actually work. Of course, if you put a Trustee in place, he might honestly do his job to look after the assets. But, more than likely, he won't. Why should he?

    The only reason he would do the job properly is if he was monitored. Nobody was monitoring these guys, and the Managers were allegedly conspiring with them to let the fraud continue. Well, of course! There was too much money involved not to try and steal it.

    Which is why when I designed the 5PM I started out with the principle that nobody does the job unless monitored. And nobody monitors like the owner (forget auditors, they're just more highly paid versions of the Trustees). So the most important person in the 5PM is the 5th party - the user. Or, the owner, as they like to call themselves. And the most important part of the structure is not who is doing what, but how they tell the user what they are doing.

    And monitor they do - when given a chance, and when given some explanation of how they are the only ones really standing between their assets and the crooks that are pretending to guard them.


    Addendum 2004.09.06 SEC scrutinizes trustees of mutual funds

    Posted by iang at 08:49 AM | Comments (0) | TrackBack

    July 12, 2004

    VeriCola

    Governance is about the appropriate aligning of incentives. When we build a governance layer, what we are essentially doing is cleaning up after the technocrats have done their best. In the case of FC, the technocrats are cryptographers, software engineers, rights people, and accountants.

    Of course, because we all talk to each other, and we're all multidisciplinary, there is no throw-it-over-the-wall architecture in FC, now, is there? Governance people widely discuss what they can and can't do, and in discussion with the above ubergeeks, and driven by the reqiurements of layers 6, 7, we eventually come up with a design that is cohesive.

    Here's an important idea that we are pushing to take the phishing out of secure browsing. Breached ot the tune of about a billion dollars, the out of date security model for browsing can actually be fixed up quite easily. But to do so we have to think broadly - and we have to align incentives properly. Here's how branding helps where crypto and protocols fail.

    http://iang.org/ssl/VeriCola.html

    (oh, sorry, yes, this is another rant in the infamous "SSL considered harmful" series. Enjoy!)

    Posted by iang at 05:40 PM | Comments (0) | TrackBack

    July 07, 2004

    The Ricardian Contract

    Presented yesterday at the IEEE's first Workshop on Electronic Contracting, a new paper entitled "The Ricardian Contract" covers the background and essential structure of Systemics' innovation in digital contracts. It is with much sadness that I am writing this blog instead of presenting, but also with much gladness that Mark Miller, of E and capabilities fame, was able to step in at only a few hours notice.

    That which I invented (with help from Gary Howland, my co-architect of the Ricardo system for secure assets transfer) was a fairly mundane document, digitised mundanely, and wrapped in some equally mundane crypto. If anything, it's a wonderful example of how to use very basic crypto and software tools in a very basic fashion to achieve something much bigger than its parts.

    In fact, we thought it so basic that we ignored it, thinking that people will just copy it. But, no-one else did, so nearly a decade after the fact, I've finally admitted defeat and gone back to documenting why the concept was so important.

    The Ricardian Contract worked to the extent that when people got it, they got it big. In a religious sense, which meant that its audience was those who'd already issued, and intiutively felt the need. Hasan coined the phrase that "the contract is the keystone of issuance," and now Mark points out that a major element of the innovation was in the bringing together of the requirements from the real business across to the tech.

    They are both right. Much stuff didn't make it into the paper - it had hit 20 pages by the time I was told I was allowed 8. Slashing mercilessly reduced it, but I had to drop the requirements section, something I now regret.

    Mark's comment on business requirements matches the central message of FC7 - that financial cryptography is a cross-discipline game. Hide yourself in your small box, at your peril. But, no person can appreciate all the apposite components within FC7, so we are forced to build powerful, cross-discipline tools that ease that burden. The Ricardian Contract is one such - a tool for bringing the technical world and the legal world together in issuance of robust financial value.

    Posted by iang at 06:03 AM | Comments (1) | TrackBack

    July 02, 2004

    Putting the chat back into IM

    An interesting article about how a manager lost his job when an instant messaging virus sent his entire recorded conversations to his buddy list. This brings out the ticking time bomb that is the archive of all ones conversations. I've always treated chat and IM as just that - idle chat, and don't record those comments please!


    Yet I seem to be a minority - I know lots of people who record their every message. And they've got good reasons, which makes me feel even worse. This permanent archiving kind of takes the spontaneity out of it, and it certainly makes it un-chat-like. How does one feel about teasing around with ones partner, as one does, when the threat of a divorce case in 4 years time brings out how cruel you were? Or, idle musings on the safety features of a product, in an open whiteboard fashion, gets dragged into liability suits?

    I don't think there is an easy answer to this dilemma. The medium of chat is as it is, and no amount of wishing for that personal, forgiving experience can make the chat archiving devil vanish.

    But there are some things that could be done. Here's one idea - perhaps a chat client could present a policy button with a buddy connection. For example, there might be different buttons for partner/confidential, business/confidential, negotiation/confidential and client/attorney privilege.

    The first might extend husband-wife protection, with an intent of making the chat not useable against each party in a court of law. The second might create an internally confidential status, so that any forwarding could be warned against. The third would extend confidentiality to the documents such that they couldn't be used in a dispute (this is a trap for young players that I fell into). And the fourth could make the discussions inaccessible to aggressive plaintiffs. (And, we'd of course need another button for "write your own." Not that many people would of course.)

    To support these buttons, there would need to be a textual understanding. A contract, lawyers would call it. If we both selected the same contract, then we'd agreed up front to its provisions. In legal terms, this gives us some protection - the courts generally agree with what you said up front.

    There are limits of course - for example contract protection gets weaker if criminal proceedings are being undertaken. In which case, if you murder your spouse, you shouldn't expect the marital confidentiality button to save you. Also, even if the words can't be presented in court, there might be a lot of value in just reading them.

    But it could bring back enough peace of mind to enable IM to get chatty again. What say you? Select your chat confidence policy and IM me with comments....

    Posted by iang at 09:08 AM | Comments (1) | TrackBack

    June 25, 2004

    Independent Chairmen

    In the governance soap opera known as the mutual funds scandal, the SEC voted narrowly to insist on Chairmen being Independent [1]. This was a hard fought battle, and quite rightly - it is hard to see just how this is going to make a difference.

    It doesn't take a doctorate to realise that those funds that have insiders as chairmen - 80% of them - can simply find a mate who is nominally independent. This reminds me of the George Bernard Shaw joke about how any woman can be a prostitute, we just have to establish the price. For money, most will claim whatever they are told to say, including independence.

    The core issue seems to come down to the conflict of interest. It's pretty clear that any appointees of the management company have two masters - the investors and the management company. But, this is generally resolved by aligning their incentives, not by making up yet another rule.

    And here's the clanger: mutual funds are set up by the management company, and they take a fee for service. There's no getting around the fact that the management company's incentive is aligned towards egregious fee inflation (Elliot Spitzer's 1st complaint) and insider fraud (2nd complaint).

    So, mucking around at the titular notion of independence will have little or no beneficial effect on the core issue. It's the incentives that are mucked up, and the only question is, where next will the fire break out?

    Having said that, it's hard not to have sympathy with the SEC. It has to do something, but what? The shrill apologists for the mutual funds aren't exactly offering a solution [2]. Instead, what they appear to be saying is "we don't want any changes so we can get back to raiding the funds..."

    The only thing I've heard so far that makes any sense (other than our own RTGS solutions of course) is Fidelity's push to have DTCC take over the settlement. Yet, they are embroiled in the Stockgate scandal, so the shine is certainly off that idea [3].

    [1] SEC Says Mutual Funds Must Have Independent Chairmen
    http://www.accountingweb.com/cgi-bin/item.cgi?id=99395&d=815&h=817&f=816&dateformat=%25B%20%25e,%20%25Y
    [2] Mutual Fund Folly By JAMES K. GLASSMAN
    sorry, no URL, but seems to be the Wall Street Journal.
    [3] DTCC accused of counterfeiting shares
    http://www.financialcryptography.com/mt/archives/000157.html

    Posted by iang at 06:59 AM | Comments (0) | TrackBack

    June 22, 2004

    DTCC accused of counterfeiting shares

    I had heard about Stockgate a while back when the Nanopierce lawsuit was filed. At the time, it looked like a hopeful settlement deal, but now more details have come to light [1].

    And what details! This may well be bigger than the mutual funds scandal, which was the biggest scandal of all time as far as I can see. The Nanopierce class action team has 65 lawyers in it! They have (allegedly) uncovered 1200 funds and 150 broker dealers in naked short selling.

    Here's how it works. Short selling is supposed to involve borrowing the stock, then selling the borrowed stock on the market, anticipating a drop in price. It's "good" because it moves information more quickly. It's "bad" because someone with a lot of time and money on their hands can just dump the stock and then buy it back at a cheaper price. Like all things valued by people over the age of 12, there are goods and bads in it.

    Where it gets egregious is if the stock is not borrowed at all, and simply "sold" on a promise. Now, if you are a big bad player and you can "not borrow" enough of it, and "sell" enough of what you don't have, then the price has to go down. Supply and demand, and all that. Then you can "buy" it on the cheap, transfer a few things around in the accounts, and end up with a profit.

    Having the actual stock on hand is supposed to put a brake on this practice. And, when the DTCC - the single depository and clearing agency in the US - set up its stock lending facility, it was quite popular, as it was relatively easy to just borrow the shares from DTCC, and dump them on the market.

    All supposing that DTCC had acquired them from somewhere. Now it transpires that DTCC took a fee for this activity, and worked out that they could over-lend. That is, they could simply counterfeit the shares. It's alleged by the lawsuit that DTCC turned off its governance, and turned on the equity tap. Anyone who wanted to borrow, presumably could - even if there were none to borrow.

    "The Stock Borrow Program was purportedly set up to facilitate expedited clearance of stock trades. Somewhere along the line, the DTCC became aware that if it could lend a single share an unlimited number of times, it could collect a fee each time, according to Burrell. "There are numerous cases of a single share being lent ten or many more times," giving rise to the complaint that the DTCC has been electronically counterfeiting just as was done via printed certificates before the Crash."

    "Such re-hypothecation has in effect made the potential 'float' in a single company's shares virtually unlimited and the term 'float' meaningless. Shares could be electronically created/counterfeited/kited without a registration statement being filed, and without the underlying company having any knowledge such shares are being sold or even in existence." ...

    But, says the cunning governance observer, what happens if the price moves against the naked short seller? Surely he's then caught with his pants down? No. Here's the game: DTCC, instead of taking a clearing agency role as they are supposed and covering the particpants, simply refers the dispute to arbitration between the parties! And, they leave an open position book until it has been resolved.

    If true, this makes a mockery of governance, regulation, the system, and any sense of investment. What is the point in investing in shares in a small company if the big players are naked short selling it out of existance, simply to transfer wealth from your pocket into their pocket?

    The mutual funds scandal was pretty rude - big players conspired with insiders to strip out percentage points worth of value every year. This sort of salami scam works as long as the amounts taken out don't appear too large. 1% per annum is fine ... always remembering that we are talking about 1% of a 7 trillion dollar amount here.

    But stockgate is a whole other ballgame, as the Americans would say - here, broker dealers and investment banks were conspiring allegedly to transfer the *whole* value of small companies to them. One expert claims that 7,000 public companies and from one to three trillion dollars have been raided.

    [1] http://www.investors.com/breakingnews.asp?journalid=21660437&brk=1
    StockGate: London Companies on Berlin Exchange Ask for Investigation, Reg SHO Hearing Reset

    Posted by iang at 07:26 AM | Comments (7) | TrackBack

    June 09, 2004

    Compliance Persons Of The Year

    I'm not one for awards, as I usually see them as a career destroyer. But these ones are fun - their careers are already destroyed in the name of truth, justice, etc.

    I refer of course to the mutual funds scandal. It has been a bit of an eye-opener for me, partly because of the dirt that was exposed, and partly because there are so many forces were against fixing the mess. It's known, for example, that regulators knew the game, but "could not do anything about it."

    In a surprise move, Compliance Reporter, an industry governance magazine, has decided to give the so-called whistleblowers - Harrington, Nesfield and Goodwin - their award of "Compliance Persons of the The Year." While the press were busy digging up dirt on these guys to make them appear like evil participants (in some cases, to directly move attention away from the real evil participants, and in others, because it just made for a better story and they didn't understand the scam anyway) here is a group that recognises the rot in the system, and says:

    "Though not compliance officers, Harrington, Nesfield and Goodwin's actions had more impact on the mutual fund industry than anyone's ..."

    Elliot Spitzer also picked up the award for "Regulator of the Year." Equally controversial, and equally poignant. You have to hand it to these Compliance Reporter guys - they know how to point out that the rest of the industry ain't worth diddly squat when it comes to governance.

    Fuller blurbs follow, FTR:




    Compliance Persons Of The Year
    May 21, 2004
    Noreen Harrington, James Nesfield, Andrew Goodwin,
    informants, The Canary Capital Partners case


    Harrington, Nesfield, and Goodwin sounded the alarm on mutual fund trading abuses by bringing the massive improprieties at Canary Capital Partners to light. By doing so they opened the door for New York Attorney GeneralEliot Spitzer, and eventually the Securities and Exchange Commission, to cast their nets on the mutual fund industry. Harrington is a "gutsy gal," said a Washington, D.C.-based securities lawyer. Though not compliance officers, Harrington, Nesfield and Goodwin's actions had more impact on the mutual fund industry than anyone's, the lawyer said. The informants are credited with being the catalysts for a complete ethical makeover of the entire industry. As Vanguard Group founder and former CEO John Bogle put it in a recent speech, "The shareholder is the raison d'etre for this industry's existence."

    Harrington, whose job at Stern Asset Management was to distribute the Stern family's money to other investment funds, was the first to tell Spitzer's office about Canary Capital's trading irregularities. In June, she informed the Attorney General that Canary was parking investments in mutual funds in exchange for being allowed to rapidly trade other funds--also known as market timing. She also told the Attorney General's office that Canary had engaged in illegal late trading--the practice of executing trades at same day-prices after the 4 p.m. close.

    Goodwin was a senior trader at Canary Capital, and Nesfield was a back-office consultant hired by Canary to recruit mutual fund companies that would let the hedge fund market-time their funds. Neither was on Canary's payroll when Harrington contacted Spitzer. Nesfield and Goodwin became informants in detailing Canary's abuses once Spitzer launched the investigation, and Spitzer's office acknowledged Harrington's and the informants' roles in the probe.

    Harrington, Nesfield, and Goodwin's actions have opened the door to reforms that will keep continuing, said Donald Weiss, partner at Bell, Boyd & Lloyd in Chicago. As another lawyer added, there is just nothing like "a good squeal." Harrington and Goodwin's whereabouts are unknown. Nesfield lives in North Carolina and makes a living installing piers and working on fishing boats.



    Regulator Of The Year
    May 21, 2004
    Eliot Spitzer, New York Attorney General


    In early September, Spitzer grabbed the mutual fund industry by the horns and ushered in an age of regulation the likes of which the industry had not seen in more than half a century. "The mutual fund industry is presently undergoing its most thorough transformation since the enactment of the 1940 Act," said Mitch Herr, partner at Holland & Knight in Miami and a litigator who represents securities firms. "No one could reasonably disagree that this entire process arises out of Spitzer's seminal investigation into Canary Capital [Partners] and the various market participants who allowed it to engage in late trading and market timing," said Herr. "Spitzer has been instrumental in identifying systemic problems in the securities industry that need to be addressed by the entire regulatory community."

    In early September, Spitzer's office brought a case against hedge fund Canary Capital for market timing and late trading in several mutual funds. It was a case that will live in financial history as the opening battle in the war on fraudulent mutual fund trading practices. "There is no doubt that Eliot Spitzer was the primary catalyst in what resulted in the biggest mutual fund scandal and reform effort in history," said David Tittsworth, executive director of the Investment Counsel Association of America. After the Canary case, the Securities and Exchange Commission, the NASD and the Attorney General of Massachusetts brought charges against mutual funds and individuals who engaged in the trading practices.

    "Spitzer certainly deserves recognition for his vigorous intervention into the securities enforcement arena," said C. Evan Stewart, partner with Brown Raysman Millstien Felder & Steiner in New York. "Whether all of his efforts are consistent with the primacy of the federal securities laws and whether all of his prosecutions have been interposed consistent with public policy, however, remain to be seen." Spitzer has received his share of criticism for attempting to regulate mutual fund fees and for not acting in concert with federal regulators such as the SEC. In spite of the controversy, many feel Spitzer has succeeded in his crusade to improve the markets and investor confidence. "[Whether you] agree with him or not, the fact is the public investor sleeps better at night as a result of Spitzer's recent actions," said Bill Singer, partner with Gusrae Kaplan & Bruno in New York.

    Posted by iang at 10:02 AM | Comments (0) | TrackBack

    June 04, 2004

    Trust Cannot be Outsourced

    The PKI sector successfully pushed the notion that trust could be outsourced. This was a marketing claim that was never quite shown to be the case, in that PKI itself never delivered a workable business model. So maybe the PKI vendors will bounce back in another life, and show us what they meant.

    I think not. Outsourcing trust to a PKI vendor is like outsourcing taste to a brewery, you may as well let the brewer drink the beer for you.

    This conundrum should be obvious to any serious business person. It is possible to outsource process, and it is possible to outsource substantial elements of due diligence (DD). But in the end, you make the decision, and the document you get from some rating agency is just one input into the full process.

    The credit ratings agencies are perhaps the best example. Do they do your trust for you? No, not really. They provide a list of the customer's credit events. As well as that useful input to the process, a good business conducts other checks. A forecourt - car seller - might check the driver's licence, and it might pay more attention to some things on the credit report than others. Car dealers make assessments of integrity by looking and talking to the person. And ultimately they trust in the courts, police and driver and vehicle registration people to provide limits.

    There's an easy test. If the trust is outsourced to a firm, the firm can make the decision for you. Does the credit agency decide to sell a car on credit? No chance. Does a third party PKI decide to let the customer in to transfer her life's savings? No way.

    There are cases where decisions of trust are made entirely by other organisations. In which case, I'd suggest, the model is back to front. What's happened is that you've outsourced your business to the trust provider. Or, the decision maker has outsourced customer acquisition to you. That which owns the customer, is the business. You're now in the business of providing leads.

    So if all this is true, why did PKI vendors make such a big deal of outsourcing trust? They weren't trying to put their customers out of business by acquiring their customers, that's for sure. No, it seems as if was just another powerful image of marketing. Also, as an evocative reason with no substance, it was a qualifier. If a customer "bought" the message that trust could be outsourced, they were likely to buy into PKI, also.

    Posted by iang at 09:24 PM | Comments (0) | TrackBack

    May 20, 2004

    Mutual Funds - Timestamping

    In a rare arisal of a useful use of cryptography in real life, the mutual funds industry is looking to digital timestamping to save its bacon [1]. Timestamping is one of those oh-so-simple applications of cryptography that most observers dismiss for its triviality.

    Timestamping is simply where an institution offers to construct a hash or message digest over your document and the current time. By this, evidence is created that your document was seen at that time. There are a few details as to how to show that the time in ones receipt is the right one, but this is trivial (meaning we know how to do it, not that it is cheap to code up..) by interlinking a timestamp with the preceeding and following ones. So without even relying on the integrity of the institution, we can make strong statements such as "after this other one and before this next one."

    The SEC is proposing rule changes to make the 4pm deadline more serious and proposes USPS timestamping as one way to manage this [2]. There are several things wrong with the USPS and SEC going into this venture. But there are several things right with timestamping in general, to balance this. On the whole, given the complicated panopoly of strategic issues outlined earlier, timestamping could be a useful addition to the mutual funds situation [3].

    First what's wrong: timestamping doesn't need to be regulated or charged for, as it could easily be offered as a loss leader by any institution. A server can run a timestamping service and do 100,000 documents a day without noticing. If there is any feeling that a service might not be reliable, use two! And, handing this commercial service over to the USPS makes no regulatory sense in a competitive market, especially when there are many others out there already [4].

    Further, timestamping is just a small technical solution. It shouldn't need to be regulated at all, as it should be treated in any forum as evidence. Either the mutual fund accepts orders with timestamps, or it doesn't. If it doesn't, then it is taking a risk of being gamed, and not having anything to cover it. An action will now be possible against it. If it does only accept timestamped orders, then it's covered. Timestamping is better seen as "best practices" not as Regulation XXX.

    Especially, there are better ways of doing it. A proper RTGS transactional system has better protections built in of its nature than timestamping can ever provide, and in fact a regulation requiring timestamping will interfere with the implementation of proper solutions (see for example the NSCC solution in [1]). It will become just another useless reg that has to be complied with, at cost to all and no benefit to anyone.

    Further, it should be appreciated that timestamping does not "solve the problem" (but neither does the NSCC option). What it allows for is evidence that orders were received by a certain time. As explained elsewhere, putting a late order in is simply one way of gaming the fund [5]. There are plenty of other ways.

    Coming back to where we are now, though, timestamping will allow the many small pension traders to identify when they got their order in. One existing gaping loophole is that small operators are manual processors and can take a long time about what they do. Hence 4pm was something that could occur the next day, as agreed by the SEC! With timestamping, 4pm could still be permitted to occur tomorrow, as long as the pension trader has timestamped some key piece of info that signals the intent.

    For this reason, timestamping helps, and it won't hinder if chosen. The SEC is to be applauded for pushing this forward with a white paper. Just as long as they hold short of regulation, and encourage mutual funds to adopt this on an open, flexible basis as we really don't want to slow down the real solutions, later on.

    [1] U.S. Postal Service Wants to Deliver Fairness to Mutual Funds
    http://www.wbex.com/script/headline_newsmanager.php?id=294597&pagecontent=business&feed_id=43
    [2] White Paper on Mutual Fund Reform and the USPS Electronic Postmark®
    http://www.sec.gov/rules/proposed/s72703/uspostal020204.htm
    [3] Mutual Funds - the Softball Option
    http://www.financialcryptography.com/mt/archives/000140.html
    [4] E.g., DigiStamp, http://www.digistamp.com/
    [5] Nesfield and Grigg, "Mutual Funds and Financial Flaws," testimony before U.S. Senate Finance Committee, 27th January 2004.
    http://iang.org/papers/mutual_funds.html

    Posted by iang at 04:53 AM | Comments (2) | TrackBack

    Mutual Funds - the Softball Option

    Reading the slew of articles in our favourite humungous financial scandal, it seems that the SEC is going for the softball option. (Recaps here [1], [2].) Congress is backing off from legislation, and the SEC's proposals - quick redemptions attract a fee, more independent boards, etc - are being treated with a yawn by some and a grumble by others [3], [4]. Indeed, the recent Fortune article (sorry, no URL) suggests that the techniques behind the scandal were discussed in a book as early as 1992 [5].

    What to make of all this? First we saw the excitement of AG Elliot Spitzer's billion dollar assault on the fund managers, and now we see the regulators lack lustre response - almost as if they didn't want to do it [6].

    Jim Nesfield's comment adds light [4]:

    ' While most analysts like the SEC's plan against late-trading, James Nesfield, a key informant in the scandal involving disgraced hedge fund Canary Capital Partners, says it fails to address structural problems in the industry. '


    ' "My answer to you is that they [SEC officials] are doing everything they possibly can with what they have," said Nesfield, ... [The] systems, Nesfield says, remain vulnerable to manipulation by unscrupulous traders. And none of the regulations implemented so far directly address the problem. "They need to address the way trades are processed and settled ... As long as there's a human being that can slip an order in a batch after 4 p.m., you could have late trading." '

    Which is where we are: The SEC (and Congress, and the NASD, and ...) are faced with several choices. 1. create raft of legislation to "solve the problem;" 2. fix the structural problems at source. 3. wait for someone to fix them. 4. do nothing.

    The issue here may be that the cost of Sarbanes-Oxley / Basle II has woken people up to the lack of success of heavy weight regulatory options [7]. Even the regulators must have wondered when the run of scandals was going to end, and wasn't the last cleanup supposed to do it?

    So, 1. is out of favour - no big regulatory package this time. 2. seems obvious. If we can identify the flaws, why not fix them? Structural problems abound, and we know where they are. Further, in these pages we know all about them because we've solved them already. And in that very solution lies the trap.

    The SEC cannot fix the structural problems if it is a commercial responsibility. The mere fact that this could be a purchased solution from a solution provider means that the SEC is somewhat constrained by non-interventionist policies.

    Which leaves 3., waiting for someone to fix them. Which is uncommonly like 4., do nothing. Hence the desire to slap on a few bandaids and hope that we (industrially, collectively) get our transactional act together.

    [1] Nesfield and Grigg, "Mutual Funds and Financial Flaws," testimony before U.S. Senate Finance Committee, 27th January 2004. http://iang.org/papers/mutual_funds.html
    [2] "Governance or Regulation - You Pick?"
    http://www.financialcryptography.com/mt/archives/000027.html
    [3] "Jury's out on mutual fund reform,"
    http://www.tdn.com/articles/2004/05/12/biz/news03.txt
    [4] "SEC fund reform: Is it stalling?"
    http://www.baltimoresun.com/business/bal-bz.reform11may11,0,459903.story?coll=bal-business-headlines
    [5] The New Market Wizards, 1992,
    in one chapter profiles the "Gil Blakes" strategy.
    [6] "Mutual funds face minimal scrutiny,"
    http://www.sunherald.com/mld/sunherald/business/8678286.htm
    [7] "Sarbanes assails bid to dilute reforms,"
    http://www.baltimoresun.com/business/investing/bal-bz.sarbanes14may14,0,1090342.story?coll=bal-investing-headlines

    Posted by iang at 03:37 AM | Comments (0) | TrackBack

    May 15, 2004

    Open Governance Mindmap

    The talk being prepared for the PaySec conference next month is now entitled Open Governance. Here's the mindmap I am using to dump all my thoughts on ... what amounts to the entire governance layer.

    Be-aware - this is an applet which requires your browser to be installed with Java 1.4! Worse, the content is a draft, and will change over time. But, for the interim, this mindmap tool is quite an exciting little toy now that I've found out how to get it working across a group of people.

    Check it out. The two things you can do are click on a node to fold it up and open out, and also grab the background to move around. Best seen on a big screen.

    (I have another mindmap for SSL secure browsing threats which I'll also post when I've played with things.)

    Posted by iang at 11:00 AM | Comments (0) | TrackBack

    May 12, 2004

    EC opens ears on e-money directive

    The 1990s was characterised by a long fight to stop the Europeans from regulating eMoney out of existence (I wrote about this in my first ever paper). Invented in places like The Netherlands (service station money for truck drivers, and DigiCash's blinded tokens), eMoney always struggled against the fears of the Bundesbank that it would actually succeed and change the banking structure.

    Eventually, the, European Parliament passed a compromised Directive that required issuers to seek a "like a bank" eMoney licence. This regime left all unsatisfied, and as I predicted back in 1996, the real action happened wherever the "need to regulate" was ignored.

    Now it seems that they have opened a review on the eMoney Directive. Read on:

    EC opens ears on e-money directive
    By John Oates Published Monday 10th May 2004 15:13 GMT

    The European Commission has opened a consultation period on its controversial "e-money" directive. The EC wants businesses to tell it how the directive could be improved to "avoid unnecessary burdens for industry".

    Under the directive, providers of e-money will have to provide a way for people to redeem their e-money for real world money. They must also take action to ensure the system is not used for money laundering.

    At present, the e-money directive could be applied to the purchase and use of pre-pay mobile phone cards. The definition of electronic money is monetary value stored on a chip card or computer memory which is accepted for payment by someone other than the issuer.

    In interpreting this for use at a national level regulators have disagreed as to how the directive should apply in practice. Some countries have, for instance, decided that pre-pay mobile cards are covered by the new rules. Because of the confusion, the Commission decided last year to seek a common interpretation of the law.

    That analysis concluded that mobile pre-pay cards do not qualify as e-money if they are used to buy airtime from the company which issued them. But if they are used to buy ringtones, messaging, news, tickets or other products from a third party then they should be considering e-money.

    Still awake at the back? Good. Since, even by EU standards, this is an early morning snack for a four-legged pet (dog's breakfast). The Commission has decided to clarify exactly when and where the e-money directive should be applied. It is asking for comments and suggestions from those in the mobile or related industries and from ordinary punters.

    Interested parties have until 20 July 2004 to respond to the proposals and more details are available here, where you can download the whole consultation document as well. ®

    Posted by iang at 11:16 AM | Comments (0) | TrackBack

    May 03, 2004

    Neu5PM

    Nueclear from Pelle suggests a variant of the 5PM (which in itself is just a variant of hundreds and even thousands of years of good governance). In Pelle's model, he adds an auditor, and changes the names a bit. Here it is:

    6-party model
    http://neuclear.org/display/neu/6-party+model
    Last changed on Apr 01, 2004 by Sandy

    Ian Grigg has formulated a 5-party governance model which provides an excellent starting point for governing electronic assets. We have taken this model and added an additional party, the auditor.

    • Promoter The originator and promoter of an asset. To promote trust he contracts with the 4 following parties and does little else.
    • Issuer Issues assets into the NeuClear System. This could be a trust company or a certified auditor. The main role of the Issuer is to verify that the value implied in the above layer is actually entered into the system and that the Promotor can't falsely inflate the system.
    • Operator The operator is like an Application Service Provider. He maintains the books of the assets and responds to Transfer Orders with Transfer Receipts in such a manner that none of the other parties can interfere or otherwise modify the underlying accounting of the value system.
    • Auditor The auditors run a seperate, parallel set of books to the Operator. He listens to Transfer Orders and Transfer Receipts and is the final authority on balance of accounts.
    • Manager The manager is contracted by the Issuer to do the day-to-day management of the asset. For example, requesting that the Issuer add more assets to the system, or customer service.
    • Users The users are in many ways the real auditors of the system. As long as at least one of the 4 parties directly above is honest, they can monitor the runnings of the Asset live and instantly, to see if anything goes wrong. Users can optionally maintain their own books that can be automatically reconciled with those of the Auditor.

    Note we also modified the names of two of the parties from Ian's 5-party model, as they were causing confusion to people outside of the Financial Cryptography world. Ian's Issuer became our Promoter. His Mint became our Issuer.

    Examples of the 6-party model

    It can be hard to understand the 6-party model without seeing practical examples. Please see the following:

    Posted by iang at 12:03 PM | Comments (9) | TrackBack

    April 10, 2004

    "The Ricardian Contract"

    This paper, written for publication in a proceedings, covers the background of "why the Ricardian Contract?" It's now in final proofreading mode, so if anyone wants a review copy, let me know (still embargoed so no link posted).

    This was a hard paper to write - I had to reverse-engineer the process of many years back. It travels the journey of how we came to place the contract as the keystone of issuance.

    (Along that journey, or revisiting thereof, I had to dispose of any notions of making this paper the one and only for Ricardian Contracts - they suddenly sprung an 8 page limit on me, which put the 22 page draft into turmoil. So, I've stripped out requirements and also any legal commentary, which means - oh joy - two more papers needed...)

    Many thanks to Hasan for the metaphor. The more I think about it, and write about it, the contract really does have a critical place in financial cryptography, such that it deserves that title: the keystone. Because, only when it is in place is the archway of governance capable of supporting the real application.

    Or something. Expressive writing was never my strong suit, so the metaphor is doubly welcome. Bring them on!

    Posted by iang at 09:09 AM | Comments (5) | TrackBack

    April 07, 2004

    Playing Favorites

    An article on the "gap" in regulatory coverage between the Federal Reserve and the SEC. It tries to show that the banks regulated by the Fed got off lightly in the Enron mess, but the ones regulated by the SEC suffered more.

    I don't buy it. The evidence is weak, and the bias shows. However, the discussion is worth having, and no doubt there are tensions there that we need to understand when dealing with a multi-regulator scenario.

    Playing Favorites
    Why Alan Greenspan's Fed lets banks off easy on corporate fraud.

    Ronald Fink, CFO Magazine April 01, 2004

    When the Financial Accounting Standards Board released its exposure draft of new accounting rules for special-purpose entities (SPEs), in late 2002, the nation's financial regulators sent FASB chairman Robert H. Herz decidedly mixed signals.

    On the one hand, the Securities and Exchange Commission wanted Herz to make the rules effective as soon as possible. SPEs were the prime vehicle for the fraud that brought Enron down, and were widely used by other companies to take liabilities off their balance sheets, obscure their financial condition, and obtain lower-cost financing than they deserved. Not surprisingly, the SEC was anxious to head off other financial fiascos resulting from such abuse.

    At the same time, however, the Federal Reserve Board pressed Herz to slow down. That's because the new rules threatened to complicate the lives of the Fed's most important charges: large, multibusiness bank holding companies that happen to earn sizable fees by arranging deals involving SPEs. Stuck between this regulatory rock and hard place, Herz told the Fed and the SEC to get together and work out a timetable that satisfied both constituencies.

    ...

    http://www.cfo.com/printarticle/0,5317,12866|M,00.html?f=options

    Posted by iang at 12:36 PM | Comments (0) | TrackBack

    April 02, 2004

    Biggest scandal is only starting...

    The governance scandal in Mutual Funds is now the biggest ever, according to an article Bear Stearns Faces U.S. Probes... on Bloomberg:

    "Spitzer's probe into Canary marked the beginning of a regulatory investigation into sales and trading practices in the $7.6 trillion U.S. mutual fund industry that has led to the departures of some 80 industry executives and the imposition of more than $1.7 billion in penalties."

    $1.7 bullion puts it past the $1.3 billion settlement in 2002 for email retention. That makes it the biggest financial scandal ever, by size of fines, at least.

    And it's only just starting. Up until now it has primarily been the New York and other state AGs on the prowl, but now it's the Feds: the SEC and the US Attorney.

    That means criminal charges, Federal judges, RICO, long jail sentences and a lot more fines. Also, for the first time, it seems, money market mutual funds are being targetted - these were conspicious in their absence in all the activities by the states. That means the Federal Reserve, as well, as the dollar funds act as dollar payment systems.

    Some last year estimated fines of about $12-13 billion.in a 7 trillion industry. It's still a drop in the bucket of actual losses, which were estimated by some as about 10% of the value under management: so about $700bn.

    Which funds are involved? The quiet money is on "assume all or almost all of them and you will be righter than any other possibility." That is, it isn't possible to work out without some form of divine knowledge, but proving that a given fund wasn't doing it has been harder than first thought.

    For information on the detail and arisal of this scandal, check out Mutual Funds and Financial Flaws by James Nesfield and Ian Grigg, presented as testimony to the US senate hearings. See the more journalistic Governance or Regulation - You Pick? for a blog entry explaining the FC relevance.

    Posted by iang at 12:12 PM | Comments (0) | TrackBack

    March 22, 2004

    Reinventing Contract

    This article by Professor Burke, of the Riga Graduate School of Law, explains how the common law tradition creates a framework of contracts based on negotiation by equal parties, and tries to squeeze all agreement into its framework. Yet, form contracts do not squeeze so readily, and only the presence of legal fictions - ones fraught with potential for flaky rulings - can make these form contracts work under the regime of the classical negotiated contract.

    Standard form contracts are those written by a vendor, for their clients, to create the terms and conditions for some product.

    The difference is in the absence of negotiation, consideration of terms, and meeting of the minds. A form contract is presented, and there is no discussion as to terms. Indeed, Burke says, the counterparty, the customer, has no necessary appreciation of the terms, and not even any especial knowledge that there are terms to consider!

    Thus, as an inescapable conclusion, there can be no meeting of the minds in a form contract. Yet, form contracts are totally legal, totally acceptable, and people travel to work every day on them: we derive huge economic benefit from them, from bus and airline tickets to dry cleaning stubs, from insurance contracts to software licences...

    In fact, Burke proposes that form contracts are 99% of all contracts (albeit with recognition that there is no empirical study to back this up). Whereas 99% of the tradition of contract law is negotiated contracts. This is, to my layman's eye, a huge criticism of the state of the law, but we must drag ourselves back to the here and now.

    Ricardian Contracts are Form Contracts. In this sense they are like airline tickets. The user acts according to a purchase of a product. The product is a payment, a transaction, and the product is "purchased" as a whole entity, including the terms and conditions that apply.

    What the user does not do is negotiate the contract. The user of a Ricardo transaction doesn't enter into a bargain, nor examine the terms, nor suggest their own terms. They simply buy a product called a payment.

    Indeed, in a form contract, as there is no meeting of the minds, there is no symbol to record that event - so, there is no "need" of signatures.

    We've known for a long time that the digital signature of the Issuer was ... an act of some pretence, in the sense that it was completely overdone: the hash entanglement, the publication of the document, and original sales create far more of a record of the intent of the Issuer than any mathematical nonsense dressed up as a signature. But we have puzzled over the question of the user's intent.

    Surely, goes classical contract logic, we needed the user's signature to record their intent and act of entering into the contract? No, it appears not, if Burke's critique is to be taken at face value. This is a form contract, and the usage of the product is as much as we can expect, and as much as we need.

    This discovery doesn't solve every unanswered question about Ricardian Contracts, but it does shift emphasis away from trying to craft a user's signature as a legal symbol (a task of some contortion, if you know your digsig politics). In the general case, the Issuer of a Ricardian Contract needs a signature from the user no more than an auditorium owner needs a signature from members of the audience, as they walk in.

    Both are still covered by terms and conditions of the contract for admittance. It may be that a signature is collected for entrance to a shareholders' meeting, as opposed to a concert, but that's a matter of content, not form.

    Posted by iang at 11:08 AM | Comments (2) | TrackBack

    March 10, 2004

    Fannie Mae no longer backed by the G-Man?

    John Snow, the US Treasury Secretary, has stated that the US Government no longer stands behind Fannie Mae and Freddie Mac. (1, below, 2, 3)

    This takes me back to the late eighties, when the old Lady's Governor announced that the Bank of England would no longer necessarily bail out a bank just because it was a bank. Many years later, driving back after b-school, I heard Eddie George on the radio announcing the bankrupcy and immediate wind-up of Barings Bank.

    Barings was old and venerable, but tiny. A ripple in the pond. Fannie Mae and Freddie Mac are ... none of that!

    WASHINGTON (Reuters) - U.S. Treasury Secretary John Snow took direct aim Tuesday at mortgage finance firms Fannie Mae and Freddie Mac, repeating previous warnings to investors that government-sponsored enterprises are not financially backed by the U.S. government.

    "We don't believe in a 'too big to fail' doctrine, but the reality is that the market treats the paper as if the government is backing it. We strongly resist that notion," he said in prepared remarks before a bankers group here.

    "You know there is that perception. And it's not a healthy perception and we need to disabuse people of that perception. Investments in Fannie (FNM: Research, Estimates) and Freddie (FRE: Research, Estimates) are uninsured investments," he said.

    ...

    Posted by iang at 02:51 PM | Comments (2) | TrackBack

    March 08, 2004

    PayPal Probed for Anti-Fraud Efforts

    Spitzer: PayPal to better disclose Internet buyers' rights

    By MICHAEL GORMLEY
    Associated Press Writer
    March 8, 2004, 5:33 PM EST

    ALBANY, N.Y. -- PayPal, the nation's largest online payment service, has agreed to start making sure Internet consumers get credit when their merchandise doesn't arrive, New York Attorney General Eliot Spitzer said Monday.

    PayPal will pay New York state $150,000 in penalties and the cost of the investigation. The online payment service also will clearly describe consumer rights to its more than 25 million account members including conditions or limitations of the rights and reversals or refund policies.

    Without the agreement, consumers using their credit cards for Internet purchases through payment services would not have been protected by the federal Fair Credit Billing Act and similar state laws. For example, consumers who didn't receive merchandise purchases through PayPal were often denied credit from either PayPal or American Express or Discover credit cards.

    The credit card firms agreed to properly credit consumers in an agreement with Spitzer late last year. The firms are issuing "chargeback" credits to those who didn't receive credit for undelivered items

    "Protecting consumer rights in online transactions is the best way to establish and maintain confidence in electronic commerce," Spitzer said. "As with any new industry, it is essential that consumers making e-payments receive full disclosure of their rights and liabilities."

    ...

    Posted by iang at 05:12 PM | Comments (2) | TrackBack

    February 24, 2004

    XML Voucher

    Ko Fujimura and Masayuki Terada have placed their "XML Voucher" into Internet Draft status.

    The XML Voucher is the next closest thing to the Ricardian Contract that exists. It differs in many details, but the salient advantage of this form over the Ricardian Contract appears to be its use of XML.

    The ID's purpose is to capture some of the details of a retailer's marketing offer, but it does not go so far as to present itself as a contract suitable for securities dealings.

    For example, it does nothing towards the Ricardian Contract's rule of one contract . The voucher is a programmatic construct, rather than a readable document.

    One thing should be noted: definitions and wider scope of their Voucher Trading System appear in RFC3506, and that document should probably be read first.

    Posted by iang at 10:46 AM | Comments (0) | TrackBack

    February 18, 2004

    Soft Dollars under attack

    A story on the Mises Institute site has it that the regulators in the US are now worried about soft dollars, and are looking to close down on the practice.

    The story makes some good points - such as soft dollars having been accepted for decades, and even condoned in the law. Now they are bad and unacceptable and must be stopped.

    Soft dollars, by the way, are a fascinating internal currency used between insiders in wall street and other trading worlds. They are a self-issued currency, handed out as kickbacks by suppliers, and taken back in exchange for some other mild services. The classical path is for a pension to be paid soft dollars in exchange for passing a trade through a bank. Then, the pension purchases research from the bank, paying with soft dollars.

    Whether that's a transfer pricing scheme, as some would have it, or an internal market currency, like our PSD, or a rort designed to rape the unprotected public, depends on many factors. What is clear is that they evolved through pressures in the market place, and probably have their place. But, like anything, they can be abused.

    Instead of fixating on the tabloid libertarian rhetoric, it would have been more useful to speculate on why this is all going on. One clue - the ICI, deep in the midst of crisis from the mutual funds scandal - is asking for the bad stuff to be stopped. How convenient.

    Posted by iang at 11:46 AM | Comments (1) | TrackBack

    February 15, 2004

    The Ricardian Contract

    I have rewritten/revised a paper on the Ricardian Contract, for WEC. It is meant to cover the foundations, design and results of same, in a fullsome, yet readable fashion.

    Contact me if you are in a mood to review it! It's in the normal secret place, under the name of ricardian_contract with all the normal suffixes.

    Posted by iang at 09:17 PM | Comments (0) | TrackBack

    February 03, 2004

    Rock and Roll

    http://www.federalreserve.gov/boarddocs/press/other/2004/20040130/default.htm

    How to clean up the rock? New York clerks call the unreconciled difference between the custodians and DTC _the rock_ perhaps reflecting its size, but almost certainly also reflecting its resistence to resolution.

    One way to deal with the rock is to write it off. Another way is to hide it or transfer it around like musical chairs, preferably in something like the book roll, that which gets rolled over every night to the next day's trading.

    Up until recently, the rock's existence was a widely known secret amongst clerks, and the preferred way of dealing with it seemed to be to pretend the rock didn't exist. As a negative proof of the ostrich-like behaviour of the 'street, do a google on "rock unreconciled account" ... not a peep.

    Unfortunately, when the WTC buildings were reduced to rubble, so did a lot of processing of security trades. As all the systems stopped for about 3 days, this opened up the unusual event of a systemic restart of the entire trading system.

    Which meant that all traders had to declare the full and proper balance sheet - including the rock. As the total restart mean that there was no book roll, it was impossible to hide any more.

    How big was it? Nobody's saying publically, but there are a smattering of banks and other intermediaries that are now for sale with books and claims that reveal the rock - curiously, attributed to 911 directly. Apparently it was big enough to ask for another restart, this time of the shareholders.

    Which brings us to the Federal Reserve's rather odd intervention in the market for clearance and settlement - referenced above. Rumour has it that that Fed was a little surprised at the size of the rock, and has been moving to resolve it. Now, under the cover of a bunch of media sound bites, they have brought all the players together to start a new settlement system.

    Call it a dormant bank, call it a third option, call it a challenge to DTC. Call it what you will, but players will be asked to walk in with clean books - this is a singularity, a once-off event that will permit the industry to divide itself between the rocked and the rolled.

    http://www.federalreserve.gov/boarddocs/press/other/2004/20040130/default.htm

    Posted by iang at 04:52 PM | Comments (0) | TrackBack

    January 28, 2004

    Using Software to Sniff Out Fraud

    "Forensic accounting" sleuths are taking advantage of sophisticated programs to catch the crooks in action.

    BusinessWeek Article

    In the 1920s, Frank Benford, a physicist at General Electric (GE), discovered an astonishing mathematical law: In just about any given set of numerical data, numbers occur as the first or second digit at a predictable rate. For example, "1" will appear as the first digit 31% of the time, but "9" will appear first only 5%. While that sounds unlikely, Benford tested lists of numbers from many different sources -- accounting ledgers, geographic data, even magazine articles -- and found that the same probability persisted.

    Applied to accounting, Benford's Law makes for a great way to check to see if numbers are fabricated (since when liars make up figures, they usually don't follow the same statistical pattern Benford identified). The law is now enjoying booming popularity as the basis for a fairly easy, routine test that's used to uncover accounting fraud. Easy, that is, if you have a sophisticated software package and enough high-powered computers to crunch numbers from reams of documents.

    In 2002, Darrell Dorrell, a principal at accounting firm Financial Forensics in Lake Oswego, Ore., used a computer program to apply Benford's Law to more than 21,000 payroll records of a health-care company accused of defrauding investors. He found that the number "0" turned up as the second digit in the payroll records twice as often as it should have, and "5" showed up 60% more often than would be expected. With that information, plus lots more evidence from other tests, he reported to the company's receiver that the records "appear to be contrived."

    FUELED BY FEAR. Benford's Law provides just one small example of the way in which technology used to uncover accounting fraud has been growing in both sophistication and popularity. The growth hasn't really been stimulated by technological innovation, which has mostly amounted to fine-tuning sleuthing programs so that they issue fewer false alarms, customizing such programs for use with new industries, and upping raw computing power so the programs can crunch more data. Instead, the boom is being fueled by accounting scandals, terrorism threats, and new regulations such as the Sarbanes-Oxley financial-disclosure law and the Patriot Act, which both require companies to be more vigilant about avoiding financial fraud and about keeping employees honest.

    All of those threats "have made businesses more aware of the potential catastrophic damage to organizations that fraud presents," says Toby Bishop, president of the Association of Certified Fraud Examiners. "In the past, companies were unwilling to spend money on solutions until they had a bad experience," he adds. But over the past couple of years, "financial-statement fraud has risen to the top of the agenda."

    Partly, that's because of the weak economy, says Carolyn Newman, president and co-founder of Houston-based Audimation Services, which sells software that's used by forensic accountants. "When individuals have a financial need, or a need to protect their jobs, they're more likely to commit or participate in fraud," she says.

    EYE-GRABBING RESULTS. However, despite the high-profile instances of malfeasance that have plagued Corporate America lately, the companies leading the charge to find fraud are trying to root out dishonest customers more than crooked executives. In the last 10 years, credit-card companies have cut their losses due to card theft in half using programs like Fair Isaac's (FIC) Falcon Fraud Manager, which flags potentially bogus transactions at checkout based on analysis of past spending patterns by cardholders. And software that's used to spot insurance fraud typically delivers a return on investment of more than 300%, says Bishop. "Those are figures that will grab the eye of any chief financial officer," he adds.

    Returns are so high because fraud-finding software, including programs used by auditors to check a company's financial records, is better than ever. While auditors typically sample small portions of data to check that accounting policies are being followed, now they can easily check every transaction, a capability identified by the oxymoron "100% sampling."

    "We're in a complex business environment where the number of transactions companies have to monitor has increased in conjunction with more regulation," says Harald Will, chief executive of Vancouver (B.C)-based ACL Services, a leading provider of software for internal audits. ACL will debut its "Continuous Monitor" suite of software tools in mid-October. "Companies need to manage the risks, ensure that controls are working properly, monitor the integrity of transactions -- and they need to do it continuously," Will says. "The only way they can do that is with technology."

    CONFLICT CHECKERS. Increasingly, companies are also using outside databases to look for relationships between potential new hires and business units, with an eye to uncovering conflicts of interest or illegal activity. The latest systems will scroll through payment information looking for suppliers that aren't listed in any online commercial database -- a possible sign that they aren't legit -- or that operate from addresses that have been associated with fraud in the past.

    From its Springfield (Va.) home base, a company called I2 sells the "Analyst's Notebook," a program developed for law-enforcement agencies but becoming more widely used in corporate settings. One of its corporate tasks is to check for conflicts of interest on a company's board of directors. The software will troll through open databases, like D&B (DNB ) or LexisNexis, to look for connections between individuals and companies. Then it will illustrate the connections graphically, with lines connecting people and organizations.

    "We can take three feet of written documents and turn them into a picture that shows relationships," claims Jack Reis, I2's president. He has noted increasing demand from forensic accountants -- those who look for fraud. "I expect we're going to see more," he says.

    ELIMINATE OPPORTUNITIES. Large accounting firms tend to develop their own, proprietary software for forensic accounting that performs many of the same checks as off-the-shelf programs. And internal auditors at companies that want to do detective work on the cheap often use basic desktop applications such as Microsoft Excel and Access (a database management program) to hunt for fraud. For example, they might use those programs to identify duplicate payments to the same vendor.

    Eventually, says the ACFE's Bishop, basic accounting software will incorporate many of the tools that now come in anti-fraud programs. Even as that happens, companies that specialize in accounting technology will develop many more ways to either prevent fraud or find and close loopholes before they can be exploited. "Frauds that are possible will happen," says Bishop. "The key is to minimize the opportunity." And for the good guys, that's a never-ending task.

    By Amey Stone in New York

    Posted by iang at 06:32 AM | Comments (1) | TrackBack

    January 27, 2004

    Mutual Funds and Financial Flaws

    Some time today, Tuesday 27th January, the U.S. Senate Finance Committee meets in Washington D.C to hear testimony on the mutual funds scandal. Included is this written testimony.

    Abstract: Mutual funds are vulnerable to abuses involving market timing and late trading. Primarily, this is due to a failure of governance, and the delayed nature of settlement of both payments and transfers. This vulnerability is only exploited over time, through a progression of small steps that, individually, raise no alarm, but in sum, cross the line of acceptable behaviour. Solutions to the abuses will be found not in more regulation, but in open governance and a move towards real time gross settlement.

    There's also PDF and PS on the same page at http://iang.org/papers/.



    Wednesday, 28th. The Opening Statement by Senator Fitzgerald, and a few articles that appeared to quote the testimony:


    Posted by iang at 12:46 AM | Comments (0) | TrackBack

    January 24, 2004

    Financial Derivative Contracts

    How do you specify the contract, and then link it into the systems such that all this boring paper disappears? One answer is the domain specific encoding approach, another is the natural language approach. An example of the latter is Ricardian Contracts, and here is an example of the former, domain specific encoding, method by a company called LexiFi .

    Lexifi have created a language that allows specification of an entire set of contract possibilities within one narrow market. For example, if one considers the trades that occur between traders in an institutional options market, each trade can only have a score or so paramaters.

    The language developed by this company, MLFi, claims to reduce such contracts down to 20 elements, and from there it is possible to compose the full set of contracts.

    This seems to work well in a market where one contract is easily relatable to another - perhaps where these contracts are fungible by some measure or other. But, I wonder if it works outside a specific domain? When I see an example of a contract itself I might be able to answer that question.

    ( another cousin is Risla which finds this entry in
    citeseer which says this:

    "The Risla project has met its targets: the time it costs to introduce a new product is down from an estimated three months to two or three weeks. Moreover, financial engineers themselves can use the questionnaire [tool] to compose new products. Furthermore, it has become much easier to validate the correctness of the software realization of the interest rate products. In addition to that, the component library appears to be useful for other product families, such as insurances or options."

    )

    Posted by iang at 03:51 PM | Comments (0) | TrackBack

    January 18, 2004

    Measuring Fraud in DGCs

    Another sign of the increasing maturity of the DGC ("Digital Gold Currency") sector is in this article over on the Gold Economy blog/news site. The hallmark of a mature sector - independent analysis of the things the Issuers would rather keep mum about!

    With a sample of 2000 independent exchange provider fraud reports, it was possible to graph where most of the fraud was. e-gold leads with 82% which is probably due to its massive lead in number of transactions. eBullion comes second, with 7%, indicating many transactions as well, possibly.

    What is less easily explainable is goldmoney's position - they are down in the noise level, with Pecunix at 1% total. As goldmoney is now the star mover in this field (recently confirmed as on track growth of 4xpa), this is a surprisingly low figure. See the relative bar chart in red.

    I don't think it's to do with goldmoney's technical systems. I more think it is to do with their consistent and aggressive positioning from their very first days - they couched themselves as having a zero tolerance for frauds, even to the extent of suggesting that they would break the accepted norms of the highly libertarian DGC society if they had to - privacy, sanctity of contracts etc.

    Now it is paying off with lower fraud activity, and thus lower costs.

    PS: originally this entry referred to a diffferent article on a dispute between two issuers. It only referred glancingly to the fraud figures. New article, linked above is more focused.

    Posted by iang at 09:44 AM | Comments (1) | TrackBack

    January 16, 2004

    A (US) Law Dictionary

    Finally, an online Law dictionary . I can now look up what the definition of a contract is, at least according to "The Real Life Dictionary of the Law" which is the paper version of this dictionary.

    Caveat Lector - the authors, Gerald and Kathleen Hill , are dyed in the wool UC Berkeley Democrats. I hear the 9th circuit is the most dynamic and progressive rewriter of the law on the planet. If you like that sort of thing, you'll be in clover!

    Read on if you want to share the definition of a contract.

    contract
    1) n. an agreement with specific terms between two or more persons or entities in which there is a promise to do something in return for a valuable benefit known as consideration. Since the law of contracts is at the heart of most business dealings, it is one of the three or four most significant areas of legal concern and can involve variations on circumstances and complexities. The existence of a contract requires finding the following factual elements: a) an offer; b) an acceptance of that offer which results in a meeting of the minds; c) a promise to perform; d) a valuable consideration (which can be a promise or payment in some form); e) a time or event when performance must be made (meet commitments); f) terms and conditions for performance, including fulfilling promises; g) performance, if the contract is "unilateral". A unilateral contract is one in which there is a promise to pay or give other consideration in return for actual performance. (I will pay you $500 to fix my car by Thursday; the performance is fixing the car by that date.) A bilateral contract is one in which a promise is exchanged for a promise. (I promise to fix your car by Thursday and you promise to pay $500 on Thursday.) Contracts can be either written or oral, but oral contracts are more difficult to prove and in most jurisdictions the time to sue on the contract is shorter (such as two years for oral compared to four years for written). In some cases a contract can consist of several documents, such as a series of letters, orders, offers and counteroffers. There are a variety of types of contracts: "conditional" on an event occurring; "joint and several," in which several parties make a joint promise to perform, but each is responsible; "implied," in which the courts will determine there is a contract based on the circumstances. Parties can contract to supply all of another's requirements, buy all the products made, or enter into an option to renew a contract. The variations are almost limitless. Contracts for illegal purposes are not enforceable at law. 2) v. to enter into an agreement.
    See also: adhesion contract bilateral contract consideration oral contract unilateral contract
    Place this dictionary on your site

    Posted by iang at 09:11 AM | Comments (0) | TrackBack

    January 13, 2004

    1st ever eMoney Licence?

    Contopronto had been awarded a licence under the EC's electronic money directive. Follow to the
    Dutch Retail Payments
    blog.

    Follows is an additional story that indicates this is the first ever for mobile phones:

    For those that didn't follow the decade long debate (!) the existence of the EC electronic money directive has its roots in the Bundesbank's paranoia at non-banks competing against the banks. They succeeded in destroying the electronic money lead that the Europeans had, by constraining it to large players who were uninterested in cutting consumer's costs (read: banks); only now are new independent operators able to use the advantage of the open mobile platform to be able to regain the lost ground.

    Meanwhile, as I predicted in my old paper , the Americans continue to lead in eMoney, partly due to their deliberate slowness in regulating something they did not and still do not understand.

    Here's the additional story:

    Contopronto wins e-money licence

    06 January 2004 - The first-ever European e-money licence allowing for payments and money transfers to any bank, credit card, business or individual through mobile phones has been granted to Norwegian-based virtual bank Contopronto.

    Issued by the Norwegian Royal Ministry of Finance, the licence allows for the international expansion of Contopronto's mobile-based payment system, which was first rolled out to Norwegian businesses and personal users last year.

    In Norway, merchants such as McDonald's, Peppe's Pizza, and the country's number one loyalty programme Trumf have participated in the one-year pilot. Contopronto users dining at McDonald's or Peppe's, for example, text the billing code for their meal into their mobile to transfer payments to the restaurant's account.

    Carrier-independent, the system has also been adopted for paying salaries direct to mobiles and online gambling, and will soon be made available in taxis in 25 cities in Norway. Contopronto currently claims 10,000 active users in its home territory.

    The company recently opened its first office abroad in London and is in discussion with Norwegian and UK airlines about the possibility of using the system for the sale and delivery of flight tickets.

    The new e-money licence will open up the application for international money transfers says Contopronto CEO Morten Hofstad.

    "Contopronto users only send a text message and within a matter of seconds, rather than days, the transaction is completed for a fraction of the cost of a traditional funds transfer," he says. "Funds can be sent in any currency. For example a person in Denmark can send either kroners, pounds, euros or other currencies to someone in London."

    Funds to a maximum value of EUR1250 can be sent to anyone, even if they are not Contopronto members, says Hofstad. Once a payment is accepted an account will be automatically opened.

    http://www.finextra.com/fullstory.asp?id=10880

    Posted by iang at 12:02 PM | Comments (0) | TrackBack

    December 07, 2003

    NASDAQ Practices Their Vectoring of Systemic Risk

    Over on Slashdot [1], there was a long debate about the NASDAQ market deciding to cancel a dud series of orders that sent shock waves through the US trading markets, based on this NYT article .

    The core problem underlying this event is that the trade - and all trades - are not real. That is, they are promises to make good on the orders, not trades in and of themselves. It's like imagining that everyone in the system, including the system itself, works with credit cards with really high limits on them.

    This leads to two problems. Firstly, the trader might max out his creit card, and not make good on a promise. That's called settlement risk [2].

    Secondly, any other party might decide to stick their wick in and futz with the order, because their own credit card gets maxed out. In this case, the other parties included

    - the computer program that sent the repeating series of unreal orders,
    - NASDAQ which cancelled these unreal orders after other traders had made yet further unreal orders, and
    - Archipeligo which re-opened without alerting traders to the potential unwinding of the unreal state.

    That's called operational risk. It's what happens when the systems make mistakes on you, and leave you with the mess to clean up [3].

    Mistakes happen [4]. As time goes on, routine mistakes get caught and exotic ones slip through. Then, as they are discovered, these exotics are turned into routines by new patches. So, over time, more and more complexity marches together with more and more exotic mistakes.

    Within any system, mistakes will be caught, or not, as the case may be. This mistake was not caught before it sent the shock waves through the system. Systems-wise, it's fairly clear that most mistakes will be caught, and an occasional one will get through and cause havoc. This will cause a rethink and repatching, which will catch that very mistake next time.

    Until the next exotic mistake slips through, which by definition is more exotic, and more damaging [5].

    As each ensuing trade is based, one after the other, on the original promise, the result is that the financial system works both as a breeding ground for bigger and more exotic mistakes, and as an amplifier of the exotic mistake. As is intiutively seen by the slashdotters (but glossed over by the financial participants) the original order is now lost in the confusion of responses by various agents trying to establish the "right" thing to do.

    Say hello to systemic risk!

    This is the risk that a shock cascades through the system, causing the collapse of entities unrelated to the original cause, and thus further propogating and amplifying the original shock.

    Systemic risk in today's financial system rests primarily on the core premise that the whole system is based on promises to pay. It's as if every participant has a credit card, and too many of them are maxed out.

    There is an easy solution to this. It's called real time gross settlement, and it means making every trade real. This isn't to eliminate credit, it instead amounts to taking away the credit cards from the systems and institutions in the center. That is, NASDAQ, Archipeligo, etc, who are not traders, but are part of the system.

    Which would then make them into sinks of systemic risk, rather than amplifiers of it. Mistakes would be smothered one step away from the source, rather than cause waves of systemic failures through the global system.

    But, don't hold your breath waiting for this solution. Keen students of financial cryptography will know that it is both a real solution, and a cost effective one. In fact, too cost-effective, as it will reduce the opportunities to make money by those with lots of credit cards.

    iang


    [1]
    Slashdot discussion
    [2] definition: "Settlement risk is the risk that a settlement in a transfer system does not take place as expected. Generally, this happens because one party defaults on its clearing obligations to one or more counterparties." The BIS calls this credit risk.
    [3] It's also related to Herstatt Risk, after a German bank was suspended leaving counterparties sandwiched between such one-sided trades (see URL in [2]), and to legal risk, as some contracts got breached, but others got enforced, arbitrarily.
    [4] vadelais reports on slashdot:

    MSNBC
    BBC

    "Mistakes have been made in market trading before by other companies.

    In May last year, London's FTSE 100 index dropped by more than 2%, after a trader typed 300m, instead of 30m, while selling a parcel of shares.

    In 1998 a Salomon Brothers trader mistakenly sold 850m-worth of French government bonds by LEANING ON HIS KEYBOARD.

    And at the end of 2001, shares in Exodus, a bankrupt internet firm, jumped by 59,000% when a trader accidentally bid $100 for its shares, at a time when its value was 17 cents."

    [5] Lawrence_Bird on slashdot suggests an advantageous and more exotic mistake:

    "To this day, I do not believe the order was entered in error. I believe a hedge fund or other firm had a need to buy, and buy large. What better way to get filled then to trigger a large move in a closely correlated market (Dow futures) where you know the majority of the trades will be cancelled, and just sit on the bid in the other market (CME) as people panic sell. And do not rule out collusion."

    Posted by iang at 12:30 PM | Comments (0) | TrackBack

    December 06, 2003

    Workshop on Electronic Contracting

    Real world commerce is largely built on a fabric of contracts. Considered abstractly, a contract is an agreed framework of rules used by separately interested parties to coordinate their plans in order to realize cooperative opportunities, while simultaneously limiting their risk from each other's misbehavior. Electronic commerce is encouraging the growth of contract-like mechanisms whose terms are partially machine understandable and enforceable.

    Workshop on Electronic Contracting

    The First IEEE International Workshop on Electronic Contracting (WEC) is the forum to discuss innovative ideas at the interface between business, legal, and formal notions of contracts. The target audiences will be researchers, scientists, software architects, contract lawyers, economists, and industry professionals who need to be acquainted with the state of the art technologies and the future trends in electronic contracting. The event will take place in San Diego, California, USA on July 6 2004. IEEE SIEC 2004 will be held in conjunction with The International Conference on Electronic Commerce (IEEE CEC 2004).

    Topics of interest include but are not limited to the following:

    Contract languages and user interfaces
    Computer aided contract design, construction, and composition
    Computer aided approaches to contract negotiation
    "Smart Contracts"
    "Ricardian Contracts"
    Electronic rights languages
    Electronic rights management and transfer
    Contracts and derived rights
    Relationship of electronic and legal enforcement mechanisms
    Electronic vs legal concepts of non-repudiation
    The interface between automatable terms and human judgement
    Kinds of recourse, including deterrence and rollback
    Monitoring compliance
    What is and is not electronically enforceable?
    Trans-jurisdictional commerce & contracting
    Shared dynamic ontologies for use in contracts
    Dynamic authorization
    Decentralized access control
    Security and dynamism in Supply Chain Management
    Extending "Types as Contracts" to mutual suspicion
    Contracts as trusted intermediaries
    Anonymous and pseudonymous contracting
    Privacy vs reputation and recourse
    Instant settlement and counter-party risk

    Submissions and Important Dates:

    Full papers must not exceed 20 pages printed using at least 11-point type and single spacing. All papers should be in Adobe portable document format (PDF) format. The paper should have a cover page, which includes a 200-word abstract, a list of keywords, and author's e-mail address on a separate page. Authors should submit a full paper via electronic submission to boualem@cse.unsw.edu.au. All papers selected for this conference are peer-reviewed. The best papers presented in the conference will be selected for special issues of a related computer science journal.

    Submissions must be received no later than January 10, 2004.
    Authors will be notified of their submission?s status by March 2, 2004
    Camera-Ready versions must be received by April 2, 2004

    General Chair
    Ming-Chien Shan, Hewlett Packard, USA

    Program Co-Chairs
    Boualem Benatallah, University of New South Wales, Sydney, Australia <boualem@cse.unsw.edu.au>
    Claude Godart, INRIA-LORIA, Nancy, France <Claude.Godart@loria.fr>

    Program Committee:

    to be added later
    Mark S. Miller, Hewlett Packard Laboratories, Johns Hopkins University
    Alan Karp, Hewlett Packard Laboratories
    to be added later

    Posted by iang at 09:39 AM | Comments (0) | TrackBack

    December 05, 2003

    Governance or Regulation - You Pick?

    For those of you following the US finance news, there is a developing scandal surrounding mutual funds, based on a regulatory or governance faulure. Which it would be - regulatory failure or governance failure - is a matter for individual choice.

    It doesn't seem to be widely explained, but I have what might be called an inside scoop, having watched this develop over the last 6 months, so here's the story (not that I know any secrets).

    Mutual funds within the US are technically unregulated. There is no designated regulator, and any regulation comes from "general jurisdiction" such as NASD's SRO status (SRO is self-regulatory-organisation) applying to the licensed broker/dealers within its ambit, or to the State Attorneys General. More about this below.

    Mutual funds themselves are poorly governed. They have a bit of basic separation of roles, in that the assets held within are often held in the name of an independent party. So, that's one role of the 5PM, that which we would call the repository. But, there generally is no distinct co-signatory, and the digital side - the units in the funds - have a hotchpotch of arrangements.

    IOW, governance that make the average top-notch DGC blush, as it were. One could equate the mutual fund sector to the less well governed DGCs, the ones that follow the "we don't do that, you have to trust us" mantra.

    One more little thing needs to be explained: Mutual funds are not real time. Unlike DGCs, they settle in decidedly archeological time. Settlement can take months, and as long as 18 months has been seen ......

    In essence, these issues are investments and you are meant to be "in" for a long time, to allow your manager to "do his thing" for you.

    Of course, at some stage, the poorly liquid fund gets hit with a big redemption order. In order to satisfy redemptions, with some level of immediacy, what the mutual funds have been doing is taking on a clients that can take up the slack in the short term.

    This is called "capacity." That is, if a big redemption hits, capacity is injected by a known big player, until the assets can be sold and monetarised. At which time, the big player is bought out again.

    For a profit, of course. This involves some sort of good deal for the big capacity player, which is only fair, his capital is being used. In a sense, it is a bridging loan, but, as it occurs in the units of the fund, it's a bridge with a nice curve to it.

    Nice, good, clean finance.

    Until, that is, the managers realised that they can also benefit from letting the big players come in anytime, not just when they need the big money. Which is easy enough, as commissions are paid on th big amounts, and kickbacks are always plausible.

    And this resulted in delito #1: "Market Timing."


    This was a process whereby a big player and a mutual fund would negotiate a special deal to place large lumps over short periods of time, generating *two* commissions for the manager, and some big gain for the player.

    In essence, it was a quantity discount, negotiated in advance.

    But, in practice, it was egregious as it deliberately took money from the *other* unit holders: When the big money man saw a shift in the market, he could put a big lump in, wait a few days, and then pull it out again, knowing that others in the fund could not move as fast, and that the fund prices themselves were sticky.

    However, it wasn't strictly illegal. There were no rules in the mutual fund agreement against it... So, market timing wasn't in essence something for anyone to get upset about, it was just one of those insider secrets.

    Let's move on! One of the things that a mutual fund does is to mark-to-market its assets. Then, at a fixed time every day, it would declare the value of the fund, and the price of the units, based on that time and asset base.

    And, as a consequence, it would also set a time by which all orders had to be in by. 3pm was common. If the order arrived after the timeslot, it got tomorrow's price.

    Now comes delito #2: "Late Trading."

    Unsatisfied with their bulk discounts, some players also negotiated an ability to trade *after* the cutoff time.

    Which led to the perfect arbitrage. By watching a market in, say, Japan, they could see what the opening price was, after the cutoff, and if it moved favourably (to them), they could trade the fund at what was to become yesterday's price.

    This was the perfect rort. Fortunes were being made. And, investors were being raped. If the trade looked good, it was confirmed at what was to be yesterday's price, and the manager would shift back the order in time. If it looked bad, it was forgotten.

    All upside, no downside.

    Into this fray swaggers the Attorney General of New York State. David Brown is the lead guy there, although most people will know the Attorney General as Elliot Spitzer, who is now challenging for top spot as Governor of the State of New York.

    Somewhere along the end of 2002 or beginning of 2003, the AG heard whiff of crazy money being made in the mutual fund industry, and did some digging. Eventually, David Brown and his team managed to understand what was going on, and also found a case that they could take on.

    That case was "Canary Capital." It was launched about mid 2003, and settled within two months for a $40 million fine and sundry banishments.

    That's blinding speed in the regulatory business!

    Which might indicate several things: The company got off very lightly, it was caught dead to rights, and it gave up some more info. Further, it set a precedent.

    Funnily enough, Canary was an investor, and thus did not (presumably) do more than conspire to participate (and, as the settlement didn't admit blame, it maybe didn't even do that). But, even as an investor, it was sufficient to give the AG his lead case.


    And now, all the big names in Wall Street are being hit with the same thing. Shocked by the crash of the first toppled domino, the whole lot are wobbling away from the vertical.

    Security Trust Corp., a 13 billion dollar trust company, is being closed up by the federal government, and three executives are under indictment, facing long jail sentences (25 years, etc). A whole gaggle of famous names in the finance industry are under subpoena, and lots of hurried house cleaning operations are in progress.

    It seems that almost everyone was doing it, or being done to.

    Worse, big Wall Street firms were (it has been rumoured) front-running their own mutual funds! That is, one division would invest into the fund and pull out in a couple of days, generating more fees and profits for both sides.

    Class action attorneys are foaming at the mouth with glee - because the investor never gets a dime of the fines, and thus, he still has a complaint! There has already been one big case launched, and the speed of it indicates that it is a strategic defence case, not a real aggresive play by injured parties.

    And, of course, Elliot Spitzer has added another notch on his revolver grip, and his deputy David Brown is odds-on favourite to take the AG position.

    The total fines that will be collected off Wall Street firms are rumoured to be in the order of 10 times more than the last scandal. That one set the record at 1.3 billion, so 13 billion sounds like a pretty nice haul.

    Nice work if you can get it. What does it all mean to the world of DGCs? One thing is that the governance record of the unregulated mutual fund industry was pretty spotty.

    To cut a long story short, the normal path for a badly governed finance sector is

    1. success,
    2. complaints, concerns, handwringing,
    3. scandal,
    4. regulation.

    Mutual funds are well into phase 3. Bringing this back to DGCs, they are in phase 2. Does this mean phase 3 - scandal - follows inevitably? No, there is at least the possibility that the lesser-governed DGCs clean up their acts.

    But, unless they do, any scandal will create the forces necessary to lead to regulation. As a general result. So, it's not inevitable, but one has to say that it is likely, unless there is a clean up.

    I personally do not favour regulation.

    (NB., that's an actual opinion, signalled explicitly, due to the rarity of such!)

    To my mind, the addition of regulation causes the following sequence:

    1. regulation
    2. scandal
    3. add more regulation, go back to 2.

    But, the state of the world pertains. Which means that unless we provide a sector that can and does govern itself well, and removes the underlying (but poor) rationale for regulation, then we may well end up walking that treadmill.


    iang

    PS: all of the above is hearsay. I have taken no time to check the facts, and it could very well be that I've made some gross errors. These would be all mine and mine alone. I'm not "in" the MF industry, nor "in" a privileged position, so think of the above as no more than gossip. It's value is in seeing the MFs predict our own futures in advance, not in understanding the sordid details of their scandals.

    PS: an earlier version of this rant was posted on the dgcchat list.

    Addendum: It appears that some academic interest in the problem has occurred, with a paper by Eric Zitzewitz entitled Who Cares About Shareholders? Arbitrage Proofing Mutual Funds

    See also an article at Stanford b-school The Blind Spot in Mutual Fund Investing

    Posted by iang at 10:37 AM | Comments (0) | TrackBack

    ARMISTICE: Real-time Distributed Risk Management

    http://www.enhyper.com/content/erlangrisk.pdf

    In this paper, some experiences of using the concurrent functional language Erlang to implement a classical vertical application, a risk management information system, are presented. Due to the complex nature of the business logic and the interactions involved in the client/server architecture deployed, traditional development techniques are unsatisfactory. First, the nature of the problem suggests an iterative design approach. The use of abstractions (functional patterns) and compositionality (both functional and concurrent composition) have been key factors to reduce the amount of time spent adapting the system to changes in requirements. Despite our initial concerns, the gap between classical software engineering and the functional programming paradigm has been successfully fullfiled.

    Posted by graeme at 04:04 AM | Comments (0) | TrackBack

    November 05, 2003

    Principles and Practices of Microfinance Governance

    http://www.gdrc.org/icm/govern/govern.pdf

    As microfinance institutions (MFIs) expand their outreach and increase their assets, and as more MFIs become regulated entities that can capture savings deposits, clear articulation of the functions of their boards of directors is essential for effective governance.

    Posted by graeme at 10:38 AM | Comments (0) | TrackBack

    October 12, 2003

    On The Resolution of Disputes

    Trust is a funny thing. It's hard to pinpoint. One can say easily that one trusts someone, but less easily why.

    Trust could be considered to be an expectation that some predicted event will come to pass.

    Put that way, we can then break down the use of trust into something more objective.

    If you have an expectation, you can compare it to other expectations that have since happened. If you rely on this event, you can also determine what your potential costs, benefits and losses are on this event.

    There - we said all that without saying who! And, in fact, trust is not about who, it's about events. When I say, "I trust my wife," what I mean is that I have high expectations for her to do and act in a certain way in any given event. I just haven't bothered to list those events.

    (Of course, I never say "I trust my wife." Perhaps that's what she didn't marry me.)


    Events and expectations. Take the DGC industry. There is this digital gold. It's supposed to have value. You can buy stuff with it, but it costs money.

    How do I trust that? How do I trust any person in the DGC world?

    Well, it's actually quite easy to get or acquire trust. You do it by starting small, and building up.

    You buy something small. This works, because your loss in the bad event is small, so you don't care so much. Or, to put it another way, even if you lost out on, say, $10 worth of digital gold, you had a little fun and experience to go with it.

    This is why so many people's first experience of digital gold is a 1g event. Someone sends them a gram, it's about the same price as a movie ticket, and it has similar entertainment value.

    Very broadly speaking, of course. Any loss is offset by the fun of it, and any success confirms the story and starts the building of trust.

    Of such small events, bigger expectations are built.

    When you next get into the big league and buy, say, $100 worth of gold, that exciting twinge of fear teases. Maybe you'll get the gold. Maybe it will all evaporate the moment you do get the gold, and you will wake up wondering about the white rabbit?


    But it all works, and it gets bigger and bigger, and you learn about the exchange providers and how to tell the good from the bad.

    You build up trust. In the expectation that, when you send your paycheck entire to some dude with a strange name, you'll get a full bag of gold in return.


    Then there is the gold itself. It's digital. How did that get to be trusted?

    Well, everyone else believes it trusted. That's a good start.

    But, everyone knows about scams. That's not such a good start!

    And, in fact, at least two Issuers of gold currency have collapsed - OSGold and Standard Reserve. Both in dire and financially ruinous conditions for some. And, to see some of the actions of some of the current pack of Issuers, it's not so clear that one can safely say they aren't the next to be written up in our list of infamous fraudsters.

    So, how does our newbie tell the pyrite from the gold? And, why can't it be easy like telling a good exchange provider from a bad?


    Issuance is different to exchange. Let's look at the events, again, and form our expectations.

    In Exchange, you send me national currency, and I send you gold. Either you get the gold, or you don't. That means you can tell fairly quickly whether it happened.

    It's fast. It's also limited in value, to the precise amount.

    Let's look at the downside - I as the Exchange provider decide to run with your national. I will do this if you send me so much money that it exceeds all the future profits that I can earn.

    This is a given - there is no point in me working my butt off for the rest of my days if I will earn less money than I could by taking my one chance at your pot [1].

    In the business of Exchange, the provider sees a lot of moderate amounts flow through, in and out, very quickly, and she takes a small cut from each [2]. In general, the cut will grow over time, as her revenue, and will be worth much more than any one amount that is being bought and sold.

    Not so with the Issuer. By definition, all the metal that is behind an issue is in the hands of the Issuer already. Every little bit that comes in is way less than the amount already under management.

    So the equation is reversed. Every Issuer that is out there faces the fact that if he could steal the whole lot, he could earn more money than he could if he stayed in the business of issuance.

    Every day, every moment, Issuers are faced with this equation. Cut and run is highly lucrative.

    How do we then reverse this? How do we turn this devil's temptation into a sustainable long term business serving us angels?

    Well, one way is to promote good governance. We talk about things like 5PM, which is a way to take the power out of hands of the Issuer, and to share it with other trusted parties [3]. Briefly, we examine the location of the bars, what serial numbers they claim, who has verified that they exist, and who can sign them out.

    We repeat the process for the digital side [4].

    Lately, we've also started to discuss reputation in a less objective fashion. Honour, I've called it [5]. Can we assess the honour of an Issuer and his propensity to do more than just set up a copycat of 5PM? Because that's what happened in one of the failures, 5PM was copied and convincingly presented. People bought it.


    Issuance is a different product to Exchange. It has the unusual characteristic that when we hand over our cash, we don't get immediate satisfaction of our trust requirements.

    Unlike buying a car, flying in a plane, or trading the digital gold itself, with Issuance, we are dependant on a trust equation that extends out into the indeterminate future.

    Like banks, Issuance requires long term reputation. Like pensions, we need to know that the institution will stay, and will stay safe. Like schools, we need to know more than just whether the child is safe today. Like the army, we don't care what silly parade ground drill they are rehearsing today, we just want to know that we can call on them in 5 years time, when the barbarians are at the gate.

    Businesses like these are ripe for government regulation, but that's just because the government is the last man standing when everything else has collapsed. Surely the government knows how to do this, people say? And, when the government shows it doesn't know, people don't say anything, because the issues are too complex [6].

    We have a unique sector going on here. We have - collectively - shown how to build a long term trust equation that stands on its own feet. It delivers cost benefits beyond that of any competing arrangement. It finds new solutions quicker than the conventional world. It shows flexibility. It shows strength. It grows and it evolves.


    Into this fray comes one more business activity, the activity known as dispute resolution.

    The problem of settling disputes has been a vexing one. Many users are far-flung, talk in different languages, and even think under different laws. Issuers are in strange places with names that are found in holiday brouchures. Exchange providers likewise.

    Out of this, several strategies have arisen. One Issuer insists publically on only court orders for all disputes Another strategy is sabre-rattling. A further strategy is to craft the user base to be ... less dispute-ridden.

    And, we also have ADR. Alternative Dispute Resolution means a technique for resolving disputes by not using the courts, but instead, using a well known private party to intermediate. He's called a mediator or an arbitrator.

    First promoted in the early days of e-gold, perhaps most visibly in a series of conferences called Lex Cybernatoria, it has long been known that if we as a group can Exchange and Issue, why cannot we also Resolve?

    It has long been expected that ADR will arise in some form or other, but all of the powerful players are of course conflicted. Only independant players can resolve disputes. Of course.


    The American Arbitration Association is listed in at least one Issuer's user agreement, but we have no reports of it being tested in a user dispute. Notwithstanding its conceptual form, it is apparant that the substance of ADR has distinct and challenging characteristics.

    Like Issuance, we are, as users of the service of ADR, dependent on events in the future. Unlike Issuance, we do not so much analyse and enter into this field with eyes open; it's a characteristic of disputes that if one knew what we were doing, we wouldn't have done that!

    Also, unlike Issuance, even if we wanted to analyse it, how could we do it? We can't for example run a little event. There's no such thing as a trial dispute, for example. And, other people's disputes do not mean so much to us - especially in today's world of bluster and never admitting doubt or wrongness.

    If we were to draw a matrix of these characteristics:















    Building Trust

    Trial Events

    Cannot Try Out

    Quick

    Exchange

    [7]

    Future

    Issuance Dispute Resolution

    So, up-front analysis is not really a characteristic of dispute resolution. We thus can dispose of a lot of rhetoric easily.

    How then can we trust a provider of ADR? The close we look at the event, the more daunting it becomes:

    The parties to a dispute have already faced losses - that's a characteristic of disputes. They are also looking at further potential losses due to costs. Perhaps one of them is looking at a potential gain, in the event that she "wins" the dispute.

    It's not fast. We didn't want to be here. And we are at great risk. Yet, here we are. Looking at a future event of some great risk.

    We need a lot of trust in this process. And no events to draw upon.


    When we look to a provider of dispute resolution, we need to know, with great confidence, that it is trusted, because without making the normal conscious and planned choices, we are suddenly dependent on the judgement of the provider. Indeed, the provider of dispute resolving services has a daunting task establishing this level of trust. The only thing left to analyse is secondary information: the past, the people, the actions, the politics, the results of actions.

    All these data points are indirect, so as many as possible are needed to analyse. Every part of the past will be brought to bear, because that's all there is to go on.

    Every action, every posture. Here's a trial list:

    * considered, reasoning writings, not hyperbole
    * impartiality
    * longevity and transparency
    * respect to all
    * a sense of honour (that meets and even exceeds that demanded of the Issuers)
    * straight forward answers to difficult questions
    * polite useful answers to easy questions
    * acceptance of criticism, acceptance of weakness
    * open structures, open procedures
    * gravity and seriousness, not tomfoolery

    Which I scratched out in a moment. Other lists could also be written, no doubt.

    Which leaves us in a dilemma - the list of the above is almost impossibly hard to meet. Does that mean we should lower our standards to find a provider of ADR?

    I believe not. ADR is nothing without an extremely high level of trust. If it is, then, so like nothing, then we are better off not having it.

    We as users may actually be a lot better off by cutting our losses. We are often better off limiting up front than relying and risking on the uncertain future gamble.

    If we found ourselves in dispute resolution, and it was bad dispute resolution, then we would be better off avoiding it; removed of the crutch of a false promise, we would then at least be enabled to develop more reliable ways of commerce, in exchange for the losses suffered.

    iang


    [1] So, don't ever send payments to an EP in excess of her normal takings. Stay under her biggest amounts, and you have a good chance of being safe.

    [2] Exchange providers are often referred to in the feminine, as a merchant, Matilda, whereas Issuers are generally in the masculine, Ivan. It's a convention that helps those in the English language.

    [3] 5PM is Five Parties Model, which places the actual control of something valuable in the hands of several parties. Space does not permit full description today...

    [4] Which makes for ten parties. Sorry about that.

    [5] Ivan the Honourable makes his first appearance at http://www.iang.org/rants/ivan_the_honourable.html

    [6] Mises asked the question, why is it that we think that government knows the answers? He never got a satisfactory answer before he died, so it behoves us to keep asking for him.

    [7] If you are wondering what goes in this corner, it may be security - it's quick, but you cannot test it. A paradox, but one irrelevant to today's topic.

    Posted by iang at 01:32 PM | Comments (1) | TrackBack

    September 19, 2003

    The Contract is the Keystone of Issuance

    This perceptive remark was made by Hasan (Martin Bramwell) in a private document. Actually, he said that the keystone of the issuance is the contract! So I am toying around with the phrase to see what rings the loudest bell.

    No matter, they are Hasan's words. And, it is a remarkable observation that is worthy of deep attention. Consider this - can you find another project that pays even lip service to the contract in its architecture?

    I never have. We invented the Ricardian Contract back in 1995, and at the time, even though we announced its form and discussed it widely, we fell into the trap of assuming it was too obvious. Indeed, that's what people told us, lulling us into its obviousness!

    We actually thought that there was no point in pressing the place and case of the contract in Financial Cryptography, because fairly soon, all and sundry would sweep up the obvious construct, and our "first" would become just another forgotten footnote in the rubble of FC history.

    Yet, none of that came to pass. Even though every small fact in this construct is easily established, just like static physics, and every piece of logic stands strong, the resultant archway appears too tall to see.

    Why is that? It's not as if the contract is hard to understand. You take some text, you shove in some parsable elements, you sign it with OpenPGP's cleartext signature, and you hash the document. Really basic crypto, as it should be.

    That then becomes the starting point for ... everything!

    Maybe, if it's not in the construct, it's in what we did with it, that the mystery lies. Like a keystone, we built an entire aquaduct of governance over it. We took that hash, and tied it into the servers and the transactions and the repudiability. We took the signature and tied that into the Issuer. We took the text and tied that as a contract into the reserves.

    And, we took the hash again and showed how the user was now part and party to the contract.

    And... And...

    Maybe our emphasis is wrong. Instead of looking at the keystone, we should be looking at the arches. Or, maybe the topdown view of the edifice is preferred, and how we got to the top of the world should be covered with hand waving and press releases.

    Whichever. The water of governance flows without pause because it rides over something built around the keystone of a contract. The Ricardian Contract supports a civilisation of Financial Cryptography in a way that makes one realise that these are words yet to be appreciated.

    Posted by iang at 06:00 PM | Comments (1)