One of the more intriguing movies with a technology theme in the last few decades was a 1983 flick called “WarGames,” starring Matthew Broderick in his second movie.
Critics of the movie from the IT community at the time said that the films plot—about a sophisticated war game computer that confused its NORAD masters into thinking that a simulated nuclear attack was real—was unrealistic because every computer has more failsafes than the one in the story.
Maybe, but I saw the films theme as dramatizing a valid point: Any sophisticated program is going to have capabilities that most of its day-to-day users are unaware of and that ignorance can cause huge problems.
In 2006, current Web capabilities are rapidly growing and few users understand how much data is being collected and potentially shared. Thats a lesson learned this week by the Washington Post.
The Post has extensive experience protecting confidential sources. As journalists, we know the clues people look for in our stories to try and identify confidential sources, and we avoid them.
When the newspaper posted pictures to accompany the story, they included metatag info that identified the sources location as a particular small town, making the sources identity easy to guess given all of the details in the story.
When the photo department placed that information on the image for its catalog purposes, didnt it realize it would be world-viewable? How many retail IT execs would have thought of that?
Another good example: A recently published book called SpyChips discussed privacy concerns about RFID. But one tactic that the authors (including someone finalizing a Harvard doctorate program) used was to go to various vendor sites and—so help me—type in the word “confidential.” Sure enough, certain sites then displayed confidential documents.
In doing lots of Web searches, I found various internal memos and documents that were archived for a companys internal review and no one realized theyd be discovered by search engines.
Far too many Web managers have faith in what is known as security by obscurity, which essentially means that a piece of content cant be found unless the user knows the exact URL path or finds a link to the document somewhere.
That approach may be fine for a casual site visitor checking out your electronic storefront, but if someone searches for a word included in that document, youre toast.
The reflexive response to security by obscurity is to stick a password on the front page of that document. The problem is that many sites do not properly set up their password security.
Done quickly, the password can block someone who tries to click on that documents front door, but if a search engines spider hits every other possible combination, it might get through to some of the internal pages.
I saw this recently on a site that had a large number of audio files (it was a post-production Web cast) and a mandatory registration page associated with the link to go to that collection of audio links.
That mandatory reg page was comparable to a password in that it was a script that required a specific response before it would allow anyone through.
The problem was that the site needed to password protect each and every file within that site.
Another scary piece of Web magic: GoogleDesktop. That is an amazing piece of software. When I started using it, it wonderfully archived tons of files and images and E-mails. But I was startled during one search when it found someones phone number that had only existed in a brief IM exchange I had had weeks earlier and then deleted.
Of course, theres the well-publicized Microsoft Office revision changes, which are often retained, even when invisible. Those documents can only reveal changes, but who the document had been sent to and lots of other great details that few people realize are being transmitted to clients and suppliers and anyone else on their distribution list.
Google’s own CEO—Eric Schmidt—learned that lesson the hard way in March when he used Microsoft Office. Specifically, his data costume reveal was when he posted some PowerPoint slides he had used for an analyst presentation. The slides included speaker notes that revealed a theretofore secret plan to replicate a users entire harddisk on Google servers.
The more sophisticated and automated Web programs get, the more data theyll need and that means the more data it might inadvertently share.
Its something to consider before you send your boss an accidental nastygram, your wife a love letter that originally had someone elses name on it and your customers information revealing your markup.
You do that a few times in a day and WarGames version of global thermonuclear war will start to look appealing.
Evan Schuman is retail editor for Ziff Davis Internets Enterprise Edit group. He has tracked high-tech issues since 1987, has been opinionated long before that and doesnt plan to stop anytime soon. He can be reached at [email protected]