A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back
Rate it:
Open Preview
Kindle Notes & Highlights
2%
Flag icon
Security technologists look at the world differently than most people.
3%
Flag icon
The point is that if they are going to make public policy around cybersecurity, they have to think like people who cheat. They need to cultivate a hacking mentality.
Keith
True for most policy making.
3%
Flag icon
like children, many wealthy individuals don’t accept that the rules apply to them. Or, at least, they believe that their own self-interest takes precedence. The result is that they hack systems all the time.
Keith
An apt comparison
3%
Flag icon
It’s not that the wealthy and powerful are better at hacking, it’s that they’re less likely to be punished for doing so.
Keith
This is my shocked face
3%
Flag icon
Hacking can be a force for good. The trick is figuring out how to encourage the good hacks while stopping the bad ones, and knowing the difference between the two.
5%
Flag icon
There’s even a word for this sort of thing in Italian: furbizia, the ingenuity that Italians deploy towards getting around bureaucracy and inconvenient laws. Hindi has a similar word, jugaad, which emphasizes the cleverness and resourcefulness of making do. In Brazilian Portuguese, the equivalent is gambiarra.
7%
Flag icon
Even politics is governed by norms as much as by law, something we repeatedly learned in the US in recent years as norm after norm was broken.
15%
Flag icon
Passing a law that makes card counting in blackjack illegal renders the tactic ineffective, but only if you get caught. Does that remove the vulnerability, or does it reduce the hack’s effectiveness?
16%
Flag icon
Equifax in 2017 through a vulnerability in the Apache Struts web-application software. Apache patched the vulnerability in March; Equifax failed to promptly update its software and was successfully attacked in May.
16%
Flag icon
Turn automatic updates on for both your computer and phone. Patch everything else as soon as you get an update. Always.)
Keith
Yes. You are a target.
16%
Flag icon
With social, economic, or political systems that don’t directly involve computers, it’s not as clean. When we talk about “patching” the tax code or the rules of a game, what we mean is changing the laws or rules of the system so that a particular attack is no longer permitted.
16%
Flag icon
What, for example, does it mean to “patch” the tax code? In most cases, it means passing another law that closes the vulnerabilities from the original law. That’s a process that can take years, because the tax code is created in the political realm, which is characterized by competing visions of what public policy should accomplish.
17%
Flag icon
“cognitive hacks” that play on universal human biases like fear and deference to authority.
Keith
We all like to think these don’t work on us. We’re wrong.
19%
Flag icon
This concept easily extends to social systems. It’s reflected in the idea that government regulators should not have any financial interest in the industries they oversee (a principle regularly violated in the US via the revolving door between the government and industry). Or that election districts shouldn’t be created by elected officials who could benefit from gerrymandering them.
28%
Flag icon
This continual shuffling of aluminum affected that price, and since those twenty-seven warehouses stored over a quarter of the country’s aluminum supply, Goldman Sachs’s legal dance let it manipulate the price to its own advantage.
29%
Flag icon
To some extent this arises from the natural complexity of our high-tech world, but to another extent it is a deliberate hack designed to impede users’ access to accurate information.
29%
Flag icon
The cost to switch, in money, time, convenience, or learning, is just higher. That’s lock-in. And the hack part comes from all the different ways of enforcing lock-in:
29%
Flag icon
The idea is captured in an old quote widely attributed to J. Paul Getty (though probably first said by John Maynard Keynes): “If you owe the bank $100, that’s your problem. If you owe the bank $100 million, that’s the bank’s problem.” That’s “too big to fail” in a nutshell.
29%
Flag icon
Directors of an enterprise deemed too crucial to fail, on the other hand, know that the inevitable costs of any poor decisions they might make will be paid by taxpayers: that is, by society as a whole.
Keith
Privatized profit. Socialized risk.
30%
Flag icon
The “too big to fail” hack essentially results from a change in the threat model. When the mechanisms of the market economy were invented, no business could ever be so critical to the entire economy that its failure would necessitate government intervention. This was partly due to size, but also because critical social functions were not privatized in the same way. Sure, companies could grow, but none would grow at such a scale. That level of growth requires modern technologies.
30%
Flag icon
The 2010 Dodd-Frank banking reforms reduced the threat of “too big to fail” institutions, but those were mostly rendered ineffectual as the bill made its way through Congress, or were neutered in subsequent tax reform legislation.
30%
Flag icon
Today, I’m certain that companies view a “too big to fail” bailout as their ultimate insurance policy. Certainly, the few organizations that were explicitly guaranteed bailouts through Dodd-Frank—Citigroup, JPMorgan Chase, Bank of America, and Goldman Sachs—know that the government will bail them out again if needed. It’s a hack that has been normalized, even though it’s incredibly damaging to our market economy.
30%
Flag icon
it’s unsustainable for individual investors, too; food delivery doesn’t work for anybody.
39%
Flag icon
If you’re in charge of implementation, you can make the law very, very difficult to follow. In other words, you can drown the policy, and those trying to access it, in bureaucratic hurdles. The tactics vary—from long waiting times and excessive paperwork, to cumbersome filing systems and repeated in-person interviews, to lousy websites—but the goal remains the same: to impose a burden so onerous that people otherwise eligible for the benefit, many of whom are already weighed down by poverty, poor health, limited education, and unstable housing, simply cannot overcome.
40%
Flag icon
Deliberate creation of administrative burden takes this to an extreme. Instead of weeding out the unqualified, the burden associated with receiving the benefit is increased to the point where many people who should qualify simply give up. It’s passive-aggressive benefit denial.
40%
Flag icon
Outside of judicial intervention, it’s difficult to find a satisfactory solution because political authorities are the ones creating these administrative burdens.
42%
Flag icon
This is important. Hacking isn’t just malicious manipulation inflicted upon a system. A successful hack changes the hacked system, even more so as it is repeatedly used and becomes popular. It changes how the system works, either because the system gets patched to prevent it or expands to encompass it. Hacking is a process by which those who use a system change it for the better, in response to new technology, new ideas, and new ways of looking at the world.
42%
Flag icon
Harnessed well, hacking is a way of accelerating system evolution by incorporating an adversary in the process. Harnessed for ill, hacking can be a way of accelerating system destruction by exposing and exploiting its flaws for selfish gain in a way that tears it apart.
42%
Flag icon
Innovation is essential if systems are to survive.
42%
Flag icon
Contemporary political science research suggests that when conservative groups representing the rich and powerful refuse to allow their societies to evolve, they can break their political systems as a whole.
42%
Flag icon
In social system evolution, the powerful are the favorites, and often get to decide which hacks stay and go. If this isn’t fixed, then allowing hacks to drive evolution of systems will perpetuate status quo injustices.
44%
Flag icon
We may have to wait for AIs, which operate at computer speed, to read, understand, and identify hacks before the laws are enacted. That would certainly help solve the problem—although it would equally certainly create new ones.
47%
Flag icon
What I am developing is a sophisticated notion of hacking. It’s not that hacks are necessarily evil. It’s not even that they’re undesirable and need to be defended against. It’s that we need to recognize that hacks subvert underlying systems, and decide whether that subversion is harmful or beneficial.
62%
Flag icon
In The Hitchhiker’s Guide to the Galaxy, a race of hyper-intelligent, pan-dimensional beings build the universe’s most powerful computer, Deep Thought, to answer the ultimate question to life, the universe, and everything.
74%
Flag icon
Edward O. Wilson once described the fundamental problem with humanity is that “we have Paleolithic emotions, medieval institutions, and godlike technology.”
Keith
Love this