Tuning the Privacy/Customer Service Dial



Twitter handles can be valuable commodities, and no story better demonstrates that than one described by web developer Naoki Hiroshima. Originally published on his personal blog and then republished with permission by TheNextWeb, “How I lost my $50,000 Twitter username” describes the ordeal he went through when a hacker decided he wanted Hiroshima’s Twitter handle @N—registered to Hiroshima since 2007.

In a nutshell, a hacker decided he wanted @N and was going to do just about anything to get it—without paying any money, of course. To do so, according to the hacker himself (someone call "Ripley’s Believe It or Not"), he socially engineered his way into Hiroshima’s GoDaddy account, which controlled several of his website domains, in order to wrest control of @N from Hiroshima. Give up the Twitter handle and the hacker would take his hands off the throat of Hiroshima’s websites.

Extortion at its finest.

After acquiring control of @N, the hacker was willing to share how he exploited Hiroshima’s GoDaddy account. And what he divulged is disconcerting.

To: <*****@*****.***> Naoki Hiroshima
Date: Mon, 20 Jan 2014 19:53:52 -0800
Subject: RE: …hello

- I called paypal and used some very simple engineering tactics to obtain the last four of your card (avoid this by calling paypal and asking the agent to add a note to your account to not release any details via phone)

- I called godaddy and told them I had lost the card but I remembered the last four, the agent then allowed me to try a range of numbers (00-09 in your case) I have not found a way to heighten godaddy account security, however if you’d like me to recommend a more secure registrar i recommend: NameCheap or eNom (not network solutions but enom.com)

Understandably, Hiroshima had harsh words for the companies involved. “Stupid companies may give out your personal information (like part of your credit card number) to the wrong person.” We saw a similar mistake in 2012, when Wired Senior Writer Mat Honan temporarily had his entire digital life destroyed by hackers who wanted his Twitter handle: @mat (another fascinating read if you haven’t read already).

Since Hiroshima’s victimization went viral earlier this week, Paypal has come out and said no personal information was given out. GoDaddy, however, accepted some responsibility. Its chief information security officer (CISO) said the hacker already had in possession a large amount of Hiroshima’s personal information but did note, “We are making necessary changes to employee training to ensure we continue to provide industry-leading security to our customers and stay ahead of evolving hacker techniques.”

Now, I’m not writing this post to excoriate GoDaddy or Paypal or any other specific business. There are excellent lessons to be learned from the @N and @mat incidents for Internet users—as they both readily admit—but there is a powerful message for business as well.

As a consumer, whether I’m making an online purchase, downloading a service or paying a bill, a smooth user experience goes a long way. But making access to user accounts and purchases easier can also open the door for identity thieves. I’ve personally been a victim in two identity theft cases, and let me assure you, I have not used the services that were involved since, and I never plan to.

A colleague recently told me about a negative experience he had when trying to pay an online bill under his wife’s name, even though they shared the account. It was a service he has used and enjoyed for years, but the experience of having to authenticate, then create a new account for himself, along with new security questions and a password, left a bitter taste in his mouth.

So businesses must walk a fine line: Create a seamless user experience without opening up gaping security (and therefore privacy) holes. As was evidenced by the solution devised by GoDaddy’s CISO, employee training is a must. There will always be risk associated with human error, but better-prepared employees are much less likely to open gaping holes in your defenses.

Perhaps today’s news about the Transportation Security Administration (TSA) is instructive as well. If we are to believe, at least in part, that the former TSA employee is telling the truth, procedural logic and employee morale would seem to go a long way in preventing privacy harm. Will confiscating nail clippers from the very pilot of the plane that’s about to take off prevent a terrorist attack? Having employees implement what sometimes seems arbitrary security measures only angers customers, prompts negative headlines and brings down employee morale. And with morale low, privacy violations seem to run rampant. The very security measure implemented by the TSA—the body scanners—serves as a perfect privacy-violating metaphor:

“Dear America, I Saw You Naked: And yes, we were laughing.”

The TSA seems to have the opposite problem as GoDaddy. One’s security protocols are thorny, invasive and often irritating, while the other’s is, perhaps, too smooth, lax and unsecure. Neither seems to have the security/usability knobs tuned quite right, and both are producing unhappy users.

Seen through the lens of risk management, privacy controls and customer service would seem to be at odds with each other. As you dial up the security and privacy controls, you increase the risk of dissatisfied customers and lost business. Conversely, if you dial down the controls, you increase the risk of a privacy breach, which, of course, leads to dissatisfied customers.

What’s the answer? Perhaps it’s our old friend transparency. If customers know why the controls are in place, and the logic behind them seems reasonable, they’re unlikely to be dissatisfied with the extra nuisance. You’re doing it, after all, for their benefit.

Because if the best explanation you can give for your security and privacy controls amounts to “we think your grandmother might have a bomb in her underwear,” or (true story) “we want to make sure you can use your account without your wife knowing about it,” well, you probably need to rethink your privacy and security controls. They’re not tuned quite right.

photo credit: Little Baby Zorak via photopin cc

Written By

Jedidiah Bracy, CIPP/E, CIPP/US


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Spots Going Fast

With the top minds in the field leading this exceptional program, it's no wonder it's filling quickly. Register now to secure your spot.

Be Part of Something Big: Join the Summit

Registration is open for the Global Privacy Summit 2016. Discounted early bird rates available for a short time, register today!

Data Protection Intensive Returns to London

Registration is now open for the IAPP Europe Data Protection Intensive in London. Check out the program!

P.S.R. Call for Speakers Open!

P.S.R. is THE privacy + cloud security event of the year, and you can take a leading role. Propose a session for this year's program.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»