The dogma of forced password changes demands a serious policy rethink. Forced password changes frustrate users, increase sustainment costs and reduce security. Forced password changes cost industry and Defence billions of dollars a year, yet, for many years this has been recognised as poor and ineffective practice. Moreover, this financial cost fails to consider the costs of time, energy and user frustration.
At inception, forcing users to change passwords was considered wisdom; it would deny hacker’s entry to systems because they no longer had ‘the password’. Accordingly, this action improved cyber security, or so the alleged logic went. Yet, any analysis of computing (nowadays ‘cyber’) is impoverished without considering user behaviour, let alone how hackers actually operate.
Consider, for example, the ‘Typical User Profile’ that I have generated at Table 1. Although there is evidence that password security is correlated to the sensitivity of the service, recalling the above amount of passwords, when not necessarily using all accounts daily, is a tall order. What would a user (aka human) do to remember all of the above combinations? A solid analysis would suggest they will either (1) forget/reset (costing time, money and frustration) or (2) write down the password combinations – which is the antithesis of cyber security.
It is also noteworthy that forced password changes consistently reflect only minor increments, specifically incrementing a number or letter eg. FROM abc123 TO abc124. Ask yourself, what do you do when you are forced to change your password – are you up to ‘pa$$word18’ or ‘pa$$word24’? Then ask yourself if a budding kiddie scripter (junior hacker) could readily guess the same subtle change…
The reality is poor passwords are readily guessed or ‘brute forced’ by hackers. Moreover, this technique is but one way hacker’s side step encryption. Yes, that is correct; military-grade encryption is a dubious reason for feeling cyber secure. The billions spent worldwide on employing the top 0.001% of the best Mensa can recruit is simply side-stepped by any budding hacker after watching a few YouTube videos! I digress.
A bigger issue with passwords is when they are used on multiple accounts. If you want to see what happens to even the ‘cyber experts’ when they repeatedly use the same password; google “hack HBGary” or “Aaron Barr”. Stepping back, a 2012 survey shows three-quarters of people self-reported using the same password for more than one account – worse, the same article reinforces the unquestioned doctrine that passwords must be regularly changed. Even Australian national policy echoes this same creed – with (in my view) zero evidence to support its current value. Yet, consider the following mathematical logic when using ‘strong passwords’: 
- A 9 digit combination would take 0.29 milliseconds to crack
- A 9 character combination of numbers and letters would take more than 3 months
- A 9 character combination of numbers, letters and special characters – over 6 decades
- A 10 digit combination would still take 0.29 milliseconds to crack
- A 10 character combination of numbers and letters would take more than 1 decade
- A 10 character combination of numbers, letters and special characters – over 4 millennia!
The pure logic here demonstrates a password containing a 10 character combination of numbers, letters and special characters is not going to be guessed anytime soon. Surely, our policy makers can understand this low risk of guessing complex passwords? Indeed, even if policy makers cannot accept this low level of risk; they could enforce 12 character complex passwords – where the current computational time is a truly staggering 1,026,997 thousand years – this is enough time to fly the space shuttle to Alpha Centauri and back over 3,000 times! Therefore, when users have complex passwords – why force them to change, particularly when any such changes are routinely incremental? Guessing passwords is not a risk worthy of attention.
Conclusion – What is Smarter Policy on Passwords?
Smarter password behaviour is not using the same password for anything sensitive eg. banking, financial, work or private accounts. In reality, hackers hack, crack, guess or steal passwords – regardless of complexity. A better policy is to advise users (1) when attempts have been made to login to their accounts, (2) when their passwords have been changed and (3) multi-factor authentication. This empowers users, rather than treating them like culprits.
Smarter policy would purchase a single super-computer, for say $20,000 (replaced every 3-4 years), and employ someone to run it with the sole purpose of ‘guessing’ passwords. When the super-computer guesses a password, it would generate an automated email to the user advising them their password had been guessed and, accordingly, they must change their password. Not only would this benefit users beyond their Army life by making users consider changing the same password to any personal data, it serves multiple Army and Defence end-states by (1) reducing sustainment costs, (2) enhancing user cyber security awareness, (3) reducing user frustration and, most importantly, (4) increasing systemic cyber security.
 Research companies suggest the cost per password reset via a Help Desk is somewhere between $17 and $25 each time.
 Duggan, Johnson & Grawemeyer Rational security: Modelling everyday password use; 22 Feb 2012, International Journal of Human-Computer Studies.
 Hackers use ‘brute force’ attacks (also known as ‘dictionary attacks’) instead of trying to crack encryption. They achieve this by comparing a ‘dictionary file’ of possible passwords against the Users password.
 For simplicity, the author defines a ‘strong’ password as being at least 10 characters long and containing numbers, letters and special characters because over 4 millennia is somewhat of a long time.
About the Author:
The author is a serving ADF member. The Cove is allowing them to write anonymously for legitimate reason. The member’s identity, and the veracity of their work, has been checked.