Why Cryptosystems Fail
ryptography is used by governments, banks, and other or-ganizatiom to keep
messages secret and to protect electronic transactions from modification. It
is basically an engineering discipline, but differs in a rather striking way
from, for example, aeronautical engineering: there is almost no public feed-
back about how cryptographic systems fail.
Commercial airline crashes are extremely public events. Investigators
rush to the scene, and their inquiries involve experts from a wide range of
interestsfrom the carrier, through the manufacturer, to the pilots’ union.
Their findings are examined byjournalisrs and politicians, discussed on elec-
tronic bulletin boards and in pilots’ messes, and passed on by flying instruc-
tors. This learning mechanism is the main reawn why, despite the inherent
hazards of flying, the risk of an individual being killed on a scheduled air
journey is only about one in a million.
Cryptographers rarely get this kind of feedback, and indeed the history of
the subject shows the same mistakes being made over and over again. For
example, Norway’s rapid fall in the Second World War was largely due to the
Germans’ success in solving British naval codesusing exactly the same tech-
niques that the Royal Navy’s own “Room 40” had used against Germany in
the previous war [ 161.
Altbough we now have a reasonable history of cryptology up to the end
of World War II, a curtain of silence has descended on government-sector
use of this technology since then. Although this is not particularly surpris
ing, it does leave a large experience deficit, especially as the introduction of.
computers since 1945 has changed the situation considerably. It is as ifacci-
dent reports were only published for pistonengined aircraft, while the caw
es of all jet-aircraft crashes were kept a state secret.
This secrecy is no longer appropriate, a~ military messaging networ!~ now
make up only about 1% of the world’s crptography, whether we measure
this by the number of users or by the number of terminals. There are some
civilian applications for secure messaging, such as interbank money transfer
and burglar alarm signaling; but the great majority of fielded cryptographic
systems are in applications such as bank cards, pay-TV, road tolls, office
building and computer access tokens, lottery termmals, and prepayment
electricity meters. Their job is basically to make petty crime, such as card
forgery, slightly more difficult.
Cryptography was introduced to the commercial world from the military
by designers of automatic teller machine (ATM) systems in the early 1970s.
Since then, ATM security techniques have inspired many of the other sys
ternsespecially those where customers initiate low-value transactions for
which we want to account. One might therefore expect the ATM experience
to give a good first-order threat model for cryptographic systems in general.
Automatic Teller Machine Dispute.
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Why Cryptosystems Fail ryptography is used by governments,.docx
1. Why Cryptosystems Fail
ryptography is used by governments, banks, and other or-
ganizatiom to keep
messages secret and to protect electronic transactions from
modification. It
is basically an engineering discipline, but differs in a rather
striking way
from, for example, aeronautical engineering: there is almost no
public feed-
back about how cryptographic systems fail.
Commercial airline crashes are extremely public events.
Investigators
rush to the scene, and their inquiries involve experts from a
wide range of
interestsfrom the carrier, through the manufacturer, to the
pilots’ union.
Their findings are examined byjournalisrs and politicians,
discussed on elec-
tronic bulletin boards and in pilots’ messes, and passed on by
flying instruc-
tors. This learning mechanism is the main reawn why, despite
the inherent
hazards of flying, the risk of an individual being killed on a
scheduled air
journey is only about one in a million.
Cryptographers rarely get this kind of feedback, and indeed the
history of
the subject shows the same mistakes being made over and over
again. For
2. example, Norway’s rapid fall in the Second World War was
largely due to the
Germans’ success in solving British naval codesusing exactly
the same tech-
niques that the Royal Navy’s own “Room 40” had used against
Germany in
the previous war [ 161.
Altbough we now have a reasonable history of cryptology up to
the end
of World War II, a curtain of silence has descended on
government-sector
use of this technology since then. Although this is not
particularly surpris
ing, it does leave a large experience deficit, especially as the
introduction of.
computers since 1945 has changed the situation considerably. It
is as ifacci-
dent reports were only published for pistonengined aircraft,
while the caw
es of all jet-aircraft crashes were kept a state secret.
This secrecy is no longer appropriate, a~ military messaging
networ!~ now
make up only about 1% of the world’s crptography, whether we
measure
this by the number of users or by the number of terminals.
There are some
civilian applications for secure messaging, such as interbank
money transfer
and burglar alarm signaling; but the great majority of fielded
cryptographic
systems are in applications such as bank cards, pay-TV, road
tolls, office
building and computer access tokens, lottery termmals, and
prepayment
3. electricity meters. Their job is basically to make petty crime,
such as card
forgery, slightly more difficult.
Cryptography was introduced to the commercial world from the
military
by designers of automatic teller machine (ATM) systems in the
early 1970s.
Since then, ATM security techniques have inspired many of the
other sys
ternsespecially those where customers initiate low-value
transactions for
which we want to account. One might therefore expect the ATM
experience
to give a good first-order threat model for cryptographic
systems in general.
Automatic Teller Machine Disputes
In SCIIIK countries, banks are responsible for the risks
associated with new
technology In 1980, a New York court believed a bank
customer’s word that
she had n”t made a withdrawal, rarhcl
than the word of the bank’s exper,
that she must have done so 1151; the
Federal Reserve then passed regula-
dons that require U.S. banks to refund
all disputed electronic transactions
unless they can prove fraud by the cus-
4. tamer. Since then, many U.S. ATM
cash dispensers have had video carr-
eras installed.
In Britain, the courts have not yrt
been so demanding; despite a parha-
mentary commission that found thar
the personal identification numbe
(PIN) system was insrcurr [14], bank-
crs simply deny that their systems ca”
ever be at fault. Customers who c”m
plain about “phantom withdrawals”
are told that they must be lying, 01
mistaken, or that they must have
been defrauded by their friends or
relatives. This has led t” a string of
court cases in the U.K.:
l A teenage girl in Ashton was COIL-
victed in 1985 of stealing f40 from
her father. She pleaded guilty on
the advice of her lawyers that shy
had no defense, and then disap-
peared; it later turned “ut that
there had nevrr been a theft, but a
clerical rrr”r by the bank, which
tried to cover it up.
. A She&Id police sergeant wa>
charged with theft in N”vembe,
1988 after a phantom withdrawal
took place on a card he had confia-
cated from a suspect. He was lucky:
his colleagues located the person
who made the transaction after the
5. disputed one, and her testimony
cleared him
l Charges of theft against an el-
derly w”man in Plymouth were
dropped after our inquiries showed
the bank’s computer security sys-
terns were a shambles. The same
happened in a case against a taxi
driver in Great Yarmouth.
l After a police constable c”m
plained he had not madr six AIM
withdrawals that appeared on his
bank statement, the bank had him
prosecuted and convicted for at-
tempting to obtain money by decrp-
don. Their technical evidence was
highly suspect; there was an outcry
in the press, and an appeal is
under way.
l Customers are suing banks in the
civil courts in both England and
&otlar~d, dnd n C~LC ,,,a? lbe
launched shol-tly in Norwa) a well
Wr have been involved i” prow-
ing expcrr advice in many of thrse
cases, which produced a vasr quantity
of evidence. In addition m this, and
“the,- information discovered
through the legal p,-ocess, we haw
intcrvirwed former bank rmployeeb
and criminals, srarching the banking,
6. legal, and trchnical literatures, and
drawn on experirnce gainrd dcsign-
ing cryptographic equipment. One
outcome of all this activity has been
the first unclassified study ofhow and
why cryptosystcms fail.
The Three COmmOfl Problems
with ATM Security
Automatic teller- machine systems ue
rncryption t” protect customers
PINs. The details vary from one bank
m another, but many use variants ofa
system originally drvclopcd by IBM
[21], in which the PIN is derived from
the account number by encryption. Ir
is also rncryptrd while being sent
Srom the ATM to thr bank for vrrifi-
cat;on.
When the crypt” know-how was
“riginally imported from the dcfenae
sector, a threat model came with it.
This model presumed that attacks on
the system would be technically so-
phisticated, and might in,olve crypr-
analysis or the manipulation of trans-
acti”ns at s”mr point in the path
between the ATM and the bank that
issued the card.
Indeed, there are many ways i”
which a skilled attacker could pene-
tratr thr world’s ATM networks [3].
Some networks do not cncrypt PINS
7. properly, or at all; many banks, espc-
cially in the U.S., do encryption in
software rather than hardware, with
the rrsult that the keys are known t”
programmers; somr older ATMs and
encryption devices have known wcak-
nesses; and even those systems that
use approved encryption hardware
can be vulnerable, as the Data En-
cryption Standard algorithm is be-
coming increasingly “pen t” attack
[24]. All these facts are used by en-
cryption equipment sales staff in thei!
efforts t” persuade bankrrs to buy the
latest products.
Of the hundreds of documented
failures of ATM security, however,
“nl) IMO rnwlwd ruch attack*: in
one, a telephone engineer in Japan
recorded customer Cal-d data and
PIN5 from a phone line; in the other,
technicians programmed a communi-
cations px-ocessol- to send only posit
tive authorirati”ns t” an ATM where
accomplices were waiting. None of
the other thefts and frauds wrre due
t” skilled attack, but were rather
made possible by errors in the desig”
or operation of the ATM system itself
The three main causes of phantom
8. withdrawals did not involve cryptol-
ogy at all: they w.e,vz pr”gram buga,
postal interception OS cards, and
thefts by bank staff.
First, there is a “background
noise” of transacti”ns that turn out t”
be wrongly processed (e.g., posted t”
the wong account,. It is well known
that it is difficult to get an error rate
below about 1 in 10,000 on largr, he
rrogcnrous transaction pl-“casing
systems such as ATM networks [IO],
yet, bef”re the British litigation
started, the government minister rc-
sponsiblc for Britain’5 banking indus-
try was claiming an rrr”r rate of 1 in
1.5 million! Under prcsaurr from
lawyers, this claim was trimmed to I
in 250,000, then 1 in 100,000, and
most recently to I in 34,000. Eveo
this last figure would still mean thal
about 30,000 phantom withdrawals a
year in Britain (and “vrr 200,000 in
the United States) are caused by pro-
cessing errors.
Second, problems with the posul
service are also well known and can
be particularly acute in university
towns. In Cambridge, for example,
approximately 4,000 pcoplc “pen
bank accounts every October; thei,
ATM cards and PINS are delivered t”
9. college pigeonholes, which are wide
open t” thieves. Yet this author’5
bank was unable t” arrange for a card
to be sent by recorded delivery; ita
systrm designers had not anticipated
the requirement.
The third big problem is theft by
bank stall. British banks dismiss
about I% of their staff every year for
disciplinary reasons, and many of
these firings are for petty thefts in
which ATMs can easily bc involved.
There is a mwal hazard here: staff
know that many ATM-related theft5
g” undetected because of the p”licy
the pwblem (and it did not occur
to anyone t” check).
. One of the largest Londrm hanks
had written the encrypted PIN on
the card’s magnetic strip. The crirw
inal fraternity found by trial and
error that you could changr the
arcount number on your own card’s
magnetic strip to that of y”ur tdr-
get, and then use it with your “WI>
PIN to toot the targeted acc”unt. A
document about this tectmique cir-
10. culated in the British prison systenl,
and tw” men were recently chargrd
at Bristol Crown c”wt “f conspiring
to steal money by altering cards in
this way. They produced an em-
nrnt banking industry expert who
testified that what they had planned
was impossible; but after a leading
newspaper demonstrated otherwise,
they changed their plea to guilty[8].
l Some banks have schemes that
enable PINS to be checked by “ff-
line ATMs withnut giving them the
master encryption key needed t”
derive PINS from account numbezra.
For example, customers of one Brit-
ish bank got a credit-card PIN with
digit-one plus digit-four equal t”
digit-two plus digit-thrcr, and a
debit-card PIN with one plus three
equals tw” plus four. Villains even-
tually discovered that they could
use stolen cards in off-line devicea
by entering a PIN such as 4455.
l Even without such weaknesses,
the use of store-and-forward pro-
cessing is problematic. Anyone can
“pen an account, get a card and
PIN, make several copies of the
card, and get accomplices to draw
cash from a number of different
ATMs at the samr time. This was a
favorite modus operandi in Britain
11. in the mid-19ROs, and is still a
problem in Italy, where ATMs arc
generally off-line over the weekend.
l Any security technology can be
defeated by gross negligence. In
August 1993, my wife went into a
branch of our bank and told them
that she had forgotten hrr PIN;
they helpfully printed a replace-
ment PIN mailer from a PC behind
the counter. This was not the
branch at which her acc”unt is
kept; no “ne knew her, and the
only identification she produced
was her bank card and checkbook.
By thnt tm,e, bank5 II, Bntam hnd
endured some 18 months of bad
publicity about pwr ATM sccuriry,
and this parrirutar bank had been 4
press target since April of that year.
Tllis might Icad IIS to ak what the
future might bold. M’ill all magnrtic
cards br replaced with smartcards, as
is already happrning in countrirs
from Francr t” Guatemala and from
Norway t” South Africa [Z]? One “I
the smartcard vrndors strongest ar-
guments is that card forgery keeps on
rising, and that the fastest growin!:
modus “prrandi is to use hdac trm&
nals to collrct customer card and PIN
12. data.
Artarks “1 this kind were lirsr ICI-
ported from the United Stares in
198X; more recently, an enterprising
gang b”ughtATMa and an ATM aoft-
ware dcvrtopmrnt kit (on credit),
pwgrammed a machine t” capturr
PINS, and rented space f”l, it in a
shopping mall in Connecticut. A
Dutch gas station attrndant used a
tapped pr,int-of-sale terminal t” har-
vest card data in 1993; and in March
1994, villains constructed an entire
bogus bank branch in the East Lnd of
London and made off with f250,OOO
($375,000). Thcrr srems to be no de-
fense against this kind of attack, short
of moving fwm magnetic cards to
payment tokens, which are more dil-
ficult to forge.
But trusting technology to” much
can be dangerous. Norwegian banks
aprnt millions “n smartcards, and arc
now as publicly certain about theit
computer security as their British c”I-
leagues. Yet despite the huge iwest-
ment, there have been a number of
cases in Trondheim, Norway, where
stolen cards have been used without
the PIN having been lraked by the
user. The hanks‘ refusal to pay up will
13. probably lead t” litigation, as in Brit-
ain, with the same risk to both bal-
ance sheets and reputations.
Where transaction processing sys-
tems are used directly by the public,
there are really two separate issues.
The first is the public-interest issue of
whether the burden of proof (and
thus the risk) falls on the customer or
on the system operator. If the cus-
mmer carries the risk, the operator
will have little short-term incentive to
rn~p~ovc security; but 111 the lorlg:cl
term, when innocent people are prose
ccutrd because of disputed transa-
ti~ns, the public interest becomea
acute.
If, “1, thr other hand, thr system
operator carrirs the risk, as in the
United States, then the public-intcr-
est isuc disappcara, and security be-
comes a straightfwward engineering
pwblrm fix the hank (and its insur-
e1.s and equipment suppliers). WC
wnsider how this problem can br
tackled in the following sections.
Organizational Aspects
First, a caveat: our reseat& sbowcd
14. that the organizational problems “I
building and managing srcure sys-
tems arc so ~rvrrr that they will frus-
trate any purely technical solution.
Many organizations have no corn
puter security team at all, and the rep,
have tenuous arrangements. The irr-
ternal audit dcpartmcnt, fw rxam-
plr, will resist bring givrn any line
management tasks, while the pro-
gramming staftdislike anyone whose
role seems m be making their .j”b
more difficult. Security teams thus
tend to be “rrorganizrd” rrgulxly,
lading t” a toss of continuity; a re-
cent study shows, for example, that
the average job tenure of compurel
security managers in U.S. govern-
ment departments is only seven
months [13].
It should not br surprising that
many firms get outside consultants t”
do their security policy-making and
review tasks. However, this can be
dangerous, especially if firms pick
these suppliers for an “air ofcertainty
and quality” rather than for theit
technical credentials. For example,
there was a network “fover 40 hanks
in &a that encrypted their PINS in a
completely insecure manner (using a
15. Caesar cipher) for five years, yet in all
this time not one of their auditors or
consultants raised the alarm. It is in-
teresting to notr that, following a
wave of litigation, accountancy firma
are rewriting their audit contracts to
shift all responslbthty for fraud con-
trol to their clients; but it remains to
be seen what effect this wilt have on
their security consulting business.
Much of the management debate,
however, is not about the consultancy
The Problems with Securitv
Products
know that most hkel) fkuhs, ,n<t, as a
poor batch of steel, contaminated
concrete, or uneven weathering, have
the effect of slightly reducing the
breaking strain of the structure; so
thr usual rule is to design a bridge so
that its theoretical breaking strain
with optimal materials is six times
what is required, and to proof tat
samples of the actual materials used
to three times the ncrdcd strength.
16. Aircraft rngincers, on the other
hand, know that many accidents are
causrd by the failure of critical com-
ponents, and make extensive use of
redundancy; with very critical func-
tions, this may rxtrnd to design di-
versity. Whrn flying in clouds, pilots
need to know which way is up, and so
a modern airliner typically has two
attitude indicators driven by elcctri-
tally powered gyro platforms. If these
both fail at once, there is a 1950s-rra
technology artificial horizon with
pneumatically driven gyros, and a
1920s vintage turn-and-slip indicator
driven by a battery.
But neither overdcsign nur redun-
dancy is adequate for secure compu-
tational systems. Just doing more
rounds of a bad encryption algo-
rithm, or using a number of weak al-
gorithms one after another, will not
necessarily produce a strong one; and
unthinking use of redundancy in
computer systems can be dangerous,
as resilience can mask faults that
would otherwise be found and fixed.
Our work on ATM systems thcre-
fore inspired us to look for an orga-
nizing principle for robustness prop-
erties in computer security systems.
The kry insights came from the high-
17. tech end of the business-from
studying authentication protocols
and the ways in which cryptographic
algorithms interact (see the sidebar
“No Silver Bullet”).
These results suggest that explicit-
ness should be the organizing princi-
ple for security robustness. Crypto-
graphic algorithms interact in ways
that break security when their de-
signers do not specify the required
properties explicitly; and protocol
failures occur because naming, fresh-
ness, and chaining properties are as-
sumed implicitly to hold between two
parties.
The importance of explicitness is
confirmed m tbr field of oprtamg
systems security by a recent report
that shows implicit information proh-
lems were one of the main causes of
failure there, and that most of thr
others were due to obGous require-
ments not being explicitly checked [ 171.
However, just saying that every
sccul(ty property must be made ex-
plicit is not a solution to the practical
problem of building robust systems.
The more aspects of any system are
made explicit, the more information
18. its designer has to deal with; and this
applies not only to designing systems,
hut to evaluating them as well. Can
our explicitness principle ever
amount to more than a warning that
all a system’s assumptions must be
examined very carefully?
There are two possible ways for-
ward. The first is to look for ways in
which a system that has a certain set
ofrelationships checked explicitly can
be shown using formal methods to
possess some desirable security prop-
erty. This may be a good way to deal
with compact subsystems such as au-
thentication protocols; and lists of the
relevant relationships have been pro-
posed [I].
The othrr, and more general, ap-
proach is to try to integrate security
with software engineering. Data-
dependency analysis is already start-
ing to be used in the security world:
l A typical difftcult problem is iden-
tifying which objects in a system
have security significance. As we
saw previously, frauds have taken
place because banks failed to realix
that an address change was a secu-
19. rity event; and evaluating thr signif-
icance of all the objects in a distrib-
uted operating system is a
Herculean task, which involves trac-
ing dependencies explicitly. Auto-
mated tools are now being con-
structed to do this [l I];
l Another difficult problem is that
of verifying whether an authentica-
tion protocol is correct. This prob-
lem can he tackled by formal meth-
ods; the best-known technique
involves tracing an object’s dcpen-
dencies on crypto keys and fresh-
ness information [9], and has been
used to verify transaction processing
applications as well [2].
However, we cannot expect to find
a “sdvr, bullrr” brtr crrbrr ‘1 t,,i 1s
bccaux many of the m,,re subtle and
difftcult mistakes occur whew ash
sumptioos ahoul security proper&b
fail at the interfacr between different
levels (e.g., algorithm-prot~j,col or
protocol-operating system) [6]. Thus
when WC decompose our system into
mod&s, we must be very careful to
ensure that all our assumptions about
possible interactions have been made
explicit and conzidrrcd carefully.
Explicitness and Software
20. Engineering
Robustness as rxplicitnesb lita m well
with the general principles of soft-
ware engineering but may require
some changes in its practice. A recent
study shows that for many years the
techniques used by system builders tu
manage security requirements, as-
sumptions, and drpendencies have
lagged a grneration behind the state
of the art [5].
An even more elementary problem
concerns the mechanisms by which
security goals are established. Many
software engineering methodologies
since the waterfall model have dis-
pensed with the traditional requirc-
ment that a plain-language “concept
of operations” should be agreed
upon before any detailed specifica-
tion work is undertaken. This is illus-
trated by our work on ATMs.
ATM security involves several cow
flicring goals, including controlling
internal and external fraud, and arbi-
trating disputes fairly. This was not
understood in the 1970s; people built
systems with the security technology
they had available, rather than from
any clear idea of what they were try-
21. ing to do. In some countries they ig-
nored the need for arbitration alto-
gether, with expensive consequences.
This underlines the particular impor-
tance of making security goals ex-
plicit, where a concept of operations
can be a great help; it might have fo-
cused ATM designers’ attention on
the practicalities of dispute resolution.
Finally, it may be helpful to com-
pare secure systems with safety criti-
cal systems. They are known to be re-
lated: while the former must do at
most X, the latter must do at /~_YI X,
and there is a growing realization
that many of the techniques and even
wrnponcnr~ horn one disclplmc can
be reused in the other. Let us extend
this relationship to the methodologi-
cal level and have a look at good de-
sign practice. A leading software
safety expert has summed this up in
four principles [Xl]:
l The specification should list all
possible failure modes of the sys-
tan. This should include every hub-
stantially new accidrnt or incident
that has ever been reported and
that is relevant to the equipment
being specified.
22. l It should explain what swateg)
has been adopted to prevent each
of these failure modes, or at least
make them acceptably unlikely.
l It should then spell out how each
of these strategies is implemented,
including the consequences when
each single component fails. This
explanation must cover not only
technical factors, but training and
management issues too. If the pro-
cedure when an engine fails is to
continue flying with the other en-
gine, then what skills does a pilot
need to do this, and what are the
procedures whereby these skills are
acquired, kept current, and tested?
l The certification program must
include a review by independent
experts, and test whether the equip-
ment can in fact be operated by
people with the stated level of skill
and experience. It must also in-
clude a monitoring program
whereby all incidents are reported
to both the equipment manufac-
turer and the certification body.
This structure ties in neatly with
our findings, and gives us a practical
paradigm for producing a robust,
explicit security design in a real proj-
ect. It also shows that the TCSEC
program has a long way to go. As we
23. mentioned earlier, so far no one
seems to have attempted even the
first stage of the safety engineering
process for cryptographic systems.
We hope that this article will contrib-
ute to closing the gap, and to bring-
ing security engineering up to the
standards already achieved by the
safety-critical systems community.
concIustons
Designers of cryptographic systrms
have suttered from a lack <,I feedback
about how their products fail in prac-
tice, as opposed to how they might
fail in theory. This has led to a false
thrrat model being accrpted; design-
e,n focused on what could possibly go
wrong, rather than on what was likely
to, and many of their products ended
up being so complex and tricky to
use, they caused implrmentation
blunders that Icd to security failures.
Almost all security failures are in
fact due to implementation and man-
agement errors. one specific conse-
quence has been a spare of ATM
fraud, which has not only caused fi-
nancial losses, but has also caused sev-
era1 wrongful prosecutions and at
least one miscarriage ofjustice. There
have also been military consequences,
24. which have now been admitted (al-
though the dewI, remain classitird).
Our work also shows that compo-
nent-level certification, as embodied
in the TCSEC program, is unlikely to
achiew its stated goals. This, too, has
been admitted indirectly by the rnili~
tary; and we would recommend thal
future security standards take much
more account of the environments in
which the components are to be used,
and rspecially the system and human
factors.
Most interesting of all, however, is
the lesson that the bulk of the com-
puter security research and develop-
ment budget is expended on activities
that are of marginal relevance to real
needs. The real problem is how to
build robust security systems, and a
number of recent research ideas arc
providing insights into how this can
No Silver 6ullt?t
Mach of these ProPosats only addresses Part of the Problem.
and none of
them 15 adequate on Its own: ProtPcot fatlures are knOwI which
W$“ttkO”J
the lack of name, or of heshnesr. or M context tnformatton
wtfhtn the s.?C”rth/
envek,Pe 111. But Putting them together and tnststtng on at1
25. Me% “artabtes
being made exPttCtt t” each me55age aPPears to sot”e the
global rObuStWSI
Problem--af least for StmPte PrOtOCOtS.
This COmbined aPProach had act”att” been adopted in 1991 for
a banttng
aPP,,cat,on 121, In which attact on the Payment Protocots are
Prevented by
making each message stiTt wt+_h the sender’s name. and then
enCr’,Pttng If
under a key that contains a “ash of the Previous message. These
techntdWS
were not Wed as an exPertmenf In robuStne5s. but to factlltate
format Wrtflcatlon.
4nother reason to believe that exPttcitneSS Should be the
organlztng Prlnct-
Pte for robust sec”rtN comer from st”dyt”g how CWPtOgraPhtC
atgortthms
Interact. Researchers have aSLed. for examPte. what sort of
PrOPertIeS We
need from a hash function In order to use It With a given
StgnatUre scheme.
and a number of “ece55ar” CPndtftonS have been found. Thts
ted US tO ask
whether there Is any stngte ProPetT, that IS S”MCte”f to
Prwenf at, dangerous
interactions. We recen#y showed that fhe anrwer is Probably no
141.
What this mexx 16 that in CrfPtotog”. a5 In sG+euare
engtneertng. we cannot
exPect to Rnd a “s,,“er bullet” 171; there can be no general
PrPPei-b, that Pre-
“entS NV0 algorithms frOm t”teWXt”g and Mat 15 tltW tO be
28. Overview of Early School Years
Ages 4-8 Years
Me – Being Me
ME - USING MY BODY
Whereas the child’s physical-motor development during early
childhood
is marked by large growth spurts, during the early school years
it is rather
gradual and constant. This being said, between the ages of four
and eight, a
child’s improvement in coordination and skill is still amazing.
So is the child’s
perceptuo-motor integration, or ability to synchronize her body
movements
to the movements she sees, or hears, others performing, (so-
called eye-hand
coordination is a part of perceptuo-motor integration, and
begins when
children eyes can be guided to follow movements of their
hands).
The period between ages 4 and 8 is a time of expanded vigour
and energy. It
is also a time when the child learns to master her otherwise wild
exuberance,
and put it at the service of things he likes to do.
As they enter their fi fth’s year, most children have enough
mastery over their
gross motor skills to be able to balance, hop, skip, run, and
jump. And they
have perfected the use of fi ne motor skills well enough to be
able to reach,
30. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
144
manoeuvre a two-wheeled bike, and they are ready to skate, ski,
or swim.
They engage in many group activities, from soccer to
gymnastics, from
hockey to ballet, and they have become competent team players.
In the later section, we shall look at how children, between the
ages of 4 and
8, progressively refi ne their physical-motor abilities, which, in
turn, opens
the way to many new activities, fosters a growing sense of
freedom and
control, and new forms of relating to the world, self, and others.
ACKNOWLEDGEMENTS
The main sources for Me in this Part are:
Anselmo, S, Franz, W. (1995). Early Childhood Development:
Prenatal
Through Age Eight. (2nd ed.). Englewood Cliffs, NJ: Prentice-
Hall [First
edition was published in 1985. New York: Merill / Macmillan].
Sanford, A.R.
and Zelman, J.G. (1981) Learning accomplishment profi le.
Winston Salem,
NC: Kaplan.
31. ME – KNOWING MYSELF
The roots of a child’s a self-concept lies in infancy, and evolves
through the
many interactions the child has with her social environment. By
their fourth
birthday, most children have acquired a fairly good sense of
themselves
as distinct from others. They also have a budding sense of
identity or self-
invariance: the idea that some core aspects of self remain
unchanged over
time.
One of the big breakthroughs, as children enter their preschool
years, is the
passage from a merely physical- and action-centric self-concept
to a more
psychological one. In other words, children develop a sense of
self-worth,
or self-esteem: the emotional, affective, moral, and intellectual
facets of a
child’s early self-concept. This, in turn, requires an
understanding that the self
is unique (distinct from other), stable (identity over time), and
worth one’s
own, and other people’s, consideration, and love. Self-esteem
or self-worth
emerges as the child learns to distinguish between an inner-me,
or “agent,”
that drives her actions, and an outer-me: a person’s physical
attributes and
/or actions.
By developing a positive and accurate body image/self-concept,
children
build a reliable frame of reference—themselves—to help them
33. both cognitively and affectively.
In this Part, we shall look at how 4–8-year-old children’s sexual
and gender
awareness, sense of self-worth, and views of their own
competences, or
meta-cognitive skills, evolve during early school years.
Again, each child grows at his own pace, so that development
stages and ages
are no more than indicative of general trends. What’s more,
self-development
is not a neutral area! Children live with people who hold their
own views on
what a good person, or a true self, should be. This makes for
great variability in
ideals, which in turn informs how adults support and constrain
their children.
Us – Growing Together
US - RELATING TO OTHERS
Early school years mark huge progress in a child’s abilities to
understand,
communicate, and refl ect upon matters that govern and
motivate social
relations. Children gain greater control over their emotions, an
increased
self-awareness, and they learn to put their feelings, intentions,
desires,
and beliefs at work to consolidate their social ties, while
preserving their
identity.
Between the ages of 4-8, a child’s ways of relating expand and
become
35. Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
146
A person’s emotions play a key role in how he relates to others.
Emotions
are like internal signals that prepare a person to cope with
situations that, to
him, are associated with fear, joy, or sadness. The problem with
emotions,
however, is that they take over, at least initially, forcing us to
act in certain
ways. Progressively however, the child learns to recognize and
describe his
own (and other people’s) emotions and starts to understand the
behavioural
consequences of certain emotional states. That’s when his initial
urge to
act out whatever he feels turns into a more mediated and fl
exible palette of
possible responses that the child then taps into as a means to
relate better
with others. In other words, as the child becomes aware of his
feelings and
intentions (and those of others), he increases his ability to
negotiate and co-
operate. He monitors and communicates what he feels, intends,
desires, and
believes, to regulate his exchanges and dealings with others.
According to Erikson, a fi rst developmental breakthrough
occurs during the “play
age”: from about 3 1⁄2 to age 5. During it, the growing child
36. learns: (1) to imagine
and to broaden her skills through active play of all sorts,
including fantasy (2) to
co-operate with others (3) to lead as well as to follow. That’s
when the child enters
a new phase of psycho-social development called initiative.
Initiative adds to
autonomy a quality of following through on tasks for the sake of
“getting to know
more.” While bringing about obvious benefi ts, initiative also
comes with its share
of new challenges. Following through on things can be risky
and solitary. It is
thus not by chance that initiative coincides with the emergence
of the “play age.”
Pretend and role play, both of which peak at this stage, offer
safe ground to explore
some of the consequences that taking initiative entail. In other
words, when the
child is ready, developmentally speaking, to take the risks of
initiative, she fi rst
wants to explore those risks through joint make-believe
activities.
Later during the school years, 6- to 8-year-old children become
ready to
embark on yet another of Erikson’s stages of psycho-social
development:
They become industrious, which has a decisive effect on school
life and
on the later entrance into the world of work. Without industry,
according to
Erikson, children may suffer from a sentiment of inferiority.
Children at this
age become excited by projects such as building forts, sewing,
and cooking,
38. The Feeling Peeling Game. To help children become aware of
their feelings
and, by the same token, understand how others feel, Smith’s
“feeling
peeling” game (fi ve years up) remain a good inspiration.
Again, the game
can be played in dyads, or in groups (Smith 1982). As in the
previous stage,
the idea is to ask questions that encourage children to think
about the causes
and consequences of various emotions. Emotions to be “peeled”
at this age
include: happy, angry, affection, afraid, and sad, and also
embarrassed,
ashamed, guilty. Questions that can be asked include:
- What would you do when you are X? [e.g. afraid].
- What would you like to do when you are X…..
- What would you like other people to do for you when you are
X….
- What are some of the things that give you an afraid feeling?
- How do you feel when someone is afraid of you?
- What feeling is diffi cult to tell other people about?
Note. This list is only a beginning of a large series of questions
that may
encourage children to explore their emotions and understand
those of
others. Imagine role-play scenarios in which can enact and play
out some of
the questions, taking on different roles. Put the same child in
the role of the
agent and the recipient.
In role playing games, always respect a child’s desire not to
disclose how
40. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
148
A child’s journey toward getting to know others, to understand
what they
want, feel, believe, and intend, is a lengthy one, which involves
a two-fold
ability: 1. to “de-centre,” or move away from oneself, and 2. to
“re-centre,”
or take on another’s view. The focus here is on how children,
between the
ages of 4 to 8, operate this shift away from themselves to build
a sense of
other (Schantz, 1975). It is worth noting that the apparently
contradictory
movements of getting to know oneself and moving away from
self, toward
other, are intricately related. Without self-control and self-
awareness there
can be no respect and understanding of others. Both
competencies emerge
and evolve together.
Early school years are marked by a growing ability to
understand not just
that other people may think and feel differently, but what it is
they may
feel and think! During these years, children become able to
empathize and
41. adopt different perspectives. They learn to negotiate, and make
sense of,
other people’s expectations and intentions. The seventh year
also marks the
beginnings of Piaget’s stage of concrete operations. The child is
now able to
think about events that were previously performed through
physical actions,
and mentally reverse the direction of action and thought. She
also understands
that thoughts are different from actions, and appearances
different from reality.
A child’s ability to put herself in other people’s shoes or to feel
what they feel,
has deep repercussions in how she relates to, and understands,
others.
World – Making Sense of it All
WORLD – EXPLORING AND INVESTIGATING
Early school years are marked by a child’s expanding curiosity
and mindful
investigation. During this period, the child’s physical energy
and intellectual
vigour are at a peak and his natural exuberance is being
channelled in the
pursuit of many exciting, long lasting, and challenging projects.
From a
wonderer, one may say, the child becomes an explorer and
experimenter.
This, in turn, allows for many new wonders to pop-up, and be
further
explored. In this process, the child learns a great deal about
himself and
about the world in which she lives and grows.
43. intelligent trial and error, often focusing on one variable at a
time when trying
to get a handle on a complex situation. A four-year-old’s
worldview remains
essentially “egocentric,” and their thinking is magical and
animistic. Eight-
year-olds, in contrast, engage in directed and systematic
experimentation,
and are able to compose with multiple variables when making
decisions.
Eight-year-olds’ thinking is reversible (i.e., they can mentally
reverse the
direction of thought, and action), which, in turn, impacts the
ways they
conceive of such categories as time, space, and causation. Their
take on
things has become more “objective,” less egocentric.
The seventh year marks the big breakthrough with the
beginnings of Piaget’s
stage of concrete operations. The child now anticipates events
that were
previously acted out, and draws conclusions in her head.
Besides reversibility,
a benchmark of concrete operations is conservation: the
understanding that
objects or quantities remain the same—or invariant—despite a
change in
their physical appearance.
In the later section, we shall look at how children between the
ages of 4
and 8 examine, understand, and refl ect upon their actions, thus
becoming
increasingly good investigators and experimenters. Let us also
look at how
45. be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
150
1960b, 1964), whereas eight-year-olds have acquired the ability
to reason
“logically.” They have reached the stage of what Piaget refers
to as concrete
operations (Piaget 1960a, 1960b, 1964). One of the
characteristics of
concrete operations, most relevant in this section, is
reversibility: the ability
to mentally reverse the direction of thought and action. So, for
example, a
6-year-old will fi nd it obvious (a “logical necessity,” in
Piaget’s words) that
if a number can be added to another it can also be subtracted, or
that if an
object moves from point A to B to C, then it should be able to
return from
C to B to A.
As the child begins to reason in ways that are reversible a whole
structure
of interrelated logico-mathematical capabilities, or operations,
46. appears: The
child now understands such relations as transitivity, inclusion,
and identity,
and she uses her newly acquired logico-mathematical power to
infer many
otherwise invisible patterns and rules, and to make logical
deductions.
The transition from pre-operational thinking to concrete
operational thinking
occurs between the ages of six and seven, and is usually
completed by the
time the child is eight years old.
In the later section, we shall look into the lengthy journey that
brings a
child from pre-logical to logical thinking. We shall focus on
how 4–8-year-
olds come to understand basic mathematical ideas, such as
quantifi cation,
elementary number theory, and their handling of logical
operations, such as
classifi cations and seriatims.
To explain the development of logic in the early school years,
we refer
mainly to Piaget, whose ideas about children’s thinking during
early school
years have revolutionized the fi eld of psychology and
education. To this
day, Piaget’s contribution to how children think is unique and
unsurpassed
(Piaget 1960a, 1960b, 1964, Piaget and Inhelder, 1969).
Creations – Realising Visions
48. speech and thinking, will children start to evoke and revisit past
experiences
or events and, more to the point, add a new twist or change the
ending
in some way. Imagination proper sets in when, beyond merely
creating
variations in the absence of a model, the child starts to produce
fi ctional
scenes and invents scenarios that don’t exist.
Early manifestations of human imagination can be seen in a
child’s fantasy
or pretend play, as well as in her willingness to invent and
converse with
imaginary companions. They appear in her budding sense of
humour and
abilities to tease and joke. Humour can be thought of as a subset
of make-
believe and play (McGhee, 1984): an intellectual play with
ideas or words,
based upon appreciation of logical displacements and
incongruities. What
characterizes all of the above activities is suspension of
disbelief rather than
a quest for truth
At the beginning of early school years (between the ages of 4
and 6), a child’s
imagination tends to run wild, while, at the same time,
becoming ever more
sophisticated as she perfects her abilities to incorporate other
people in his
pretend play, sharpens his sense of humour, and cultivates his
ways of teasing.
Towards the end of the period (between the ages of 6 and 8), the
child’s
50. The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
152
ACKNOWLEDGEMENTS
The main sources for Creations in this Part are:
Anselmo, S, Franz, W. (1995). Early Childhood Development:
Prenatal
Through Age Eight. (2nd Ed.). Englewood Cliffs, NJ: Prentice-
Hall [First
edition was published in 1985. New York: Merill/Macmillan].
McGhee, P. (1979) Humor: its origin and development. San
Francisco:
Freeman & Company.
CREATIONS – ENACTING AND CREATING
Children not only make up things in their heads, or fantasize;
they also make
things, or give form, or expression, to their inner most feelings
and ideas. In
other words, children bring to life their fantasies to make their
dreams come
true! Children speak their minds in many ways, and they use a
51. variety of
media: children speak in gestures and in voice, in pictures and
in words,
picking whichever medium conveys their ideas the best.
Children also
combine several media within a single production.
Through their personal and collective creations, children, like
artists, bring
imagination into being…and they do so by design! Unlike
scientists, a
child’s creative expression is less about building models and
representations
of existing realities, so-called objective truths, than it is about
exploring
possibilities, often possibilities within i.e., re-digesting or
reverberating
deeply felt human experience. While both the artist and the
scientist seek to
capture deep hidden truths, the fi rst uses language to inspire
and evoke, and
the second to analyze and validate. In other words, creative
expression is
the visible face of imagination at work!
This section speaks to the importance of creative expression as
a source of
a child’s personal and intellectual growth. Of particular interest
here is the
exciting and lengthy path that brings early school-age children
to becoming
literate in the sense of becoming acquainted with, and fl uent in,
the usage
of available cultural tools as means of self-expression. We
purposely defi ne
literacy in the broadest possible sense to mean the ability to
55. 4-5 Years
Me – Being Me
ME - USING MY BODY
Kick the Ball & Keep the Beat! Four- to fi ve-year-olds are
vigorous and energetic:
They love to play and, when given a chance, they become
exuberant and “go
wild.” At the same time, children of this age also spend hours
channelling their
energy—i.e., perfecting their physical-motoric abilities—by
getting a better
handle on all kinds of objects, such as balls, bikes, swings, or
seesaws. Like
their younger counterparts, 4–5-year-olds still spend hours on
the playground,
using swings, slides, and climbing-structures. Yet, unlike
younger children,
they have become amazingly skilled and autonomous users.
Four- to fi ve-year-olds like to keep in the fl ow (and in the
beat) of things,
through dance and rhythm, and they learn to synchronize their
body
movements and positions with that of others, using visual clues.
They
march at a drumbeat, and play musical chairs, or “statues” (a
person takes
a position, and other imitate). When playing ball, they work
hard at refi ning
their kicking and catching techniques, and they become truly
expert tricycle
riders.
As mentioned before, activities like kicking a ball or riding a
57. 156
directionality), and temporal-perceptual awareness, or sense of
time and
rhythm.
All these areas come into play as the child exercises, and refi ne
his skills.
All contribute to optimize the performances. As an example,
when playing
ball, 4-5 years become quite adept at throwing and catching,
and when
throwing, they turn the non-dominant shoulder toward the target
and steps
with opposition as they throw. They catch the ball away from
the body, in
the hands with palms facing each other (Anselmo and Franz,
1995. p. 384).
And when playing inside the house, 4–5-year-olds like to
scribble, draw, cut,
and glue. They still use broad movements with their fi ngers,
arms, and hands.
Yet, they produce recognizable shapes in their drawings, which
they love to
present as gifts to family members.
MANIFESTATION:
What actions will the child do to attain the competencies?
Four- to fi ve-year-olds can walk heel-to-toe for four or more
steps along a
line and stand on one foot for fi ve seconds. On the playground,
they can get
themselves started on swings, walk on a beam, climb ladders
58. and slide down
slides, without assistance. And since moms and dads are less
needed on the
playground, they spend more time playing with other children.
At this age, children also become eager and skilled tricycle
riders. Their hopping,
jumping, and kicking skills improve. Walking downstairs is now
mastered,
without the help of an adult. Four- to fi ve-year-olds eat much
more neatly than
3-year-olds. They start using a fork, spoon, and, if allowed, a
knife. They can
carry a cup fi lled with water from the kitchen sink to the table,
without spilling.
As they approach their 5th birthday, most children are able to
dress themselves.
They put on their socks, and open and close buttons and zippers.
In kindergarten, 4–5-year-olds like to engage in all kinds of
arts-and-crafts
activities: They cut and fold paper; glue pieces together,
hammer pegs into
holes, draw and scribble, and assemble puzzles. They also like
to bake,
to make clay fi gures, and to build sand castles. All these
activities greatly
facilitate a child’s eye-hand coordination.
Four year-old children learn about the left and right sides of
their bodies
(laterality), and about the body’s position and heading
(directionality and
orientation). Yet, many children of this age still have diffi
culties with tasks
that require left-right discriminations.
60. rhythm can be explored
through play. Invite children to discover for themselves the
ways they want to
move and stretch, and how far they want to “push” themselves.
Remember: “our
bodies move in space, in time, with force, and with fl ow (…)
There is never a
wrong move, but certain moves feel better” (Gilliom, 1970. p.
6).
Educators may imagine activities to broaden the palette of
movements
made available to the children (Gilliom, 1970. p. 6). Gilliom
proposes four
dimensions to be considered by parents and educators.
1. Where to move (space), which involves an understanding of
self-space.
2. What to move (body awareness), which requires awareness
of body parts
and relations between body / objects to be manoeuvred / space.
3. How to move? (force, balance). Involves creating / absorbing
force (gravity),
transferring force (rocking, rolling, sliding) and transferring
weight (step on
beams).
4. How to move in a smoother way (time, fl ow). Involves
changing rhythm,
speed, pulse, and beat, and feel what it does.
For each dimension, many fun activities can be imagined (for
inspiration,
see movement chart in Gilliom, 1970. p.8., and Anselmo and
62. Four year-olds develop an early sense of self beyond mere
physical attributes,
observable acts, and concrete events. In other words, they
overcome earlier
forms of “trivial behaviourism” by disentangling some of the
intricacies
between what a person does, shows, or says in terms of her
behaviour or
appearance, and what she thinks, feels, or intends. This, not
surprisingly, leads
to new forms self-evaluation and self-knowledge, as well as new
forms of moral
“judgements”. While paying closer attention to the “hidden”
aspects of self,
4-5 years old children still have problems with egocentrism, and
they do not
always recognize that a person’s inner states, thoughts,
intentions or feelings,
can or should be different from their outer expression (Selman,
1980).
Four- to fi ve-year-old children’s body awareness and self-
concept are partly
expressed in, and informed by, their understanding of sexuality,
gender, as
well as by their views of what’s inside their body, and what
makes a person
ill or well, sad or happy, and bad or good.
As they reach their 5th birthday, most children have developed
a fairly
accurate sense of who they are and what they think they are able
(or unable)
to do. This type of self-knowledge includes what are commonly
called meta-
63. cognitive skills — an important component of more advanced
refl ection,
learning, and introspection.
COMPETENCIES:
What does the 4-5-year-old naturally strive to learn?
Like the “curious threes”, 4-5-year-old children still wonder:
‘Who am I?
Where do I come from? Where do I go?’ They also still puzzle
over how babies
are made, what’s in their bodies, why people die, and what will
become of
them after death. Yet, as they try to make sense of these
questions, 4-5-year-
olds develop their own views and attitudes about their origins,
well-being or
health, and their strengths and weaknesses as persons, and as
learners.
Most signifi cant at this age, a person’s self begins to be seen as
a mix of
action and intents, involving both body and mind. So, for
example, 4-5-year-
old children not only understand themselves as being a boy or a
girl, tall or
short, or blond or brown, but they begin to develop a sense who
they are, as
persons, beyond being gendered, sized, or coloured.
A 4-5-year-old’s grasp of what happens inside her body and
what it means to
be healthy or sick are still rather mechanical and animistic. So
for example,
children can tell you where their brain, heart or stomach are
located, yet
65. belly, 4-5-year-olds will assign human-like qualities to the
sperm/or egg
(Bernstein and Cowan, 1981). They will imagine all those tiny
little people
inside mom’s belly, helping to make the baby and bring it out.
MANIFESTATION:
What actions will the child do to attain these competencies?
Four- to fi ve-year old children’s awareness of self transcends
physical
appearances (pretty, small, girl, boy) to include “mindsets”
(witty, nice, girly,
boyish), and the child starts to distinguish between feelings and
actions.
He understands that while certain emotional reactions may be
unwanted
and hard to control, our actions in reaction to inner emotions
can, and
maybe should, be controlled. He doesn’t always understand why
controlling
impulses may be a good thing beyond “Mom won’t like it” or “it
could make
things worse”. But, that’s a start!
Four-year-olds’ conceptions of sickness, contagion, and causes
of death are
still “magico- phenomenist”, to use Piaget’s term. While many
four-year-olds
understand that sickness occurs through contagion, and
contagion through
proximity, proximity itself remains this magical thing…some
mystical, bad
infl uence.
Four- to fi ve-year-olds begin to develop a sense of fair play
67. feelings through play. Soon enough, she will understand that
getting upset
and acting impulsively can be separated and that sometimes it is
worth
doing so.
Help your child accept his physical characteristics as well as his
similarities
to, and differences from, others. In this regard, games like “me
and my
shadow” and “body drawings” are still relevant at this age
(projection of kids’
shadows against a wall, and asking kids to draw contours of
their bodies on
big sheets of paper). Yet, at this age, expand the game by telling
stories about
different people’s ways of being, or better, have the children
tell their stories,
as a way to focus on psychological diversity, and moral issues.
While acknowledging diversity in ways of being, and of
relating, avoid
gender or racial stereotyping. Help your child understand that
people come
in many shades and shapes, that diversity is rich, and that good
and bad are
colour blind.
A four-year-old’s sex education comes in response to questions
about
how babies are born, and where she was before she was born.
While
straightforward answers are welcome, there is no need to go
into any more
anatomical details than the child asks for.
69. research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
161
Children’s sense of initiative is validated when adults respect
and encourage
their interests, and when they genuinely respond to, and
encourage, the
child to pursue their frequent questions, and try things out for
themselves.
If initiative is not encouraged, children may ultimately lose
their willingness
and ability to do what it takes to realise their own dreams. They
shy off from
the healthy quest for achievement, or realisation, in future
endeavours.
COMPETENCIES:
What does the 4-year-old naturally strive to learn?
Four-year-olds are vigorous, imaginative, and playful. They are
eager to learn,
play, and work with others. They listen to their teachers, and
they participate
in conversations. They are curious and easily engaged in the
excitements of
new undertakings. Their initiative extends to include social
relations with
70. adults outside the family and with other children.
Four-year-olds have become pretty good at controlling their
emotions, and
are increasingly aware of basic human feelings, such as sadness
and anger.
They can recognize and describe feelings associated with liking,
surprise,
disgust, boredom, loneliness, and curiosity. Children, at this
age, also start
to understand the connections between emotions and social
behaviour, and
inner thoughts, feelings or intents, their expression, and
consequences on
others.
Four-year-olds like to engage in pretend play with peers. They
participate
in group play, and they form privileged relations with
individual friends.
They become better at sharing, at losing in competitive
situations, and at
negotiating interactions with others. They show less frustration
around play
equipment and toys, and they are more patient when they have
to wait their
turn. This being said, the lengthy path that leads a child to
gracefully manage
her emotions and feelings in social transactions is only starts at
this age.
MANIFESTATION:
What actions will the child do to attain these competencies?
Four-year-olds are usually very sociable, both in play situations
and in
72. they may
still boss around younger siblings, or try to get their way
through whining
and screaming.
Many children of this age begin to enjoy “follow the leader”
games. They
play catch with each other, and some start collecting items and
sharing those
items, or swapping them. They begin to play board games, in
which they
learn to take turns and cooperate.
SUPPORT:
What can caregivers do to support this natural development?
Four-year-olds are full of life. Yet, unbridled energy and
exuberance can
sometime result in negative feelings, destructive acts, and
manipulation.
That’s when adults can come in handy to help them channel
their surplus of
energy in positive ways. And the best ways to help is to do so
non-intrusively.
So if your 4-year-old withdraws, fears something that can’t
possibly harm
him, or goes overboard and starts harming others, make sure
you guide him
in ways that do not squash his initiative but rather channel it in
more positive
ways. Don’t just say “No.” Say, “If you wish to do that, here
is a way you
can do it safely or non-destructively.”
For example, if your child climbs on the dinner table, which
genuinely annoys
74. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
163
playing ball, children learn the benefi ts of sharing, and taking
turns. Through
role and pretend play, children explore how it feels to be
another character,
and learn how to negotiate rules to play “fair” in many
intriguing social
scenarios.
US - UNDERSTANDING OTHERS
Putting on Different Hats. In their fi fth year, children begin to
understand that
other people may feel and think differently than they do, and
they become
able, at least in concrete situations, such as joint pretend and
role play, to
shift position, in their mind, between their own and other
people’s views, or
perspectives. “The ability to imagine being another person with
intentions
and feelings that are different from one’s own is surely
important evidence
for children’s growing understanding of others—evidence that
parallels the
signs of children’s abilities to deceive” (Dunn, 1991, p. 105).
At this age, children “do not (just) understand an emotional
75. state, such
as sadness or shame, simply by focussing on the way that the
emotion is
expressed, nor by noting the diverse situations that provoke an
emotions.
Rather, they identify the mental perspective that someone
adopts with
respect to those various situations (Harris, 1989. p 81). The
child interprets
another person’s ways of being as a coherent set of feelings,
intentions,
desires, beliefs, and thoughts that transcend specifi c contexts.
COMPETENCIES:
What does the 4-year-old naturally strive to learn?
As they reach their fourth birthday, most children pretty much
know what
other people expect from them, and they can communicate what
they want.
Starting in the middle of the fourth year, however, a whole new
range of
abilities emerges. Children learn to infl uence others using
persuasion,
deception, or humour. They can take on multiple roles or
voices, at least in
their play, and they learn that a person’s interests, beliefs, and
intentions can
change over time and according to circumstances, while, at the
same time,
maintaining a consistency or integrity over time.
“From three years onwards, the child can attribute to others
thoughts and
feelings that are different to her own. This is an important
intellectual and
77. cannot do and that 4 and 5-year-olds can do (Astington, 1991, p.
159). The
tasks Astington refers to involve the understanding of another
person’s false
beliefs, and the ability to distinguish between appearance and
reality.
While many researchers in the theories of mind tradition claim a
major
breakthrough takes place at the age of 4, many 4-year-olds still
have
diffi culties in attributing false beliefs to others, and/or to
distinguish between
appearance and reality. In the light of this, the so-called “false
belief”
experiments are discussed in the next section (5-6 years).
MANIFESTATION:
What actions will the child do to attain the competencies?
In their pretend play, 4-year-olds engage in elaborate talk about
who’s being/
doing what, and how each player should act, and what they
should say and
do, in order to respect the personal traits of the character, or
part. Children
also invent many complex scenarios. Multiple characters are
used. More
feelings are expressed in their play.
Four-year-olds begin to recognize the nuances of complex social
emotions,
like sadness, joy, loneliness, embarrassment, shame, or guilt.
So, for example,
a 4-year-old may describe sadness as “there are tears in your
heart”. In
79. www.lego.com/parents
165
Show empathy for your child, and he will learn to empathise
with you and
others. You may encourage a 4-year-old to help care for pets, or
even take
care of a younger sibling, with supervision, of course. Four-
year-olds love
being trusted to care for others after they have shown they know
how to be
gentle.
Let your child to play with other children. And, every now and
then, be a
part in your child’s pretend and role-playing activity (if invited
to do so!).
This will help her feel how different people, of different ages
and walks of
life, negotiate play. Help her express her feelings through play,
and imagine
scenarios in which the child is encouraged to take on multiple
roles and
voices, i.e. switch role, say from mama to baby, from big bad
bully to poor
little puppy. This is important to help a child “feel for” what
others may feel.
Pretend play offers a safe terrain for such explorations.
Four-year-olds love to listen to stories and they start to pretend-
read and
write. Show them, tell them and let them show-and-tell. Play
verbal variants
80. of peek-a-boo, ‘Ride-a-Cock-Horse’, ‘This-is-the-Way-the-
Ladies-Ride’. If
your child shows interest, try board games, where he learns to
take turns and
cooperate. Help him be a good loser and respect players who
may do better
than him. In short, encourage any activities that help your child
de-centre
(i.e. see his partner’s point of view) while not giving up his
stance. Both are
needed to understand other.
World – Making Sense of it All
WORLD – EXPLORING AND INVESTIGATING
From Wonders to Inquiries. Four-year-olds are curious about
how things
work and about how people act and behave. They wonder about
the
passage of time and about how things change over time. They
puzzle about
how the trajectories of moving objects are coordinated in time
and space.
Four year-olds hold their own views of how things come about
and impact
one another, and of why things look/act the way they do. They
develop their
own intuitions about how people differ from things, and how
people and
things originate, grow, age or erode, and dissipate.
Children at this age like to discover things for themselves and
to fi gure things
out through hands-on experimentation. Some children will
spend hours
taking objects apart and putting them back together. Others may
82. people, evolve
over time (also called “diachronic thinking”) and how they
move about in
and confi gure space (referred to in the literature as topological
and geometric
relations). These views, we shall see, remain essentially
“egocentric.”
COMPETENCIES:
What does a 4-year-old naturally strive to learn?
Four-year-olds like to take on tough tasks, and they now pursue
their interests,
even when interrupted, over fairly long periods of time. They
like to be taken
seriously in their attempts. This striving for initiative is
synonymous with
going at things hands on and heads in, which serves them well
in many
respects. Four-year-olds excel in the art of intelligent “messing
about,” which
is none other than their own privileged means to fi guring out
how things
work.
A child’s understanding of causality increases a great deal
during this period,
as she now predicts outcomes of actions before they occur. At
the same
time, her conceptions of how things come about and impact one
another
are still animistic. The child endows many things, especially
things that move
funnily, with people-like qualities, and her outlook is more
“magical” than
“logical.” So, for example, four-year-olds may explain the
84. 167
Four-year-olds are pretty aware of the present time and they can
tell you
about the past. The future is still hard to comprehend. Most 4-
year-olds
have trouble gauging how long an incident lasts. They tend
either to over- or
underestimate time.
While most 4-year-olds have a fairly good sense of size
relationships, many
still think that the tallest person in a group ought to be the
oldest or, more
impressive, the taller the older.
Probably because they still ‘animate” things in their minds,
many 4-year-
olds still have “irrational” fears, such as fear of the dark, of
monsters, and of
masks, even if they know the monsters don’t exist and the
masks hide mom’s
face. Such fears lessen as children enter the elementary school
years (Bauer,
1976).
SUPPORT:
What can caregivers do to support this natural development?
It is important, at this age, to take your child’s hundred
questions seriously,
no matter how diffi cult the answers! Even more important is to
encourage
his initiative. Enjoy your child’s eagerness to experiment and
try out things,
85. and appreciate his ability to come up with many clever
explanations to the
most obscure philosophical queries.
Three rules of thumb at this age are: 1) Respond to your child’s
questions,
yet don’t impose your adult take on things, 2) Don’t get caught
up in
drilling your child to become ready for school. At this age, the
best way to
prepare a child for school, and life, is to support her initiative.
3) ‘Teach
her that it’s worth taking the time, and making the detours,
needed to
pursue her interests. So, for example, if the child gets
discouraged or
repeatedly avoids obstacles, renew her interest by suggesting an
exciting
next step, or surprise her by taking an unusual stance on things
that
intrigue her.
WORLD - SEEKING LOGIC
“One, Two, Three … A Lot”. Four-year-olds draw many
lessons from their
experience. Some are about the world, others are about the
“logic” that
drives the world, and still others about people’s actions on the
world.
Children detect regularities and they make inferences. They
generalize and
they schematize. They infer laws and they establish rules. While
acting in
the world, in other words, children soon transcend both action
and object