Q&A: Schneier says cybercrime problem 'might not be fixable'
Business changes are needed to combat identity thieves, BT Counterpane CTO contends
IDG News Service - Bruce Schneier is an expert on cryptography and a well-known author and commentator on information security issues in general. Schneier also is chief technology officer at BT Counterpane, a managed security services vendor that is part of BT PLC; the company was founded by Schneier as Counterpane Internet Security Inc. in 1999 and then acquired by BT in October 2006. At the Infosecurity Europe 2008 conference in London this week, Schneier spoke with the IDG News Service about the psychology of data security and the effectiveness of security software. Excerpts follow:
Are antivirus vendors just making money by giving people a feeling of security instead of real security? Antivirus products actually work; they have for years. A lot of the software on this show floor is just snake oil, but antivirus does work. You should have an antivirus program; you should have it updated regularly. It doesn't make you secure, but it gets that bottom layer of the trivial stuff. It's not sufficient, but it's certainly necessary.
People are tricked into downloading malicious software through social engineering. Have people become so conditioned — mainly by watching television — that they believe whatever appears on their PC monitors? Yes, but it's not television. People believe what they see on the Net not because of television but because of the trappings of reality. So when you got to BT.com, you see the BT logo, the BT font, the PR material, and you think, "Yeah, it's BT" — like when you go to your bank, you see the logo and the tellers.
On the Web, it could be a fake BT.com site and you don't notice, because it's trivially easy to copy. So people do believe what they see on the Internet — not because of television, but because the Internet has the trappings of the real world. All of those social cues you get to know to trust something — it looks professional, nothing's misspelled — you see those things and you believe it's real.
Do you think people will ever become more suspicious of the Internet? Younger people will pick it up. But certainly you can always fool people unless there is some external validation of [Web sites]. Unless you can do that, there's no guarantee that [users] are not going to be fooled.
What do you think the biggest online threat is right now? Crime.
So how do you fix it? It's expensive to investigate, and it's cross-jurisdictional. It might not be fixable. A lot of [the solution] is going to be making the things that criminals are going after harder to get. You're not going to stop the criminals [from trying]. But in the United States, it's really easy to get a credit card in someone else's name. The credit card companies like it that way. So a lot of it is looking at how the criminals are attacking things and making it harder [for] them. The brokerage companies want it to be easy for you to log on and make trades. Make it harder, and the businesses don't like that.They're afraid that it will drive away customers. Of course. If I strip-search you before you go into the bank, you might change branches. In the U.S., the government doesn't have the [guts] to require stuff like [stronger authentication]. You've got to make the banks responsible for losses. The brokerage company has to [reimburse] me if I didn't make a [fraudulent] trade — period, end of sentence. That's how you fix it. Because then, my brokerage is going to start buying security; otherwise, they won't.
The basic rule of security: you make the entity in the best position to mitigate the risk responsible for the risk. Make them responsible — they'll figure it out. That's how capitalism works.
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Reducing the cost and complexity of endpoint management IBM now offers simpler, more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations. Read this...
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Endpoint Security White Papers | Webcasts