Q&A: Schneier says cybercrime problem 'might not be fixable'
Business changes are needed to combat identity thieves, BT Counterpane CTO contends
IDG News Service - Bruce Schneier is an expert on cryptography and a well-known author and commentator on information security issues in general. Schneier also is chief technology officer at BT Counterpane, a managed security services vendor that is part of BT PLC; the company was founded by Schneier as Counterpane Internet Security Inc. in 1999 and then acquired by BT in October 2006. At the Infosecurity Europe 2008 conference in London this week, Schneier spoke with the IDG News Service about the psychology of data security and the effectiveness of security software. Excerpts follow:
Are antivirus vendors just making money by giving people a feeling of security instead of real security? Antivirus products actually work; they have for years. A lot of the software on this show floor is just snake oil, but antivirus does work. You should have an antivirus program; you should have it updated regularly. It doesn't make you secure, but it gets that bottom layer of the trivial stuff. It's not sufficient, but it's certainly necessary.
People are tricked into downloading malicious software through social engineering. Have people become so conditioned — mainly by watching television — that they believe whatever appears on their PC monitors? Yes, but it's not television. People believe what they see on the Net not because of television but because of the trappings of reality. So when you got to BT.com, you see the BT logo, the BT font, the PR material, and you think, "Yeah, it's BT" — like when you go to your bank, you see the logo and the tellers.
On the Web, it could be a fake BT.com site and you don't notice, because it's trivially easy to copy. So people do believe what they see on the Internet — not because of television, but because the Internet has the trappings of the real world. All of those social cues you get to know to trust something — it looks professional, nothing's misspelled — you see those things and you believe it's real.
Do you think people will ever become more suspicious of the Internet? Younger people will pick it up. But certainly you can always fool people unless there is some external validation of [Web sites]. Unless you can do that, there's no guarantee that [users] are not going to be fooled.
What do you think the biggest online threat is right now? Crime.
So how do you fix it? It's expensive to investigate, and it's cross-jurisdictional. It might not be fixable. A lot of [the solution] is going to be making the things that criminals are going after harder to get. You're not going to stop the criminals [from trying]. But in the United States, it's really easy to get a credit card in someone else's name. The credit card companies like it that way. So a lot of it is looking at how the criminals are attacking things and making it harder [for] them. The brokerage companies want it to be easy for you to log on and make trades. Make it harder, and the businesses don't like that.They're afraid that it will drive away customers. Of course. If I strip-search you before you go into the bank, you might change branches. In the U.S., the government doesn't have the [guts] to require stuff like [stronger authentication]. You've got to make the banks responsible for losses. The brokerage company has to [reimburse] me if I didn't make a [fraudulent] trade — period, end of sentence. That's how you fix it. Because then, my brokerage is going to start buying security; otherwise, they won't.
The basic rule of security: you make the entity in the best position to mitigate the risk responsible for the risk. Make them responsible — they'll figure it out. That's how capitalism works.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility Lacking the time for proper training and education, SMB administrators often resort to taking shortcuts to keep their environment running.This paper discusses the...
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Endpoint Security White Papers | Webcasts