Security expert seeks to make surveillance costly again
At the USENIX conference, Bruce Schneier urged the technical audience to make government eavesdropping more difficult
IDG News Service - The ongoing revelations of governmental electronic spying point to a problem larger than National Security Agency malfeasance, or even of security weaknesses. Rather the controversy arising from Edward Snowden's leaked documents suggest we face unresolved issues around data ownership, argued security expert Bruce Schneier.
"Fundamentally, this is a debate about data sharing, about surveillance as a business model, about the dichotomy of the societal benefits of big data versus the individual risks of personal data," Schneier told attendees of the Usenix LISA (Large Installation System Administration Conference), being held in Washington this week.
"We might not buy [it], but the basic NSA argument is 'You must give us your data because it is keeping you safe.'"
Schneier has been an outspoken critic of the NSA since Snowden, a former NSA contractor, first leaked documents showing the many ways in which the intelligence agency had tapped into the Internet and data centers to collect data en masse about people's activities.
"The NSA has turned the Internet into a giant surveillance platform," Schneier said via Skype.
But for most of his talk, Schneier urged the audience to think beyond the present controversy of the NSA, and think about ways we generate data, and the ways large companies make money from such information.
What the NSA leaks show is that "we have made surveillance too cheap. We have to make surveillance expensive again," Schneier said. "The goal should be to force the NSA , and all similar adversaries, to abandon wholesale collection in favor of targeted collection."
Such costs of making our personal data available are easy to ignore. Schneier admitted to using the Google service Waze, which collects travel data from all of its users to show alerts of traffic jams. Users of the service freely give up data about their locations in exchange for the potentially valuable knowledge of which roads to avoid.
The chief business model of the Internet has been surveillance, Schneier noted, though it's companies such as Google and Facebook that are collecting data on our activities, rather than secretive government agencies. Schneier noted that because the cost of computing and storage continues to plummet, it is easier for most people and organizations not only to create a lot of data but also to keep all of the data that is being generated.
This business model, however, makes it very relatively easy for the NSA, or any adequately government sponsored intelligence agency, to tap into such data sources.
"How do we design systems that benefit society as a whole, while protecting individuals? This is the problem we must solve," Schneier said.
- 3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it...
- IT Security by the Numbers: Calculating the Total Cost of Protection Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet."...
- SBIC: Transforming Information Security This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
- HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction In this report, learn how one organization was able to use HP ArcSight ESM to reduce false positives by 90% and the time...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency... All Data Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!