iTnews
  • Home
  • News
  • Technology
  • Security

Information is our only security weapon: Bruce Schneier

By Sarah Stokely
Jan 30 2008 12:44PM
Follow google news

Computer security expert Bruce Schneier took a swipe at a number of sacred cows of security including RFID tags, national ID cards and public CCTV security cameras in his keynote address to Linux.conf.au this morning.

Information is our only security weapon: Bruce Schneier
These technologies were all examples of security products tailored to provide the perception of security rather than tackling actual security risks, he said.

“Camera companies are pushing it, but all the actual data points the other way,” Schneier said. “RFID is another one – the industry pushing it is very much distorting facts.”

The discussion of public security -- which has always been clouded by emotional decision making -– has been railroaded by groups with vested interests such as security vendors and political groups, he said.

Public discussion which should be a security debate can be coloured by politics, he said.

"In the US, a lot of security discussions become political - my side good, your side bad. It's very hard to say 'I'm going to defer to the experts' because the political sphere is so polarised there are paid experts on all sides."

It will take a generation before US attitudes towards public security move beyond the post-September 11 climate of fear, he added.

The lesson for the computer security industry is to cater to real security issues while also considering the impact which fear and other emotions have on individual and organisational decision making.

Historically, the computing industry is littered with good products which failed to gain market traction over less secure solutions, he said, pointing to the firewall market as one example.

Schneier noted that despite the well known impact of emotional and psychological thinking on security decisions, information remains the greatest weapon that we have in creating good security solutions.

The best security solution will fail if it doesn't cater to both the reality and perceptions to do with security, Schneier warned.

"For most of my career I would insult ‘security theatre’ and ‘snake oil’ for being dumb. In fact, they're not dumb. As security designers we need to address both the feeling and the reality of security. We can't ignore one.

"It’s not enough to make someone secure, that person needs to also realise they’ve been made secure. If no-one realises it, no-one's going to buy it," Schneier said.

The goal must be to get the reality and perception matching up – so that security solutions aren’t lulling users into a false sense of security, or letting them exist in an unnecessary climate of fear.

"How do you stop the stupid stuff from outweighing the reality? The way to get people to notice that reality and feeling haven't converged is information. Information is the best weapon we have.”

In the IT industry, this information is a scarce resource, he said.

"In IT there isn’t a lot of data. Our bosses ask us for it all the time. We don't have the data because people don't report or they don't know they've been attacked.

"If there's enough information out there, you get a natural convergence between feeling and reality. In the business world, information is how the problem fixes itself," he said.

Bruce Schneier is the founder and CTO of BT Counterpane. He's the author of several books on computer security and cryptography including "Beyond Fear: Thinking Sensibly about Security in an Uncertain World". He also publishes a monthly newsletter called Crypto-Gram, and publishes a blog.

Find out more in this exclusive interview with Bruce Schneier on fighting security FUD.

Add iTnews as your trusted source

Add iTnews As Your Trusted Source Add iTnews As Your Trusted Source
Got a news tip for our journalists? Share it with us anonymously here.
Tags:
informationislinuxconfonlyourschneiersecurityweapon

Related Articles

  • Checkmarx-style supply chain attack hits password manager Bitwarden Checkmarx-style supply chain attack hits password manager Bitwarden
  • Attacker embeds Claude Code in mass credential harvesting op Attacker embeds Claude Code in mass credential harvesting op
  • Microsoft to integrate Anthropic's Mythos into its security development program Microsoft to integrate Anthropic's Mythos into its security development program
  • ANZ Banking Group names acting CISO ANZ Banking Group names acting CISO
Join our WhatsApp Channel

Partner Content

The Toggle Tax: 5 signs your support team is Mental-Tasking, not Multitasking
Partner Content The Toggle Tax: 5 signs your support team is Mental-Tasking, not Multitasking
Cyconsol Unlocks Growth Potential for Cyber Vendors in Australia
Promoted Content Cyconsol Unlocks Growth Potential for Cyber Vendors in Australia
How Optus brings your mobile-first security strategy to life
Partner Content How Optus brings your mobile-first security strategy to life
InnoEX and Hong Kong Electronics Fair (Spring Edition) will open in April 2026
Promoted Content InnoEX and Hong Kong Electronics Fair (Spring Edition) will open in April 2026

Sponsored Whitepapers

Shift left: The IT leader's digital workplace maturity playbook
Shift left: The IT leader's digital workplace maturity playbook
Mind the M365 security gap
Mind the M365 security gap
The future of resilience: AI-Driven dynamic storage
The future of resilience: AI-Driven dynamic storage
Stop Hiring Like It’s 2025:  AI-Augmented Cybersecurity  Performance Data Every CISO Needs
Stop Hiring Like It’s 2025: AI-Augmented Cybersecurity Performance Data Every CISO Needs
5 reasons to adopt a mobile first security strategy
5 reasons to adopt a mobile first security strategy

Events

  • iTnews Executive Retreat - Data & AI Edition iTnews Executive Retreat - Data & AI Edition
  • iTnews Cloud Covered Breakfast Summit iTnews Cloud Covered Breakfast Summit
  • iTnews State of Security Breakfast iTnews State of Security Breakfast
  • The 2026 iAwards The 2026 iAwards
  • Integrate 2026 Integrate 2026
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NSW Treasury staffer allegedly exfiltrated 5600 sensitive documents

NSW Treasury staffer allegedly exfiltrated 5600 sensitive documents

ANZ Banking Group names acting CISO

ANZ Banking Group names acting CISO

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Cloud deployment firm Vercel breached, advises secrets rotation

Cloud deployment firm Vercel breached, advises secrets rotation

techpartner.news logo
Sydney-based AI-cloud waste startup raises $3m
Sydney-based AI-cloud waste startup raises $3m
Brennan uses NiCE to modernise its contact centre
Brennan uses NiCE to modernise its contact centre
Impact Awards: Tecala slashes customer response times for fintech IQumulate
Impact Awards: Tecala slashes customer response times for fintech IQumulate
Interactive introduces private cloud platform
Interactive introduces private cloud platform
Digital61 expands cybersecurity portfolio
Digital61 expands cybersecurity portfolio
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.