His recently released book, Schneier on Security, dissects issues like data mining, the industry power struggle over controlling PC security, and why some risks are overestimated while others are underestimated.
In this interview, the security guru discusses a plethora of security topics – including how to protect your own PC.
What is the single biggest threat to our technological security at this point?
The single biggest threat is the technology itself. Technological systems, especially newer ones, are exceedingly complex—and complexity is the worst enemy of security. This is true for a number of reasons. One is that in our rush to build new systems, we generally ignore security or only pay attention to it at the last minute. But the other is that complex systems, especially non-linear and tightly coupled systems, are naturally less secure.
There’s really no solution to this problem; we’re not going to give up our new technological systems just because of security concerns, but it is something we need to be constantly aware of.
More on this topic by Bruce Schneier
Fear of identity theft seems to be at exceptionally high levels, with constant headlines about hijacked credit cards and bills run up without the account owner’s consent. Is the threat from identity theft as bad as it seems?
In the U.S., not really. The extreme cases get the press, but in the main, identity theft is a solved problem. If someone manages to open a credit card in your name, he makes an average of $1,350 in fraudulent purchases—but you’re not liable for that. Your median out-of-pocket cost for new account fraud is only $40, plus ten hours of grief to clean up the problem. This isn’t to say that we shouldn’t require companies to be more vigilant with our personal information, though. The privacy issues are much bigger than identity theft.
More on this topic by Bruce Schneier
Are there security risks that are far greater than we know? That is, some issues that don’t get much coverage but are in fact quite serious?
Corporate crime—both fraud and espionage—gets less coverage than personal crime. Companies have an incentive to keep incidents out of the public eye, so they are more likely not to talk about them. When mandatory disclosure laws were passed a few years ago, we learned that companies were losing personal data far more often than they admitted. Almost certainly they are suffering other damages as well.
It seems as if there’s a national passion for data mining, largely in hopes that it will detect terrorists before they act. Do you agree with our apparent enthusiasm for data mining?
Data mining is great for some things, and terrible for others. Its success story is credit card fraud prevention. Right now, data mining systems are looking through credit card transactions, watching for signs of card theft and other sorts of fraud. This works because 1) there is a large data set of attacks to use to generate predictable patterns, 2) criminals tend to do the same things over and over, 3) fraud reduction is easily quantifiable, and 4) the cost of false alarms is low.
Compare this with detecting terrorism: 1) there are very few attacks, 2) they’re mostly different, 3) it’s hard to quantify what a reduction in risk looks like, and 4) the cost of false alarms is very expensive. So while I have an enthusiasm for data mining as a security tool, it’s only in areas where it makes sense to use it.
More on this topic by Bruce Schneier
We’ve sacrificed a lot of privacy in the last few years in the name of security. Are we actually safer as a result?
The whole security vs. privacy dichotomy is a false one. There are many security measures—door locks, burglar alarms, tall chain-link fences—that have nothing to do with privacy. It’s only identity-based security that affects privacy, and there are limits to that approach. I’ve repeatedly said that exactly two things have made airplane travel safer since 9/11: reinforcing cockpit doors and convincing passengers that they need to fight back. Those two things have no effect on privacy. Security measures that affect privacy, like ID checks, haven’t made us any safer. The real dichotomy is liberty vs. control. And real security comes from liberty plus privacy.
More on this topic by Bruce Schneier
Protecting computer security is usually seen as a technological challenge, but you refer to it as an economic problem. Why so?
Because if you don’t get the economic incentives right, no amount of technology will help. Security is a trade-off, and people will weigh the cost of security against the benefits. It’s easiest to see this in a business environment—for example, is an anti-fraud measure more or less expensive than the fraud it will prevent—but it’s true everywhere: personally through nationally. These trade-offs aren’t made in some abstract “greatest good” sort of way; they’re made by people based on their own personal situation. And if the costs and benefits aren’t aligned, people won’t make good trade-offs.
An example might make this clearer. A lot of identity theft comes from corporations not securing their databases filled with personal information. Of course, they could spend more money to increase security, but the economic incentives aren’t aligned: the risk of identity theft is borne by those people in the databases, not by the company. So it doesn’t matter what kind of technologies you invent; it won’t be worth it for the company to implement them. The way you fix this is by fixing the economics: making these data breaches costly to the company.
More on this topic by Bruce Schneier
I found your writings about the psychology of security to be particularly interesting: about how we may feel we’re secure when we’re not, and vice versa. How does this gap affect our real world efforts to guard our security?
We end up with a lot of security measures that make us feel more secure, regardless of whether they actually make us more secure. This effect is most pronounced when it’s hard to evaluate the actual effectiveness of a security measure. Crime prevention measures are relatively easy to evaluate, because you can watch the crime rate go up or down. On the other hand, anti-terrorism measures can be very hard to evaluate, because there simply aren’t enough events to get a sufficient data sample. Fears, folk beliefs, and preconceived notions also make it hard to notice when the feeling of security doesn’t match the reality. So we end up with a lot of security theater.
More on this topic by Bruce Schneier
The big question: Our personal PC security. When people ask you—as they often do—what they can do to protect their PCs, you’ve been known to answer “nothing—you’re screwed.” But you readily admit the reality is more complicated. What are the most essential things people need to do?
Backup. Backup, backup, backup. For most people, the biggest security risk is losing their data. A regular backup will go a long way to making their computer more secure. And be sure to test those backups; they’re no good if the restore doesn’t work. After that, invest in an anti-virus program and keep your patches up to date. Everything else is in the margins.
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.