Marcus Ranum wrote “Information security’s response to bitter failure, in any area of endeavour, is to try the same thing that didn’t work — only harder.”
It seems that this often applies to the entire security field, not just IT. Here’s a timely example.
There have been calls, in the wake of April’s bombing at the Boston Marathon, for increased surveillance of Americans — already, arguably, the most-surveilled and most spied-on citizens on the planet, to such an extent that ex-Stasi staff are likely envious. In particular, there have been calls for mass (camera) surveillance from police department officials in Boston and New York City.
These recommendations clearly raise serious issues about privacy and the Constitution and the values we hold as a society. Others have written about those issues more eloquently than I can. But let me break from their approach and point out something on a much more pragmatic level:
It didn’t work.
Let me ask you to consider for a moment the Boston Marathon and all the video/still cameras that were focused on it, the ones whose images were in front of the nation nonstop for days. Anyone who’s run in or been to a major distance running event knows that there are cameras everywhere. There are race operation cameras at the start and finish. There are TV news cameras, all over the course — some fixed, some mobile. There are family/friends of runners and other spectators, concentrated at the start and finish, but scattered everywhere along the course, and nearly all of them have cameras. There are official and unofficial race photographers in multiple locations who try to grab still shots of every runner and then offer them for sale afterwards. There are even some runners wearing cameras from time to time. And then of course there are all the now-ubiquitous cameras on stores, banks, parking garages, traffic signs, and on all kinds of other structures along the way.
We don’t know why the those responsible for the attack in Boston did it; but what we do know is that the attack required a modicum of planning and intelligence: they weren’t entirely stupid. I submit that there is no possible way that they did not know that the finish area of a major marathon is one of the most heavily-photographed areas of the planet on the day of the event. Yet they not only selected it as their target, they made no attempt at all to evade the massive number of lenses focused on it.
Thousands of cameras equated to zero deterrent value.
Yes, those cameras certainly helped identify and locate the suspects: but that is cold consolation to those who lost life and limb, because they didn’t actually prevent the attack. The upcoming prosecution of Dzhokhar Tsarnaev, while it might yield some answers to troubling questions, is not going to help local runner Carol Downing’s daughters (Nicole Gross suffered two broken legs; Erika Brannock lost part of one of hers) recover and rehab and go on with their lives.
A thousand more, ten thousand more, a hundred thousand more cameras would not help: cameras have no deterrent value to people who are prepared to die and/or don’t care if they’re identified.
There also remains the distinct, disturbing possibility that the attackers chose the locationbecause they knew it was so thoroughly covered with cameras. An attack like this is clearly directed at those present, but if its real purpose is, as Bruce Schneier observes, to attack the minds of hundreds of millions elsewhere, then it can only reach its targets if the event is heavily documented and widely disseminated.
To put that point another way: it’s entirely possible that adding cameras to a particular location will decrease public safety — because it may make that location more attractive to those who want to make certain their attacks are captured on video and of course, dutifully replayed in slow-motion thousands of times by 24×7 news networks with many hours of airtime to fill.
The Latest on: Spying on the public
- Canada's 'super secret spy agency' is releasing a malware-fighting tool to the public on October 19, 2017 at 5:55 am
Canada's electronic spy agency says it is taking the "unprecedented step" of releasing one of its own cyber defence tools to the public, in a bid to help companies and organizations better defend their computers and networks against malicious threats. […]
- Reveal your sources: Swiss suspect told in German spy trial on October 18, 2017 at 9:51 am
FRANKFURT (Reuters) - Prosecutors pressured a Swiss man accused of spying on a German tax authority to name his inside source or face up to five years in jail. The 54-year-old man, identified only as Daniel M., appeared in a Frankfurt court on Wednesday ... […]
- Swiss man on trial accused of spying in Germany on October 18, 2017 at 5:37 am
BERLIN – A Swiss man is on trial in Frankfurt on espionage charges over allegations he spied on German tax investigators for his homeland. The dpa news agency reported Wednesday the 54-year-old, identified only as Daniel M. in line with privacy rules, is ... […]
- Swiss 'tax spy' ready to confess in German trial: lawyer on October 18, 2017 at 4:23 am
A Swiss man accused of spying on German officials who were hunting tax cheats signalled at the opening of his trial in Frankfurt Wednesday that he was ready to confess. Daniel Moser, 54, was arrested in the German business capital in April on espionage ... […]
- Swiss Man Stands Trial in Germany on Spying Charges on October 17, 2017 at 11:02 pm
FRANKFURT (Reuters) - A Swiss man accused of spying on a German tax authority to find out how it obtained details of secret Swiss bank accounts set up by Germans to avoid tax is due in court on Wednesday for the start of his trial on espionage charges. […]
via Google News and Bing News