Dan Geer

by Dan GeerEditor’s Note: As the CISO of In-Q-Tel, the CIA-backed strategic investment firm focused on developing technologies for the intelligence community, Dan Geer gets paid to help find the answers to big questions about computer security, national security, privacy and technology. Headlines proliferate about sophisticated cyber attacks, the looming specter of cyber warfare and ongoing espionage by nations like China and Russia. That means Dan’s job gets more important with each passing day. So what’s on Dan Geer’s mind these days? We asked him what questions he was mulling and, as usual, the answers we got back were both eye-opening and provocative.  Here, in Monday morning ‘shot of espresso’ format (and with as little editing as possible) is our three minute speed date with Dan’s brain.

Our digital affluence is making us insecure, writes Dan Geer, the CISO
at In-Q-Tel. Like addled consumers trying to choose from among 20
different types of toothpaste in the supermarket aisle, IT is paralyzed
by an overabundance of security products, unable to decide which
products are worth the investment, which to keep, and which to remove.by Dan Geer, CISO, In-Q-TelIn his book “The Paradox of Choice,” the academic psychologist Barry Schwartz famously argued that having more choice does not necessarily make individuals (or societies) happier.  This is counter-intuitive.Does not “affluence,” by any definition, boil down to “more choice?”And does not more choice mean more freedom?  More freedom more welfare?  At the limit, the answer is “No,” and for two main reasons:For one, there’s paralysis.  As choices increase, the effort required to choose increases and the ability to reach decisions — to choose– actually declines.  For another, there’s regret.  The more choices we have, the easier it becomes to regret the choices we make when they turn out to be less than perfect, as they almost certainly will.  In other words, the more choices there are, the more any dissatisfaction must be your fault; you could have chosen differently, after all.How does this all relate to cybersecurity?The effect of our digital “affluence” contributes directly to digital insecurity.  The general purpose computer offers far too many choices in the sense of far too many interfaces, far too many configuration parameters, far too many libraries, far too many conveniences, far too much extensibility.  When, in the name of security, we “lock down” an operating system, we do so precisely so as to counter that surfeit of choice, by removing functions not in use, by reducing the choice set of what might be running.  The reason that the Web browser is the principal entry point for malware is the number of choices that a browser offers up to whomever is at the other end.Evolving technologies like HTML5 promise to make this significantly worse.(http://threatpost.com/en_us/blogs/security-concern-html5-gains-traction-091610)The peculiar physics of digital assets — if I steal your data you still have it, to take an example — mean that data owners (andauditors) can only seek infallible protection for digital assets, but when you expect perfection it is impossible to have a pleasant surprise.  At the same time, our digital “affluence” provides us with an overabundance of security products (with knobs and dials to adjust) promising to help us achieve the perfect protection that we seek.  Any one of them may indeed be narrow enough to perfectly solve some particular flaw; that’s not the point.It is said that complexity is the chief enemy of security, and Bruce Schneier deserves credit for beating that drum so well.  Modern operating systems and computer networks are chock-a-block with bloat but they also bristle with invasive security programs vying to pre-empt all comers, including each other.  The resulting complexity of those interactions does not scale with the n^2 of Metcalfe’s Law (the number of potential 2-way interactions), but the 2^n of Reed’s Law (the number of potential multi-way interactions).  This is the heart of complexity’s enmity against security: security’s task list is all multi-way interactions, all the time.  We make it worse by adding too many security products that are mere symptomatic relief for the problem du jour.Skeptical?  Show me one CISO who can deinstall — and write-off — a fully deployed enterprise security product because the marginal utility it contributes is not worth the complexity cost it engenders.Show me the full operational cost accounting for your AV + IDS + IPS + HIPS + firewall + DLP + etc., and prove to me that the net effect is even just non-negative.We can’t prove security products work, but we can prove that complexity matters, and that we are ourselves contributing to complexity by deploying too many security products.  Like addled consumers facing 225 choices of toothpaste, we’re paralyzed.  Every time we buy a new security product, we regret that the others we already have didn’t do the job and the paralyzing choice of whether this new product makes it possible for us to remove one or more of the old ones.  Show me the CIO who will trade up, not add on, and I’ll show you an unsung hero.Let me be clear, by “limiting choice” I mean minimizing the number of security states our systems can assume; I do not mean limiting sysadmin choice by failing to document the stuff that really matters– an approach that Apple appears to have mastered.  And I write “limiting choice” with the utmost sadness, well aware that those of us who want and can manage a general purpose computer are not relevant in an Internet of Things, a new world order in which a dwindling number of us are prepared to revert to paper on a bad day but yet have the ability to tinker all the way down to the iron.Look around.  IP enabled “stuff” — appliances, phones, cars, TVs– are already muscling out the general purpose computer.  It is a fait accompli.  You had better hope that what is embedded in your home automation system, your refrigerator, or your little piece of the electrical grid offers much less choice than your PC.It is our duty as security people to make things better.  As of now, we’re making them worse.In his book “The Paradox of Choice,” the academic psychologist Barry Schwartz famously argued that having more choice does not necessarily make individuals (or societies) happier. This is counter-intuitive. Does not “affluence,” by any definition, boil down to “more choice?” And does not more choice mean more freedom?  More freedom more welfare? At the limit, the answer is “No,” and for two main reasons:

[img_assist|nid=2482|title=|desc=|link=none|align=right|width=100|height=100]It occurred to me recently that I’ve been covering the security industry for just about 10 years. That’s a long time to be doing anything, and especially to be writing about one topic. But it’s hard to think of something that would have been much more interesting to cover this decade, given the huge change in the amount of attention paid to security and the fascinating cast of characters this industry has.

By Joan Goodchild, CSO
“The dean of the security deep thinkers,” “security luminary, ” and “risk-management pioneer” are all phrases that have been used to describe Dan Geer. Considered one of the foremost leaders in information security, his resume includes time as president and chief scientist at Verdasys Inc, a critical role in Project Athena at MIT, and a now famous firing from @Stake for co-writing a paper warning that a Microsoft monoculture threatened national security.
These days Geer, a 2009 CSO Compass Award winner, is CISO with In-Q-Tel, a non-profit venture capital firm that invests in security technology in support of the intelligence community. Geer recently spoke with CSO [csoonline.com] and explained why, despite all he has accomplished in his past, his sights are still set toward the future of security. Read the full Q&A interview.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.