Bruce Schneier
   HOME

TheInfoList



OR:

Bruce Schneier (; born January 15, 1963) is an American cryptographer,
computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
professional,
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Center for Internet & Society as of November, 2013. He is a board member of the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
, Access Now, and The Tor Project; and an advisory board member of Electronic Privacy Information Center and VerifiedVoting.org. He is the author of several books on general security topics, computer security and
cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
and is a
squid A squid (: squid) is a mollusc with an elongated soft body, large eyes, eight cephalopod limb, arms, and two tentacles in the orders Myopsida, Oegopsida, and Bathyteuthida (though many other molluscs within the broader Neocoleoidea are also ...
enthusiast.


Early life and education

Bruce Schneier is the son of Martin Schneier, a Brooklyn Supreme Court judge. He grew up in the Flatbush neighborhood of
Brooklyn, New York Brooklyn is a Boroughs of New York City, borough of New York City located at the westernmost end of Long Island in the New York (state), State of New York. Formerly an independent city, the borough is coextensive with Kings County, one of twelv ...
, attending P.S. 139 and Hunter College High School. After receiving a physics bachelor's degree from the University of Rochester in 1984, he went to American University in Washington, D.C., and got his master's degree in computer science in 1988.


Career

In 1991, Schneier was laid off from his job and started writing for computer magazines. Later he decided to write a book on applied cryptography "since no such book existed". He took his articles, wrote a proposal to John Wiley and they bought the proposal. In 1994, Schneier published ''Applied Cryptography'', which details the design, use, and implementation of cryptographic algorithms. In 1999, Schneier was a founder and Chief technology officer of Counterpane Internet Security (now BT Managed Security Solutions). In 2000, Schneier published ''Secrets and Lies: Digital Security in a Networked World''; in 2003, '' Beyond Fear: Thinking Sensibly About Security in an Uncertain World'' and in 2012, '' Liars and Outliers: Enabling the Trust that Society Needs to Thrive''. As a
Fellow A fellow is a title and form of address for distinguished, learned, or skilled individuals in academia, medicine, research, and industry. The exact meaning of the term differs in each field. In learned society, learned or professional society, p ...
of Berkman Center for Internet & Society at
Harvard University Harvard University is a Private university, private Ivy League research university in Cambridge, Massachusetts, United States. Founded in 1636 and named for its first benefactor, the History of the Puritans in North America, Puritan clergyma ...
since 2013, Schneier has been exploring the intersection of security, technology, and people, with an emphasis on power. He worked for
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
when they acquired Resilient Systems in 2016, where he was CTO. until he left at the end of June 2019. Schneier has been an Adjunct Lecturer in Public Policy at the Harvard Kennedy School.


Personal life

Schneier was married to Karen Cooper in 1997 and lived in Minneapolis; they published restaurant reviews in the Pulse of the Twin Cities. The couple divorced in 2022.


Viewpoints


Blockchains

Schneier has warned about misplaced trust in blockchain and the lack of use cases, calling blockchain a solution in search of a problem. He goes on to say that
cryptocurrencies A cryptocurrency (colloquially crypto) is a digital currency designed to work through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it. Individual coin ownership records ...
are useless and are only used by speculators looking for quick riches.


Cryptography

To Schneier, peer review and expert analysis are important for the security of cryptographic systems. Mathematical cryptography is usually not the weakest link in a security chain; effective security requires that cryptography be combined with other things. The term ''Schneier's law'' was coined by Cory Doctorow in a 2004 speech. The law is phrased as: He attributes this to Bruce Schneier, who wrote in 1998: "Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break. It's not even hard. What is hard is creating an algorithm that no one else can break, even after years of analysis." Similar sentiments had been expressed by others before. In '' The Codebreakers'', David Kahn states: "Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break", and in "A Few Words On Secret Writing", in July 1841, Edgar Allan Poe had stated: "Few persons can be made to believe that it is not quite an easy thing to invent a method of secret writing which shall baffle investigation. Yet it may be roundly asserted that human ingenuity cannot concoct a cipher which human ingenuity cannot resolve." Schneier also coined the term "kid sister cryptography", writing in the Preface to ''Applied Cryptography'' that:


Digital rights management

Schneier is critical of
digital rights management Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures, such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM ...
(DRM) and has said that it allows a vendor to increase lock-in. Proper implementation of control-based security for the user via trusted computing is very difficult, and security is not the same thing as control. Schneier insists that "owning your data is a different way of thinking about data."


Full disclosure

Schneier is a proponent of full disclosure, i.e. making security issues public.


Homeland security

Schneier has said that homeland security money should be spent on intelligence, investigation, and emergency response. Defending against the broad threat of terrorism is generally better than focusing on specific potential terrorist plots. According to Schneier, analysis of intelligence data is difficult but is one of the better ways to deal with global terrorism. Human intelligence has advantages over automated and computerized analysis, and increasing the amount of intelligence data that is gathered does not help to improve the analysis process. Agencies that were designed around fighting the
Cold War The Cold War was a period of global Geopolitics, geopolitical rivalry between the United States (US) and the Soviet Union (USSR) and their respective allies, the capitalist Western Bloc and communist Eastern Bloc, which lasted from 1947 unt ...
may have a culture that inhibits the sharing of information; the practice of sharing information is more important and less of a security threat in itself when dealing with more decentralized and poorly funded adversaries such as al Qaeda. Regarding PETN—the explosive that has become terrorists' weapon of choice—Schneier has written that only swabs and dogs can detect it. He also believes that changes to airport security since 11 September 2001 have done more harm than good and he defeated Kip Hawley, former head of the Transportation Security Administration, in an ''
Economist An economist is a professional and practitioner in the social sciences, social science discipline of economics. The individual may also study, develop, and apply theories and concepts from economics and write about economic policy. Within this ...
'' online debate by 87% to 13% regarding the issue. He is widely credited with coining the term " security theater" to describe some such changes.


Movie plot threat

"Movie-plot threat" is a term Schneier coined that refers to very specific and dramatic
terrorist Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
attack scenarios, reminiscent of the behavior of terrorists in movies, rather than what terrorists actually do in the real world. Security measures created to protect against movie plot threats do not provide a higher level of real security, because such preparation only pays off if terrorists choose that one particular avenue of attack, which may not even be feasible. Real-world terrorists would also be likely to notice the highly specific security measures, and simply attack in some other way. The specificity of movie plot threats gives them power in the public imagination, however, so even extremely unrealistic security theater countermeasures may receive strong support from the public and legislators. Among many other examples of movie plot threats, Schneier described banning baby carriers from subways, for fear that they may contain explosives. Starting in April 2006, Schneier has had an annual contest to create the most fantastic movie-plot threat. In 2015, during the 8th and the last one, he mentioned that the contest may have run its course.


System design

Schneier has criticized security approaches that try to prevent any malicious incursion, instead arguing that designing systems to fail well is more important.Homeland Insecurity
, '' Atlantic Monthly'', September 2002
The designer of a system should not underestimate the capabilities of an attacker, as technology may make it possible in the future to do things that are not possible at the present. Under Kerckhoffs's Principle, the need for one or more parts of a cryptographic system to remain secret increases the fragility of the system; whether details about a system should be obscured depends upon the availability of persons who can make use of the information for beneficial uses versus the potential for attackers to misuse the information.


Service and awards

Schneier is a board member of the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
, Access Now, and The Tor Project; and an advisory board member of Electronic Privacy Information Center and VerifiedVoting.org. In 2015, Schneier received the EPIC Lifetime Achievement Award from Electronic Privacy Information Center. In 2011, he was awarded an honorary Ph.D from the University of Westminster in London, England, by the Department of Electronics and Computer Science in recognition of Schneier's 'hard work and contribution to industry and public life'.


Work


Cryptographic algorithms

Schneier has been involved in the creation of many cryptographic algorithms. Hash functions: * Skein Stream ciphers: * Solitaire * Phelix * Helix Pseudo-random number generators: * Fortuna * Yarrow algorithm Block ciphers: * Blowfish * Twofish * Threefish * MacGuffin


Publications

Schneier writes a freely available monthly Internet newsletter on computer and other security issues, ''Crypto-Gram'', as well as a security
weblog A blog (a Clipping (morphology), truncation of "weblog") is an informational website consisting of discrete, often informal diary-style text entries also known as posts. Posts are typically displayed in Reverse chronology, reverse chronologic ...
, ''Schneier on Security''. The blog focuses on the latest threats, and his own thoughts. The weblog started out as a way to publish essays before they appeared in Crypto-Gram, making it possible for others to comment on them while the stories were still current, but over time the newsletter became a monthly email version of the blog, re-edited and re-organized. Schneier is frequently quoted in the press on computer and other security issues, pointing out flaws in security and cryptographic implementations ranging from biometrics to airline security after the September 11 attacks. * Schneier, Bruce. ''Applied Cryptography'', John Wiley & Sons, 1994. * Schneier, Bruce. ''Protect Your Macintosh'', Peachpit Press, 1994. * Schneier, Bruce. ''E-Mail Security'', John Wiley & Sons, 1995. * Schneier, Bruce. ''Applied Cryptography'', Second Edition, John Wiley & Sons, 1996. * Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels. ''The Twofish Encryption Algorithm'', John Wiley & Sons, 1996. * Schneier, Bruce; Banisar, David. ''The Electronic Privacy Papers'', John Wiley & Sons, 1997. * Schneier, Bruce. ''Secrets and Lies: Digital Security in a Networked World'', John Wiley & Sons, 2000. * Schneier, Bruce. '' Beyond Fear: Thinking Sensibly About Security in an Uncertain World'', Copernicus Books, 2003. * Ferguson, Niels; Schneier, Bruce. '' Practical Cryptography'', John Wiley & Sons, 2003. * Schneier, Bruce. ''Secrets and Lies: Digital Security in a Networked World'', John Wiley & Sons, 2004. * Schneier, Bruce. ''Schneier on Security'', John Wiley & Sons, 2008. * Ferguson, Niels; Schneier, Bruce; Kohno, Tadayoshi. ''Cryptography Engineering'', John Wiley & Sons, 2010. * Schneier, Bruce. '' Liars and Outliers: Enabling the Trust that Society Needs to Thrive'', John Wiley & Sons, 2012. * Schneier, Bruce. ''Carry On: Sound Advice from Schneier on Security'', John Wiley & Sons, 2013. * Schneier, Bruce. ''Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World'', W. W. Norton & Company, 2015. * Schneier, Bruce. '' Click Here to Kill Everybody: Security and Survival in a Hyper-connected World'', W. W. Norton & Company, 2018. * Schneier, Bruce. ''We Have Root: Even More Advice from Schneier on Security'', John Wiley & Sons, 2019. * Schneier, Bruce. ''A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back'', W. W. Norton & Company, 2023.


See also

* Attack tree * Failing badly * Snake oil (cryptography) * Alice and Bob


References


External links


Personal website, Schneier.com




"Glenn Greenwald's Encryption Guru," by Alex Carp, March 16, 2014
Talking security with Bruce Almighty


video with Schneier participating on the Cryptographer's Panel, April 21, 2009, Moscone Center, San Francisco
Bruce Schneier on Real Law Radio
Bruce talks with Bob DiCello on the legal news talk radio program, Real Law Radio, about the case involving a Philadelphia school that allegedly spied on its students via the webcam on their computers (Podcasts/Saturday February 27, 2010). *
Bruce Schneier at Google
19 June 2013. Schneier discusses various aspects of Internet computing and global geo-politics including trust, power relations, control, cooperative systems, ethics, laws, and security technologies. (55 minutes)

on The WELL by Jon Lebkowsky, August 2012 {{DEFAULTSORT:Schneier, Bruce 1963 births Living people American cryptographers American technology writers Berkman Fellows 20th-century American Jews American University alumni University of Rochester alumni Modern cryptographers Cypherpunks Privacy activists American chief technology officers Hunter College High School alumni Writers about computer security Writers from New York City Writers from Minneapolis Wired (magazine) people 21st-century American Jews