Bruce Schneier Q&A: The Endless Broadening of Security

For Bruce Schneier, the security discipline still evolves and expands. Now he's the one trying to expand it.

1 2 Page 2
Page 2 of 2

CSO: You always seem to find inspiration for security wisdom in unusual places. Do you have any for us?

Schneier: I find the most surprising security wisdom in the insect world. It shouldn't come as a surprise. Evolutionarily, they've tried just about everything. Attack-and-defense techniques that worked were repeated, and those that failed weren't. Because evolution tries solutions at random and stops at the first workable solution found, insects tended to arrive at interesting and surprising solutions. It's common to find insect countermeasures that are non-obvious, but nonetheless effective.

CSO: Non-obvious security solutions?

Schneier: By and large, ants differentiate friends from foes by their sense of smell. There are some beetles that have evolved to defeat this security system by sneaking into the ant colony and laying low, playing dead if attacked, until they acquire the scent of their ant neighbors. After that, they're tolerated in the nest by the ants even as they feast on ant larvae.

Another story: Some flowers have long tube-like shapes to prevent bees, which don't pollinate them very effectively, from stealing their nectar. They prefer long-tongued hummingbirds. But some bees have evolved to chew a hole in the side of the flower and get the nectar that way.

But the neatest story I've found is about how lima bean plants defend themselves. When two-spotted spider mites attack them, the plants emit a chemical distress signal. The distress signal helps in three distinct ways. One, it gets other, nearby lima bean plants to start sending out the same distress signal, even if they're not being attacked yet. Two, it repels other two-spotted spider mites. And three, it attracts carnivorous mites to land on the lima bean plants and prey on the herbivorous two-spotted spider mites. Yes, the plants have evolved to call in air strikes against their attackers.

Copyright © 2008 IDG Communications, Inc.

1 2 Page 2
Page 2 of 2
Microsoft's very bad year for security: A timeline