Home / Blogs

Cyber-Spin: How the Internet Gets Framed as Dangerous

At the beginning of this year, a set of powerhouse organizations in cybersecurity (CSO Magazine, Deloitte, Carnegie Mellon’s CERT program, and the U.S. Secret Service) released the results of a survey of 523 business and government executives, professionals and consultants in the ICT management field.

The reaction generated by this survey provides an unusually clear illustration of how cyber-security discourse has become willfully detached from facts. There is an organized industrial and political imperative to drill into our heads the idea that the Internet is dangerous and its threats are spiraling out of control, and it doesn’t matter what facts are uncovered—they are all interpreted to support this preconception.

With that intro, here is the lead sentence from the January 25 2010 Carnegie-Mellon University news release about the 2010 CyberSecurity Watch Survey:

“Cybercrime threats posed to targeted organizations are increasing faster than many organizations can combat them, according to the 2010 CyberSecurity Watch Survey…”

Stop right there. A careful review of both the survey and the responses to it quickly reveals that that conclusion did NOT come from the survey itself, and was not supported by its data. In fact, the claim that cyberthreats are increasing faster than many organizations can combat them comes from a Deloitte “review of the results” of the survey. The Deloitte “review” is entitled (in big, bold letters) CYBERCRIME: A CLEAR AND PRESENT DANGER and it admits it is an “interpretation,” which “goes beyond simple reporting of results.”

Apparently Deloitte, one of the sponsors of the survey, was not happy with the results:

“Deloitte believes…that some of the findings point to significant incongruities between the views of many survey respondents and the current reality of cyber crime.” In other words, don’t listen to what the people actually facing and dealing with threats tell you, listen to the scary stuff.

So what are the relevant facts in the survey?

The survey “uncovered a drop in victims of cybercrimes (60% vs. 66% in 2007), however, the affected organizations have experienced significantly more attacks than in previous years.”

“Since 2007, when the last cybercrime survey was conducted, the average monetary value of losses resulting from cybercrimes declined by 10%.”

“More than half of the respondents (58%) believe they are more prepared to prevent, detect, respond to or recover from a cybercrime incident compared to the previous year.”

Isn’t this interesting? How does Deloitte get from a drop in the number of victims and a 10% drop in losses (despite more attacks) and a general improvement in perceived preparedness, to the conclusion that crimes are increasing “faster than potential victims can cope with them?” It’s easy when you’ve got something to sell.

Where do cyber-security threats come from? Once again, there is a very interesting gap—perhaps we should say chasm—between the Deloitte report and the actual survey results. In Deloitte’s spin, the main threat is external, and comes from “An increasing number of criminals and criminally minded enterprises [that] have hired, purchased, or otherwise acquired the ability to infiltrate systems with new penetration techniques while developing a criminal e-business network.” But Deloitte doesn’t stop there. Without adducing a shred of evidence it asserts that “There is a likely nexus between cyber crime and a variety of other threats including terrorism, industrial espionage, and foreign intelligence services.” Shudder. Oh my God.

Now what is the data in the survey report?

The survey respondent reported that the vast majority of attacks—and the most costly ones—come from insiders. No less than 3/4 (75%) of all cybercrime comes from KNOWN sources. Moreover, “Insider incidents are more costly than external breaches, according to 67% of respondents.”

The Deloitte “review” of the survey results shows they are simply unable to accept an alternate, less exciting and scary view about the sources of risk. And so it issued a glossy, bold pamphlet/advertisement that actually garnered more media coverage than the actual survey. And the assertions of its tract were often conflated with those of the survey.

To be fair to Deloitte, their tract does make some wise points. They argue, convincingly, that organizations should focus security on a “risk-based approach” that “starts with the assumption that an unauthorized user can gain access to the system, and then design responses based on the value of the data that could thus be compromised.”

Equally wise, the Deloitte report urges enterprises to “shift away from building a ‘great wall’ against all threats, toward identifying and addressing the most significant ones. This entails prioritizing risks on the basis of their likelihood, impact, and potential interactions with other risks, then allocating resources accordingly.”

But if Deloitte followed its own advice consistently, it would stop promoting hysteria about unknown, unquantified, and as yet undemonstrated risks “that can be imagined” (their words) from “terrorist organizations, foreign intelligence services, and traditional organized crime entities” and focus more directly on where the real risks are.

There may be a valid argument that the survey respondents are complacent or ignorant about the real security risks—but Deloitte hasn’t made it. And it is hard to argue with the fact that the survey respondents know more than Deloitte does about what incidents actually hit them and how much money those incidents actually cost them. To posit risks and threats that “could be imagined” sounds more like a sales job than analysis.

By Milton Mueller, Professor, Georgia Institute of Technology School of Public Policy

Filed Under

Comments

Not often I completely agree with you, Milton Suresh Ramasubramanian  –  Apr 9, 2010 3:01 AM

In this case - yes, there’s a lot to be said in favor of not overestimating (or is the word “overhyping”) a threat.

Well said Jothan Frakes  –  Apr 13, 2010 6:28 AM

Milton, this is a good article.

There certainly are harms out in the internet and bad actors, but it is important to call out sensationalistic FUD, and I think you did a great job of this.

+1

Yes, and? Neil Schwartzman  –  Apr 13, 2010 10:27 AM

OK, this particular survey skewed results in a certain manner. That is what surveys do, most of the time. They often miraculously arrive at conclusions beneficial to those who paid for them to be undertaken.

What conclusions are we to draw from the inference above? That cyber crime isn’t a serious problem? That its impact is lessening?

Simply because a risk can be imagined doesn’t make it any less valid as a risk; In 2002 I attended a banking conference at GWU in DC, hosted by D&T;competitor KPMG, and DHS. When I spoke of the risk associated with botnets, it was dismissed as an ‘un-demonstrated risk’. Had my words been heeded way back when, perhaps some consumers’ money would not have been cyber-stolen from their bank accounts.

We have since seen botnets take entire countries offline. We have seen botnets take a city’s 9-1-1 system offline. We have seen malware allow malicious outsiders to have control of a hospital’s lighting and door control systems. At one time, less than a decade ago, all of this was un-demonstrated.

Any attempt at diminishment and dismissal of serious threats, actual and potential, using the Internet as a vector of transmission or attack, is wrongheaded.

Mr. Mueller has spoken against security-related measures in at least one forum of which I am aware. A ivory-towered philosophical stance that the dangers inherent in today’s Internet are sufficiently negligible to be ignored, or to be over-ridden, as they are of less importance that other more utopian ideals can only lead to additional real-world data disasters, and reactionary legislation by governments.

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC