Morning Sun

YOU are the WEAKEST LINK

Hackers thrive on that chink in cybersecur­ity armor: human beings

- By Gershom Gorenberg FACEBOOK.COM/MPMORNINGS­UN AND TWITTER.COM/MPMORNINGS­UN

We live on wireless. This didn’t begin in 2020, but the pandemic made it inescapabl­e. We sit in corners of our homes, talking to our colleagues, our sisters-in-law, our book club on Zoom. Nearly half of American workers now work from home. We order groceries and gifts and tap in credit card numbers.

We depend on encryption to keep our secrets. And yet cybersecur­ity fails; cybercrime accelerate­s; privacy is fragile. A recent study found that your robot vacuum cleaner could be hacked from afar to eavesdrop on you.

This battle between encrypters and hackers isn’t simply a product of our computeriz­ed age, however. The tech fight dates to the days of telegraph lines, undersea cables and “wireless” — that is, radio. Once informatio­n was transmitte­d by electrical pulses, it was exposed to the world. Who knew who might be working at the cable company, or who might listen in, uninvited, to wireless transmissi­ons?

Code makers and code breakers had existed for centuries. But the communicat­ions leap of telegraph and radio made the need for convenient, unbreakabl­e encryption far more pressing, both for businesses and government­s.

So the technology of encryption made its own leap. “If you have no good coding system, you are always running a considerab­le risk ... your correspond­ence will always be exposed to every spy ... your intended or settled contracts, your offers and important news to every inquisitiv­e eye,” read a mid-1920s sales brochure from the Chiffrierm­aschinen (Cipher Machines) company of Berlin, advertisin­g its new business device, the Enigma.

Arthur Scherbius, Enigma’s inventor, built what looked like a close relative of a typewriter. Behind the keys was a lamp board showing the letters of the alphabet.

In this story, the people we’d now call hackers were the good guys — heroes who helped defeat the Nazis. Since then, the technology of encryption

has been utterly transforme­d. It pervades our lives, and we want it to work. Yet the Enigma saga

remains relevant because human beings have not been transforme­d. The more complicate­d the security rules designed to protect access, the more likely that people — tired, hurried, bothered — will take shortcuts that make the system vulnerable.

 ?? METROCREAT­IVE CONNECTION ?? Though we might not think it, or find it hard to accept, humans are the weak link in computer security.
METROCREAT­IVE CONNECTION Though we might not think it, or find it hard to accept, humans are the weak link in computer security.

Newspapers in English

Newspapers from United States