In 2009, security consultant and current chief technology officer of IBM Resilient Bruce Schneier wrote about the concept of security theater. “Security theater refers to security measures that make people feel more secure without doing anything to actually improve their security,” he wrote. At the time, there was a lot of fear about information security and a sense of urgency to stem the tide of cybercrime.

Since then, we have learned that fearmongering is counterproductive. Tactics such as creating ID checks and banning liquids and gels from carry-on luggage aren’t really effective. As each measure is put in place to try to protect the public, there are others created to defeat them. Often, these techniques just create more problems.

Setting the Scene

In an earlier article, however, Schneier explained that security theater can be effective under certain circumstances. On a visit to a newborn unit at a local hospital, for example, he noticed that the babies were wearing radio frequency identification (RFID) tags around their ankles. The tags triggered an alarm when a baby passed through the doors, which were equipped with sensors.

Now, the risk to infant abduction from a hospital ward is quite low — about 1 in 375,000 babies, if you average things over the past several decades — and far lower than infant deaths. But that isn’t really relevant. In this case,”RFID bracelets are a low-cost way to ensure that the parents are more relaxed when their baby was out of their sight,” he explained.

The benefits of using RFID technology — in this case, parents’ peace of mind — outweigh the relatively low cost.

Don’t Write Off Security Theater

Yes, the RFID tags are security theater, but they are necessary. “Most of the time security theater is a bad trade-off, because the costs far outweigh the benefits,” Schneier wrote. “But there are instances when a little bit of security theater makes sense.” The potential cost of a lawsuit if a baby is actually abducted, for example, could easily eclipse the cost of the RFID tag program.

The trick is to balance the need for security with its eventual implementation. This holds for IT implementations, too. Sometimes we need to consider both our feelings and the realities of enterprise security.

As Schneier put it, “Security theater is no substitute for security reality, but, used correctly, security theater can be a way of raising our feeling of security so that it more closely matches the reality of security. To write off security theater completely is to ignore the feeling of security.”

More from Risk Management

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Digital solidarity vs. digital sovereignty: Which side are you on?

4 min read - The landscape of international cyber policy continues to evolve rapidly, reflecting the dynamic nature of technology and global geopolitics. Central to this evolution are two competing concepts: digital solidarity and digital sovereignty.The U.S. Department of State, through its newly released International Cyberspace and Digital Policy Strategy, has articulated a clear preference for digital solidarity, positioning it as a counterpoint to the protectionist approach of digital sovereignty.What are the main differences between these two concepts, and why does it matter? Let’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today