Feeds

The Devil is in the Detail

The SCREWTAPE Letters

  • alert
  • submit to reddit

Internet Security Threat Report 2014

June 13, 2002

My dear Wormwood,

You know that our best work has always been accomplished through manipulation of the humans' own institutions. By influencing their emotions, and especially by invoking a sense of fear, we have had great success in encouraging the humans to destroy themselves. Our master below has been especially pleased with our work in putting so many high-tech workers out of jobs. Remember that it was your second cousin Slubgob's idea to concentrate on the humans who are responsible for writing press releases.

We have done well in encouraging the press to accept contrived press releases as real news-the natural laziness of most reporters makes it easy for us to manipulate them. A large firm such as the one your human works for can write a press release that is repeated by thousands of unskilled journalists. By influencing your human to write one short document, we can sow fear and ignorance worldwide. I should not have to remind you that our family's work must always remain hidden, or else it will cease to be effective.

When placing thoughts into the mind of your human, never forget the guidelines that Slubgob developed for creating effective propaganda. First, simplification is the most effective technique for misleading humans through the media. Humans are intellectually lazy, and it is amusing to us how eager they are to over-simplify any issue to a binary decision. It is easier-and more satisfying for them-to believe that all cyberthreats are equally dangerous, creating ever more urgency to purchase the unnecessary products from your human's company. Humans lack courage, and are strongly influenced by the fear that all other humans are doing something that they are not. The high-tech market has made good use of the unanimity principle, making it easy for humans to accept that all right-thinking computer managers not only use their products, but would be irresponsible not to. Finally, the orchestration principle is crucial in reinforcing the intellectual distortions that are the purpose of this particular game. The endless repetition of any message, no matter how silly to us, is comforting to the hairless ape, making it ever easier for them to relax their mental guard, and accept it as truth.

As your uncle, I must tell you that your career will be in jeopardy if you do not better control your human. His company has taken credit for every single discovery in their field, but many humans fail to see any evidence of actual research to justify these claims. His latest press release was so outrageous that even the most gullible humans find it suspicious. Many humans are fearful of the Internet, and our hoaxes and attempts to create alarm and dissension have been largely successful. But even the dimmest human will soon learn that they need not fear having viruses in their graphics files. Your human has perhaps had too much success; he has been writing press releases with ever more preposterous claims about the dangers of technology and the need for the useless products made by your human's employer. It would hurt our cause if their ability to sow misinformation were lost through a lack of subtlety.

Nephew, you know that I have always given you useful advice and have laboured to increase the prestige of our family. If your work were to fail at this point, you would probably be assigned to a dead-end position, tormenting a corporate accountant. Beezlebarge and his assistants have been hugely successful in manipulating the feelings of hubris and desire in this particular type of human, almost destroying human trust in their financial system. Now that human trust in their financial system is failing, you can be sure that Beezlebarge will be moving on to some other new scheme, leaving just a mop up job for his successors. You must avoid this fate. Use your influence with the programming demons to obtain a truly nasty-seeming virus and see that your human gets it before any of the competitors do. Suggest an outrageous name that will titillate the gullible creatures. Then your human can announce that their firm has once again discovered a horrible new danger, and once again, they have saved the world from it.

Although it seems like blatant manipulation to us, this message will simultaneously thrill and comfort the two-legged animals, reassuring them that they made a good choice in purchasing your human's over-priced and over-engineered software. Our work can only succeed if we keep the humans in a constant state of fear and ignorance.

Your affectionate uncle

SCREWTAPE

(A letter discovered during an investigation by Jay Heiser, co-author of Computer Forensics: Incident Response Essentials ISBN 0201707195) ®

Another exceedingly fine column from Jay Heiser

Snouts in the HoneyPot

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.