Feeds

Security guru Bruce Schneier to leave employer BT

Nothing to do with criticising GCHQ and the NSA, insists telco

Reducing security risks from open source software

Exclusive Noted security guru Bruce Schneier, who has spent a great deal of energy publicly analysing the Edward Snowden leaks into the activities of the NSA and allied spy agencies, is to leave UK telco BT.

A spokesman for BT said: “We can confirm that Bruce Schneier, BT’s security futurologist, is leaving BT at the end of December 2013.”

News of the parting of the ways reached El Reg via a leaked internal email. Our source suggested Schneier was shown the door as a result of his comments about the NSA and GCHQ's global dragnet and mass surveillance activities.

BT denies this, saying that the working relationship had come to its "natural end".

To: All people in BT Security

From: Mark Hughes, CEO, BT Security

Status: For information

Bruce Schneier to leave BT.

I would like to announce that Bruce Schneier, BT’s security futurologist, is leaving the company after eight years. Bruce joined BT in 2006 as part of the Counterpane acquisition and has been a great asset to the company.

I’d like to thank him for all of his contributions to BT and wish him success in his future endeavours.

Mark Hughes, CEO, BT Security

Hughes gave a keynote presentation about BT Security's work securing the Olympics at the recent RSA Europe conference. During an accompanying question-and-answer session he downplayed suggestions that BT had a close working relation with GCHQ, saying that the telecoms giant was no different from any other large private sector firm in the UK.

Leaks from former NSA sysadmin Edward Snowden painted a different picture, however, including reports that BT, Vodafone and other carriers allowed GCHQ to tap their fibre-optic lines.

BT denied that Schneier leaving was anything to do with his recent critical commentaries on the dragnet surveillance tactics of Blighty's GCHQ in partnership with the NSA:

We hired Bruce because of his thought leadership in security and as part of our acquisition of Counterpane. We have agreed to part ways as we felt our relationship had run its course and come to a natural end. It has nothing to do with his recent blogs. We hired Bruce because of his thought leadership in security, not because we agree with everything he says. In fact, it's his ability to challenge our assumptions that made him especially valuable to BT.

We wish Bruce every success in his future endeavours and thank him for his contributions to the company and the industry.

Updated to add

Schneier told The Register this evening of his departure: "This has nothing to do with the NSA. No, they [BT] weren't happy with me, but they knew that I am an independent thinker and they didn't try to muzzle me in any way. It's just time. I spent seven years at BT, and seven years at Counterpane Internet Security, Inc before BT bought us. It's past time for something new.

"As to the future: answer, cloudy; ask again later." ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.