Top 25 James Scott Quotes



After Congress passed SJ Res 34, we are no longer merely battling a cyber-kinetic war on all fronts, we are now in a state of perpetual cyber-kinetic-meta war, and there will be no end.

 

This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.

 

We’ve gone from a planet ruled by natural geography to political geography to kinetically functional geography to a cyber geography that is ruled by ideological variation rather than politically constructed boarders.

 

Cyber hygiene, patching vulnerabilities, security by design, threat hunting and machine learning based artificial intelligence are mandatory prerequisites for cyber defense against the next generation threat landscape.

 

America is a reactionary society which makes us prone and vulnerable to Hegelian dialectic style manipulation. I’m more concerned about the adversaries within our boarders than I am our adversaries from abroad.

 

Electronic consciousness and the transhuman revolution renders infinite possibilities for the future as man merges with machines. This is an exhilarating time to be alive!

 

We have the technical sophistication of Tinker Toy’s protecting the IoT microcosms of America’s health sector organizations.

 

The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!

 

For Nation States, and the adversaries within America’s boarders (special interest groups, cyber caliphate, Muslim brotherhood, Antifa etc), metadata is “THE” silent weapon in this quiet information war.

 

The gaping wound in America’s national security is without a doubt, the unregulated dragnet surveillance capitalists.

 

Why all this fear and paranoia around Vault 7 and WikiLeaks? Solve the problem by demanding regulation that centers around Security by Design by technology manufactures, problem solved

 

There’s no silver bullet solution with cyber security, a layered defense is the only viable defense

 

Ransomware is unique among cybercrime because in order for the attack to be successful, it requires the victim to become a willing accomplice after the fact

 

You think an Air Gap is a defense? Sofacy, Stuxnet, Uroburos, AirHopper, BitWhisperer and ProjectSauron…enough said!

 

Right and wrong isn’t a matter of ethics, rather it’s the geography in which you reside and whose control you’re under. Tallinn Manual 2.0 is based largely on western international humanitarian law.

 

Security by design is a mandatory prerequisite to securing the IoT macrocosm, the Dyn attack was just a practice run

 

You’ll have the right to be angry about Vault 7 only after you boycott dragnet surveillance data providers like Google, Microsoft, Skype, Facebook and LinkedIn. The true threat is coming from the private sector surveillance profiteers.

 

Overall, Cyber Shield Act is an excellent idea and could facilitate a much-needed cultural shift in secure device manufacturing and upkeep.

 

The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery

 

In this cyberwar, industry is on their own and must combat nation states, cyber mercenaries, cyber caliphate and other actors via layered security laced with intelligent machines.

 

There’s a compounding and unraveling chaos that is perpetually in motion in the Dark Web’s toxic underbelly.

 

The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery”James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

 

Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies.James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

 

Overall, Cyber Shield Act is an excellent idea and could facilitate a much-needed cultural shift in secure device manufacturing and upkeep.”James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

 

Every conceivable layer of the election process is completely riddled with vulnerabilities, so yes, hacking elections is easy!

 

 

Quotes by Authors

Leave a Reply

Your email address will not be published. Required fields are marked *