Sort by:PopularityA - Z
This next president is going to inherit the most sophisticated and persistent cyber espionage cultures the world has ever seen, He needs to surround himself with experts that can expedite the allocation of potent layers of next generation defenses around our targeted critical infrastructure silos.
A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.
America’s treasure troves of public and private data, IP, and critical infrastructure continues to be pilfered, annihilated, and disrupted, while an organizational culture of ‘Participation Trophy Winners” managed by tech neophyte executives continue to lose one battle after the next.
Hacking a national election is simple. Exploit a vulnerability in the manufacturer's network, poison the tabulation software update with self-deleting malware and let the manufacturer send to their field reps and election consultants who update the election systems.
I watch Fox news for the comedy, MSNBC when I need to be reminded that mind midgets exist and CNN when I want to check out the latest in media lies and special interest propaganda. On the other 364 days of the year I read the American transcendentalists, David Hume, Rene Descartes, Immanuel Kant, Niccolo Machiavelli and Diogenes of Sinope.
James Scott, ICIT, Senior Fellow, Institute for Critical Infrastructure Technology, Cybersecurity , America , Hegelian dialectic style manipulation , society
Real cybersecurity means that your Security Operations team is consistently pen testing your network with the same stealth and sophistication as the Russian nation state, the same desperation as China’s 13th Five Year Plan, the same inexhaustible energy of the Cyber Caliphate and the same greed and ambition for monetary payoff as a seasoned cyber-criminal gang.
Security by design is a mandatory prerequisite to securing the IoT macrocosm, the Dyn attack was just a practice run
The day an organization realizes they’ve been hacked they’ll hire a forensic team to analyze the network only to identify the reality that they were hacked months or years ago, they just didn’t know it.
The most successful attacks by more sophisticated hackers tend to be strategically “indirect”. Why risk attacking Target directly and getting caught. Just hack the HVAC contractor and use their access to Target’s network
There has been a failure in moral courage by the technologically astute to step in and lead, selflessly. There's always a product pitch at the end of whitepapers. We need to remove the product pitches and replace it with objective and viable action steps
There needs to be a reset in cultural values to become more cyber hygienic and security-centric in regards to virtual connectivity
We’re talking about the fate of our economy and the questionable resiliency of our Nation’s critical infrastructure. Why are experts so polite, patient, and forgiving when talking about cybersecurity and National Security? The drama of each script kiddie botnet attack and Nation State pilfering of our IP has been turned into a soap opera through press releases, sound bites and enforced absurdity of mainstream media. It’s time for a cybersecurity zeitgeist in the West where cyber hygiene is a meme that is aggressively distributed by those who have mastered it and encouraged to be imitated by those who have experienced it.
Why all this fear and paranoia around Vault 7 and WikiLeaks? Solve the problem by demanding regulation that centers around Security by Design by technology manufactures, problem solved
You'll have the right to be angry about Vault 7 only after you boycott dragnet surveillance data providers like Google, Microsoft, Skype, Facebook and LinkedIn. The true threat is coming from the private sector surveillance profiteers.
Among state sponsored hacking groups, Russian APT’s approach hacking our critical infrastructure as if they are playing chess; strategically, methodically and with a concentrated focus.
Security-by-design is an indispensable prerequisite to the establishment of vital critical infrastructure resiliency. Each device vulnerable to adversarial compromise, inflates and bolsters the exploitable cyber-attack surface that can be leveraged against targets, and every enslaved device grants adversaries carte blanche access that can be utilized to parasitically entwine malware into organizational networks and IoT microcosms, and that can be leveraged to amplify the impact and harm inflicted on targeted end-users, organizations, and government entities
A CISO's job is to streamline, harmonize and propagate cybersecurity and cyber hygiene throughout the organizational IoT microcosm and staff
A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.
After Congress passed SJ Res 34, we are no longer merely battling a cyber-kinetic war on all fronts, we are now in a state of perpetual cyber-kinetic-meta war, and there will be no end.
Cultural Marxism, now called Political Correctness is a loaded gun that one puts to their own head. The narrative illusion normalizes the abnormal and is an elitist weapon over minions for citizen vs. citizen policing for establishment control.
Cyber hygiene, patching vulnerabilities, security by design, threat hunting and machine learning based artificial intelligence are mandatory prerequisites for cyber defense against the next generation threat landscape.
Cybersecurity whitepaper authors have it all wrong! It’s about weaponizing the mind of the reader so that when they’re done reading the document, you’ve memetically drilled home actionable concepts that will expediently impact their cyber defense.
Cyborgification is simply the process of compensating technologically for the inherent limitations of natural man.
Dragnet surveillance capitalists such as Facebook, Comcast, AT&T and Google, unfortunately, supply these manipulating forces with an endless supply of metadata for this information war against the American and European public.
Electronic consciousness and the transhuman revolution renders infinite possibilities for the future as man merges with machines. This is an exhilarating time to be alive!
Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this?
Few critical infrastructures need to expedite their cyber resiliency as desperately as the health sector, who repeatedly demonstrates lackadaisical cyber hygiene, finagled and Frankensteined networks, virtually unanimous absence of security operations teams and good ol’ boys club bureaucratic board members flexing little more than smoke and mirror, cyber security theatrics as their organizational defense.
First and foremost, the most profound weapon a nation or special interest can possess is “control” over information. This contributes to control over the narrative and the meme is the embryo of the narrative.
For Nation States, and the adversaries within America's boarders (special interest groups, cyber caliphate, Muslim brotherhood, Antifa etc), metadata is THE silent weapon in this quiet information war.
HCCIC by the C suite at HHS is a profound statement of having the moral courage to do what's right for the health sector
I don’t care how secure you think your organization is, I’ll social engineer my way inside in less than 24 hours regardless of the sophistication of your IoT microcosm security. Whatever obstacles I run into exploiting your technical vulnerabilities will be made up for by exploiting the vulnerabilities in the cyber hygiene of your staff.
I see the impossible work being done by of my friends at the federal agencies, the Pentagon, NATO, Five Eyes and the intelligence community. They are doing the impossible, for the ungrateful and with a fraction of the budgets required to render a viable defense.
If developed and implemented meaningfully, Cyber Shield Act could be a catalyst to incite responsible cybersecurity adoption and implementation throughout multiple manufacturing sectors. James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.
In the United States there is a unique blend of patriotism indoctrination from the pulpit which blends establishment controls into the religious ideology. This way, to question the establishment is to question God, therefore one’s patriotism and salvation is contingent on their submission to the state.
In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own.
In this cyberwar, industry is on their own and must combat nation states, cyber mercenaries, cyber caliphate and other actors via layered security laced with intelligent machines.
Man is a hostage to the cage of cultural programing and the mass hallucination of the propagandist’s narrative illusion.
Man is to technology what the bee is to the flower. It’s man’s intervention that allows technology to expand and evolve itself and in return, technology offers man convenience, wealth and the lessening burden of physical labor via its automated systems.
Manufacturing consent begins by weaponizing the meme and utilizing the censorship algorithms of Google, Facebook, Twitter and YouTube.
Meme Warfare 101: the meme hovers above the syntactical model that has limited man's evolution and expansiveness due to the restrictions of language. The meme introduces that which defies the restrictions of language and cuts to the psycho-emotional core of the individual.
Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies. James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Nietzsche said that All great things must first wear terrifying and monstrous masks in order to inscribe themselves on the hearts of humanity. Right now there is a renaissance, an awakening, we are breaking the narrative illusion, the mask, that eats away at the face.
Political correctness is a loaded gun that the individual holds to their own head. Where laws can’t stomp on freedom of speech, automatons rule other automatons via political correctness and social acceptance.
Ransomware is not only about weaponizing encryption, its more about bridging the fractures in the mind with a weaponized message that demands a response from the victim.
Right and wrong isn’t a matter of ethics, rather it’s the geography in which you reside and whose control you’re under. Tallinn Manual 2.0 is based largely on western international humanitarian law.
Senator Markey’s Cyber Shield Act can work! Start the conversations with the basics: Use a QR code that attaches to a dynamic database that runs an artificial intelligence algorithm to calculate the score. Let’s not make this more difficult than it is.
Signature-based malware detection is dead. Machine learning based Artificial Intelligence is the most potent defense the next gen adversary and the mutating hash.
The American renaissance begins with the unified revolutionary act of turning off and smashing the television, rejecting Hollywood on all fronts and refusing to intellectually ingest the toxic force feed of the establishment minority’s matrix narrative.
The biggest center of attention needs to be the Secretaries of State. They're the ones that manage the elections. At the end of the day, they're the ones that need to be held accountable.
The cyber hygienically apathetic c-suites running critical infrastructure organization are losing this war. This this is a cyber kinetic meta war and its hyper evolving in an already next gen space.
The cyber industry is riddled with faux experts and self-proclaimed scholars, Tallinn Manual 2.0 is a perfect example of what happens when cyber-upstarts try to proclaim authority on a topic they know nothing about.
The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The disturbingly techno-illiterate and cyber-hygienically lackadaisical and shockingly arrogant responses by the National Association of Secretaries of States when we at ICIT repeatedly showed them what their vulnerabilities were and exactly how elections could be compromised is a betrayal of trust to offer safe and legitimate elections. The technical vulnerabilities littering our election systems is only part of the problem.
The Frankensteined architectonic IoT microcosm of the prototypical critical infrastructure organization renders an infinite attack surface just begging to be exploited.
The human condition is plagued with a labyrinth of shortcomings, frailties and limitations that hinder man from reaching his fullest potential. Therefore, it only makes sense that we find ourselves at the next phase in human evolution where restricted man merges with the infinite possibilities of hyper-evolving technologies. This techno-human transmutation will prove to be ‘the’ quantum leap in human progression. The harmonization of technologically extending oneself, consciousness, artificial intelligence and machine learning will reverse the failures of genetic predisposition and limitation.
The illusion of time and space that has been introduced by those who want to commodities and monetize on the time and space of others.
The narrative illusion introduces a “mind virus”, which is a syntactical contagion that spreads through communicative vectors and colonizes the cognitive biases of the targeted individual’s psychology, thus transforming the mental processes of that target.
The two main problems with signature and heuristic based anti-virus is the mutating hash and the fact that you first need a victim in order to obtain the signature. James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The weaponized meme, when properly introduced and reinforced, will parasitically weave its way throughout the labyrinth of the mind and attach itself to the subconscious, thus effecting the root of the thought of the recipient.
There's a compounding and unraveling chaos that is perpetually in motion in the Dark Web's toxic underbelly.
This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.
We have the technical sophistication of Tinker Toy’s protecting the IoT microcosms of America’s health sector organizations.
You are a product to dragnet surveillance capitalists like Google, Facebook, Comcast and Verizon. Your ideas are rarely your own, rather you are little more than a pawn to their perception steering initiatives to get you to read, believe and buy what they put in front of you. The first step to breaking out of this faux reality matrix is to stop using Google, Bing, Yahoo, Comcast and Facebook.
You can keep the Office of Personnel Management records, I don't need Electronic Health Records, give me the metadata, big data analytics and a custom tailored algorithm and a budget and during election time, I can cut to the psychological core of any population, period!
Quotes from the news wire:
Rubbing alcohol has long been used in medicine as a disinfectant for skin surfaces and environmental surfaces, it has been generally thought that rubbing alcohol was fairly safe from the emergence of resistance amid susceptible germs. This interesting and carefully done study refutes that assumption.
It is important for people to understand that this study is specifically concerned with one particular germ that is increasingly implicated in hospital-acquired infections, this study really only applies to the specific environment of hospitals, and I'm confident that alcohol-based disinfectants will continue to remain highly effective in general use.