Sort by:PopularityA - Z
As we’ve already seen with exfiltrated voter registration databases and the endless methods of poisoning manufacturer updates, manipulating DRE and optical scan machines and bypassing air gap defense, the state election official’s illusion of security is being pummeled by the reality of cyberattack.
Cyber hygiene has to be memetically pounded into the intellectual DNA of the American population and continuously reinforced by peer pressure.
It was refreshing to see the cybersecurity communities pushback when the DNC attempted to introduce the cold war “It’s the Russians” mantra when fear mongers found that their completely unprotected networks were infiltrated by script kiddies.
Look at the stealth and sophistication of foreign nation state APTs who break through even the most sophisticated layers of security daily and tell me why they would just give our completely unprotected election systems a pass
Many members of Isis are not sophisticated attackers. The majority of members do not have a technical background. The UCC is predominately capable of hacking soft targets, such as Twitter accounts, and spreading propaganda or defacing websites
The collaboration between secretaries of state, election officials and the voting system manufacturers on the matter of enforcing this black box proprietary code secrecy with election systems, is nothing less than the commoditization and monetization of American Democracy.
The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!
The security theater we are witnessing in our election system boasting the illusion of security via ‘clunky as heck’ and air gap defense will do nothing against the real and sophisticated adversarial landscape that is zeroing in on our democracy
You think an Air Gap is a defense? Sofacy, Stuxnet, Uroburos, AirHopper, BitWhisperer and ProjectSauron…enough said!
Between the black box proprietary code, barebones computers we call voting machines and a mass of completely unqualified election officials, our election system is up for grabs to anybody with even a modest interest and some script kiddie capability. The cyber-kinetic attack surface here is wide open.
Share your thoughts on James Scott, Senior Fellow, Institute for Critical Infrastructure Technology's quotes with the community:
Would you like us to send you a FREE inspiring quote delivered to your inbox daily?
Use the citation below to add this author page to your bibliography:
"James Scott, Senior Fellow, Institute for Critical Infrastructure Technology Quotes." Quotes.net. STANDS4 LLC, 2019. Web. 18 Oct. 2019. <https://www.quotes.net/authors/James+Scott%2C+Senior+Fellow%2C+Institute+for+Critical+Infrastructure+Technology+Quotes>.