Matthew jhon's Quotes

Here's the list of quotes submitted by Matthew jhon  —  There are currently 48 quotes total — keep up the great work!

The narrative illusion introduces a “mind virus”, which is a syntactical contagion that spreads through communicative vectors and colonizes the cognitive biases of the targeted individual’s psychology, thus transforming the mental processes of that target.

James Scott  Famous Quote

added 2 years ago

Nietzsche said that All great things must first wear terrifying and monstrous masks in order to inscribe themselves on the hearts of humanity. Right now there is a renaissance, an awakening, we are breaking the narrative illusion, the mask, that eats away at the face.

James Scott  Famous Quote

added 2 years ago

Meme Warfare 101: the meme hovers above the syntactical model that has limited man's evolution and expansiveness due to the restrictions of language. The meme introduces that which defies the restrictions of language and cuts to the psycho-emotional core of the individual.

James Scott  Famous Quote

added 2 years ago

Cyborgification is simply the process of compensating technologically for the inherent limitations of natural man.

James Scott  Famous Quote

added 2 years ago

Cultural Marxism, now called Political Correctness is a loaded gun that one puts to their own head. The narrative illusion normalizes the abnormal and is an elitist weapon over minions for citizen vs. citizen policing for establishment control.

James Scott  Famous Quote

added 2 years ago

If you don’t formulate your own narrative, you become a pawn in someone else’s.

James Scott  Famous Quote

added 2 years ago

In the United States there is a unique blend of patriotism indoctrination from the pulpit which blends establishment controls into the religious ideology. This way, to question the establishment is to question God, therefore one’s patriotism and salvation is contingent on their submission to the state.

James Scott  Famous Quote

added 2 years ago

Man is a hostage to the cage of cultural programing and the mass hallucination of the propagandist’s narrative illusion.

James Scott  Famous Quote

added 2 years ago

Manufacturing consent begins by weaponizing the meme and utilizing the censorship algorithms of Google, Facebook, Twitter and YouTube.

James Scott  Famous Quote

added 2 years ago

The illusion of time and space that has been introduced by those who want to commodities and monetize on the time and space of others.

James Scott  Famous Quote

added 2 years ago

First and foremost, the most profound weapon a nation or special interest can possess is “control” over information. This contributes to control over the narrative and the meme is the embryo of the narrative.

James Scott  Famous Quote

added 2 years ago

Political correctness is a loaded gun that the individual holds to their own head. Where laws can’t stomp on freedom of speech, automatons rule other automatons via political correctness and social acceptance.

James Scott  Famous Quote

added 2 years ago

Man is to technology what the bee is to the flower. It’s man’s intervention that allows technology to expand and evolve itself and in return, technology offers man convenience, wealth and the lessening burden of physical labor via its automated systems.

James Scott  Famous Quote

added 2 years ago

The weaponized meme, when properly introduced and reinforced, will parasitically weave its way throughout the labyrinth of the mind and attach itself to the subconscious, thus effecting the root of the thought of the recipient.

James Scott  Famous Quote

added 2 years ago

I don’t care how secure you think your organization is, I’ll social engineer my way inside in less than 24 hours regardless of the sophistication of your IoT microcosm security. Whatever obstacles I run into exploiting your technical vulnerabilities will be made up for by exploiting the vulnerabilities in the cyber hygiene of your staff.

James Scott  Famous Quote

added 2 years ago

The gaping wound in America’s national security is without a doubt, the unregulated dragnet surveillance capitalists.

James Scot  Famous Quote

added 2 years ago

You are a product to dragnet surveillance capitalists like Google, Facebook, Comcast and Verizon. Your ideas are rarely your own, rather you are little more than a pawn to their perception steering initiatives to get you to read, believe and buy what they put in front of you. The first step to breaking out of this faux reality matrix is to stop using Google, Bing, Yahoo, Comcast and Facebook.

James Scott  Famous Quote

added 2 years ago

If you don’t feel ordained by the Universe to do this job, do something else. The intelligence community has to shut down the gaping wound that is the insider threat epidemic we are experiencing right now.

James Scot  Famous Quote

added 2 years ago

The cyber hygienically apathetic c-suites running critical infrastructure organization are losing this war. This this is a cyber kinetic meta war and its hyper evolving in an already next gen space.

James Scott  Famous Quote

added 2 years ago

For Nation States, and the adversaries within America's boarders (special interest groups, cyber caliphate, Muslim brotherhood, Antifa etc), metadata is THE silent weapon in this quiet information war.

James Scott  Famous Quote

added 3 years ago

The biggest center of attention needs to be the Secretaries of State. They're the ones that manage the elections. At the end of the day, they're the ones that need to be held accountable.

James Scott  Famous Quote

added 3 years ago

The biggest center of attention needs to be the Secretaries of State. They're the ones that manage the elections. At the end of the day, they're the ones that need to be held accountable.

James Scott  Famous Quote

added 3 years ago

The health sector is in desperate need of a cyber hygiene injection

James Scott  Famous Quote

added 3 years ago

HCCIC by the C suite at HHS is a profound statement of having the moral courage to do what's right for the health sector

James Scott  Famous Quote

added 3 years ago

A CISO's job is to streamline, harmonize and propagate cybersecurity and cyber hygiene throughout the organizational IoT microcosm and staff

James Scott  Famous Quote

added 3 years ago

Medical devices and EHR systems are notoriously vulnerable to remote compromise

James Scott  Famous Quote

added 3 years ago

The Frankensteined architectonic IoT microcosm of the prototypical critical infrastructure organization renders an infinite attack surface just begging to be exploited.

James Scott  Famous Quote

added 3 years ago

A vulnerability in an organization's IoT microcosm is a taunt to exploit by malicious hackers.

James Scott  Famous Quote

added 3 years ago

Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this?

James Scott  Famous Quote

added 3 years ago

In this digital age, we're experiencing the weaponization of everything.

James Scott  Famous Quote

added 3 years ago

You can keep the Office of Personnel Management records, I don't need Electronic Health Records, give me the metadata, big data analytics and a custom tailored algorithm and a budget and during election time, I can cut to the psychological core of any population, period!

James Scott  Famous Quote

added 3 years ago

After Congress passed SJ Res 34, we are no longer merely battling a cyber-kinetic war on all fronts, we are now in a state of perpetual cyber-kinetic-meta war, and there will be no end.

James Scott  Famous Quote

added 3 years ago

Cyber warfare is as much about psychological strategy as technical prowess.

James Scott  Famous Quote

added 3 years ago

When flimsy cyber defense fails, Format Preserving Encryption prevails

James Scott  Famous Quote

added 3 years ago

Wannacry is the Stuxnet of Ransomware

James Scott  Famous Quote

added 3 years ago

This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.

James Scott  Famous Quote

added 3 years ago

James Scott, ICIT, Senior Fellow, Institute for Critical Infrastructure Technology, Cybersecurity , America , Hegelian dialectic style manipulation , society

James Scott  Famous Quote

added 3 years ago

Right and wrong isn’t a matter of ethics, rather it’s the geography in which you reside and whose control you’re under. Tallinn Manual 2.0 is based largely on western international humanitarian law.

James Scott  Famous Quote

added 3 years ago

We have the technical sophistication of Tinker Toy’s protecting the IoT microcosms of America’s health sector organizations.

James Scott  Famous Quote

added 3 years ago

Ransomware is not only about weaponizing encryption, its more about bridging the fractures in the mind with a weaponized message that demands a response from the victim.

James Scott  Famous Quote

added 3 years ago

Your organization’s illusion based security theater will lose to the reality of cyber-attack any day of the week.

James Scott  Famous Quote

added 3 years ago

Cybersecurity whitepaper authors have it all wrong! It’s about weaponizing the mind of the reader so that when they’re done reading the document, you’ve memetically drilled home actionable concepts that will expediently impact their cyber defense.

James Scott  Famous Quote

added 3 years ago

The cyber industry is riddled with faux experts and self-proclaimed scholars, Tallinn Manual 2.0 is a perfect example of what happens when cyber-upstarts try to proclaim authority on a topic they know nothing about.

James Scott  Famous Quote

added 3 years ago

In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own.

James Scott  Famous Quote

added 3 years ago

Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies. James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

James Scott  Famous Quote

added 3 years ago

The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

James Scott  Famous Quote

added 3 years ago

The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!

James Scott, Senior Fellow, Institute for Critical Infrastructure Technology  Famous Quote

added 3 years ago

Many members of Isis are not sophisticated attackers. The majority of members do not have a technical background. The UCC is predominately capable of hacking soft targets, such as Twitter accounts, and spreading propaganda or defacing websites

James Scott, Senior Fellow, Institute for Critical Infrastructure Technology  Famous Quote

added 3 years ago

We need you!

Help us build the largest authors community and quotes collection on the web!

Our awesome collection of

Promoted Quotes

»