Critical Infrastructure Quotes

We've searched our database for all the quotes and captions related to Critical Infrastructure. Here they are! All 100 of them:

Fortifying the company involves assessing the vulnerabilities of critical infrastructure and implementing safeguards.
Hendrith Vanlon Smith Jr. (Board Room Blitz: Mastering the Art of Corporate Governance)
A robust cybersecurity framework is essential to protect a company's digital assets, sensitive data, and critical infrastructure.
Hendrith Vanlon Smith Jr. (Board Room Blitz: Mastering the Art of Corporate Governance)
In Venezuela Chavez has made the co-ops a top political priority, giving them first refusal on government contracts and offering them economic incentives to trade with one another. By 2006, there were roughly 100,000 co-operatives in the country, employing more than 700,000 workers. Many are pieces of state infrastructure – toll booths, highway maintenance, health clinics – handed over to the communities to run. It’s a reverse of the logic of government outsourcing – rather than auctioning off pieces of the state to large corporations and losing democratic control, the people who use the resources are given the power to manage them, creating, at least in theory, both jobs and more responsive public services. Chavez’s many critics have derided these initiatives as handouts and unfair subsidies, of course. Yet in an era when Halliburton treats the U.S. government as its personal ATM for six years, withdraws upward of $20 billion in Iraq contracts alone, refuses to hire local workers either on the Gulf coast or in Iraq, then expresses its gratitude to U.S. taxpayers by moving its corporate headquarters to Dubai (with all the attendant tax and legal benefits), Chavez’s direct subsidies to regular people look significantly less radical.
Naomi Klein
But withholding information about vulnerabilities in US systems so that they can be exploited in foreign ones creates a schism in the government that pits agencies that hoard and exploit zero days against those, like the Department of Homeland Security, that are supposed to help secure and protect US critical infrastructure and government systems.
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
Every conceivable layer of the election process is completely riddled with vulnerabilities, so yes, hacking elections is easy!
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In one of the meetings, Clapper said that he was worried that Russia might respond with cyberattacks against America’s critical infrastructure—and possibly shut down the electrical grid.
Michael Isikoff (Russian Roulette: The Inside Story of Putin's War on America and the Election of Donald Trump)
Man is to technology what the bee is to the flower. It’s man’s intervention that allows technology to expand and evolve itself and in return, technology offers man convenience, wealth and the lessening burden of physical labor via its automated systems.
James Scott, co-founder, Institute for Critical Infrastructure Technology
Your ideas are bound to forces of which you have no control due to the fact that you've voluntarily submitted your freedom of though to the perception steering censorship of Google, Facebook and other dragnet surveillance capitalists.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Cities require connectivity rather than territory in order to drive their economic stability and growth.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Consider all tabulation systems infected by bad actors until a third party, not affiliated with the manufacturer or election officials, proves they are secure.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
This next president is going to inherit the most sophisticated and persistent cyber espionage cultures the world has ever seen, He needs to surround himself with experts that can expedite the allocation of potent layers of next generation defenses around our targeted critical infrastructure silos.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
But somehow things took a sinister turn, and the division of labor came to be understood as the demarcation of a social hierarchy. Women kept busy with numerous domestic responsibilities while their male counterparts' sole duty was tending to the flocks. Men had time to think critically, form political infrastructures, and ultimately, network with other men. Meanwhile, women were kept too busy to notice that somewhere along the line, they had become inferior. This is approximately when shit hit the fan.
Julie Zeilinger (A Little F'd Up: Why Feminism Is Not a Dirty Word)
Ransomware is more about manipulating vulnerabilities in human psychology than the adversary's technological sophistication
James Scott
You think an Air Gap is a defense? Sofacy, Stuxnet, Uroburos, AirHopper, BitWhisperer and ProjectSauron…enough said!
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In this digital age, we're experiencing the weaponization of everything.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Hackers find more success with organizations where employees are under appreciated, over worked and under paid. Why would anyone in an organization like that care enough to think twice before clicking on a phishing email?
James Scott
The security theater we are witnessing in our election system boasting the illusion of security via ‘clunky as heck’ and air gap defense will do nothing against the real and sophisticated adversarial landscape that is zeroing in on our democracy
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Hacking a national election is simple. Exploit a vulnerability in the manufacturer's network, poison the tabulation software update with self-deleting malware and let the manufacturer send to their field reps and election consultants who update the election systems.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
We’re talking about the fate of our economy and the questionable resiliency of our Nation’s critical infrastructure. Why are experts so polite, patient, and forgiving when talking about cybersecurity and National Security? The drama of each script kiddie botnet attack and Nation State pilfering of our IP has been turned into a soap opera through press releases, sound bites and enforced absurdity of mainstream media. It’s time for a cybersecurity zeitgeist in the West where cyber hygiene is a meme that is aggressively distributed by those who have mastered it and encouraged to be imitated by those who have experienced it.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this?
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Wannacry is the Stuxnet of Ransomware
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
A vulnerability in an organization's IoT microcosm is a "taunt" to exploit by malicious hackers
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The biggest center of attention needs to be the Secretaries of State. They're the ones that manage the elections. At the end of the day, they're the ones that need to be held accountable.
James Scott, co-founder, Institute for Critical Infrastructure Technology
In amassing zero-day exploits for the government to use in attacks, instead of passing the information about holes to vendors to be fixed, the government has put critical-infrastructure owners and computer users in the United States at risk of attack from criminal hackers, corporate spies, and foreign intelligence agencies who no doubt will discover and use the same vulnerabilities for their own operations.
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
If you don’t feel ordained by the Universe to do this job, do something else. The intelligence community has to shut down the gaping wound that is the insider threat epidemic we are experiencing right now.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Look at the stealth and sophistication of foreign nation state APTs who break through even the most sophisticated layers of security daily and tell me why they would just give our completely unprotected election systems a pass
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Dragnet surveillance capitalists such as Facebook, Comcast, AT&T and Google, unfortunately, supply these manipulating forces with an endless supply of metadata for this information war against the American and European public.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The most terrifying thing about writing this book was how little I had to make up. Between actual historical power outages, government assessments of power grid vulnerabilities, and official estimates of the casualties that a long-term outage would generate, much of the book wrote itself. Having said that, things like the details of how attacks would best be carried out and specific locations of critical infrastructure have been purposely obscured or fictionalized.
Kyle Mills (Total Power (Mitch Rapp, #19))
You'll have the right to be angry about Vault 7 only after you boycott dragnet surveillance data providers like Google, Microsoft, Skype, Facebook and LinkedIn. The true threat is coming from the private sector surveillance profiteers.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
What do you mean “Should we worry about cyber adversaries getting into state voter registration databases?” They’re already in and selling exfiltrated voter registration data on the dark web! Next election cycle black hats will be selling ‘access as service’.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
I see the impossible work being done by of my friends at the federal agencies, the Pentagon, NATO, Five Eyes and the intelligence community. They are doing the impossible, for the ungrateful and with a fraction of the budgets required to render a viable defense.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The collaboration between secretaries of state, election officials and the voting system manufacturers on the matter of enforcing this black box proprietary code secrecy with election systems, is nothing less than the commoditization and monetization of American Democracy
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
My own choice of a single-variable measure for rapid and revealing comparisons of quality of life is infant mortality: the number of deaths during the first year of life that take place per 1,000 live births. Infant mortality is such a powerful indicator because low rates are impossible to achieve without having a combination of several critical conditions that define good quality of life—good healthcare in general, and appropriate prenatal, perinatal, and neonatal care in particular; proper maternal and infant nutrition; adequate and sanitary living conditions; and access to social support for disadvantaged families—and that are also predicated on relevant government and private spending, and on infrastructures and incomes that can maintain usage and access. A single variable thus captures a number of prerequisites for the near-universal survival of the most critical period of life: the first year.
Vaclav Smil (Numbers Don't Lie: 71 Things You Need to Know About the World)
Private sector networks in the United States, networks operated by civilian U.S. government agencies, and unclassified U.S. military and intelligence agency networks increasingly are experiencing cyber intrusions and attacks,” said a U.S.-China Economic and Security Review Commission report to Congress that was published the same month Conficker appeared. “. . . Networks connected to the Internet are vulnerable even if protected with hardware and software firewalls and other security mechanisms. The government, military, businesses and economic institutions, key infrastructure elements, and the population at large of the United States are completely dependent on the Internet. Internet-connected networks operate the national electric grid and distribution systems for fuel. Municipal water treatment and waste treatment facilities are controlled through such systems. Other critical networks include the air traffic control system, the system linking the nation’s financial institutions, and the payment systems for Social Security and other government assistance on which many individuals and the overall economy depend. A successful attack on these Internet-connected networks could paralyze the United States [emphasis added].
Mark Bowden (Worm: The First Digital World War)
Real cybersecurity means that your Security Operations team is consistently pen testing your network with the same stealth and sophistication as the Russian nation state, the same desperation as China’s 13th Five Year Plan, the same inexhaustible energy of the Cyber Caliphate and the same greed and ambition for monetary payoff as a seasoned cyber-criminal gang.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
You are a product to dragnet surveillance capitalists like Google, Facebook, Comcast and Verizon. Your ideas are rarely your own, rather you are little more than a pawn to their perception steering initiatives to get you to read, believe and buy what they put in front of you. The first step to breaking out of this faux reality matrix is to stop using Google, Bing, Yahoo, Comcast and Facebook.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The critical infrastructure of Indigenous worlds is, fundamentally, about responsibility and being a good relative. But our responsibilities do not happen only in the realm of political transformation. Caretaking, which we address in the introduction and in Part III, is the basis, too, for vibrant economies that must work fluidly with political structures to reinforce the world we seek to build beyond capitalism. We must thus have faith in our own forms of Indigenous political economy, the critical infrastructures that Huson speaks of so eloquently. We must rigorously study, theorize, enact, and experiment with these forms. While it covers ambitious terrain, The Red Deal at its base provides a program for study, theorization, action, and experimentation. But we must do the work. And the cold, hard truth is that we must not only be willing to do the work on a small scale whenever it suits us—in our own lives, in our families, or even in The Red Nation. We must be willing, as our fearless Wet’suwet’en relatives have done, to enforce these orders on a large scale. In conversation, our The Red Nation comrade Nick Estes stated, “I don’t want to just honor the treaties. I want to enforce them.” We can and should implement these programs in our own communities to alleviate suffering and protect what lands we are still able to caretake under colonial rule. To survive extinction, however, we must enforce Indigenous orders in and amongst those who have made it clear they will not stop their plunder until we are all dead. Settler and imperial nations, military superpowers, multinational corporations, and members of the ruling class are enemies of the Earth and the greatest danger to our future. How will we enforce Indigenous political, scientific, and economic orders to successfully prevent our mass ruin? This is the challenge we confront and pose in The Red Deal, and it is the challenge that all who take up The Red Deal must also confront.
The Red Nation (The Red Deal: Indigenous Action to Save Our Earth)
That’s to say, understanding Adrian’s reasons, respecting them, and admiring him. He had a better mind and a more rigorous temperament than me; he thought logically, and then acted on the conclusion of logical thought. Whereas most of us, I suspect, do the opposite: we make an instinctive decision, then build up an infrastructure of reasoning to justify it. And call the result common sense. Did I think Adrian’s action an implied criticism of the rest of us? No. Or at least, I’m sure he didn’t intend it as such.
Julian Barnes (The Sense of an Ending)
General Hamza, I am pleased that we have finally secured Jerusalem. General Malik, you bring up a major concern. Have we been able to get our laser defense systems operational yet?” “Yes, we have about 40% of them back online. The Americans were able to destroy ten of our sixteen ground-based sites with cruise missiles. The majority of our mobile defense systems are at the frontline, leaving us vulnerable. We have started to pull some of them to help protect our critical infrastructure. The Russians are helping by connecting their power transmission nodes into ours. As they are able to provide more electricity, we should have the rest of our laser batteries operational,” explained General Malik with an optimistic look on his face. “It was a smart move on the Americans’ part to destroy our power plants. Aside from shutting down our laser defense systems, it has plunged most of the Republic into the dark.” “Fortunately, we also have a lot of industrial grade generators and two Russian nuclear powered ships in port--they are providing a substantial amount of power,” said Admiral Mustafa.
James Rosone (Prelude to World War III: The Rise of the Islamic Republic and the Rebirth of America (World War III, #1))
Build, Build, Build has been the target of fake news, trolls, and critics. They have tried to redefine it far from its scope — and in their “proud, most credible voice” — report it as truth. Are they confused or just simply cunning? During the upcoming elections, many will try to discredit the accomplishments of 6.5 million construction workers. They will say that what we have completed is not enough, that there could have been many things that we could have done still, or that we never really worked at all. Allow me to say — if you are reading this, and you’re part of the Build, Build, Build team - without you, we wouldn’t have been able to build 29,264 kilometers of roads, 5,950 bridges, 11,340 flood control projects, 222 evacuation centers, 150,149 classrooms, 214 airport projects, and 451 seaport projects.
Anna Mae Yu Lamentillo (Night Owl: A Nationbuilder’s Manual)
Looking at a situation like the Israel-Palestine conflict, Americans are likely to react with puzzlement when they see ever more violent and provocative acts that target innocent civilians. We are tempted to ask: do the terrorists not realize that they will enrage the Israelis, and drive them to new acts of repression? The answer of course is that they know this very well, and this is exactly what they want. From our normal point of view, this seems incomprehensible. If we are doing something wrong, we do not want to invite the police to come in and try and stop us, especially if repression will result in the deaths or imprisonment of many of our followers. In a terrorist war, however, repression is often valuable because it escalates the growing war, and forces people to choose between the government and the terrorists. The terror/repression cycle makes it virtually impossible for anyone to remain a moderate. By increasing polarization within a society, terrorism makes the continuation of the existing order impossible. Once again, let us take the suicide bombing example. After each new incident, Israeli authorities tightened restrictions on Palestinian communities, arrested new suspects, and undertook retaliatory strikes. As the crisis escalated, they occupied or reoccupied Palestinian cities, destroying Palestinian infrastructure. The result, naturally, was massive Palestinian hostility and anger, which made further attacks more likely in the future. The violence made it more difficult for moderate leaders on both sides to negotiate. In the long term, the continuing confrontation makes it more likely that ever more extreme leaders will be chosen on each side, pledged not to negotiate with the enemy. The process of polarization is all the more probably when terrorists deliberately choose targets that they know will cause outrage and revulsion, such as attacks on cherished national symbols, on civilians, and even children. We can also think of this in individual terms. Imagine an ordinary Palestinian Arab who has little interest in politics and who disapproves of terrorist violence. However, after a suicide bombing, he finds that he is subject to all kinds of official repression, as the police and army hold him for long periods at security checkpoints, search his home for weapons, and perhaps arrest or interrogate him as a possible suspect. That process has the effect of making him see himself in more nationalistic (or Islamic) terms, stirs his hostility to the Israeli regime, and gives him a new sympathy for the militant or terrorist cause. The Israeli response to terrorism is also valuable for the terrorists in global publicity terms, since the international media attack Israel for its repression of civilians. Hamas military commander Salah Sh’hadeh, quoted earlier, was killed in an Israeli raid on Gaza in 2002, an act which by any normal standards of warfare would represent a major Israeli victory. In this case though, the killing provoked ferocious criticism of Israel by the U.S. and western Europe, and made Israel’s diplomatic situation much more difficult. In short, a terrorist attack itself may or may not attract widespread publicity, but the official response to it very likely will. In saying this, I am not suggesting that governments should not respond to terrorism, or that retaliation is in any sense morally comparable to the original attacks. Many historical examples show that terrorism can be uprooted and defeated, and military action is often an essential part of the official response. But terrorism operates on a logic quite different from that of most conventional politics and law enforcement, and concepts like defeat and victory must be understood quite differently from in a regular war.
Philip Jenkins (Images of Terror: What We Can and Can't Know about Terrorism (Social Problems and Social Issues))
Of course, culture is an oppressive structure. It’s always been that way. It’s a fundamental, universal existential reality. The tyrannical king is a symbolic truth; an archetypal constant. What we inherit from the past is willfully blind, and out of date. It’s a ghost, a machine, and a monster. It must be rescued, repaired and kept at bay by the attention and effort of the living. It crushes, as it hammers us into socially acceptable shape, and it wastes great potential. But it offers great gain, too. Every word we speak is a gift from our ancestors. Every thought we think was thought previously by someone smarter. The highly functional infrastructure that surrounds us, particularly in the West, is a gift from our ancestors: the comparatively uncorrupt political and economic systems, the technology, the wealth, the lifespan, the freedom, the luxury, and the opportunity. Culture takes with one hand, but in some fortunate places it gives more with the other. To think about culture only as oppressive is ignorant and ungrateful, as well as dangerous. This is not to say (as I am hoping the content of this book has made abundantly clear, so far) that culture should not be subject to criticism.
Jordan B. Peterson
Bitcoin was in theory and in practice inseparable from the process of computation run on cheap, powerful hardware: the system could not have existed without markets for digital moving images; especially video games, driving down the price of microchips that could handle the onerous business of guessing. It also had a voracious appetite for electricity, which had to come from somewhere - burning coal or natural gas, spinning turbines, decaying uranium - and which wasn't being used for something arguably more constructive than this discovery of meaningless hashes. The whole apparatus of the early twenty-first century's most complex and refined infrastructures and technologies was turned to the conquest of the useless. It resembled John Maynard Keynes's satirical response to criticisms of his capital injection proposal by proponents of the gold standard: just put banknotes in bottles, he suggested, and bury them in disused coal mines for people to dig up - a useless task to slow the dispersal of the new money and get people to work for it. 'It would, indeed, be more sensible to build houses and the like; but if there are political and practical difficulties in the way of this, the above would be better than nothing.
Finn Brunton (Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency)
Civil Aviation Authoritues are the custodians of the National Air Transport Critical Infrastructure in their respective countries, They are therefore duty bound towards having a Critical Infrastructure Resilience Strategy geared towards the continued operation of air transport in the face of all hazards. As a mandatory, CAA's are duty bound therefore to ensure their charge achieves the continued provision of essential services (provided by the critical infrastructure in their charge) to businesses, governments and the stakeholding community within the aviation industry, as well as to other critical infrastructure sectors.
Taib Ahmed ICAO AVSEC PM
A company’s revenue engine is a critical success factor. I had seen from my own direct experience how easy it was to get caught in silos: marketing people would just think of marketing, salespeople would just think of sales, and accounting wouldn’t think of itself as part of the revenue engine at all. Furthermore, product and the revenue engine were too often thought of completely independent of each other. The need for a more integrated approach was on my mind from the beginning. The revenue engine is a whole system. It encompasses a diverse set of integrated components, each doing its part to advance the system’s purpose. The engine is not just comprised of marketing and sales— it includes product, accounting, and the underlying technology and data infrastructure required to keep everything flowing. It involves people, tools, workflow, and metrics. Its purpose is to optimize reach, conversion, and expansion of customer spend. I call my revenue engine model “the bowtie schema.” It was the product of continuous iteration. As I interacted with marketing and sales practitioners and waded through the research, the model slowly emerged. The final model conveys not just the product and customer journey across the bowtie, but also the foundational layers that support that journey-- the interaction between people tools, workflow, and metrics that make it all happen. The most basic question a CEO must answer is whether the product has achieved a value breakthrough. Without that, the revenue engine is irrelevant. Once product-market fit is confirmed, the next step is to clearly identify your ideal customer profile (ICP) and your business model. This includes the lifetime value (LTV) profile of your company. Assuming a strong product, a clear ICP, and a solid understanding of the constraints composed by your unit economics, the path forward is clear. Then, the focus will turn to uplifting the maturity of your revenue engine and scaling it efficiently.
Tom Mohr
Yet “unhackable” is clearly what we need future AI systems to be before we put them in charge of, say, critical infrastructure or weapons systems, so the growing role of AI in society keeps raising the stakes for computer security.
Max Tegmark (Life 3.0: Being Human in the Age of Artificial Intelligence)
Virtually all of our civilian critical infrastructure—including telecommunications, water, sanitation, transportation, and healthcare—depends on the electric grid. The grid is extremely vulnerable to disruption by a cyber- or other attack. Our adversaries already have the capability to carry out such an attack. The consequences of a large-scale attack on the U.S. grid would be catastrophic for our national security and economy.” It went on to say: “Under current conditions, timely reconstitution of the grid following a carefully targeted attack if particular equipment is destroyed would be impossible; and according to government experts, would result in widespread outages for at least months to two years or more, depending on the nature of the attack.
Ted Koppel (Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath)
In humanity's relentless drive for convenience and economic growth, we have developed a dangerous level of dependency on networked systems in a very short space of time: in less than two decades, huge parts of the so-called 'critical national infrastructure' (CNI in geekish) in most countries have come under the control of ever more complex computer systems.
Misha Glenny (DarkMarket: Cyberthieves, Cybercops and You)
When flimsy cyber defense fails, Format Preserving Encryption prevails
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
A CISO's job is to streamline, harmonize and propagate cybersecurity and cyber hygiene throughout the organizational IoT microcosm and staff
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Medical devices and EHR systems are notoriously vulnerable to remote compromise
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
HCCIC by the C suite at HHS is a profound statement of having the moral courage to do what's right for the health sector
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The health sector is in desperate need of a cyber hygiene injection
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Russia, China, and Iran, among others, continue on an almost daily basis to demonstrate a range of cyber capabilities in espionage, denial-of-service attacks, and the planting of digital time bombs, capable of inflicting widespread damage on a U.S. power grid or other piece of critical infrastructure.
Ted Koppel (Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath)
We’ve gone from a planet ruled by natural geography to political geography to kinetically functional geography to a cyber geography that is ruled by ideological variation rather than politically constructed boarders.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The way to stifle China’s growth is to inhibit the flow of their connectivity. In order to slow down Chinese expansion, we need to cripple their cyber-kinetic-political connectivity. Indirect polarization, in all forms, must be at the forefront of the agenda when conducting influence operations on all things China.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Labor automation, machine learning and artificial intelligence will have a devastating impact on the already struggling Chinese economy.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
North Korea gets a high score for both “defense” and “lack of dependence.” North Korea can sever its limited connection to cyberspace even more easily and effectively than China can. Moreover, North Korea has so few systems dependent upon cyberspace that a major cyber war attack on North Korea would cause almost no damage. Remember that cyber dependence is not about the percentage of homes with broadband or the per capita number of smart phones; it’s about the extent to which critical infrastructures (electric power, rails, pipelines, supply chains) are dependent upon networked systems and have no real backup.
Richard A. Clarke (Cyberwar: The Next Threat to National Security & What to Do About It)
I don’t care how secure you think your organization is, I’ll social engineer my way inside in less than 24 hours regardless of the sophistication of your IoT microcosm security. Whatever obstacles I run into exploiting your technical vulnerabilities will be made up for by exploiting the vulnerabilities in the cyber hygiene of your staff.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Given the historical importance and exponential power ascribed to Convergence technologies, a comprehensive vision is required that describes how these technologies will be best aligned with our core human values and what the implications will be if they are not. Piecemeal descriptions and industry-centric narratives do not provide the holistic vantage point from which we must consider how best to make the critically important decisions regarding matters of privacy, security, interoperability, and trust in an age where powerful computing will literally surround us. If we fail to make the right societal decisions now, as we are laying the digital infrastructure for the 21st century, a dystopic “Black Mirror” version of our future could become our everyday reality. A technological “lock-in” could occur, where dysfunctional and/or proprietary technologies become permanently embedded into the infrastructure of our global systems leaving us powerless to alter the course of their direction or ferocity of their speed. A Web 3.0 that continues its march toward centralized power and siloed platforms would not only have crippling effects on innovation, it would have chilling effects on our freedom of speech, freedom of thought, and basic human rights. This should be enough to compel us to take thoughtful but aggressive action to prevent such a lock-in from occurring at all costs. Thankfully, there is also a “white mirror” version of Web 3.0, a positive future not well described in our sci-fi stories. It’s the one where we intentionally and consciously harness the power of the Convergence and align it with our collective goals, values, and greatest ambitions as a species. In the “white mirror” version, we have the opportunity to use these technologies to assist us in working together more effectively to improve our ecologies, economies, and governance models, and leave the world better than the one we entered.
Gabriel Rene (The Spatial Web: How Web 3.0 Will Connect Humans, Machines, and AI to Transform the World)
As cities expand and more vehicles take to the roads, the infrastructure struggles to keep pace, resulting in congestion, compromised safety, and an increased risk of accidents. The need for a holistic approach that encompasses infrastructure development, public awareness campaigns, and stringent law enforcement becomes evident in addressing this critical issue.
Shivanshu K. Srivastava
3. “Back in 2016, no one knew what Build, Build, Build meant or what it stood for. Critics had very little expectation of the team. They wagered against our success, not knowing that when they did, they gambled against the future of their country. They were certain that the infrastructure projects would never materialize — that blueprints would remain as drawings. They didn’t expect 6.5 million Filipinos to stand and work behind it. “ - Anna Mae Yu Lamentillo , Night Owl: A Nationbuilder’s Manual 2nd Edition (p. 142, Build, Build, Build Projects CAR Region)
Anna Mae Yu Lamentillo
The Russian president’s nuclear bunker, like Site R, presently has electricity, internet, and hardwired telephone service. Underground bunkers are built for redundancy, their critical infrastructure components—including air, heat, and water—duplicated for resilience in emergencies and crises. Multiple high-capacity fiber-optic lines provide uninterrupted communications systems. The backup generators have backup generators.
Annie Jacobsen (Nuclear War: A Scenario)
physical sharing and exchange of computer tapes and disks on which the code was recorded. In current Internet days, rapid technological advances in computer hardware and software and networking technologies have made it much easier to create and sustain a communal development style on ever-larger scales. Also, implementing new projects is becoming progressively easier as effective project design becomes better understood, and as prepackaged infrastructural support for such projects becomes available on the Web. Today, an open source software development project is typically initiated by an individual or a small group seeking a solution to an individual's or a firm's need. Raymond (1999, p. 32) suggests that "every good work of software starts by scratching a developer's personal itch" and that "too often software developers spend their days grinding away for pay at programs they neither need nor love. But not in the (open source) world...." A project's initiators also generally become the project's "owners" or "maintainers" who take on responsibility for project management." Early on, this individual or group generally develops a first, rough version of the code that outlines the functionality envisioned. The source code for this initial version is then made freely available to all via downloading from an Internet website established by the project. The project founders also set up infrastructure for the project that those interested in using or further developing the code can use to seek help, provide information or provide new open source code for others to discuss and test. In the case of projects that are successful in attracting interest, others do download and use and "play with" the code-and some of these do go on to create new and modified code. Most then post what they have done on the project website for use and critique by any who are interested. New and modified code that is deemed to be of sufficient quality and of general interest by the project maintainers is then added to the authorized version of the code. In many projects the privilege of adding to the authorized code is restricted to only a few trusted developers. These few then serve as gatekeepers for code written by contributors who do not have such access (von Krogh and Spaeth 2002). Critical tools and infrastructure available to open source software project participants includes email lists for specialized purposes that are open to all. Thus, there is a list where code users can report software failures ("bugs") that they encounter during field use of the software. There is also a list where those developing the code can share ideas about what would be good next steps for the project, good features to add, etc. All of these lists are open to all and are also publicly archived,
Eric von Hippel (Democratizing Innovation)
Survivability is a personal responsibility.
U.S. Government (Military Planning for a Catastrophic Critical Infrastructure Event - In the Dark, Terminal Blackout: Electric Infrastructure Vulnerabilities and Civil-Military Resiliency, EMP)
is clear that neither countries nor regions can flourish if their cities (innovation ecosystems) are not being continually nourished. Cities have been the engines of economic growth, prosperity and social progress throughout history, and will be essential to the future competitiveness of nations and regions. Today, more than half of the world’s population lives in urban areas, ranging from mid-size cities to megacities, and the number of city dwellers worldwide keeps rising. Many factors that affect the competitiveness of countries and regions – from innovation and education to infrastructure and public administration – are under the purview of cities. The speed and breadth by which cities absorb and deploy technology, supported by agile policy frameworks, will determine their ability to compete in attracting talent. Possessing a superfast broadband, putting into place digital technologies in transportation, energy consumption, waste recycling and so on help make a city more efficient and liveable, and therefore more attractive than others. It is therefore critical that cities and countries around the world focus on ensuring access to and use of the information and communication technologies on which much of the fourth industrial revolution depends. Unfortunately, as the World Economic Forum’s Global Information Technology Report 2015 points out, ICT infrastructures are neither as prevalent nor diffusing as fast as many people believe. “Half of the world’s population does not have mobile phones and 450 million people still live out of reach of a mobile signal. Some 90% of the population of low-income countries and over 60% globally are not online yet. Finally, most mobile phones are of an older generation.”45
Klaus Schwab (The Fourth Industrial Revolution)
Interest rates are critical for information-theory economic analysis because they are an index of real economic conditions. If the government manipulates them, they will issue false signals, breeding confusion that undermines entrepreneurial activity. For example, if the government keeps interest rates artificially low for institutions that finance it—as it has been doing in the United States—the channel is seriously distorted. The interest rates are noise rather than signal. Interest rates near zero cause finance to hypertrophy as privileged borrowers reinvest government funds in government securities. Only a small portion of these funds goes to useful “infrastructure,” while the rest is burned off in consumption beyond our means.
George Gilder (Knowledge and Power: The Information Theory of Capitalism and How it is Revolutionizing our World)
So we have a critical segregation between the designer, who will focus on processes, interactions, people and customers, and the architect, who will focus on building materials, infrastructures, networks and technologies.
Chris Skinner (Digital Bank: Strategies to launch or become a digital bank)
The complex systems that produce and deliver energy are among the most critical of all the “critical infrastructures,” and that makes their digital controls tempting targets for cyberattacks.
Daniel Yergin (The Quest: Energy, Security, and the Remaking of the Modern World)
On August 18, 1590, a privateering expedition on its way back to England from the Caribbean stopped off at Roanoke Island. John White, the governor of the colony and passionate advocate of the new world, took his men ashore. They found the settlement completely deserted. Infrastructure had been dismantled, no trace existed of the hundred-and-eight residents, and they couldn’t find any signs of struggle. The colonists were never found.
Darren Wearmouth (Critical Dawn (Critical, #1))
In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
There's a compounding and unraveling chaos that is perpetually in motion in the Dark Web's toxic underbelly.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Overall, Cyber Shield Act is an excellent idea and could facilitate a much-needed cultural shift in secure device manufacturing and upkeep." James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Senator Markey’s Cyber Shield Act can work! Start the conversations with the basics: Use a QR code that attaches to a dynamic database that runs an artificial intelligence algorithm to calculate the score. Let’s not make this more difficult than it is.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Managed IT services from Mission Critical Systems is a way to effectively maintain your data and infrastructure so that you can focus on the aspects of your business you need to help the company grow. Find out more about the suite of managed IT services we offer by visiting us on our IT Services Colorado website or calling us.
Mission Critical Systems
Many members of Isis are not sophisticated attackers. The majority of members do not have a technical background. The UCC is predominately capable of hacking soft targets, such as Twitter accounts, and spreading propaganda or defacing websites
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
As we’ve already seen with exfiltrated voter registration databases and the endless methods of poisoning manufacturer updates, manipulating DRE and optical scan machines and bypassing air gap defense, the state election official’s illusion of security is being pummeled by the reality of cyberattack.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Between the black box proprietary code, barebones computers we call voting machines and a mass of completely unqualified election officials, our election system is up for grabs to anybody with even a modest interest and some script kiddie capability. The cyber-kinetic attack surface here is wide open.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
We are finally no longer critically relevant to the world economy. The rest of the globe is strong enough to decouple from us. We, our country, our city, our infrastructure, are in a state of freefall.
Gary Shteyngart (Super Sad True Love Story)
Focus only on the critical requirements. Many startup companies get distracted by the trappings of a new business. Focus only on those aspects of the business that are critical to delivering your product to the customer. Too often, businesses over-invest in buildings, infrastructure, and networks “in advance” of business materializing—really
Chris LoPresti (INSIGHTS: Reflections From 101 of Yale's Most Successful Entrepreneurs)
It's time to wake up and smell the Mutating Hash! Signature Based Malware Detection is Dead
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Few critical infrastructures need to expedite their cyber resiliency as desperately as the health sector, who repeatedly demonstrates lackadaisical cyber hygiene, finagled and Frankensteined networks, virtually unanimous absence of security operations teams and good ol’ boys club bureaucratic board members flexing little more than smoke and mirror, cyber security theatrics as their organizational defense.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Why all this fear and paranoia around Vault 7 and WikiLeaks? Solve the problem by demanding regulation that centers around Security by Design by technology manufactures, problem solved
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Cyber hygiene, patching vulnerabilities, security by design, threat hunting and machine learning based artificial intelligence are mandatory prerequisites for cyber defense against the next generation threat landscape.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
the fact that his businesses were built on copyright theft (Napster) and deep consumer surveillance (Facebook) leads us to question what exactly these attention harvesting industries create and whether they’re aiding the larger culture or destroying it. Disruption of critical cultural infrastructure is only worthy if the replacement is more beneficial to the society at large than the original institution was.
Jonathan Taplin (Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy)
The human condition is plagued with a labyrinth of shortcomings, frailties and limitations that hinder man from reaching his fullest potential. Therefore, it only makes sense that we find ourselves at the next phase in human evolution where restricted man merges with the infinite possibilities of hyper-evolving technologies. This techno-human transmutation will prove to be ‘the’ quantum leap in human progression. The harmonization of technologically extending oneself, consciousness, artificial intelligence and machine learning will reverse the failures of genetic predisposition and limitation.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
It was refreshing to see the cybersecurity communities pushback when the DNC attempted to introduce the cold war “It’s the Russians” mantra when fear mongers found that their completely unprotected networks were infiltrated by script kiddies.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Stuxnet is perhaps the most infamous of APTs, but it has cousins such as Flame and Duqu, along with many others yet to be discovered. Worse, now that Stuxnet, a tool developed to attack industrial control systems and take power grids off-line, is out in the wild and available for download, it has been extensively studied by Crime, Inc., which is rapidly emulating its techniques and computer code to build vastly more sophisticated attacks. The deep challenge society faces from the growth of the malware-industrial complex is that once these offensive tools are used, they have a tendency to leak into the open. The result has been the proliferation of open-source cyber weapons now widely available on the digital underground for anybody to redesign and arm as he or she sees fit. How long will it be before somebody picks up one of these digital Molotov cocktails and lobs it back at us with the intent of attacking our own critical infrastructure systems? Sadly, preparations may already be under way.
Marc Goodman (Future Crimes)
money was stolen.” The fishmonger’s complaint highlights the role that international loans and subsidies often play, in Tunisia as elsewhere, in actively feeding kleptocracy. Moroccans complain about an unnecessary high-speed rail line linking their capital to the commercial hub, Casablanca. Their criticisms, like that of the fishmonger, illustrate that it is not just humanitarian aid in crisis or postconflict environments that gets captured as a “rent” by kleptocratic networks. Infrastructure grants—or worse, loans—supposedly provided after unhurried deliberation, serve the same purpose in acutely corrupt countries.
Sarah Chayes (Thieves of State: Why Corruption Threatens Global Security)
Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies. James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
If developed and implemented meaningfully, Cyber Shield Act could be a catalyst to incite responsible cybersecurity adoption and implementation throughout multiple manufacturing sectors." James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery" James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The gaping wound in America’s national security is without a doubt, the unregulated dragnet surveillance capitalists.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The cyber hygienically apathetic c-suites running critical infrastructure organization are losing this war. This this is a cyber kinetic meta war and its hyper evolving in an already next gen space.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology