Critical Infrastructure Quotes

We've searched our database for all the quotes and captions related to Critical Infrastructure. Here they are! All 100 of them:

In Venezuela Chavez has made the co-ops a top political priority, giving them first refusal on government contracts and offering them economic incentives to trade with one another. By 2006, there were roughly 100,000 co-operatives in the country, employing more than 700,000 workers. Many are pieces of state infrastructure – toll booths, highway maintenance, health clinics – handed over to the communities to run. It’s a reverse of the logic of government outsourcing – rather than auctioning off pieces of the state to large corporations and losing democratic control, the people who use the resources are given the power to manage them, creating, at least in theory, both jobs and more responsive public services. Chavez’s many critics have derided these initiatives as handouts and unfair subsidies, of course. Yet in an era when Halliburton treats the U.S. government as its personal ATM for six years, withdraws upward of $20 billion in Iraq contracts alone, refuses to hire local workers either on the Gulf coast or in Iraq, then expresses its gratitude to U.S. taxpayers by moving its corporate headquarters to Dubai (with all the attendant tax and legal benefits), Chavez’s direct subsidies to regular people look significantly less radical.
Naomi Klein
Every conceivable layer of the election process is completely riddled with vulnerabilities, so yes, hacking elections is easy!
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In one of the meetings, Clapper said that he was worried that Russia might respond with cyberattacks against America’s critical infrastructure—and possibly shut down the electrical grid.
Michael Isikoff (Russian Roulette: The Inside Story of Putin's War on America and the Election of Donald Trump)
Man is to technology what the bee is to the flower. It’s man’s intervention that allows technology to expand and evolve itself and in return, technology offers man convenience, wealth and the lessening burden of physical labor via its automated systems.
James Scott, co-founder, Institute for Critical Infrastructure Technology
But withholding information about vulnerabilities in US systems so that they can be exploited in foreign ones creates a schism in the government that pits agencies that hoard and exploit zero days against those, like the Department of Homeland Security, that are supposed to help secure and protect US critical infrastructure and government systems.
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
Your ideas are bound to forces of which you have no control due to the fact that you've voluntarily submitted your freedom of though to the perception steering censorship of Google, Facebook and other dragnet surveillance capitalists.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Consider all tabulation systems infected by bad actors until a third party, not affiliated with the manufacturer or election officials, proves they are secure.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Cities require connectivity rather than territory in order to drive their economic stability and growth.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
This next president is going to inherit the most sophisticated and persistent cyber espionage cultures the world has ever seen, He needs to surround himself with experts that can expedite the allocation of potent layers of next generation defenses around our targeted critical infrastructure silos.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
But somehow things took a sinister turn, and the division of labor came to be understood as the demarcation of a social hierarchy. Women kept busy with numerous domestic responsibilities while their male counterparts' sole duty was tending to the flocks. Men had time to think critically, form political infrastructures, and ultimately, network with other men. Meanwhile, women were kept too busy to notice that somewhere along the line, they had become inferior. This is approximately when shit hit the fan.
Julie Zeilinger (A Little F'd Up: Why Feminism Is Not a Dirty Word)
Ransomware is more about manipulating vulnerabilities in human psychology than the adversary's technological sophistication
James Scott
You think an Air Gap is a defense? Sofacy, Stuxnet, Uroburos, AirHopper, BitWhisperer and ProjectSauron…enough said!
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In this digital age, we're experiencing the weaponization of everything.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Hackers find more success with organizations where employees are under appreciated, over worked and under paid. Why would anyone in an organization like that care enough to think twice before clicking on a phishing email?
James Scott
The security theater we are witnessing in our election system boasting the illusion of security via ‘clunky as heck’ and air gap defense will do nothing against the real and sophisticated adversarial landscape that is zeroing in on our democracy
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Hacking a national election is simple. Exploit a vulnerability in the manufacturer's network, poison the tabulation software update with self-deleting malware and let the manufacturer send to their field reps and election consultants who update the election systems.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
We’re talking about the fate of our economy and the questionable resiliency of our Nation’s critical infrastructure. Why are experts so polite, patient, and forgiving when talking about cybersecurity and National Security? The drama of each script kiddie botnet attack and Nation State pilfering of our IP has been turned into a soap opera through press releases, sound bites and enforced absurdity of mainstream media. It’s time for a cybersecurity zeitgeist in the West where cyber hygiene is a meme that is aggressively distributed by those who have mastered it and encouraged to be imitated by those who have experienced it.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this?
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Wannacry is the Stuxnet of Ransomware
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
A vulnerability in an organization's IoT microcosm is a "taunt" to exploit by malicious hackers
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The biggest center of attention needs to be the Secretaries of State. They're the ones that manage the elections. At the end of the day, they're the ones that need to be held accountable.
James Scott, co-founder, Institute for Critical Infrastructure Technology
If you don’t feel ordained by the Universe to do this job, do something else. The intelligence community has to shut down the gaping wound that is the insider threat epidemic we are experiencing right now.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Look at the stealth and sophistication of foreign nation state APTs who break through even the most sophisticated layers of security daily and tell me why they would just give our completely unprotected election systems a pass
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Dragnet surveillance capitalists such as Facebook, Comcast, AT&T and Google, unfortunately, supply these manipulating forces with an endless supply of metadata for this information war against the American and European public.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
You'll have the right to be angry about Vault 7 only after you boycott dragnet surveillance data providers like Google, Microsoft, Skype, Facebook and LinkedIn. The true threat is coming from the private sector surveillance profiteers.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
What do you mean “Should we worry about cyber adversaries getting into state voter registration databases?” They’re already in and selling exfiltrated voter registration data on the dark web! Next election cycle black hats will be selling ‘access as service’.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
I see the impossible work being done by of my friends at the federal agencies, the Pentagon, NATO, Five Eyes and the intelligence community. They are doing the impossible, for the ungrateful and with a fraction of the budgets required to render a viable defense.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The collaboration between secretaries of state, election officials and the voting system manufacturers on the matter of enforcing this black box proprietary code secrecy with election systems, is nothing less than the commoditization and monetization of American Democracy
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
My own choice of a single-variable measure for rapid and revealing comparisons of quality of life is infant mortality: the number of deaths during the first year of life that take place per 1,000 live births. Infant mortality is such a powerful indicator because low rates are impossible to achieve without having a combination of several critical conditions that define good quality of life—good healthcare in general, and appropriate prenatal, perinatal, and neonatal care in particular; proper maternal and infant nutrition; adequate and sanitary living conditions; and access to social support for disadvantaged families—and that are also predicated on relevant government and private spending, and on infrastructures and incomes that can maintain usage and access. A single variable thus captures a number of prerequisites for the near-universal survival of the most critical period of life: the first year.
Vaclav Smil (Numbers Don't Lie: 71 Things You Need to Know About the World)
Private sector networks in the United States, networks operated by civilian U.S. government agencies, and unclassified U.S. military and intelligence agency networks increasingly are experiencing cyber intrusions and attacks,” said a U.S.-China Economic and Security Review Commission report to Congress that was published the same month Conficker appeared. “. . . Networks connected to the Internet are vulnerable even if protected with hardware and software firewalls and other security mechanisms. The government, military, businesses and economic institutions, key infrastructure elements, and the population at large of the United States are completely dependent on the Internet. Internet-connected networks operate the national electric grid and distribution systems for fuel. Municipal water treatment and waste treatment facilities are controlled through such systems. Other critical networks include the air traffic control system, the system linking the nation’s financial institutions, and the payment systems for Social Security and other government assistance on which many individuals and the overall economy depend. A successful attack on these Internet-connected networks could paralyze the United States [emphasis added].
Mark Bowden (Worm: The First Digital World War)
Real cybersecurity means that your Security Operations team is consistently pen testing your network with the same stealth and sophistication as the Russian nation state, the same desperation as China’s 13th Five Year Plan, the same inexhaustible energy of the Cyber Caliphate and the same greed and ambition for monetary payoff as a seasoned cyber-criminal gang.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
You are a product to dragnet surveillance capitalists like Google, Facebook, Comcast and Verizon. Your ideas are rarely your own, rather you are little more than a pawn to their perception steering initiatives to get you to read, believe and buy what they put in front of you. The first step to breaking out of this faux reality matrix is to stop using Google, Bing, Yahoo, Comcast and Facebook.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In amassing zero-day exploits for the government to use in attacks, instead of passing the information about holes to vendors to be fixed, the government has put critical-infrastructure owners and computer users in the United States at risk of attack from criminal hackers, corporate spies, and foreign intelligence agencies who no doubt will discover and use the same vulnerabilities for their own operations.
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
The critical infrastructure of Indigenous worlds is, fundamentally, about responsibility and being a good relative. But our responsibilities do not happen only in the realm of political transformation. Caretaking, which we address in the introduction and in Part III, is the basis, too, for vibrant economies that must work fluidly with political structures to reinforce the world we seek to build beyond capitalism. We must thus have faith in our own forms of Indigenous political economy, the critical infrastructures that Huson speaks of so eloquently. We must rigorously study, theorize, enact, and experiment with these forms. While it covers ambitious terrain, The Red Deal at its base provides a program for study, theorization, action, and experimentation. But we must do the work. And the cold, hard truth is that we must not only be willing to do the work on a small scale whenever it suits us—in our own lives, in our families, or even in The Red Nation. We must be willing, as our fearless Wet’suwet’en relatives have done, to enforce these orders on a large scale. In conversation, our The Red Nation comrade Nick Estes stated, “I don’t want to just honor the treaties. I want to enforce them.” We can and should implement these programs in our own communities to alleviate suffering and protect what lands we are still able to caretake under colonial rule. To survive extinction, however, we must enforce Indigenous orders in and amongst those who have made it clear they will not stop their plunder until we are all dead. Settler and imperial nations, military superpowers, multinational corporations, and members of the ruling class are enemies of the Earth and the greatest danger to our future. How will we enforce Indigenous political, scientific, and economic orders to successfully prevent our mass ruin? This is the challenge we confront and pose in The Red Deal, and it is the challenge that all who take up The Red Deal must also confront.
The Red Nation (The Red Deal: Indigenous Action to Save Our Earth)
That’s to say, understanding Adrian’s reasons, respecting them, and admiring him. He had a better mind and a more rigorous temperament than me; he thought logically, and then acted on the conclusion of logical thought. Whereas most of us, I suspect, do the opposite: we make an instinctive decision, then build up an infrastructure of reasoning to justify it. And call the result common sense. Did I think Adrian’s action an implied criticism of the rest of us? No. Or at least, I’m sure he didn’t intend it as such.
Julian Barnes (The Sense of an Ending)
Build, Build, Build has been the target of fake news, trolls, and critics. They have tried to redefine it far from its scope — and in their “proud, most credible voice” — report it as truth. Are they confused or just simply cunning? During the upcoming elections, many will try to discredit the accomplishments of 6.5 million construction workers. They will say that what we have completed is not enough, that there could have been many things that we could have done still, or that we never really worked at all. Allow me to say — if you are reading this, and you’re part of the Build, Build, Build team - without you, we wouldn’t have been able to build 29,264 kilometers of roads, 5,950 bridges, 11,340 flood control projects, 222 evacuation centers, 150,149 classrooms, 214 airport projects, and 451 seaport projects.
Anna Mae Yu Lamentillo (Night Owl: A Nationbuilder’s Manual)
Looking at a situation like the Israel-Palestine conflict, Americans are likely to react with puzzlement when they see ever more violent and provocative acts that target innocent civilians. We are tempted to ask: do the terrorists not realize that they will enrage the Israelis, and drive them to new acts of repression? The answer of course is that they know this very well, and this is exactly what they want. From our normal point of view, this seems incomprehensible. If we are doing something wrong, we do not want to invite the police to come in and try and stop us, especially if repression will result in the deaths or imprisonment of many of our followers. In a terrorist war, however, repression is often valuable because it escalates the growing war, and forces people to choose between the government and the terrorists. The terror/repression cycle makes it virtually impossible for anyone to remain a moderate. By increasing polarization within a society, terrorism makes the continuation of the existing order impossible. Once again, let us take the suicide bombing example. After each new incident, Israeli authorities tightened restrictions on Palestinian communities, arrested new suspects, and undertook retaliatory strikes. As the crisis escalated, they occupied or reoccupied Palestinian cities, destroying Palestinian infrastructure. The result, naturally, was massive Palestinian hostility and anger, which made further attacks more likely in the future. The violence made it more difficult for moderate leaders on both sides to negotiate. In the long term, the continuing confrontation makes it more likely that ever more extreme leaders will be chosen on each side, pledged not to negotiate with the enemy. The process of polarization is all the more probably when terrorists deliberately choose targets that they know will cause outrage and revulsion, such as attacks on cherished national symbols, on civilians, and even children. We can also think of this in individual terms. Imagine an ordinary Palestinian Arab who has little interest in politics and who disapproves of terrorist violence. However, after a suicide bombing, he finds that he is subject to all kinds of official repression, as the police and army hold him for long periods at security checkpoints, search his home for weapons, and perhaps arrest or interrogate him as a possible suspect. That process has the effect of making him see himself in more nationalistic (or Islamic) terms, stirs his hostility to the Israeli regime, and gives him a new sympathy for the militant or terrorist cause. The Israeli response to terrorism is also valuable for the terrorists in global publicity terms, since the international media attack Israel for its repression of civilians. Hamas military commander Salah Sh’hadeh, quoted earlier, was killed in an Israeli raid on Gaza in 2002, an act which by any normal standards of warfare would represent a major Israeli victory. In this case though, the killing provoked ferocious criticism of Israel by the U.S. and western Europe, and made Israel’s diplomatic situation much more difficult. In short, a terrorist attack itself may or may not attract widespread publicity, but the official response to it very likely will. In saying this, I am not suggesting that governments should not respond to terrorism, or that retaliation is in any sense morally comparable to the original attacks. Many historical examples show that terrorism can be uprooted and defeated, and military action is often an essential part of the official response. But terrorism operates on a logic quite different from that of most conventional politics and law enforcement, and concepts like defeat and victory must be understood quite differently from in a regular war.
Philip Jenkins (Images of Terror: What We Can and Can't Know about Terrorism (Social Problems and Social Issues))
Of course, culture is an oppressive structure. It’s always been that way. It’s a fundamental, universal existential reality. The tyrannical king is a symbolic truth; an archetypal constant. What we inherit from the past is willfully blind, and out of date. It’s a ghost, a machine, and a monster. It must be rescued, repaired and kept at bay by the attention and effort of the living. It crushes, as it hammers us into socially acceptable shape, and it wastes great potential. But it offers great gain, too. Every word we speak is a gift from our ancestors. Every thought we think was thought previously by someone smarter. The highly functional infrastructure that surrounds us, particularly in the West, is a gift from our ancestors: the comparatively uncorrupt political and economic systems, the technology, the wealth, the lifespan, the freedom, the luxury, and the opportunity. Culture takes with one hand, but in some fortunate places it gives more with the other. To think about culture only as oppressive is ignorant and ungrateful, as well as dangerous. This is not to say (as I am hoping the content of this book has made abundantly clear, so far) that culture should not be subject to criticism.
Jordan B. Peterson
Bitcoin was in theory and in practice inseparable from the process of computation run on cheap, powerful hardware: the system could not have existed without markets for digital moving images; especially video games, driving down the price of microchips that could handle the onerous business of guessing. It also had a voracious appetite for electricity, which had to come from somewhere - burning coal or natural gas, spinning turbines, decaying uranium - and which wasn't being used for something arguably more constructive than this discovery of meaningless hashes. The whole apparatus of the early twenty-first century's most complex and refined infrastructures and technologies was turned to the conquest of the useless. It resembled John Maynard Keynes's satirical response to criticisms of his capital injection proposal by proponents of the gold standard: just put banknotes in bottles, he suggested, and bury them in disused coal mines for people to dig up - a useless task to slow the dispersal of the new money and get people to work for it. 'It would, indeed, be more sensible to build houses and the like; but if there are political and practical difficulties in the way of this, the above would be better than nothing.
Finn Brunton (Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency)
Stuxnet is perhaps the most infamous of APTs, but it has cousins such as Flame and Duqu, along with many others yet to be discovered. Worse, now that Stuxnet, a tool developed to attack industrial control systems and take power grids off-line, is out in the wild and available for download, it has been extensively studied by Crime, Inc., which is rapidly emulating its techniques and computer code to build vastly more sophisticated attacks. The deep challenge society faces from the growth of the malware-industrial complex is that once these offensive tools are used, they have a tendency to leak into the open. The result has been the proliferation of open-source cyber weapons now widely available on the digital underground for anybody to redesign and arm as he or she sees fit. How long will it be before somebody picks up one of these digital Molotov cocktails and lobs it back at us with the intent of attacking our own critical infrastructure systems? Sadly, preparations may already be under way.
Marc Goodman (Future Crimes)
money was stolen.” The fishmonger’s complaint highlights the role that international loans and subsidies often play, in Tunisia as elsewhere, in actively feeding kleptocracy. Moroccans complain about an unnecessary high-speed rail line linking their capital to the commercial hub, Casablanca. Their criticisms, like that of the fishmonger, illustrate that it is not just humanitarian aid in crisis or postconflict environments that gets captured as a “rent” by kleptocratic networks. Infrastructure grants—or worse, loans—supposedly provided after unhurried deliberation, serve the same purpose in acutely corrupt countries.
Sarah Chayes (Thieves of State: Why Corruption Threatens Global Security)
physical sharing and exchange of computer tapes and disks on which the code was recorded. In current Internet days, rapid technological advances in computer hardware and software and networking technologies have made it much easier to create and sustain a communal development style on ever-larger scales. Also, implementing new projects is becoming progressively easier as effective project design becomes better understood, and as prepackaged infrastructural support for such projects becomes available on the Web. Today, an open source software development project is typically initiated by an individual or a small group seeking a solution to an individual's or a firm's need. Raymond (1999, p. 32) suggests that "every good work of software starts by scratching a developer's personal itch" and that "too often software developers spend their days grinding away for pay at programs they neither need nor love. But not in the (open source) world...." A project's initiators also generally become the project's "owners" or "maintainers" who take on responsibility for project management." Early on, this individual or group generally develops a first, rough version of the code that outlines the functionality envisioned. The source code for this initial version is then made freely available to all via downloading from an Internet website established by the project. The project founders also set up infrastructure for the project that those interested in using or further developing the code can use to seek help, provide information or provide new open source code for others to discuss and test. In the case of projects that are successful in attracting interest, others do download and use and "play with" the code-and some of these do go on to create new and modified code. Most then post what they have done on the project website for use and critique by any who are interested. New and modified code that is deemed to be of sufficient quality and of general interest by the project maintainers is then added to the authorized version of the code. In many projects the privilege of adding to the authorized code is restricted to only a few trusted developers. These few then serve as gatekeepers for code written by contributors who do not have such access (von Krogh and Spaeth 2002). Critical tools and infrastructure available to open source software project participants includes email lists for specialized purposes that are open to all. Thus, there is a list where code users can report software failures ("bugs") that they encounter during field use of the software. There is also a list where those developing the code can share ideas about what would be good next steps for the project, good features to add, etc. All of these lists are open to all and are also publicly archived,
Eric von Hippel (Democratizing Innovation)
The complex systems that produce and deliver energy are among the most critical of all the “critical infrastructures,” and that makes their digital controls tempting targets for cyberattacks.
Daniel Yergin (The Quest: Energy, Security, and the Remaking of the Modern World)
In humanity's relentless drive for convenience and economic growth, we have developed a dangerous level of dependency on networked systems in a very short space of time: in less than two decades, huge parts of the so-called 'critical national infrastructure' (CNI in geekish) in most countries have come under the control of ever more complex computer systems.
Misha Glenny (DarkMarket: Cyberthieves, Cybercops and You)
Virtually all of our civilian critical infrastructure—including telecommunications, water, sanitation, transportation, and healthcare—depends on the electric grid. The grid is extremely vulnerable to disruption by a cyber- or other attack. Our adversaries already have the capability to carry out such an attack. The consequences of a large-scale attack on the U.S. grid would be catastrophic for our national security and economy.” It went on to say: “Under current conditions, timely reconstitution of the grid following a carefully targeted attack if particular equipment is destroyed would be impossible; and according to government experts, would result in widespread outages for at least months to two years or more, depending on the nature of the attack.
Ted Koppel (Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath)
Survivability is a personal responsibility.
U.S. Government (Military Planning for a Catastrophic Critical Infrastructure Event - In the Dark, Terminal Blackout: Electric Infrastructure Vulnerabilities and Civil-Military Resiliency, EMP)
is clear that neither countries nor regions can flourish if their cities (innovation ecosystems) are not being continually nourished. Cities have been the engines of economic growth, prosperity and social progress throughout history, and will be essential to the future competitiveness of nations and regions. Today, more than half of the world’s population lives in urban areas, ranging from mid-size cities to megacities, and the number of city dwellers worldwide keeps rising. Many factors that affect the competitiveness of countries and regions – from innovation and education to infrastructure and public administration – are under the purview of cities. The speed and breadth by which cities absorb and deploy technology, supported by agile policy frameworks, will determine their ability to compete in attracting talent. Possessing a superfast broadband, putting into place digital technologies in transportation, energy consumption, waste recycling and so on help make a city more efficient and liveable, and therefore more attractive than others. It is therefore critical that cities and countries around the world focus on ensuring access to and use of the information and communication technologies on which much of the fourth industrial revolution depends. Unfortunately, as the World Economic Forum’s Global Information Technology Report 2015 points out, ICT infrastructures are neither as prevalent nor diffusing as fast as many people believe. “Half of the world’s population does not have mobile phones and 450 million people still live out of reach of a mobile signal. Some 90% of the population of low-income countries and over 60% globally are not online yet. Finally, most mobile phones are of an older generation.”45
Klaus Schwab (The Fourth Industrial Revolution)
Under the mantle of protecting critical infrastructure, the security state has rationalized a widespread surveillance program targeting opponents of destructive energy projects related to the tar sands or fracking and, to legitimize these practices, has also engaged in the construction of the anti-petroleum movement as a quasi-criminal identity…. We stress that these practices say much less (if anything) about the social realities of the groups under surveillance, while saying a great deal about the relationships of power and aspirations for control that animate the policing agencies who engage in” kind making.” As a construction that emerges from the critical infrastructure assemblage of the security state, the “anti-petroleum movement” illustrates how settler colonial agencies normalize extractive capitalism while demonizing its opponents.
Andrew Crosby (Policing Indigenous Movements: Dissent and the Security State)
The great divergence 1. Some questions arise from why we need to study economic history: 'why are some countries rich and others poor?'/ 'why did the Industrial Revolution happen in England rather than France' 2. time span of history 1500-1800: the mercantilist era. The leading European countries sought to increase their trade by acquring colonies and using tariffs and war to prevent other countries from trading with them. European manufacturing was promoted at the expense of the colonies, but economic development, as such, was not the objective 19th century: Western Europe and the USA made economic development a priority and tried to achieve it with a standard set of four policies: creation of a unified national market by eliminating internal tariffs and building transportation infrastructure; the erection of an external tariff to protect their industries from British competition; the chartering of banks to stablise the currency and finance industrial investment; the establishment of mass education to upgrade the labour force. --> the government play a critical role in promoting economic. and we can get to know that European countries had used the tarrif protection to thrive their economic before. also by boosting the transportation infrastructure and education section, along with the function of bank, economic can proliferate 20th century: the policies above proved less effective in countries that had not yet developed. most new technology is not cost-effective in low-wage countries, but it is what they need in order to catch up to the West. Most countries have adopted modern technology to some degree, but not rapidly enough to overtake the rich countries. the coutries that have closed the gap with West have done so with Big Push that has used planning and investment coordination to jump ahead. --> that can explain the Mattew Effect: as the rich will be richer, poor will get poorer.
Rober C.Allen
With explicitly delineated levels of service, the infrastructure providers can effectively externalize the difference in the cost it takes to provide service at a given level to clients. Exposing cost in this way motivates the clients to choose the level of service with the lowest cost that still meets their needs. For example, Google + can decide to put data critical to enforcing user privacy in a high-availability, globally consistent datastore (e.g., a globally replicated SQL-like system like Spanner [Cor12]), while putting optional data (data that isn’t critical, but that enhances the user experience) in a cheaper, less reliable, less fresh, and eventually consistent datastore (e.g., a NoSQL store with best-effort replication like Bigtable).
Betsy Beyer (Site Reliability Engineering: How Google Runs Production Systems)
Note that we can run multiple classes of services using identical hardware and software. We can provide vastly different service guarantees by adjusting a variety of service characteristics, such as the quantities of resources, the degree of redundancy, the geographical provisioning constraints, and, critically, the infrastructure software configuration.
Betsy Beyer (Site Reliability Engineering: How Google Runs Production Systems)
America was in decline. While the United States was distracted with its Mideast adventures and its myopic focus on terrorism, China was busy investing in long-term infrastructure and industry, grabbing up critical global resources—oil, metals, and rare earth among others.
Steve Martini (The Enemy Inside (Paul Madriani #13))
If the combination of mindless, profit-seeking algorithms, dedicated geopolitical adversaries, and corrupt US opportunists over the past few years has taught us anything, it is that serious applied thinking is a form of critical infrastructure. The best hackers are masters of applied thinking, and we cannot afford to ignore them.
Joseph Menn (Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World)
What we inherit from the past is willfully blind, and out of date. It’s a ghost, a machine, and a monster. It must be rescued, repaired and kept at bay by the attention and effort of the living. It crushes, as it hammers us into socially acceptable shape, and it wastes great potential. But it offers great gain, too. Every word we speak is a gift from our ancestors. Every thought we think was thought previously by someone smarter. The highly functional infrastructure that surrounds us, particularly in the West, is a gift from our ancestors: the comparatively uncorrupt political and economic systems, the technology, the wealth, the lifespan, the freedom, the luxury, and the opportunity. Culture takes with one hand, but in some fortunate places it gives more with the other. To think about culture only as oppressive is ignorant and ungrateful, as well as dangerous. This is not to say (as I am hoping the content of this book has made abundantly clear, so far) that culture should not be subject to criticism.
Jordan B. Peterson (12 Rules for Life: An Antidote to Chaos)
It is far too facile an explanation to pin this devotion solely on a personality cult around Trump. The conditions that first brought him to power and, later, led to a nearly complete Republican capitulation to his whims were set in motion by two religious and political transformations of the 1970s: the sprawling political and ideological infrastructure Paul Weyrich built in the wake of Watergate, and the proliferation of televangelism and its marriage to Republican politics. At this critical moment in American history, when the democratic experiment hangs in the balance, this totalizing political and religious culture, rooted in a white Christian nationalist political ideology, was tailor-made to go to the mat for Trump. For Trump’s white evangelical supporters, defending him became indistinguishable from defending white Christian America.
Sarah Posner (Unholy: How White Christian Nationalists Powered the Trump Presidency, and the Devastating Legacy They Left Behind)
the hackers had successfully penetrated multiple critical infrastructure targets
Andy Greenberg (Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers)
Managed IT services from Mission Critical Systems is a way to effectively maintain your data and infrastructure so that you can focus on the aspects of your business you need to help the company grow. Find out more about the suite of managed IT services we offer by visiting us on our IT Services Colorado website or calling us.
Mission Critical Systems
When flimsy cyber defense fails, Format Preserving Encryption prevails
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
It's time to wake up and smell the Mutating Hash! Signature Based Malware Detection is Dead
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Why all this fear and paranoia around Vault 7 and WikiLeaks? Solve the problem by demanding regulation that centers around Security by Design by technology manufactures, problem solved
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
We are finally no longer critically relevant to the world economy. The rest of the globe is strong enough to decouple from us. We, our country, our city, our infrastructure, are in a state of freefall.
Gary Shteyngart (Super Sad True Love Story)
Focus only on the critical requirements. Many startup companies get distracted by the trappings of a new business. Focus only on those aspects of the business that are critical to delivering your product to the customer. Too often, businesses over-invest in buildings, infrastructure, and networks “in advance” of business materializing—really
Chris LoPresti (INSIGHTS: Reflections From 101 of Yale's Most Successful Entrepreneurs)
We’ve gone from a planet ruled by natural geography to political geography to kinetically functional geography to a cyber geography that is ruled by ideological variation rather than politically constructed boarders.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The way to stifle China’s growth is to inhibit the flow of their connectivity. In order to slow down Chinese expansion, we need to cripple their cyber-kinetic-political connectivity. Indirect polarization, in all forms, must be at the forefront of the agenda when conducting influence operations on all things China.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Labor automation, machine learning and artificial intelligence will have a devastating impact on the already struggling Chinese economy.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The cyber hygienically apathetic c-suites running critical infrastructure organization are losing this war. This this is a cyber kinetic meta war and its hyper evolving in an already next gen space.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The gaping wound in America’s national security is without a doubt, the unregulated dragnet surveillance capitalists.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
I don’t care how secure you think your organization is, I’ll social engineer my way inside in less than 24 hours regardless of the sophistication of your IoT microcosm security. Whatever obstacles I run into exploiting your technical vulnerabilities will be made up for by exploiting the vulnerabilities in the cyber hygiene of your staff.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
For Nation States, and the adversaries within America's boarders (special interest groups, cyber caliphate, Muslim brotherhood, Antifa etc), metadata is "THE" silent weapon in this quiet information war.
James Scott, co-founder, Institute for Critical Infrastructure Technology
the fact that his businesses were built on copyright theft (Napster) and deep consumer surveillance (Facebook) leads us to question what exactly these attention harvesting industries create and whether they’re aiding the larger culture or destroying it. Disruption of critical cultural infrastructure is only worthy if the replacement is more beneficial to the society at large than the original institution was.
Jonathan Taplin (Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy)
The human condition is plagued with a labyrinth of shortcomings, frailties and limitations that hinder man from reaching his fullest potential. Therefore, it only makes sense that we find ourselves at the next phase in human evolution where restricted man merges with the infinite possibilities of hyper-evolving technologies. This techno-human transmutation will prove to be ‘the’ quantum leap in human progression. The harmonization of technologically extending oneself, consciousness, artificial intelligence and machine learning will reverse the failures of genetic predisposition and limitation.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Senator Markey’s Cyber Shield Act can work! Start the conversations with the basics: Use a QR code that attaches to a dynamic database that runs an artificial intelligence algorithm to calculate the score. Let’s not make this more difficult than it is.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Overall, Cyber Shield Act is an excellent idea and could facilitate a much-needed cultural shift in secure device manufacturing and upkeep." James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies. James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The two main problems with signature and heuristic based anti-virus is the mutating hash and the fact that you first need a victim in order to obtain the signature." James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
If developed and implemented meaningfully, Cyber Shield Act could be a catalyst to incite responsible cybersecurity adoption and implementation throughout multiple manufacturing sectors." James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery" James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Overall, Cyber Shield Act is an excellent idea and could facilitate a much-needed cultural shift in secure device manufacturing and upkeep.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Right and wrong isn’t a matter of ethics, rather it’s the geography in which you reside and whose control you’re under. Tallinn Manual 2.0 is based largely on western international humanitarian law.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
America is a reactionary society which makes us prone and vulnerable to Hegelian dialectic style manipulation. I’m more concerned about the adversaries within our boarders than I am our adversaries from abroad.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
We have the technical sophistication of Tinker Toy’s protecting the IoT microcosms of America’s health sector organizations.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Your organization’s illusion based security theater will lose to the reality of cyber-attack any day of the week.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Ransomware is not only about weaponizing encryption, its more about bridging the fractures in the mind with a weaponized message that demands a response from the victim.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Cyber hygiene has to memetically pounded into the intellectual DNA of the American population and continuously reinforced by peer pressure.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The cyber industry is riddled with faux experts and self-proclaimed scholars, Tallinn Manual 2.0 is a perfect example of what happens when cyber-upstarts try to proclaim authority on a topic they know nothing about.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Cybersecurity whitepaper authors have it all wrong! It’s about weaponizing the mind of the reader so that when they’re done reading the document, you’ve memetically drilled home actionable concepts that will expediently impact their cyber defense.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Ransomware is not only about weaponizing encryption, its more about bridging the fractures in the mind with a weaponized message that demands a response from the victim.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Russia, China, and Iran, among others, continue on an almost daily basis to demonstrate a range of cyber capabilities in espionage, denial-of-service attacks, and the planting of digital time bombs, capable of inflicting widespread damage on a U.S. power grid or other piece of critical infrastructure.
Ted Koppel (Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath)
If you don’t formulate your own narrative, you become a pawn in someone else’s.
James Scott, co-founder, Institute for Critical Infrastructure Technology
the United States shares the concern of some in Asia that the BRI could be a Trojan horse for China-led regional development, military expansion, and Beijing-controlled institutions’.132 And, it should be stressed, for the control of critical infrastructure. After 40 per cent of the Philippines’ national electricity network was sold to the giant state-owned State Grid Corporation of China, the head of the national transmission corporation conceded that the Philippines’ entire power supply could be shut down by the flick of a switch in Nanjing, the location of the monitoring and control system.133 State Grid also owns a large share of the electricity networks in the Australian states of Victoria and South Australia.134 Its bid for the New South Wales grid was rejected on national security grounds.
Clive Hamilton (Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World)
The most terrifying thing about writing this book was how little I had to make up. Between actual historical power outages, government assessments of power grid vulnerabilities, and official estimates of the casualties that a long-term outage would generate, much of the book wrote itself. Having said that, things like the details of how attacks would best be carried out and specific locations of critical infrastructure have been purposely obscured or fictionalized.
Kyle Mills (Total Power (Mitch Rapp, #19))
Far from setting the stage for more prosperity, the more these markets were opened, they predicted, the more unfavorable Africa's position was likely to become and the more damage would be done to African economies. For these critics, it was utopian footling to suggest that African farmers could soon match the rich world in financial resources, technology, or infrastructure, whether on the national level (roads, ports, bridges, ect.) or in the context of individual farms. Given these realities, a far likelier outcome was the further immiseration and marginalization of Africa's rural smallholders, while the most important enduring effect of trade liberalization was the creation of new markers for the agricultural producers of the Global North.
David Rieff (The Reproach of Hunger: Food, Justice, and Money in the Twenty-First Century)
Critics of the administration recently pointed out that over 180,000 families will be displaced in Metro Manila should the NLEX-SLEX Connector Road Project and the North-South Commuter Railway (NSCR) Project push through. This claim is fictitious, inaccurate, and misleading. For example, based on the census and tagging conducted by the National Housing Authority, the government agency mandated to relocate and resettle Informal Settler Families (ISFs) affected by the construction of national infrastructure projects, the estimated number of likely affected ISFs in the NLEX – SLEX Connector Road Project is only 1,700.
Anna Mae Yu Lamentillo , Night Owl: A Nationbuilder’s Manual
Critics have said it cannot be done and yet the output of 6.5 million workers involved in the Build, Build, Build program has proved them wrong. Another misconception was that most projects are only situated in Metro Manila or are operated under the modality of public private partnership. This is far from the truth. In fact, less than five percent of the Build, Build, Build projects charge toll or operate under a concession agreement.
Anna Mae Yu Lamentillo , Night Owl: A Nationbuilder’s Manual