As we’ve already seen with exfiltrated voter registration databases and the endless methods of poisoning manufacturer updates, manipulating DRE and optical scan machines and bypassing air gap defense, the state election official’s illusion of security is being pummeled by the reality of cyberattack.
– James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Between the black box proprietary code, barebones computers we call voting machines and a mass of completely unqualified election officials, our election system is up for grabs to anybody with even a modest interest and some script kiddie capability. The cyber-kinetic attack surface here is wide open.
– James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Cyber hygiene has to be memetically pounded into the intellectual DNA of the American population and continuously reinforced by peer pressure.
– James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
It was refreshing to see the cybersecurity communities pushback when the DNC attempted to introduce the cold war “It’s the Russians” mantra when fear mongers found that their completely unprotected networks were infiltrated by script kiddies.
– James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Look at the stealth and sophistication of foreign nation state APTs who break through even the most sophisticated layers of security daily and tell me why they would just give our completely unprotected election systems a pass
– James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Many members of Isis are not sophisticated attackers. The majority of members do not have a technical background. The UCC is predominately capable of hacking soft targets, such as Twitter accounts, and spreading propaganda or defacing websites
– James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The collaboration between secretaries of state, election officials and the voting system manufacturers on the matter of enforcing this black box proprietary code secrecy with election systems, is nothing less than the commoditization and monetization of American Democracy.
– James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!
– James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The security theater we are witnessing in our election system boasting the illusion of security via ‘clunky as heck’ and air gap defense will do nothing against the real and sophisticated adversarial landscape that is zeroing in on our democracy
– James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Quote of the Day Today's Quote | Archive
Would you like us to send you a FREE inspiring quote delivered to your inbox daily?
Citation
Use the citation below to add this author page to your bibliography:
Style:MLAChicagoAPA
"James Scott, Senior Fellow, Institute for Critical Infrastructure Technology Quotes." Quotes.net. STANDS4 LLC, 2024. Web. 24 Nov. 2024. <https://www.quotes.net/authors/James+Scott%2C+Senior+Fellow%2C+Institute+for+Critical+Infrastructure+Technology+Quotes>.
Share your thoughts on James Scott, Senior Fellow, Institute for Critical Infrastructure Technology's quotes with the community:
Report Comment
We're doing our best to make sure our content is useful, accurate and safe.
If by any chance you spot an inappropriate comment while navigating through our website please use this form to let us know, and we'll take care of it shortly.
Attachment
You need to be logged in to favorite.
Log In