The cyber industry is riddled with faux experts and self-proclaimed scholars, Tallinn Manual 2.0 is a perfect example of what happens when cyber-upstarts try to proclaim authority on a topic they know nothing about. James Scott More Quotes by James Scott More Quotes From James Scott In this digital age, we're experiencing the weaponization of everything. James Scott Man is a hostage to the cage of cultural programing and the mass hallucination of the propagandist’s narrative illusion. James Scott Man is to technology what the bee is to the flower. It’s man’s intervention that allows technology to expand and evolve itself and in return, technology offers man convenience, wealth and the lessening burden of physical labor via its automated systems. James Scott Manufacturing consent begins by weaponizing the meme and utilizing the censorship algorithms of Google, Facebook, Twitter and YouTube. James Scott Medical devices and EHR systems are notoriously vulnerable to remote compromise James Scott Meme Warfare 101: the meme hovers above the syntactical model that has limited man's evolution and expansiveness due to the restrictions of language. The meme introduces that which defies the restrictions of language and cuts to the psycho-emotional core of the individual. James Scott Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies. James Scott, Senior Fellow, Institute for Critical Infrastructure Technology James Scott Nietzsche said that All great things must first wear terrifying and monstrous masks in order to inscribe themselves on the hearts of humanity. Right now there is a renaissance, an awakening, we are breaking the narrative illusion, the mask, that eats away at the face. James Scott Political correctness is a loaded gun that the individual holds to their own head. Where laws can’t stomp on freedom of speech, automatons rule other automatons via political correctness and social acceptance. James Scott Ransomware is not only about weaponizing encryption, its more about bridging the fractures in the mind with a weaponized message that demands a response from the victim. James Scott Right and wrong isn’t a matter of ethics, rather it’s the geography in which you reside and whose control you’re under. Tallinn Manual 2.0 is based largely on western international humanitarian law. James Scott Senator Markey’s Cyber Shield Act can work! Start the conversations with the basics: Use a QR code that attaches to a dynamic database that runs an artificial intelligence algorithm to calculate the score. Let’s not make this more difficult than it is. James Scott Signature-based malware detection is dead. Machine learning based Artificial Intelligence is the most potent defense the next gen adversary and the mutating hash. James Scott The American renaissance begins with the unified revolutionary act of turning off and smashing the television, rejecting Hollywood on all fronts and refusing to intellectually ingest the toxic force feed of the establishment minority’s matrix narrative. James Scott The biggest center of attention needs to be the Secretaries of State. They're the ones that manage the elections. At the end of the day, they're the ones that need to be held accountable. James Scott The cyber hygienically apathetic c-suites running critical infrastructure organization are losing this war. This this is a cyber kinetic meta war and its hyper evolving in an already next gen space. James Scott The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery James Scott, Senior Fellow, Institute for Critical Infrastructure Technology James Scott The disturbingly techno-illiterate and cyber-hygienically lackadaisical and shockingly arrogant responses by the National Association of Secretaries of States when we at ICIT repeatedly showed them what their vulnerabilities were and exactly how elections could be compromised is a betrayal of trust to offer safe and legitimate elections. The technical vulnerabilities littering our election systems is only part of the problem. James Scott The Frankensteined architectonic IoT microcosm of the prototypical critical infrastructure organization renders an infinite attack surface just begging to be exploited. James Scott The health sector is in desperate need of a cyber hygiene injection James Scott