The decentralized mind-set does not come naturally to companies or governments.
The haystack is the entire country.
Austin Berglas, head of cyber investigations at K2 Intelligence:
China is everywhere.
Hong Lei, Chinese Foreign Ministry:
Cyberattacks are anonymous, cross-border and hard to trace. If you keep using the words "maybe" or "perhaps" without making a thorough study, this is irresponsible and unscientific.
John Hultquist, the senior manager of online espionage threat intelligence at iSight:
We're in a new space here.
Collect all the information you can lay your hands on. In this era of big data, the more you have, the better you can find the things you should be looking for.
I can't begin to tell you the things I discovered while I was looking for something else.
Said I not that my senses were acute?
The government has decided to resume the metadata program on new legal footing, but it hasn't yet made a full accounting of its costs.
Justin Fishel, Pierre Thomas, Mike Levine, and Jack Date:
A DHS inspector general's review determined that despite spending $540 million for checked baggage screening equipment and another $11 million for training since a previous review in 2009, the TSA failed to make any noticeable improvements in that time.
On the whole, the safety architecture is a house of cards.
There are great benefits to connectedness, but we haven't wrapped our minds around the costs.
Only with hindsight can one look back and see that the smartest course may not have been the right one.