SQCIC?
(Responsible Disclosure Procedure)
Note: All GOV.UK information displayed on these pages is publicly available.



The data on these pages is intended to be used during a ±2h conversation with General Sir Nick Carter.

°  A conversation explaining why the currently popular 'cyber security' methods are failing.
°  A conversation explaining how easy it is to protect infrastructures against 'hostile actors',
     without the need for: high-tech products, endless patches and updates, complex cumbersome frameworks and legal constructions.
     By simply using a self-evident safeguard structure as a solid foundation for those who create or maintain infrastructures.

Speakers  provide the required context and explanation.







Q: Why can't countries effectively defend their critical infrastructure and sensitive data against modern attacks?
A: Because there is a conflict of interests within the security services fundamental structure.

Q: Is it at all possible to keep
'hostile actors' at a safe distance?
A: Yes it is, providing leaders choose to respect common safeguard principles again.
     Principles, which have been used for centuries by military strategists. 

Q: Prominent
'security experts' state that "it is impossible to make it 100% secure",
      so it can only be an ongoing expensive battle, can't it?
A: That is an academic theory based statement.
      A statement which is blinding defence forces, and is merely lucrative for those who make profits from it
.
      A statement which becomes irrelevant when a safeguard structure is implemented,  ensuring that 100% of 'hostile actors'  can't get a foothold.
     

» Taking the U.K. as example, to show what is going on in the 'modern' world:

  1. General Carter's disposition
  2. The current state of affairs
  3. Why the the word 'Security' should not be used
  4. Ivory-Tower / Gov.UK paradoxical claims
     "Ivory Tower: noun: an attitude of aloofness from or disdain or disregard for worldly or practical affairs"
  5. A Catch-22 / Blind-Spot, as root cause for global 'cyber insecurity'
  6. [restricted information]
  7. Requirements for a solid safeguard structure, without getting in the way of needed functionality and flexibility


examples
A B C D E