2014: The year in quotes

Security breaches, letters to the FCC, Facebook's user-emotion study, Bitcoin travails contributed to quotes of the year

From rattled airline passengers who fear the coming of smartphones to jurors who don't know a smartphone from a tablet, here are some of the colorful quotes from IT news in 2014.

Give the audience a grin

"The founders of Snapchat last year turned down a $3 billion offer from Facebook and a $4 billion offer from Google. It was a surprising show of integrity from the guys who invented the app that lets you look at pictures of boobs for five seconds."

- Comedian Cecily Strong giving a rundown of "top tech stories" as she helped Marissa Mayer launch Yahoo News Digest at CES in January.

Be quiet! I order you to be quiet!

"What's going to happen when mobile communications above ten thousand feet is allowed, and John Smith receives a phone call mid-flight from his wife of 23 years, Jane Smith, announcing that she wants a divorce? What's going to occur when busy advertising executive Ellen Jones receives a phone call mid-flight from her incompetent assistant, who has managed to screw up the big account she should have landed for her agency? ... It may be rage, it may be hysteria, it might be a panic attack, or the other passengers could hit the trifecta from hell and have all three occur simultaneously."

- Stephanie D. Zonis of Branchburg, N.J., expressed her views to the U.S. Federal Communications Commission about a proposal to allow cellular service on airplanes.

"Short of having flight attendants who are already busy and overworked, how would one deal with folks -- like myself -- who have voices which are loud and project? I wouldn't want to come to me and ask me to lower my voice."

- Peter J. McKimmin, of San Diego, offers self-reflection in his comments to the FCC.

What is your quest?

"I knew I had found the keys to the kingdom."

- Computer engineer Reginaldo Silva, after finding a vulnerability in Facebook's software that brought him the largest bug bounty yet paid by the company. But it fell well short of the million-dollar payout he'd hoped for.

This new learning amazes me

"I'm kind of a dinosaur. I don't even know what an iPad is."

- A prospective juror in an Apple-Samsung patent infringement case confesses to his lack of gadget knowledge.

This terrible feeling of déjà vu

"I don't know if there's enough vision. Industry wide, the apathy regarding this recent problem is already setting in -- shiny things are happening elsewhere, people are forgetting."

- Theo de Raadt, founder of the OpenBSD project, on the waning enthusiasm for critical open-source projects in the aftermath of the Heartbleed flaw.

You can't expect to wield supreme executive power

"We cannot deny that our decision today will have an impact on the ability of law enforcement to combat crime. Cell phones have become important tools in facilitating coordination and communication among members of criminal enterprises, and can provide valuable incriminating information about dangerous criminals. Privacy comes at a cost."

- U.S. Supreme Court Chief Justice John Roberts writing for the majority in a ruling that warrants are needed for cellphone searches.

Always look on the bright side of life

"I can see the 10k Mtgox stole from me... hooray!"

- A Reddit user after the Mt. Gox site was reactivated so that users could see their balances following the company's February bankruptcy filing.

Oh, I'm terribly sorry

"I cannot apologize enough for what happened. While I believe I did everything I could do to prevent this from happening, it still happened. Right now, I'm trying to do my best to cooperate with the bankruptcy process and the ongoing investigation."

- Former Mt. Gox CEO Mark Karpeles in a November interview, apologizing for past mistakes and talking about how he was spending his time -- he likes to bake apple pies.

Some things in life are bad

"The company purposefully messed with people's minds" in a "secretive and non-consensual" study.

- From a complaint filed by the Electronic Privacy Information Center with the U.S. Federal Trade Commission over a study Facebook conducted to intentionally manipulate the emotions of nearly 700,000 users.

Run away! Run away!

"We found these weapons could violate the most basic human rights -- the right to life, the right to a remedy and the principle of dignity. These rights are the basis for all others."

- Human Rights Watch researcher and Harvard Law School lecturer Bonnie Docherty, in an email regarding an HRW report calling for a ban on fully autonomous weapons before it's too late, even though they don't yet exist.

I'm not dead yet

"If you'd asked me about Motorola a year ago, I would have said it was on a distinct trajectory towards oblivion."

- Ben Wood, director of research at CCS Insight, regarding Motorola Mobility's unexpected comeback.

You'll be stone dead in a moment

"I think for BlackBerry this might be the last straw."

- Carolina Milanesi, an analyst with Kantor Worldpanel, referring to the effect of the Apple-IBM deal on BlackBerry.

Nothing is sacred

"It isn't surprising [the intelligence organizations] were technically able to do this. ... That they attack people they have no reason to attack and then install malware on their systems to attack even more systems is really shocking and sickening to see. On that I think we can all agree."

-- Christian Grothoff, who co-wrote an article for the German online news site Heise, speaking in an interview about a British spy program.

Victory is mine!

"It is a frothy, hot market. I suspect if you participated in these projects and got code into it you'd be highly sought after by a large number of companies. There's just all upsides to participating in these projects, which is why you see so many people doing it."

- Jim Zemlin, executive director of The Linux Foundation, regarding advice from hiring managers that IT job seekers should contribute to open-source projects.

Cast into the Gorge of Eternal Peril

"Passwords are a complete waste of time. They are the equivalent of signing the back of a credit card."

- Mark Morrison, senior vice president and chief information security officer at financial service firm State Street Corporation, during a panel discussion on enterprise security.

We shall attack at once

"I don't think the FCC is serious about Title II. I think they're going through the motions of including it ... so they can tell the angry mob outside their gates that they considered this option."

- Berin Szoka, president of free-market think tank TechFreedom on the FCC reclassifying broadband as a regulated utility, which some net neutrality advocates have urged the agency to do.

And now for something completely different

"They explained that if men want to put a large phone into their jeans, it has to be able to fit their buttocks. This is a company ranked worldwide number 1, number 2 in displays, and their marketing says this."

- Foxconn CEO Terry Gou, mocking curved smartphones.

Run away! Run away! Parts 2 and 3

"Perhaps the most bone-chilling evidence we collected in this campaign was the targeting and compromise of transportation networks and systems such as airlines and airports in South Korea, Saudi Arabia and Pakistan. The level of access seemed ubiquitous: Active Directory domains were fully compromised, along with entire Cisco Edge switches, routers, and internal networking infrastructure."

- IT security firm Cylance in a detailed report about a campaign by Iranian hackers.

"The Operation Cleaver report documents how Iran is the first highly motivated Western world adversary poised to execute serious attacks against global infrastructure, not just targeting the United States, but the critical infrastructure of over a dozen different countries. They aren't looking for credit cards or microchip designs, they are fortifying their hold on dozens of networks that if crippled would affect the lives of billions of people."

- Cylance CEO and President Stuart McClure in a blog post about the hacking campaign, dubbed Operation Cleaver.

Taunt you a second time

"We are preparing for you a Christmas gift. The gift will be larger quantities of data. And it will be more interesting. The gift will surely give you much more pleasure and put Sony Pictures into the worst state."

- The hackers of Sony Pictures promising a "Christmas gift" if their demands are not met.

Join the CSO newsletter!

Error: Please check your email address.

Tags YEAR ENDMarissa MayerCecily StrongElectronic Privacy Information CenterinternetFacebookBlackberryAppleGooglesecurityTom WheelerSamsung ElectronicslegalMotorola MobilityU.S. Federal Communications CommissionJohn RobertsU.S. Federal Trade CommissionTheo de RaadtJim Zemlin

More about AppleBlackBerryCCSElectronic Privacy Information CenterFacebookFCCFederal Communications CommissionFederal Trade CommissionFoxconnGoogleHuman Rights WatchInsightLinuxMotorolaNewsOpenBSDRobertsSamsungSonyYahoo

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Nancy Weil

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place