Not just a shotgun

It comes back to an old jab I heard somewhere “You get more done with a shotgun and a kind word, then merely with a kind word”, it is true. The bulk of all people require external motivation. Arab News gave me an update yesterday and I was actually a little surprised. 

I had expected that Saudi Arabia had well above the basic needs there, but it seems I was wrong. The article (at gives us ‘Experts warn businesses in Saudi Arabia to ramp up their cybersecurity’, which is fair enough, but that opens up a whole range of other issues as well. Remember the accusations handed against the KSA (specifically their Crown Prince), I dealt in part with it in ‘Evidence? Why?’ (At, consider that it was Julius Caesar who taught its armies (now known as Esercito Italiano) “The first rule of war is to install your defences against enemy retaliation”, he did that 2073 years, 4 months and 15 days ago (roughly). So as the Arab News gives us “As Saudi companies become more technologically advanced, cybersecurity experts have warned of a general lack of awareness about industry best practices and are worried that businesses are not adequately protecting their systems”, we see an implied lack of cybersecurity, as to what stage is there a lack all whilst the teams of the Crown Prince were accused of attacking Jeff Bezos? I hd a few doubts when I read the article, I have a hell of a lot more now. The added “95 percent of businesses in the Kingdom last year were the victim of a cyberattack” give rise to additional questions and in all this, when we see the American goods that the KSA is acquiring, no one asked or looked into the cybersecurity issues there? I wonder why?

There is a lot more in the article It starts with “85 percent of Saudi respondents said that they had witnessed a dramatic increase in the number of attacks over the past two year” and it gets to me a lot bigger when we consider that Cisco is lending  hand in the KSA (at 

So where does the shotgun come in? Well, it doesn’t directly, but when Americans see ‘shotgun’ they tend to take notice. Indirectly, when we consider the activities of Raytheon, Northrop Grumman, Booz Allen Hamilton, and a few others in the KSA, no one raised the issue of cybersecurity? I have no reason to doubt Arab News, but there is a larger setting and it does not add up. You see the quote “Al-Jaber applauds the new government improvements being implemented by the National Cybersecurity Authority (NCA) and the new Saudi Cybersecurity strategy, and recommends that those concerned brush up on their cybersecurity protocols to ensure that they are being protected”, you see ‘cybersecurity protocols’ is something to some, but a partial solution to others, there is version control, OS update and upgrade protocols, investigation into software solutions and apps, it is nice to know that the KSA has the fastest 5G in the world, but if that is not met with correct cyber protocols, it merely means that more and more data goes somewhere else, the question is where it goes. 

And this gets us back to another piece of evidence, it was given to us in the Financial Times on January 22nd 2020. There we see “The forensic analysis of Mr Bezos’s phone could not ascertain what alleged spyware was used. However, the report said: “It is believed that the compromise was likely facilitated by malicious tools procured by [Saud] al-Qahtani””, the imbalance of cybersecurity and cybertools is way too high, especially when we consider “forensic analysis of Mr Bezos’s phone could not ascertain what alleged spyware was used”, in light of the overall stage of cyber imbalance of the KSA, this statement (at is equally a consideration for additional questions. As such, the questions I had almost a year ago are now roosting and giving birth to additional questions. That is beside the questions I have on conversations that others should have had with decision makers of the KSA on Saudi cyber security. Do you not agree?


Leave a comment

Filed under IT, Military, Science

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.