Trump Administration to Hand Cyber Command to U.S. Military

U.S. - NSA- CrimeShop

United States Military

So after many months of delay, the Trump administration is currently finalizing plans to revamp the nation’s military command for defensive and offensive cyber operations in hopes of “intensifying” America’s ability to wage cyberwar against the Islamic State group and other threats.

U.S.-National-Security-Agency-Crime-Shop

And what will the new plan look like? Well, the new U.S. Cyber Command would eventually be split off from the intelligence focused NSA because the reality is that it will allow U.S. Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, who happens to be responsible for monitoring and collecting telephone, internet and other intelligence data from around the world. Which also happens to be a responsibility that often times tends to clash with military operations against enemy forces.

This is and I am shocked to admit it, a smart move considering it’s coming from the Trump Administration.

The move does stem from the escalating threat of cyberattacks and intrusions from other nation states, terrorist groups and hackers, and comes as the U.S. faces new and improved fears about Russian hacking following Moscow’s efforts to meddle in the 2016 Presidential Election.

The reality here is that other nation states have already created cyber armies made up of each respective nations military. The cyber army is it’s own unit and of the nation states that have these cyber units already in place, well let’s just say, they are years ahead of us so it will in fact, take the U.S. military time to find a balance let alone its footing.  

-nsa-crimeshop

It will take time, the NSA already has what it needs to be the Cyber Command if it weren’t for things like losing intel, creating spy programs that were never approved and that were utilized to spy on U.S. Citizens that were oh, how do you say…unauthorized?

The point is, will the U.S. Military duplicate what the NSA already has, take/transfer or assume control over what the NSA already has or build the program from the ground up? The NSA has the people and the tools already in place, so my only question is, what is the price tag of putting something into place with a different agency, that is already more or less in place with the NSA currently?

This may just be me, but it seems that it would be less costly and far easier to change the rules by which the NSA is playing and move the NSA under the command of the U.S. Military.

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

U.S. National Security Agency Shuts down Honda Factory

U.S.-National-Security-Agency-Crime-Shop

NSA – WannaCry/Wcry ransome worm

Well folks in the gift that just keeps on giving, the NSA has managed to shut down a Honda Factory after they found the WannaCry/Wcry ransome worm in its networks.

WannaCry-Wcry-Crime-Shop

Not that the NSA directly shut the factory down, it was however indirect because WannaCry/Wcry was derived after all at and by the NSA.

According to a report released today by Reuters, the automaker had to shut down its Sayama plant northwest of Tokyo on Monday after finding that WCry had affected networks across Japan, North America, Europe, China, and other regions.

the-shadow-brokers-crime-Shop

Forget Russian hacking, look at all the damage the NSA has managed to cause. Which we would not have known about had it not been for the Shadow Brokers, who obtained the code for this beauty and released it to the public back in April.

WannaCry/Wcry is basically a weaponized exploit developed, used, by the NSA. It was also in shocking news, stolen from the NSA.

Honda officials for some odd reason did  explain how or why engineers found WCry in their networks 37 days after the kill switch was activated although, it is highly possible that engineers had mistakenly blocked access to the kill-switch domain.

That kill switch by the way was created by sheer luck. A security researcher who had been playing around and acting out of curiosity just so happened to register a mysterious domain name contained in the WCry code that subsequently acted as a global kill switch which immediately halted the self-replicating attack.

I’m more than sure someone is developing ways around that sort of kill switch, I mean if you are in the business of stealing data, and shutting the internet down, power grids, hospitals and the like, you wouldn’t want to be stopped, so advertising the fact that some guy was able to create a kill switch by accident, only entices new developers to create ways around any type of kill switch.

At any rate, here’s to the NSA for not managing to keep it’s top secret weaponized exploits from falling into the the wrong hands or rather from falling out of it’s very own front door.

Does the NSA even know about all the of intel has left it’s facility or will we have to wait on someone like Shadow Brokers to inform us, the hard way…again?

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop on twitter

And https://gab.ai/thecrimeshop

 

 

 

 

 

 

 

U.S. National Security Agency contractor arrested

u-s-national-security-agency-thecrimeshop

For allegedly stealing codes

So as it turns out, instead of make a lot of noise with the arrest, the FBI decided to quietly arrest a NSA contractor who has been suspected of stealing codes.  As it so happens those codes were used to hack into the systems of other countries like Russia, China, North Korea, Iran and so on.

Yet the FBI is upset that the U.S. political system has been hacked into, multiple times this year.

I suppose that here in America, our Government definitely does not subscribe to the philosophy of “what’s good for the goose, is good for the gander.”

Here is part of the statement that was released today from the Justice Department with regards to Harold Thomas Martin III:

“During execution of the warrants, investigators located hard-copy documents and digital information stored on various devices and removable digital media. A large percentage of the materials recovered from Martin’s residence and vehicle bore markings indicating they were the property of the U.S. government and contained highly classified information, including Top Secret and Sensitive Compartmented Information (SCI). In addition, investigators located property of the U.S. government in excess of $1,000, which Martin allegedly stole.”

They went on to say that although right now this is not a case of espionage, the documents do reveal sensitive sources, methods and capabilities.

At any rate this should be really embarrassing for the NSA because it is the 2nd time in 3 years that someone who worked inside the NSA walked out the door with intel.

Even more interesting, Harold Martin happens to work for the very same firm contracted to do work for the NSA that Edward Snowden worked for, Booz Allen Hamilton.

booz-allen-hamilton-the-crime-shop

Booz Allen Hamilton, is responsible for building and operating many of the agency’s most sensitive cyberoperations…not to mention contractors who have a habit of walking out the door with intel…

But what’s even more embarrassing is that this goes to show that the NSA is actually the least secure U.S. government agency.

People are trying to tell the U.S. Government something with all of the stolen intel, the recent hacks of our political system, hacks of the NSA, the Military etc…

The messages are pretty clear….

The problem is that our government is failing to listen…

Cristal M Clark

IOS users can find The Crime Shop on Apple News

@thecrimeshop