DOGE Now Has Access to the Top US Cybersecurity Agency

Spread the love

Edward Koristin, the so -called 19 -year -old engineer of Elon Mask Government skill department (Doses) Known as “big ball”, “ Ward confirmed that the Cyber ​​Security and Infrastructure Security Agency (CISA) staff is now on the employees. According to an official source, he is now with CISA staff, another member of the Dog team with 38 -year -old software engineer Kyle Shoot.

The CISA mentions the cable cable in the Homeland Security Department (DHS), in which it is a component company, when the comment reached. DHS did not immediately respond to any request for comment.

Koristin-Costure’s brain-computer interface company Neurally, an intern for it Wired reports– Since January, there have been numerous federal agencies and categories as Daisy Operative. Has been tracked to him General service administration (GSA), the Staff management officeThe State DepartmentAnd FemaThe At the Bureau of Diplomatic Technology in the state, he received access to systems containing diplomats and many sources and spies around the world who provided intelligence and skills to the US government.

Journalist Marissa Kabas was First reportHe has now moved to the CISA of the DHS division. He was listed in the staff directory as a senior adviser.

The second Dog worker shoots also joined the CISA at Koristine. Have shot Report Also was in the GSA. He worked while he was on his work before his work with Daze WinnardA fund raising platform for Republicans that helped the team to raise $ 1.5 billion during the 2021 election campaign.

The level of access to data and networks in CISA is not yet clear, but agencies, which are responsible for the defense of the civilian federal government networks and work closely with critical infrastructure owners across the country, are abundant and stored and stored abound Critical security information on its network. These include information related to weaknesses, violations and network risk evaluation operated for local and state election offices. Since 2018, CISA has helped state and local election offices across the country to evaluate and secure weaknesses in their networks. Prior to the CISA information, the Federal Bureau of Investigation and the National Protection Agency also work to inform the victims of violations and to process information related to software weakness.

Koristin, such as wired ReportWorked briefly for the path network in 2022, a network monitoring firm, known for the recruitment of renovated blackhat hackers. According to the security journalist Brian Crabs, he was once an account associated with him Previously linked With a loosely formed cyber criminal community known as COM, whose members have been responsible for various hacking operations, including hacks of various snowflake accounts in the last few years. Koristin was not involved in snoflek violation, but as Ward said, an account owner was seeking assistance to deny the distribution of service attacks – a criminal strategy that seems involved in disabling it and to prevent valid traffic from reaching it To turn extensive traffic to a domain for. Krebs also reported that Path dismissed Koristin for alleged allegations Leak Contest.

Washington Post Been reported last week The Koristin was appointed as a senior adviser, but did not indicate any part of the extensive company he joined.

“What is the benefit of fighting cybercrime?” Cyber ​​Security Researcher says who tracks cyber criminal groups.

Leave a Reply

Your email address will not be published. Required fields are marked *