Krebs, Chris
Krebs Stamos Group Partner, Jan 2021 – present.
U.S. Cybersecurity and Infrastructure Security Agency (CISA)
Director, Nov 2018 – Nov 2020. U.S. Department of
Homeland Security (DHS) National Protection and Programs
Directorate (NPPD, precursor to CISA) acting Under Secretary
for Homeland Security, Aug 2017 – Nov 2018. Microsoft
Cybersecurity Policy Director, Feb 2014 – Mar 2017.
See
IT
Hiring: Government, Business, and the Revolving Door
in
Principles of IT
Incompetence.
No IT education. An
IT education is the most important IT credential and Krebs
only has a Bachelor of Arts in a non-IT subject and a JD from
a low-ranked night law school.
From
CISA:
No Infrastructure Cybersecurity, Just a Stepping Stone for IT
Incompetents:
Also in the November 2018 NPPD to CISA change, Chris Krebs
became Director of CISA, having been acting Under Secretary
for Homeland Security in the NPPD since August 2017, and
Matthew Travis became Deputy Director of CISA. Bryan Ware
became Jeanette Manfra's replacement as Assistant Director
for Cybersecurity in January 2020.
CISA's IT incompetent Chris Krebs, Matthew Travis, and Bryan
Ware and the cybersecurity of the 2020 U.S. Presidential
Election became notorious. All were essentially fired for
their incompetence in this by President Trump in November
2020. Finding any evidence of election, or other
infrastructure, hacking on their watches would have been a
career-threatening embarrassment — breaking their
stepping stone — so they would not have even if they
were capable of doing so. They all had new higher-paying
jobs ready to go when they were fired.
The firings did not break their stepping stone — the
publicity actually greatly helped — because of the
hatred of President Trump by the left, including the media,
who just claimed Trump wanted some election hacking evidence
manufactured and fired them in retaliation for not doing so.
CISA, in particular Chris Krebs, said "There is no evidence
that any voting system deleted or lost votes, changed votes,
or was in any way compromised." But this is the same tired
old fallacy that all IT incompetent organizations use to
avoid responsibility when they are hacked: that because they
didn't find any evidence, no hacking occurred. But think
about how stupid that is: if you don't want to find
evidence, you won't. As a former scientist, I can tell you
that one of the basic tenets of science is "absence of
evidence is not evidence of absence". See for
example HealthCare.gov
Hacked.
CISA itself, as a part of DHS, was probably hacked in 2020,
months before the 2020 U.S. Presidential Election in
November 2020, in The
Doomsday Microsoft Government Email Data
Breach.
I first investigated Chris Krebs, Matthew Travis, and Bryan
Ware when I was doing a 3-part series, as yet
unpublished, 2020 U.S. Presidential Election
Hacked, Part I: Undetectable So
Unreported, Part II: Government Responsible,
and Part III: How (see also Foreign
Hacking of New Hampshire Voting Machines from February
2020). As a real
IT expert, I can tell you that it is quite possible the
2020 U.S. Presidential Election was hacked.
Former CISA Director Chris Krebs
is IT incompetent, having no IT education; see The
Most Important IT Credential: An IT Education in
Principles of IT
Incompetence.
Chris Krebs was the Cybersecurity Policy Director at
Microsoft from February 2014 to March 2017, before he joined
CISA, and was planning on working for Microsoft again, at a
higher-paying level, with his profitable government
connections from stepping stone CISA.
Working for Microsoft was a reason for Chris Krebs not to
find any evidence of hacking in the 2020 U.S. Presidential
Election. The
Doomsday Microsoft Government Email Data Breach was
Microsoft's fault so if any evidence was found it would have
implicated Microsoft. Krebs was part of Microsoft's
protection in the federal government. See Microsoft
Guilty But Protected by NSA, AB PAC, India, and DelBenes
and note also that according to the Federal Election
Commission, Krebs donated to Microsoft's political action
committee (MSVPAC).
Chris Krebs did not end up working directly as an employee
of Microsoft, but only because he saw and exploited an
opportunity created by The
Doomsday Microsoft Government Email Data Breach. After
he was fired for IT incompetence by President Trump after
the 2020 U.S. Presidential Election in November 2020, Chris
Krebs started an IT security consulting firm with,
incredibly,
Alex
Stamos, the IT incompetent Yahoo-then-Facebook Chief
Information Security Officer (CISO) who was responsible for
both Yahoo's and then Facebook's massive data breaches;
see Yahoo-Then-Facebook
CISO Alex Stamos Allows Yet Another Massive Data Breach.
The first customer of the Krebs Stamos Group was SolarWinds,
the software company whose biggest customer was the federal
government and that most are blaming — although
Microsoft was really to blame — for The
Doomsday Microsoft Government Email Data Breach.
Microsoft will also, if they haven't already, hire the Krebs
Stamos Group, which will also probably be a violation of
Title 18 (crimes and criminal procedure) of U.S. Code,
§ 207 (restrictions on former officers, employees, and
elected officials of the executive and legislative
branches); see IT
Hiring: IT Incompetence Breeds Disloyalty and Corruption
in
Principles of IT
Incompetence.