President Donald Trump eliminated the job of the nation’s cybersecurity czar. Democratic lawmakers immediately introduced legislation to restore it. Why?

To note, this White House position was created in 2009, under the Barack Obama Administration, by the State Department’s coordinator Chris Painter. It echoes the same demonstrative spirit the Department of Homeland Security had when set up illegitimately by the George W Bush administration after the 9/11 tragedy, ponder that if you will.

President Trump signed an executive order rearranging the federal information technology infrastructure that includes no mention of the White House cybersecurity coordinator or of a replacement for Rob Joyce, who said last month that he is leaving the position to return to the National Security Agency, where he previously directed cyber defense programs.

There has been much controversy regarding the “National Insecurity” issues of our country during the past three former administrations. The very climate and culture that the deep state systemically and methodically entrenched itself and grew under an unconstitutional value system, void of rule of law, and as we have witnessed to date, a colorful and criminal cast of alleged bad actors under fire, some with indictments mounted against them.

Some would question the Presidents decision to eliminate the top White House cyber policy role is outrageous, especially given that we’re facing more hostile threats from foreign adversaries than ever before.

These are the players we know about, yet what about the compartmentalized Computing Technology Industry Association, a nonprofit trade group of operations in more than 120 countries who also asked President Trump to reconsider.

Was the Cybersecurity Czar position merely a Trojan Horse to allow the 17 Intelligence Agency’s and their Fusion Center Matrix an entrance and exit for the deep state interference into our lives?

Definition – What does Computing Technology Industry Association (CompTIA) mean?

The Computing Technology Industry Association (CompTIA) is a global nonprofit trade association founded in 1982. Originally known as the Association of Better Computer Dealers (ABCD), CompTIA’s founders represented five microcomputer dealers. Today, CompTIA has more than 2,000 members.

Techopedia explains Computing Technology Industry Association (CompTIA)

Since its inception, CompTIA has established foundational objectives, goals and a broad range of membership benefits. CompTIA is geared toward enhancing the technology industry and facilitating communication between customers and government agencies with programs focused on the following four principles:

  • Philanthropy: Provides opportunities for the underprivileged to gain the knowledge and skills required for employment in the IT industry
  • Education: Uses educational techniques, tools and resources to facilitate learning and enhance member businesses
  • Advocacy: Provides a voice for small and medium-sized businesses
  • Certification: Provides vendor and technology neutral certifications

Another words false narratives and don’t let their smiles fool you either!

In retrospect, let’s look reference on the past administrations Cybersecurity Czars and positions held to reflect why we are here today with regard to more questions than answers regarding National Security issues.

One powerful example of the growing systemic alphabet soup revolving doors would be noted in this article by Digital Guardian, regarding Jane Holl Lute.

“Jane Holl Lute currently serves as chief executive officer of the Center for Internet Security (CIS), an operating not-for-profit organization that serves as home of the Multi-State Information Sharing and Analysis Center (MS-ISAC) providing cybersecurity services for state, local, tribal, and territorial governments. Lute has previously served as served as Deputy Secretary for the Department of Homeland Security (DHS) and as Assistant Secretary-General of the United Nations (UN). She also served on the National Security Council staff under both President George H.W. Bush and President William Jefferson Clinton.”

Lute who served as a Board Member for Center for Internet Security (CIS) followed the narrative that read as follows:

CIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. Our CIS ControlsTM and CIS BenchmarksTM are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continuously refined and verified by a volunteer, global community of experienced IT professionals. CIS is home to the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities.

With caution regarding the Why and How the position of National Security Coordinator for the White House could be eliminated, I believe it is fair to say that just judging from past experience and tragic breakdowns within the intelligence agencies, it is in the best interest of the American people for our President to protect us from all enemies foreign and domestic. You be the Judge.

Here is a list of the Globalist Partners affiliated with (CIS)

President Trump has evaluated and is changing the landscape of our Cybersecurity and with great reason and concern. With all the alleged criminal activity and deep state activities emerging in connection to the former Obama administration, and the revolving door resume of former Cybersecurity Czar, DHS Agent, UN Ambassador, Jane Holl Lute states these laws and rules were set into action to protect the nations critical infrastructure:

“The U.S. Government has worked closely with the private sector during the recent series of denial-of-service incidents. We have provided classified cyber threat briefings and technical assistance to help banks improve their defensive capabilities and we have increased sharing and coordination among the various government elements in this area. These developments reinforce the need for government, industry, and individuals to reduce the ability for malicious actors to establish and maintain capabilities to carry out such efforts.

In addition to these sophisticated attacks and intrusions, we also face a range of traditional crimes that are now perpetrated through cyber networks. These include child pornography and exploitation, as well as banking and financial fraud, all of which pose severe economic and human consequences. For example, in March 2012, the U.S. Secret Service (USSS) worked with U.S. Immigration and Customs Enforcement (ICE) to arrest nearly 20 individuals in its “Operation Open Market,” which seeks to combat transnational organized crime, including the buying and selling of stolen personal and financial information through online forums. As Americans become more reliant on modern technology, we also become more vulnerable to cyber exploits such as corporate security breaches, social media fraud, and spear phishing, which targets employees through emails that appear to be from colleagues within their own organizations, allowing cyber criminals to steal information.”

According to Tripwire, Inc. Published on Mar 15, 2017
“Federal government agencies are under immense pressure to improve cyber security performance by focusing on compliance and risk management initiatives. These agencies have begun using the SANS 20 Critical Security Controls (CSC) because it provides a framework for implementing continuous diagnostics and mitigation (CDM), sequence IT control implementations, and understand budgets and impacts of these implementations.

Join us for this conversational webinar featuring Jane Holl Lute, the new CEO of the Council on CyberSecurity, as she shares her thoughts on the rapidly evolving world of cyber security. In this webinar, you will learn: • How the Council on CyberSecurity will be influencing cyber security, the SANS 20 CSC, and how it may affect your organization • Suggestions from Jane’s experience on threat actors • Value your organization may gain from upcoming activities and events involving the Council on CyberSecurity Jane Holl Lute is the new President and CEO of the Council on CyberSecurity, a private-sector non-profit, most recently having served as the Deputy Secretary for the Department of Homeland Security (DHS). Rod Murchison has been a security strategist and technology leader in the industry for nearly 20 years.” https://www.youtube.com/watch?v=c5D2_Zj_pu8

Jane Holl Lute is only one example and individual with a political-military revolving door in government.

As of February 8, 2016, she was appointed Special Coordinator on Improving the United Nations Response to Sexual Exploitation and Abuse. Her husband is Retired General Douglas Lute, who served as the War Czar for George W Bush and Barack Obama. Together they are a hidden power team, working behind the scenes.

“This next president is going to inherit the most sophisticated and persistent cyber espionage cultures the world has ever seen, He needs to surround himself with experts that can expedite the allocation of potent layers of next generation defenses around our targeted critical infrastructure silos.”
― James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

For Further Insight:

https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/

https://www.youtube.com/watch?v=c5D2_Zj_pu8

https://www.dhs.gov/news/2013/03/13/written-testimony-dhs-deputy-secretary-jane-holl-lute-house-committee-homeland

Susan Price is a National Gold Star Mother and resides in the Tampa Bay area of Florida. The daughter of a Marine, and Army Veteran, She is also the Mother of a Fallen American Hero, Gunnery Sgt, Aaron Michael Kenefick a highly decorated and stellar Marine of over twelve years. The tragic loss of Susan’s son and his Marine Embedded Training Team, raised more questions than answers. It was through a Mother’s undying love, that Susan transformed into an Investigative Researcher, and through her countless hours, days, weeks and years connecting the dots, factual documentation, eyewitness accounts and more, emerged a back story to the crimes that took place on the battlefield that fateful day of September 8th 2009. Susan is also known as a Veterans Advocate and a National voice. She has appeared on 60 Minutes, and other national media as well as and Patriot radio. Having worked with various Congressmen concerning our Military and Veterans, she has been sought out by many as the “the Gold Star Mother with a voice” – and “go to person”.

LET THE SILENT VOICES BE HEARD! Comments will show on social media

Loading Facebook Comments ...