Tuesday, March 4, 2014

Is The FBI Still Using Cisco?

The FBI & Cisco siting in a tree, KISSING!

What is Cisco? Well, we are not referring to the R&B singer, you know with the golden hair seeing about that Thong, the Thong, Thong, Thong. As reported by Wired magazine, we are discussing the Cisco, IOS.  A simple router software, operating system that can be hacked just as Windows or Linux would be hacked. Cisco makes the majority of the routers that operate the backbone of the Internet as well as many company networks and critical infrastructure systems. HELLO!

Snowden, mentioned something about this in his stolen documents list. It was stated, not all of the activity mentioned in the budget document involved remote hacking. In some cases, according to the document, the operations involved local activity by the CIA or military intelligence units to “physically place hardware implants or software modifications” to aid the spying.

Wired Magazine reported that under a $652-million program code named “Genie,” U.S. Intel agencies have hacked into foreign computers and networks to monitor communications crossing them and to establish control over them, according to a secret black budget document leaked to the Washington Post. U.S. intelligence agencies conducted 231 offensive cyber operations in 2011 to penetrate the computer networks of targets abroad.


As American people, we might have to get use to the FBI hacking into our WiFi signals to mirror what we are looking at or doing on the computer. Hey! Whom am I to snarl at those federal wanne be cops, for spending all their day looking at my feedback of cartoons, movies, me talking about their mothers.....OMITTED, just joking Van #6 or Cisco router 33BF5FAF. Do your job and utilize my tax dollars wisely. Before I retired from police work, I enjoyed the occasional doughnut treat as I parked my police car unit, 321. But I will add a quote from the book entitled: The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI, by Betty Medsger:  It stated:

"The National Security Agency’s capability at any time could be turned around on the American people, and no American would have any privacy left; such is the capability to monitor everything: Telephone conversations, telegrams, it doesn't matter. There would be no place to hide."

Here is an interesting fact! I understand that in 2008, the FBI were bummed out about the possibilities that there's counterfeit networking equipment, manufactured in China installed in many places, sensitive to the US network infrastructures. 

Don't worry the FBI jumped all over it in an operation called "Cisco Raider" which it uncovered 3,500 counterfeit Cisco network components, with an estimated value of $13.5 million. According to the FBI’s briefing of the Office of Management and Budget in May of 2008. The counterfeit equipment could allow the remote jamming of networks thought to be secure and possibly could allow access to those networks remotely. Now I ponder what did they do with those remote digital skeleton keys?

Well! At least somebody is taking their job seriously. According to General Keith Alexander, commander of the U.S. Cyber Command, director of the National Security Agency (NSA) and chief of the Central Security Service (CSS). In the Senate Appropriations Committee hearing on Cyber Security; he stated that the United States infrastructure is under attack and our resources should be targeted to combat the real threats against the government. I guess these boys didn't get the Memo. for more go to Reuters.com 
      
Above is the Senator Lindsey Graham, during a Senate Armed Services Committee hearing on U.S. Strategic Command and U.S. Cyber Command's Fiscal Year 2014 budget request, questions General C. Robert Kehler, Commander of U.S. Strategic Command; and General Keith B.  Alexander, Commander of U.S. Cyber Command, on the threats sequestration poses to our nation's ability to defend itself against growing cyber threats.
                                                                                         

No comments:

Post a Comment

Tech Show of the Month

Whistler Music Podcast