DHS becomes responsible for "tech security", but we already know they funnel money to MSNBC and Microsoft, KPMG
Posted by:
another democrat pork bill
()
Date: May 16, 2020 04:37PM
Shown Here:
Public Law No: 115-390 (12/21/2018)
Strengthening and Enhancing Cyber-capabilities by Utilizing Risk Exposure Technology Act or the SECURE Technology Act
TITLE I--DEPARTMENT OF HOMELAND SECURITY INFORMATION SECURITY AND OTHER MATTERS
(Sec. 101) This bill directs the Department of Homeland Security (DHS) to: (1) establish a policy applicable to individuals, organizations, and companies to report security vulnerabilities on DHS information systems; and (2) develop a process to address the mitigation or remediation of the vulnerabilities reported. DHS shall make such policy publicly available and submit a copy to Congress with the required remediation process.
(Sec. 102) DHS shall establish, within the Office of the Chief Information Officer, a bug bounty pilot program to minimize security vulnerabilities.
"Bug bounty program" means a program under which: (1) individuals, organizations, and companies are temporarily authorized to identify and report vulnerabilities of DHS information systems; and (2) eligible individuals, organizations, and companies receive compensation in exchange for such reports.
TITLE II--FEDERAL ACQUISITION SUPPLY CHAIN SECURITY
Federal Acquisition Supply Chain Security Act of 2018
(Sec. 202) This bill establishes a Federal Acquisition Security Council. The council shall: (1) identify and recommend development of supply chain risk management standards, guidelines, and practices for assessing and developing mitigation strategies to address supply chain risks; and (2) develop a strategic plan for addressing supply chain risks posed by the acquisition of certain technology and equipment (covered articles).
(Sec. 203) The bill sets forth standards for executive agencies in assessing supply chain risks and extends to such agencies authorities for mitigating supply chain risks in the procurement of covered articles.
(Sec. 204) The bill adds agency responsibilities relating to assessing and avoiding, mitigating, transferring, or accepting supply chain risks and complying with exclusion and removal orders.
------------------------------
Until Clinton and Obama,
THE UNITED STATES AIR FORCE had been responsible for US's telephone and internet safety and security.
Of course, they were an honest and high tech bunch - SO OBAMA PASSED LEGISLATION TO GET RID OF THEM, on a tip from the chinese that it would expose chinese military initiatives
------------------------
The DHS, on accounting sheets signed by KPMG (a britich organization btw - who has no right signing US GOV financing as being "straight up")
THE DHS HAS A SUB-AGENCY FOR WRITING SOFTWARE FOR MICROSOFT
this new DHC sub-agency is no different. it hires illegal aliens to spy on america and has no "delivery date", no standards to follow, no profit margin, no (RED BOOK of security standards to adhere to)
MICROSOFT HAS COMPLETELY LIED TO USA, PASSED OUT ADMINISTRATOR PASSWORDS TO ALL ASIAN COUNTRIES OF MOST OF AMERICAN CONSUMERS (who have asian parts in their pc - meaning didn't buy an Apple computer - meaning - most of America and most Government Offices - all completley non-secure)
furthermore, bill clinton "outlawed computer security" and funneled money to china thought "college grants" and "hillary state department". security on all platforms is ASS BACKWARDS - all of it is designed to fail EXCEPT Intel Corporations's i3, i5, i7 line chips (while big tech backstabbed the consumer to spy on the, Intel did not participate).
these holes were AND ARE used to spy on US military, all us agencies, and even BY LOCAL POLICE to spy on people in their homes (the excuse on media was "butt dialed police by mistake", the truth was that local democrats were continually monitoring people illegally looking for a leg up - "when you are lower, i am higher", these people arrest anyone who is not an insider they can gather charges on - total communists)
MORESO - THE HOLES ARE USED SO THAT CONSUMERS HAVE VERY BAD VERY BROKEN TECHNOLOGY THAT CANNOT BE USED TO COMPETE ON GOVERNMENT AND BUSINESS CONTRACTS - which is why your PC and end user machines are severely broken
SO THAT THEY ARE BIG TECH, and you are Mudd Jr.
.