Cyber Security Is NOT Being Handled By The Federal Government! (Video)



The federal government cannot get their act in gear when it comes to cyber security. There is more than national security involved. There is also personal information of the citizens of this nation to be concerned with. There is no need for new laws or loss of more freedoms. Instead, we need the government to do their job and protect this nation.


The cyber terrorist threat

take our poll - story continues below

Whom do you consider to be the most corrupt Democrat Politician?

  • Whom do you consider to be the most corrupt Democrat Politician?  

  • This field is for validation purposes and should be left unchanged.
Completing this poll grants you access to AFF updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use.

Here, from a FFV article, is what the CIA Director John Brennan had to say about the terrorist threats.

Modern communications technologies complicate the fight against ISIL and its ilk, Brennan said. “New technologies can help groups like ISIL coordinate operations, attract new recruits, disseminate propaganda and inspire sympathizers across the globe to act in their name,” he said. “The overall threat of terrorism is greatly amplified by today’s interconnected world where an incident in one corner of the globe can instantly spark a reaction thousands of miles away, and where a lone extremist can go online and learn how to carry out an attack without ever leaving home.”

The cyber domain brings tremendous benefits, but also brings tremendous dangers, he said.


“Threats in the cyber realm are an urgent national security priority, as America has no equivalent to the two wide oceans that have helped safeguard our country’s physical, maritime and aviation domains for centuries,” Brennan added.

The IRS is not secure

Here, via another FFV article, is what the GAO had to say about the lack of cyber security at the IRS.


An underlying reason for these weaknesses is that IRS has not effectively implemented elements of its information security program. The agency had a comprehensive framework for its program, such as assessing risk for its systems, developing security plans, and providing employees with security awareness and specialized training. However, aspects of its program were not yet effectively implemented. For example, IRS’s testing methodology did not always determine whether required controls were operating effectively; consequently, GAO continued to identify control weaknesses that had not been detected by IRS. Also, IRS had not updated key mainframe policies and procedures to address issues such as comprehensively auditing and monitoring of access, thereby increasing the risk of unauthorized access to tax processing systems not being detected. In addition, IRS did not reassess controls for a key system after significant changes had been made in the operating environment. Further, IRS had not ensured that many of its corrective actions to address previously identified deficiencies were effective. For example, of 69 previously reported weaknesses that remained unresolved at the end of GAO’s last audit, IRS indicated it had implemented corrective actions for 24 of them; however, GAO determined that 10 of the 24 weaknesses had not been fully resolved.


Here, via another FFV article, is how the FAA is failing the people who rely on flying to get around.

The weaknesses in FAA’s security controls and implementation of its security program existed, in part, because FAA had not fully established an integrated, organization-wide approach to managing information security risk that is aligned with its mission. National Institute of Standards and Technology guidance calls for agencies to establish and implement a security governance structure, an executive-level risk management function, and a risk management strategy in order to manage risk to their systems and information. FAA has established a Cyber Security Steering Committee to provide an agency-wide risk management function. However, it has not fully established the governance structure and practices to ensure that its information security decisions are aligned with its mission. For example, it has not (1) clearly established roles and responsibilities for information security for the NAS or (2) updated its information security strategic plan to reflect significant changes in the NAS environment, such as increased reliance on computer networks.

Until FAA effectively implements security controls, establishes stronger agency-wide information security risk management processes, fully implements its NAS information security program, and ensures that remedial actions are addressed in a timely manner, the weaknesses GAO identified are likely to continue, placing the safe and uninterrupted operation of the nation’s air traffic control system at increased and unnecessary risk.

The State Department

People were complaining about Hillary Clinton using her own email server, yet, via another FFV article, we can see the cyber security is lacking.

Using the incident statistics as the starting point for its analysis, E-Gov Cyber reviewed agency performance against authentication-related Key FISMA Metrics (KFMs). As part of the FISMA reporting process, agencies report the different methods by which users are able to gain access to Federal information and networks. Figure 3 below identifies the number of users at each CFO Act agency who are able to log on with just a user ID and password versus the number that are required to log on with a two-factor PIV Card (excluding DOD7).

Agencies which have the weakest authentication profile allow the majority of unprivileged users to log on with user ID and password alone, which makes unauthorized network access more likely as passwords are much easier to steal through either malicious software or social engineering. The following 16 agencies fall into this category: State, Labor, HUD, OPM, NRC, SBA, NSF, USAID, USDA, Energy, DOT, Interior, VA, Justice, Treasury, and NASA.

While the substantial number of unprivileged user accounts, of which there are 5,325,374 government-wide, that are able to log on to Federal networks with only a user ID and password is concerning, a potentially more serious issue is the number of privileged network accounts that are able to log on with only a user ID and password. Privileged user accounts, of which there are 134,287 across the Federal Government, possess elevated levels of access to or control of Federal systems and information, significantly increasing the risk to Government resources if their credentials are compromised. Figure 4 below identifies this data (excluding DOD8). The following 18 agencies do not require a majority of their privileged network users to log on using two-factor PIV authentication: State, VA, USDA, EPA, Labor, HUD, GSA, USAID, SBA, NRC, NASA, DOT, Treasury, HHS, Energy, Justice, Interior, and DHS.

Who is the threat

Here, via another FFV article, is who the real threat is from via Congressional testimony.

We have discovered and countered nation-state actors from China, Russia, Iran, North Korea, Syria, and other countries. The Chinese and Russians tend to hack for commercial and geopolitical gain. The Iranians and North Koreans extend these activities to include disruption via denial of service and sabotage using destructive malware. Activity from Syria relates to the regional civil war and sometimes affects Western news outlets and other victims. Eastern Europe continues to be a source of criminal operations, and we worry that the conflict between Ukraine and Russia will extend into the digital realm.

This is not some imagined enemy or some distant threat. These attacks are making America weak and we need it fixed. There is no need to kill more freedoms, just for bureaucrats to do their jobs. 

Be sure to like FIGHT FOR VOTES on Facebook- CLICK HERE!


Please Spread The Word And Share This Post!




Facebook Has Banned Us!

The leftists at Facebook decided they didn’t like our message, so they removed our page and are censoring us. Help us fight back and subscribe to our newsletter so that you can stay up-to-date with everything Facebook doesn’t want you to see!

Disqus Comments