DOGE Now Has Access to the Top US Cybersecurity Agency

MT HANNACH
5 Min Read
Disclosure: This website may contain affiliate links, which means I may earn a commission if you click on the link and make a purchase. I only recommend products or services that I personally use and believe will add value to my readers. Your support is appreciated!

Edward Coristine, a 19 -year -old engineer at Elon Musk Government Department of Effectiveness (DOGE) Known as “big bullets”, is now the staff of the cybersecurity and infrastructure Security Agency (CISA), confirmed Wired. He is joined by another member of the DOGE team, the 38 -year -old software engineer, Kyle Schutt, who is now one of the CISA staff, according to a government source.

The CISA has made alert to laugh at the Ministry of Internal Security (DHS), of which it is a component agency, when it was contacted to comment. DHS did not immediately respond to a comment request.

CORISTINE – Briefly trainee of the Brain -Computer Interface Company of Musk, Neuralink, as Wired reported– has made its way through numerous agencies and federal departments as AGENT DOGE since January. He was followed at General Services Administration (GSA), the Personnel management officeTHE State departmentAnd Fema. At the State Diplomatic Technology Office, he had potentially access to systems containing sensitive information on diplomats and many sources and spies around the world that provide the United States government intelligence and expertise.

Like journalist Marisa Kabas First to reportHe has now moved to Cisa, a DHS division. It is listed in the personnel directory as main advisor.

A second DOGE worker, Schutt, also joined Coristine in Cisa. SCHUTT A would have was also at the GSA. Before his work with Doge, he worked on the launch of VigilantA fundraising platform for the Republicans who helped the party to raise $ 1.8 billion during the election campaigns of 2024.

It is not yet clear what level of access Coristine could have for data and networks at CISA, but the agency, which is responsible for the defense of civilian networks of the federal government and works in close collaboration with the owners Critical infrastructure across the country stores many sensitive and critical security information on its networks. This includes information on software vulnerabilities, violations and network risk assessments carried out for local and state electoral offices. Since 2018, the CISA has helped the electoral offices of states and premises across the country to assess the vulnerabilities of their networks and to secure them. The CISA also works with the Federal Bureau of Investigation and the National Security Agency to inform victims of violations and information on information on the vulnerabilities of software before information becomes public.

Coristine, as cable previously reportedWorked briefly in 2022 for Path Network, a network surveillance company known for having hired reformed blackhat hackers. According to security journalist Brian Krebs, one account another partner was also previously linked With a highly trained cybercriminal community known as Com, whose members have been responsible for various hacking operations in recent years, including the hacking of numerous snowflake accounts. Coristine was not associated with infractions with snowflakes, but as Wired said, an account associated with him seemed to suggest that the owner of the account sought to lead a distributed service – a criminal technique that involves The launch of full traffic in a field to deactivate it and prevent legitimate traffic from reaching it. Krebs also pointed out that Path had shot Coristine for allegedly Strip of internal business documents to a competitor.

The Washington Post reported last week This Coristine had been assigned to the DHS as main advisor, but did not indicate which part of the sprawling agency he had joined.

“What is the point of fighting cybercrime if we will simply give access to government networks to people with cybercriminal gang affiliations?” said a cybersecurity researcher who follows cybercriminal groups.

Share This Article
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *