Stop IT Incompetence masthead.
Stop IT Incompetence motto.

Government ITIHOS Entry tab.

Microsoft logo, CISA seal, Fake, Southern Nuclear power plant Vogtle photo, Chernobyl meltdown photo, Krebs Stamos Group logo, Chris Krebs photo.

Krebs, Chris

Krebs Stamos Group Partner, Jan 2021 – present. U.S. Cybersecurity and Infrastructure Security Agency (CISA) Director, Nov 2018 – Nov 2020. U.S. Department of Homeland Security (DHS) National Protection and Programs Directorate (NPPD, precursor to CISA) acting Under Secretary for Homeland Security, Aug 2017 – Nov 2018. Microsoft Cybersecurity Policy Director, Feb 2014 – Mar 2017. See IT Hiring: Government, Business, and the Revolving Door in Principles of IT Incompetence.

No IT education. An IT education is the most important IT credential and Krebs only has a Bachelor of Arts in a non-IT subject and a JD from a low-ranked night law school.

From CISA: No Infrastructure Cybersecurity, Just a Stepping Stone for IT Incompetents:
Also in the November 2018 NPPD to CISA change, Chris Krebs became Director of CISA, having been acting Under Secretary for Homeland Security in the NPPD since August 2017, and Matthew Travis became Deputy Director of CISA. Bryan Ware became Jeanette Manfra's replacement as Assistant Director for Cybersecurity in January 2020.

CISA's IT incompetent Chris Krebs, Matthew Travis, and Bryan Ware and the cybersecurity of the 2020 U.S. Presidential Election became notorious. All were essentially fired for their incompetence in this by President Trump in November 2020. Finding any evidence of election, or other infrastructure, hacking on their watches would have been a career-threatening embarrassment — breaking their stepping stone — so they would not have even if they were capable of doing so. They all had new higher-paying jobs ready to go when they were fired.

The firings did not break their stepping stone — the publicity actually greatly helped — because of the hatred of President Trump by the left, including the media, who just claimed Trump wanted some election hacking evidence manufactured and fired them in retaliation for not doing so. CISA, in particular Chris Krebs, said "There is no evidence that any voting system deleted or lost votes, changed votes, or was in any way compromised." But this is the same tired old fallacy that all IT incompetent organizations use to avoid responsibility when they are hacked: that because they didn't find any evidence, no hacking occurred. But think about how stupid that is: if you don't want to find evidence, you won't. As a former scientist, I can tell you that one of the basic tenets of science is "absence of evidence is not evidence of absence". See for example Hacked.

CISA itself, as a part of DHS, was probably hacked in 2020, months before the 2020 U.S. Presidential Election in November 2020, in The Doomsday Microsoft Government Email Data Breach.

I first investigated Chris Krebs, Matthew Travis, and Bryan Ware when I was doing a 3-part series, as yet unpublished, 2020 U.S. Presidential Election Hacked, Part I: Undetectable So Unreported, Part II: Government Responsible, and Part III: How (see also Foreign Hacking of New Hampshire Voting Machines from February 2020). As a real IT expert, I can tell you that it is quite possible the 2020 U.S. Presidential Election was hacked.

Former CISA Director Chris Krebs is IT incompetent, having no IT education; see The Most Important IT Credential: An IT Education in Principles of IT Incompetence.

Chris Krebs was the Cybersecurity Policy Director at Microsoft from February 2014 to March 2017, before he joined CISA, and was planning on working for Microsoft again, at a higher-paying level, with his profitable government connections from stepping stone CISA.

Working for Microsoft was a reason for Chris Krebs not to find any evidence of hacking in the 2020 U.S. Presidential Election. The Doomsday Microsoft Government Email Data Breach was Microsoft's fault so if any evidence was found it would have implicated Microsoft. Krebs was part of Microsoft's protection in the federal government. See Microsoft Guilty But Protected by NSA, AB PAC, India, and DelBenes and note also that according to the Federal Election Commission, Krebs donated to Microsoft's political action committee (MSVPAC).

Chris Krebs did not end up working directly as an employee of Microsoft, but only because he saw and exploited an opportunity created by The Doomsday Microsoft Government Email Data Breach. After he was fired for IT incompetence by President Trump after the 2020 U.S. Presidential Election in November 2020, Chris Krebs started an IT security consulting firm with, incredibly, Alex Stamos, the IT incompetent Yahoo-then-Facebook Chief Information Security Officer (CISO) who was responsible for both Yahoo's and then Facebook's massive data breaches; see Yahoo-Then-Facebook CISO Alex Stamos Allows Yet Another Massive Data Breach. The first customer of the Krebs Stamos Group was SolarWinds, the software company whose biggest customer was the federal government and that most are blaming — although Microsoft was really to blame — for The Doomsday Microsoft Government Email Data Breach. Microsoft will also, if they haven't already, hire the Krebs Stamos Group, which will also probably be a violation of Title 18 (crimes and criminal procedure) of U.S. Code, § 207 (restrictions on former officers, employees, and elected officials of the executive and legislative branches); see IT Hiring: IT Incompetence Breeds Disloyalty and Corruption in Principles of IT Incompetence.