Interests

  • Biography & Memoir
  • Business & Leadership
  • Fiction & Literature
  • Politics & Economy
  • Health & Wellness
  • Society & Culture
  • Happiness & Self-Help
  • Mystery, Thriller & Crime
  • History
  • Young Adult

Browse by

  • Books
  • Audiobooks
  • News & Magazines
  • Sheet Music
Browse all
UploadSign inJoin

Letter From Jeh Johnson

Uploaded by Daily Caller News Foundation
United States Department Of Homeland SecurityComputer SecurityNational SecuritySecuritiesTechnology
0.0 (0)
Embed
Description: December 12, 2016 letter from DHS Secretary Jeh Johnson to Georgia Secretary of State Brian Kemp about DHS intrusions into the Georgia network
View More
December 12, 2016 letter from DHS Secretary Jeh Johnson to Georgia Secretary of State Brian Kemp about DHS intrusions into the Georgia network
Copyright: © All Rights Reserved
Download as PDF, TXT or read online from Scribd
Flag for inappropriate content

Related

  • Letter to Sharon Devine re: Pan Am Shelter
    by Christina Wilkinson
  • Notice: Agency information collection activities; proposals, submissions, and approvals
    by Justia.com
  • Domestic WMD Incident Management Legal Deskbook
    by GustavBlitz
  • BUDGET-2008-APP-1-11
    by FRASER: Federal Reserve Archive
  • 02271-dhs
    by losangeles
  • 14-cv-01966-Document7-12_12-4-14
    by PixelPatriot
  • Privacy Pia Emailsecuregateway 032012 DHS Privacy Documents for Department-wide Programs 08-2012
    by Constitutionalist
  • Notice: Agency information collection activities; proposals, submissions, and approvals
    by Justia.com
  • Dept. Homeland Security TECHNICAL DIVISIONAL REQUIREMENTS LONG RANGE BROAD AGENCY ANNOUNCEMENT (LRBAA) BAA 10-01 FOR THE DEPARTMENT OF HOMELAND SECURITY SCIENCE AND TECHNOLOGY DIRECTORATE
    by Phillip Stilley
  • Global Knowledge
    by cameo001
  • Michigan Office of Children's Ombudsman Annual Report 2008
    by Beverly Tran
  • CREW: U.S. Department of Homeland Security: U.S. Customs and Border Protection: Regarding Border Fence: 5/28/2010 - RE_1 Eagle Pass Redacted) 2
    by CREW
  • CREW: U.S. Department of Homeland Security: U.S. Customs and Border Protection: Regarding Border Fence: FW_GIS meeting (redacted) 2
    by CREW
  • 74 Harknett and Stever (2011).pdf
    by Twins Daddy
  • Bright Future With CAPM Certification
    by deushomo
  • A Study on Canadian IT Security Practices
    by jbascribd
  • Vl0210 Cyber Warfare
    by Kaarthik
  • ABCs of Disaster Recovery Testing_hb_final
    by Krešimir Puklavec
  • Notice: Waterfront facilities; letters of recommendation: Northern Star Natural Gas LLC liquified natural gas project Bradwood, Clatstop Count, OR; correction
    by Justia.com
  • rapid7-penetration-testing-services-brief.pdf
    by ellococareloco
  • EWI on Cybersecurity
    by InterSecuTech
  • BAZELE-antreprenoriatului
    by Constantin Caliman
  • HOUSE HEARING, 108TH CONGRESS - INDUSTRY SPEAKS ON CYBERSECURITY
    by Scribd Government Docs
  • US Treasury: 200320064fr
    by Treasury
  • Notice: Meetings: National Security Telecommunications Advisory Committee
    by Justia.com
  • Israeli Cyber Week 2014
    by Israel a Catalunya
  • Wilson Homeland Sec Print
    by Price Lang
  • T8 B5 DOT John Flaherty Fdr- Entire Contents- April 04 MFR 819
    by 9/11 Document Archive

Similar to Letter From Jeh Johnson

Skip carousel
  • Letter to Sharon Devine re
  • Notice
  • Domestic WMD Incident Management Legal Deskbook
  • BUDGET-2008-APP-1-11
  • 02271-dhs
  • 14-cv-01966-Document7-12_12-4-14
  • Privacy Pia Emailsecuregateway 032012 DHS Privacy Documents for Department-wide Programs 08-2012
  • Notice
  • Dept. Homeland Security TECHNICAL DIVISIONAL REQUIREMENTS LONG RANGE BROAD AGENCY ANNOUNCEMENT (LRBAA) BAA 10-01 FOR THE DEPARTMENT OF HOMELAND SECURITY SCIENCE AND TECHNOLOGY DIRECTORATE
  • Global Knowledge
  • Michigan Office of Children's Ombudsman Annual Report 2008
  • CREW
  • CREW
  • 74 Harknett and Stever (2011).pdf
  • Bright Future With CAPM Certification
  • A Study on Canadian IT Security Practices
  • Vl0210 Cyber Warfare
  • ABCs of Disaster Recovery Testing_hb_final
  • Notice
  • rapid7-penetration-testing-services-brief.pdf
  • EWI on Cybersecurity
  • BAZELE-antreprenoriatului
  • HOUSE HEARING, 108TH CONGRESS - INDUSTRY SPEAKS ON CYBERSECURITY
  • US Treasury
  • Notice
  • Israeli Cyber Week 2014
  • Wilson Homeland Sec Print
  • T8 B5 DOT John Flaherty Fdr- Entire Contents- April 04 MFR 819
  • Velocity
  • In-Q-Tel's Daniel Geer Explains Dangers of "Cyber-Industrial Complex". Congress Needs to Listen. Released July 31, 2011
  • Letter From Jeh Johnson
carousel previouscarousel next
 
The Honorable Brian
P.
Kemp Secretary
o
State State
o
Georgia 214 State Capitol Atlanta, GA 30334 Dear Secretary Kemp: December
12
, 2016
ecretary
U S Department
o
Homeland Security
Was
hington, DC 20528
Homeland Security
Thank you for your December 8, 2016 letter. Due
to
the publicity that your letter has generated, I wanted to respond promptly to you with initial findings. Working with your staff, we have been able to locate, in prompt fashion, the workstation from which the activity that you highlight in your letter occurred. We have reviewed the technical logs and interviewed the user
o
this computer. The user is a contractor
o
our Federal Law Enforcement Training Center (FLETC) located in Georgia; he
is
not a member with our cybersecurity team. We interviewed the contractor and he told
us
that he accessed your website as part
o
his normal job duties at FLETC to determine whether incoming FLETC contractors and new employees had a certain type
o
professional license -a service that, as I understand
it
your website provides to the general public. The technical information we have corroborates the contractor s statement, and indicates normal Microsoft Internet Explorer interaction by the contractor s computer with your website. Most important: there was no scanning
o
your systems by our cybersecurity experts. As stated before, the contractor using your website
is
not one
o
our cybersecurity experts, nor were these inquiries made for the purpose
o
assessing or determining the security
o
your website. As we have explained
to
you and other state election officials, when DHS conducts a cybersecurity scan
o
a network or system, we do so only with the cooperation and consent
o
the system owner.
www dhs gov

More From This User

Skip carousel
  • DHS Respone to Secretary Merrill 03.06.17
  • Sea to Shore PCS Transfers by Gender (FOIA)-3
  • resp 101
  • 2.14.17 Flowers Ethics FOIA Request
  • Wade PRPs
  • PADOH EastwickCancerIncidenceAnalysis (Feb 2012)
  • EPA
  • FBI Civil Rights Email
  • American Target Advertising Brief
  • Letter to President-Elect Trump
  • Signed Letter to Kemp Re Georgia Secretary of State Network
  • 2017.01.18 USDA Ethics FOIA
  • 9108588
  • FINAL Signed CCJR Letter (September 2015)
  • Blome Finalizing EGl Closure
  • Free Tibet- Secretary Kerry Re Tibet Water Resources Ltd 5-17-16-2
  • Epa Fra Policy 2-10-15
  • ORR Burwell Response Re Child Abuse
  • ORR Burwell Response Re Child Abuse
  • Hegseth Letter
  • Embargoed Sigar 17 13 Sp
  • Hits on Shanghai Expo
  • ESleuth Investigation 10-26-16
  • Initial Decision of 10-20-2016
carousel previouscarousel next
About
  • Browse books
  • Site directory
  • About Scribd
  • Meet the team
  • Our blog
  • Join our team!
  • Contact Us
Partners
  • Publishers
  • Developers / API
Legal
  • Terms
  • Privacy
  • Copyright
Support
  • Help
  • FAQ
  • Accessibility
  • Press
  • Purchase help
  • AdChoices
Memberships
  • Join today
  • Invite Friends
  • Gifts
    Scribd on AppstoreScribd on Google Play
Copyright © 2017 Scribd Inc. .Terms of service.Accessibility.Privacy.Mobile Site.Site Language:
English
中文
Español
العربية
Português
日本語
Deutsch
Français
Turkce
Русский язык
Tiếng việt
Język polski
Bahasa indonesia
Sign up to vote on this title
UsefulNot useful
Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

We've moved you to where you read on your other device.

Get the full title to continue

Get the full title to continue reading from where you left off, or restart the preview.