U.S. Cyber Command Hires Woman With Fake Computer Degrees To Protect National Networks – Laura Crabtree Callahan

Of course, the “Cyber Command” isn’t really about protecting the national infrastructure.  It is about setting the stage for a complete takeover of the internet by government regulators.

In lieu of this, Hussein’s appointment of this woman to a top security team is perfectly reasonable:

In 2004, Callahan was forced to resign from Homeland Security after a congressional investigation revealed she committed résumé fraud and lied about her computer credentials.

Investigators found that Callahan paid a diploma mill thousands of dollars for her bachelors, masters and doctorate degrees in computer science. She back-dated the degrees, all obtained between 2000 and 2001, to appear as if she earned them in 1993, 1995 and 2000, respectively. She landed the job of deputy DHS chief information officer in 2003.

I mean seriously.

This woman claimed she had a doctorate in computer science from a diploma mill and got a job as the Department of Homeland Security’s Chief Information Officer?

Are you shitting me?

This is the same woman who was involved in the Project X email scandal where 24,000 emails were stolen from a government contractor’s systems on her watch.  When contractors tried to report the breach, Callahan threatened to jail them.

The entire situation is so ludicrous that I can barely wrap my head around it.

The article goes on to state:

As WND first reported, several Northrop Grumman contractors working on the White House computer system testified in early 2000 that Callahan (née Laura Crabtree) threatened to jail them if they talked about the “Project X” email scandal even to their spouses.

One technician, Robert Haas, said she warned him “there will be a jail cell with your name on it” if he breathed a word about the glitch to anybody outside their office.

But wait!  There’s more!

Her name may sound familiar, particularly to WorldNetDaily readers. Callahan is the same Clinton White House official who worked on a 1996 e-mail server conversion project that resulted in a mysterious server “glitch” that kept more than a million e-mails covered by subpoena from being turned over to investigators in the Lewinsky, Travelgate, Filegate and Chinagate cases.

This woman is being strategically placed into important positions by the Hussein administration for the express purpose of creating data breaches into US systems.  If you simply google this woman’s name, it is like reading an encyclopedia of data breaches, data destruction, and broken systems.

She is an operative working with the Hussein administration to undermine US security for the sake of perpetuating a situation that leads to an excuse for the government to takeover the web.  There is absolutely no possible way that this is pure government incompetence.

  • dkmeller

    Government is by definition, a  collection of shameless and useless frauds!

    What passes for “higher education” and its so-called degrees and diplomas is a shameless fraud, as are “publik skoolz”  which feed the system both for the so-called students and so-called teachers, This is the case whether the “diplomas” were “fake” or not! Feminism and affirmative action–the required hiring and promotion of women in defiance of their actual employability (especially in computers and the physcial sciences) which formed the underpinning of the policy which hired her–and people like her–are also shameless frauds!

    When fraud and deception is uncovered here in and by the government (or its favored corporations) they NEVER retract their falsehoods, they never tell the truth, but cover it up with more lies, and more lies after that!

    Ain’t government grand?

    David K. Meller

  • fight it

    “When injustice becomes law, rebellion becomes duty” – Thomas Jefferson

  • Confidential

    I want to like this article, I really do.  Unfortunately the author looses credibility by referring to the president using only his middle name.  I’m sure the author is trying to make a statement and stir negative emotions associated with the now dead dictator however the resemblances between these leaders end with the name. This really is a childish tactic which only calls the rest of the article into question.

    • Mary

      Absolutely right. 

      OK, michaelsuede, we get it.  You don’t like Obama.  Neither do I, but name-calling is juvenile and undermines the credibility of the entire article.

  • I am sure the writer is attempting to make a statement and stir
    destructive feelings linked with the now dead tyrant however the
    resemblances between these leaders end with the name. This truly is a
    childish method which only calls the remainder of the text into question

    • I don’t understand your logic.

      While I agree Hussein is a destructive tyrant, Hussein is still alive and in power.

      So I’m not sure to which dead guy you are referring to.