Ex - CIA Spy Confirms That The US And Russia Are At Cyber War

A former CIA operative who now serves as a member of Congress indicated at a recent public event that the US has engaged in "offensive cyber operations" against Russia, a revelation that comes while the two countries are effectively squaring off in Syria and Ukraine.

The disclosure of the operations, which are likely classified, may have skirted the legal line with some coy phrasing.

“I got a degree in computer science. I did some offensive cyber operations when I was in the CIA,” said Rep. Will Hurd (R-Texas), who was at the agency from 2000 to 2009.

Hurd was speaking at an event organised by The Atlantic's Steve Clemons. “Were you the Stuxnet dude?” Clemons quickly interjected, referring to an alleged joint US-Israeli effort to sabotage Iranian nuclear infrastructure in 2009.

“No, no,” Hurd said. “Let’s just say I’ll probably never be invited to Moscow anytime soon. And I’m not too concerned with that."

Several media outlets, including The Huffington Post, have previously reported that hackers linked to Russia have launched cyberattacks against US government agencies, but attacks by the US government against Moscow are lesser known.

A spokesman for Hurd downplayed the significance of his remarks. “I’ve heard him say that exact same thing before. But he has never, even in private conversations, gone beyond that or gotten more specific,” Shana Teehan said. “I assume he’s being discreet for a reason.”

It is likely that Hurd received guidance from the CIA before he departed about the degree of specificity in which he could discuss his past work. He has dismissed the idea that he is prohibited from talking at all about his time in the CIA as “purely apocryphal” and cited his experience as an undercover officer on his campaign website.

The freshman lawmaker quickly gained a reputation as “one of Congress’s top thinkers on cybersecurity,” said Peter Singer, a senior fellow at the New America Foundation who hosted Hurd on a cybersecurity podcast last year. It’s unclear if Hurd went past what he is allowed to disclose. A CIA spokesman declined to comment on whether that information is classified.

Hurd likes to tell people that he decided to run for Congress after briefing lawmakers as an undercover CIA agent and discovering how poorly they understood the Middle East. With undercover postings in India, Pakistan and Afghanistan, Hurd said that during his nine-year stint at the agency, he “chased al Qaeda all over the world, chased Iranian scientists” -- but sometimes, the members he briefed knew barely anything about the issues at hand, and often couldn't be bothered to learn.

“To be frank, I was pretty disappointed with the caliber of our elected officials,” Hurd said recently, describing a scene in which he heard one member ask how soon the briefing would be over so they could get on with the pressing business of rug shopping in Kabul. Hurd recalled that one of the most senior members present at the briefing asked about the difference between Sunni and Shiite Islam. “It’s OK for my big brother not to know that because he sells cable -- but for a guy who’s sending our boys and girls to places like Iraq, Afghanistan, Yemen -- unacceptable,” said Hurd.

Ein News: http://bit.ly/1PRvWjD

« Israeli Cybertech Startups Set Trends
Know Your Enemy: The Most Popular Hacking Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

Datiphy

Datiphy

Datiphy's data-centric security platform uses behavioral analytics, and data-centric auditing and protection capabilities to mitigate risk.

Government Communications Headquarters (GCHQ)

Government Communications Headquarters (GCHQ)

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

Lares Consulting

Lares Consulting

Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing and coaching.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Cyber Resilient Energy Delivery Consortium (CREDC)

Cyber Resilient Energy Delivery Consortium (CREDC)

CREDC performs multidisciplinary R&D in support of the Energy Sector Control Systems Working Group’s Roadmap of resilient Energy Delivery Systems (EDS).

Serverless Computing

Serverless Computing

Serverless Computing London will help architects, developers and CIOs decide on the best path to a more efficient, scalable and secure computing future.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.