Ex - CIA Spy Confirms That The US And Russia Are At Cyber War

A former CIA operative who now serves as a member of Congress indicated at a recent public event that the US has engaged in "offensive cyber operations" against Russia, a revelation that comes while the two countries are effectively squaring off in Syria and Ukraine.

The disclosure of the operations, which are likely classified, may have skirted the legal line with some coy phrasing.

“I got a degree in computer science. I did some offensive cyber operations when I was in the CIA,” said Rep. Will Hurd (R-Texas), who was at the agency from 2000 to 2009.

Hurd was speaking at an event organised by The Atlantic's Steve Clemons. “Were you the Stuxnet dude?” Clemons quickly interjected, referring to an alleged joint US-Israeli effort to sabotage Iranian nuclear infrastructure in 2009.

“No, no,” Hurd said. “Let’s just say I’ll probably never be invited to Moscow anytime soon. And I’m not too concerned with that."

Several media outlets, including The Huffington Post, have previously reported that hackers linked to Russia have launched cyberattacks against US government agencies, but attacks by the US government against Moscow are lesser known.

A spokesman for Hurd downplayed the significance of his remarks. “I’ve heard him say that exact same thing before. But he has never, even in private conversations, gone beyond that or gotten more specific,” Shana Teehan said. “I assume he’s being discreet for a reason.”

It is likely that Hurd received guidance from the CIA before he departed about the degree of specificity in which he could discuss his past work. He has dismissed the idea that he is prohibited from talking at all about his time in the CIA as “purely apocryphal” and cited his experience as an undercover officer on his campaign website.

The freshman lawmaker quickly gained a reputation as “one of Congress’s top thinkers on cybersecurity,” said Peter Singer, a senior fellow at the New America Foundation who hosted Hurd on a cybersecurity podcast last year. It’s unclear if Hurd went past what he is allowed to disclose. A CIA spokesman declined to comment on whether that information is classified.

Hurd likes to tell people that he decided to run for Congress after briefing lawmakers as an undercover CIA agent and discovering how poorly they understood the Middle East. With undercover postings in India, Pakistan and Afghanistan, Hurd said that during his nine-year stint at the agency, he “chased al Qaeda all over the world, chased Iranian scientists” -- but sometimes, the members he briefed knew barely anything about the issues at hand, and often couldn't be bothered to learn.

“To be frank, I was pretty disappointed with the caliber of our elected officials,” Hurd said recently, describing a scene in which he heard one member ask how soon the briefing would be over so they could get on with the pressing business of rug shopping in Kabul. Hurd recalled that one of the most senior members present at the briefing asked about the difference between Sunni and Shiite Islam. “It’s OK for my big brother not to know that because he sells cable -- but for a guy who’s sending our boys and girls to places like Iraq, Afghanistan, Yemen -- unacceptable,” said Hurd.

Ein News: http://bit.ly/1PRvWjD

« Israeli Cybertech Startups Set Trends
Know Your Enemy: The Most Popular Hacking Methods »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

Verint Systems

Verint Systems

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Saepio Solutions

Saepio Solutions

Saepio promote an all-encompassing approach to cybersecurity, ensuring the appropriate balance of budget and resource across Policy, Product and People.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

Seven AI

Seven AI

Seven AI develops cyber security software designed to identify online threats.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.