Cold War gives way to Code War: CIA veteran

U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia.
  U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia. Photograph by: HYUNGWON KANG, Reuters

Agence France-Presse August 4, 2011 8:10 AM

LAS VEGAS - A U.S. counterterrorism expert warned Wednesday that the Cold War has given way to a "Code War" in which cyber weapons can be unleashed with devastating consequences.

Nations will launch online attacks and extremist groups will add cyber attacks to their tactics, according to Cofer Black, who spent 28 years in the Central Intelligence Agency before becoming a private consultant.

"You had the Cold War, the global war on terrorism... now you have the Code War," Cofer said at a major Black Hat computer security gathering in Las Vegas.

"The natural thing will be for Al-Qaeda to fall back to things that are small and agile," he continued. "They will enter the cyber world."

It will fall to computer security specialists such as the 8,500 Black Hat attendees to fortify defenses against such attacks and overcome the challenge of identifying culprits.

Figuring out who is behind cyber attacks is imperative as the United States and other countries weigh the option of real-world military retaliation for virtual incursions, according to Cofer.

"Boy, hold onto your seat," he told the gathering. "I could see myself in the situation room on the receiving end of a technical attack with physical dimensions saying ‘Who did this and what are we going to do?’"

A sophisticated hacking campaign exposed earlier by computer security firm McAfee was no surprise to Cofer, who saw it as a sign of more to come.

The United States, United Nations, defense contractors and the International Olympic Committee were targets of a massive global cyber spying campaign, McAfee said, with China seen as the likely culprit.

California-based McAfee said in a report that it had identified 72 victims in 14 countries of a hacking effort dubbed "Operation Shady RAT," which it traced back to at least 2006.

McAfee vice president for threat research Dmitri Alperovitch described it as a "five-year targeted operation by one specific actor" but declined to identify the country responsible.

The "compromised parties" included the governments of Canada, India, South Korea, Taiwan, the United States and Vietnam, McAfee said, as well as a U.S. Department of Energy research laboratory and around a dozen U.S. defense contractors.

Others included computer networks of the United Nations, the Association of Southeast Asian Nations, the International Olympic Committee, Asian and Western national Olympic committees and the Montreal-based World Anti-Doping Agency.

Alperovitch, the lead author of the report, said the intrusions into the systems of defense contractors targeted "sensitive military technologies."

"We believe based on the targeting and the scale and the impact of these operations, and the fact that they didn’t just have an economic gain in mind but also political and military, that that this is clearly a nation-state but we’re not pointing the finger at anyone," Alperovitch said.

James Lewis, a cybersecurity expert at the Center for Strategic and International Studies, said the evidence may not be "conclusive in a legal sense," but suspicion points toward China.

"Validation of threat and attack will come into your world," Cofer told the Black Hat gathering.

"Chaos and confusion can be inhibitors to clear action," he continued. "There is a delay to validation, and this is a great problem."

Attribution is challenging because attackers can obscure trails with tactics such as bouncing off computer servers in various countries or U.S. ing virus-infected computers without owners knowing.

Collaboration between various players on the Internet could make it harder for hackers to hide, according to Microsoft Security Response Center director Mike Reavey.

"There are ways that the industry can do more to make attribution easier," Reavey said. "You can apply tools we U.S. e to fight crime in the physical world to the cyber world."

Views: 39

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"With all due respect this guy comes off as a drunken asshole and he didn't even  know who…"
yesterday
Doc Vega posted a blog post

Was a Planned Civil War Averted?

We are living in sadly historic times where good and evil are in battle all the time. Not that this…See More
yesterday
Sandy posted a photo
Sunday
Less Prone posted a video

President Trump addresses U.N. General Assembly - FULL SPEECH

President Donald Trump speaks at the United Nations General Assembly in New York City.Full video here: https://www.c-span.org/event/white-house-event/preside...
Sunday
Burbia posted a video

2 MIN AGO: Western Provinces MAJOR New WEXIT Announcement - Canada EXPLODES!

In a stunning turn of events, Western provinces just made a major new WEXIT announcement — and it’s shaking the foundations of Canadian unity. Is Western sep...
Saturday
Doc Vega posted a blog post

How You Provoke a Civil War

In the world of counter intelligence which is simply one aspect of many pertaining to asymmetrical…See More
Friday
Burbia commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"I don't follow as much with Josh Reeves than I use to. He seems to be a documentary producing…"
Friday
Burbia posted a video

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

DONATE-paypal-dayglow76@yahoo.comCashapp-reevesradioVenmo-Josh-Reeves-61FILMS AND AUDIOBOOKS DOWNLOAD STORE-https://store.payloadz.com/results/242828-josh-re...
Friday
Doc Vega posted blog posts
Thursday
tjdavis posted a video

CHARLIE KIRK VIDEO THAT KEEPS GETTING REMOVED OFF OF SEVERAL PLATFORMS

I had not planned to share this publicly, but I believe Advar, who spoke with Charlie Kirk while I was very ill, would have wanted me to. After my interview ...
Thursday
pohonemas33 team commented on Chris of the family Masters's photo
Thumbnail

Gold-Coast-Message

"untuk bermain slot, kamu cukup kunjungi situs kacang99 pasti langsung gacor"
Wednesday
Doc Vega posted blog posts
Wednesday
Burbia posted a blog post

Former President Trump?

When was this article written? It is attributed to Victor Davis Hanson. He is a Fellow at Hoover…See More
Sep 22
Doc Vega posted a blog post

Don’t Go Hunting For Bigfoot

It is October 19, 2019 at 5:46 AM. This will be the last time any visual evidence of Mark is seen…See More
Sep 22
tjdavis posted a video

Most Corrupt Series: Elizabeth Warren | Forgotten History

Elizabeth Warren has built her reputation as a "reformer", but her political career has also drawn sharp criticism. Questions have been raised about her fina...
Sep 19
Doc Vega commented on Doc Vega's blog post Ashrams and Moonies Perfect Case for Mind Control
"less prone, Thanks for your support Buddy! "
Sep 18
Doc Vega posted a photo

main-thumb-ti-6724328-100-cnsgqkrgkrhyeyyerazynmuwoplecnbx

When will they put Trump on Mt. Rushmore?
Sep 18
Doc Vega's 4 blog posts were featured
Sep 18
Burbia's blog post was featured

Charlie Kirk Assassination

September 10th 2025 in Utah Turning Point USA CEO has been assassinated. Coincidentally,  answering…See More
Sep 18
Charles Magus's blog post was featured

FURTHER PROOF OF WALK-INS! Prisoners of the Dulce Base by Sherry Shriner

There is a real connection between the Cabal and what is happening at this Undergroung…See More
Sep 18

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted