In other presentations, Barr makes clear that his expertise in ???Information Operations??? covers forms of hacking like a ???computer network attack,??? ???custom malware development,??? and ???persistent software implants.??? The presentation shows Barr boasting that he had knowledge of using ???zero day??? attacks to exploit vulnerabilities in Flash, Java, Windows 2000 and other programs to ste