Putin Announces U.S. as a Threat to Security

Heh….Obama is no threat to anyone except Christians,legal gun owners and to taxpayers. But in case you are inclined to do some copying and pasting, here is the document. The United States under Barack Obama has refused to remain on a global stage and work to find peace through diplomacy or even militarily. Putin continues to challenge NATO and Putin will continue to be aggressive towards NATO members.

The document outlines the national interests and strategic priorities of the nation. Putin signed the executive order Thursday, establishing a new posture toward the NATO bloc, which has seen its relationship with Russia deteriorate since the crisis in Ukraine, which began in 2014.

Russian news agency Tass quotes the strategy, which cites a NATO military buildup, and “the alliance’s approach to Russia’s borders,” as a threat to Russia’s national security. The document says the organization is illegally extending its reach.

Putin Names US As Threat To Russian National Security In New Strategy Document

Durden/Zerohedge: It’s no secret that relations between Moscow and the West have deteriorated the post-Cold War lows.

The annexation of Crimea and the conflict in Ukraine have pushed the two sides to the brink of a Baltic battle while Russia’s intervention in Syria changed the West’s calculus when it comes to pushing for regime change in the Mid-East.

Earlier this year, in a hilariously accurate assessment of US foreign policy, Vladimir Putin’s Security Council issued a statement entitled “About The US National Security Strategy“. Here are some notable excerpts (translated):

The armed forces are considered as the basis of US national security and military superiority is considered a major factor in the American world leadership. While maintaining the continuity of the plants to use military force unilaterally and anywhere in the world, as well as to maintain a military presence abroad…

 

Significant efforts by the US and its allies will be directed to the formation of anti-Russian policy states, with which Russia has established partnership relations, as well as to reduce Russian influence in the former Soviet Union.

 

Continue the policy of preserving the global dominance of the United States, increasing the combat capabilities of NATO, as well as to strengthen the US military presence in the Asia-Tihokeanskom region. Military force will continue to be considered as the primary means of ensuring national security and interests of the United States. 

 

Becoming more widespread to eliminate unwanted US political regimes acquire advanced technology “color revolutions” with a high probability of their application in relation to Russia.

Thus, the strategy was developed on the basis of American exceptionalism, the right to take unilateral action to protect and promote the interests of the United States in the world and bears the active anti-Russian charge.

In other words, Moscow views US foreign policy as decidedly Russophobic and The Kremlin pretty clearly sees Washington as a threat to Russia’s security. Well on New Year’s Eve, Vladimir Putin made it official by signing a new appraisal of his country’s national security which, for the first time, lists the US as a threat. Here’s Reuters:

The document, “About the Strategy of National Security of Russian Federation”, was signed by President Vladimir Putin on New Year’s Eve. It replaces a 2009 version, endorsed by then- President Dmitry Medvedev, the current prime minister, which mentioned neither the United States not NATO.

 

It says Russia has managed to heighten its role in solving global problems and international conflicts. That heightened role has caused a reaction by the West.

 

“The strengthening of Russia happens against the background of new threats to the national security, which has complex and interrelated nature,” the document goes on to note.

 

Conducting an independent policy, “both international and domestic” has caused “counteraction from the USA and its allies, which are striving to retain their dominance in global affairs.”

 

That in turn is likely to lead to “political, economical, military and informational pressure on Russia.”

The document also implicates Washington in staging “anti-constitutional coup d’etat in Ukraine”, which is of course true. The result: a protracted civil war and a US puppet government that is less popular than its Russia-backed predecessor.

The document also reiterates Russia’s concerns about the expansion and strengthening of NATO. Here’s an excerpt:

The buildup of the military potential of the North Atlantic Treaty Organization (NATO) and vesting it with global functions implemented in violations of norms of international law, boosting military activity of the bloc’s countries, further expansion of the alliance, the approach of its military infrastructure to Russian borders create a threat to the national security.”

The references are to the multiple war games and snap drills NATO has conducted near Russia’s borders over the past nine months and to the inclusion of Montenegro in the alliance (documented here).

Of course one doesn’t necessarily have to interpret the document in the way the Western media has. Compare and contrast the following two headlines, the first from Reuters and the second from Sputnik:

Those two pieces refer to the very same document although you wouldn’t know it by what’s implied. Here are some excerpts from the Sputnik piece:

The strategy defines main venues of Russia-US partnership on the global arena as the improvement of mechanisms of arms controls, the strengthening of mutual trust measures, joint efforts in the area of WMD non-proliferation, expanded cooperation in the fight against terrorism as well as in the resolution of regional conflicts.

 

“Russia supports the strengthening of mutually-beneficial cooperation with the European countries, the European Union…with the goal of developing a transparent system of collective security in the Euro-Atlantic region based on clearly-defined legal agreements,” the text of the document, posted on Thursday on the government’s legal information portal, says.

 

According to the document, Russia continues to view NATO expansion and military activities near Russian borders as a major threat to its security and a violation of international laws, but is ready to develop relations with the Alliance in the interests of the European security.

The takeaway here probably isn’t whether or not the US is listed as a “threat” to Russia’s national security but rather that The Kremlin if officially recognizing Russia’s role in a kind of new world order wherein all matters of geopolitical significance are no longer decided in Washington.

In other words, the era of unipolarity and US hegemony (which has lasted nearly a quarter century) has come to an end and Russia’s discussion of the backlash from the US and NATO isn’t so much an effort to cast aspersions (i.e. to call this country or that country “a threat”) as it is to outline and assess the new reality.

Cheyenne Mtn: Pentagon Went Pro-Active, EMP

Given the recent missile tests by Iran and North Korea, there is cause for attention, further, Russia is never out of the equation. Paying attention to offensive measures and completion dates is an indication of the Pentagon having clues, seeing violations of agreements and resolutions and adversarial military build up of advanced technology.

Pentagon Moves More Communications Gear into Cheyenne Mountain

The gear is being moved into Cheyenne Mountain to protect it from electromagnetic pulses, said Adm. William Gortney, commander of U.S. Northern Command and NORAD.

“[T]here is a lot of movement to put capability into Cheyenne Mountain and to be able to communicate in there,” Gortney said Tuesday during a news briefing at the Pentagon.

Electromagnetic pulses, or EMPs, can occur naturally or by manmade devices such as nuclear weapons. For years, the Pentagon has been working on building weapons that could fry the electronic equipment of an enemy during battle.

“Because of the very nature of the way that Cheyenne Mountain is built, it’s EMP-hardened,” Gortney said. “It wasn’t really designed to be that way, but the way it was constructed makes it that way.”

Being able to communicate during an EMP attack is important, Gortney said.

“My primary concern was: ‘Are we going to have the space inside the mountain for everybody that wants to move in there?’ … but we do have that capability,” he said.

Last week, the Pentagon awarded defense firm Raytheon a $700-million contract to install new equipment inside the mountain. The company said the contract, which runs through 2020, will “support threat warnings and assessments for the North American Aerospace Defense Command Cheyenne Mountain Complex.”

The Pentagon’s March 30 contract announcement said Raytheon will provide sustainment services and products supporting the Integrated Tactical Warning/Attack Assessment (ITW/AA) and Space Support Contract covered systems. “The program provides ITW/AA authorities accurate, timely and unambiguous warning and attack assessment of air, missile and space threats,” it said.

Since 2013, the Pentagon has awarded contracts worth more than $850 million for work related to Cheyenne Mountain.

The Colorado complex is the embodiment of the Cold War, an era when bunkers were built far and wide to protect people and infrastructure. Cheyenne Mountain was the mother of these fallout shelters, a command center buried deep to withstand a Soviet nuclear bombardment. The complex was locked down during the Sept. 11, 2001, attacks on New York and Washington.

Air Force Space Command runs the mountain and maintains sleeping quarters, fresh water and a power station that would be used during an attack.

Almost a decade ago, NORAD pulled most of its staff out of Cheyenne Mountain and moved its command center into the basement of a headquarters building at nearby Peterson Air Force Base. Since then, Cheyenne Mountain has served as a back-up site.

Now the Cheyenne Mountain staff is set to grow again. Still, the command center at Peterson will remain operational, Gortney said.

In June 2013, then-U.S. Defense Secretary Chuck Hagel gave a speech in front of the mammoth blastproof doors on the roadway leading into the mountain.

“These facilities and the entire complex of NORAD and NORTHCOM represent the nerve center of defense for North America,” he said at the time.

***

MissileThreat: The U.S. has no ballistic-missile early-warning radars or ground-based interceptors facing south and would be blind to a nuclear warhead orbited as a satellite from a southern trajectory. The missile defense plans were oriented during the Cold War for a northern strike from the Soviet Union, and they have not been adapted for the changing threats.

The Pentagon was wise to move Norad communications back into Cheyenne Mountain and to take measures elsewhere to survive an EMP attack. But how are the American people to survive? In the event of a yearlong nationwide blackout, tens of millions of Americans would perish from starvation and societal chaos, according to members of the Congressional EMP Commission, which published its last unclassified report in 2008.

Yet President Obama has not acted on the EMP Commission’s draft executive order to protect national infrastructure that is essential to provide for the common defense. Hardening the national electric grid would cost a few billion dollars, a trivial amount compared with the loss of electricity and lives following an EMP attack. The U.S. also should deploy one of its existing transportable radars in the Philippines to help the ground-based interceptors at California’s Vandenberg Air Force defend the country against an attack from the south.

Congress also has failed to act on the plans of its own EMP commission to protect the electric grid and other civilian infrastructure that depends on a viable electric grid—such as communications, transportation, banking—that are essential to the economy. In recent years, the GRID Act, the Shield Act, and the Critical Infrastructure Protection Act have gained bipartisan and even unanimous support in the House, yet they died in the Senate.

States are not waiting for Washington to act. Maine and Virginia have enacted legislation and undertaken serious studies to consider how to deal with an EMP attack. Florida’s governor and emergency manager are considering executive action to harden their portion of the grid. Colorado legislators are holding hearings on legislation to protect their citizens. Texas, North Carolina, South Carolina, Indiana, Idaho and New York have initiatives in various stages to deal with an EMP attack.

Afghanistan is a Growing Festering War, Again

WASHINGTON —Afghanistan’s security situation is so tenuous that the top U.S. commander there wants to keep as many U.S. troops there as possible through 2016 to boost beleaguered Afghan soldiers and may seek additional American forces to assist them.

Army Gen. John Campbell said in an interview with USA TODAY that maintaining the current force of 9,800 U.S. troops to train Afghan forces and conduct counter-terrorism raids is vital, and that the scheduled reduction to 5,500 by Jan. 1, 2017, should be put off as long as possible.

“My intent would be to keep as much as I could for as long as I could,” Campbell said by telephone from Kabul. “At some point it becomes physics. I’m going to have to get them out.”

News from Afghanistan in 2015, when American troops ended their daily combat mission after 14 years, has been grim. Taliban insurgents stormed the northern provincial capital of Kunduz in October and were pushed out after fierce fighting that included an inadvertent attack by a U.S. warplane on hospital that killed 42 civilians. In the south, Taliban insurgents have battered Afghan troops in Helmand province; an al-Qaeda training camp was also discovered there and destroyed. Islamic State fighters have set up outposts in the east. Last week, six U.S. airmen were killed by a suicide bomber outside Bagram Air Base.

The Pentagon’s own quarterly assessment of security in Afghanistan this month noted that in “the second half of 2015, the overall security situation in Afghanistan deteriorated with an increase in effective insurgent attacks and higher (Afghan security force) and Taliban casualties.”

Campbell will be Washington soon to brief senior leaders on the security situation in Afghanistan and troop levels required for their missions. He declined to offer specifics on his recommendations, saying they were classified. More here from USAToday.

Report: Russia Signals Readiness to Ease UN Sanctions Against Taliban

A senior Russian diplomat reportedly said Moscow is ready “to show flexibility” on possibly easing United Nations Security Council sanctions imposed on Afghanistan’s Taliban, which has intensified attacks against U.S. service members and American-trained Afghan security forces.

Breitbart: The Taliban recently claimed responsibility for killing six U.S. troops, and the group has been behind a record number of casualties incurred by the Afghan National Defense and Security Forces (ANDSF), which includes army, police, and militia units.

“He appeared to be suggesting that major powers should consider an accommodation with the Taliban to stop the spread of rival Islamic State [ISIS/ISIL] militants, deemed a much bigger, international menace by the West,” Reuters reports, referring to Zamir Kabulov, a department chief at Russia’s Foreign Ministry and President Vladimir Putin’s special envoy on Afghanistan.

“We are ready to approach in a flexible way the issues of a possible easing of the regime of sanctions under Security Council Resolution 1988 on the Taliban, if this does not contradict Afghanistan’s national interests,” the Tass news agency quoted Kabulov as saying, according to Reuters.

“No one is talking today about achieving a victory by military means over the Taliban, while the implementation of the national reconciliation policy would in practice mean their return to power,” he added.

Kabulov noted that Russia supports the U.S.-backed Afghanistan government police aimed at achieving national reconciliation.

In 2011, the UN Security Council Resolution 1988 was passed, designating the Taliban insurgency as a threat to international peace and imposing a freezing of assets, bans on travel, and other restrictions on individuals deemed to be associated with the terrorist group.

Although the Taliban branch in Pakistan—Tehrik-e Taliban Pakistan (TTP)—is listed as a foreign terrorist organization by the United States, the Afghan Taliban is not. TTP is also known to carry out attacks on the Afghanistan side of the country’s border with Pakistan.

ISIS terrorists, which have seized swaths of Iraq and Syria, have established a presence in eastern Afghanistan and have been engaged in turf battles with the Taliban, which has labeled ISIS as “barbaric” in the Afghan territory it has captured.

Last week, Kabulov said that Russian interests in Afghanistan “objectively coincide” with those of the Taliban movement in the fight against ISIS.

He noted that Russia had established communication channels to exchange information on ISIS with the Taliban.

“Moscow, currently conducting a bombing campaign in Syria it says is aimed at Islamic State forces, has been concerned about the possible spread of Islamic State from Afghanistan into neighboring ex-Soviet states like Tajikistan, Uzbekistan and Turkmenistan,” points out Reuters.

U.S. Gen. John Campbell, the top commander of U.S. and NATO forces in Afghanistan, and the Pentagon have acknowledged that ISIS is growing in Afghanistan.

“Groups associated with Islamic State have made growing inroads in Afghanistan, attracting fighters and support away from disenchanted members of the Taliban,” reports Reuters.

“They have been battling government forces and the Taliban in a challenge for supremacy of the Islamist insurgency, and its rise has caused alarm outside Afghanistan, with U.S. commanders citing the movement as a reason to delay troop withdrawals,” it adds.

Militants from the ethnic Uzbek minority in Afghanistan have been linked to the Islamic State.

Russian is reportedly helping to strengthen the Afghan security forces.

In September, a United Nations report revealed that ISIS is actively recruiting supporters in nearly three-quarters (25) of the country’s 34 provinces.

Kabulov estimated in October that there were nearly 3,500 ISIS-linked jihadists in Afghanistan, adding that the number was growing.

Gen. Campbell recently said that between 1,000 to 3,000 ISIS-linked militants were operating in Afghanistan.

 

U.S. Worried, No Russia Experts, Navy vs. Navy

WashingtonPost: While the international war against the Islamic State and a multilateral nuclear deal with Iran underscore Russia’s growing influence in major foreign policy challenges around the world, there are growing concerns that Washington’s lack of understanding of its one-time chief adversary is proving to be a critical national security risk.

Top intelligence and national security officials — including the top general of NATO — have warned that the United States’ depth of knowledge and capacity for collecting information on Russia is not up to snuff, given the stakes of the conflicts at hand and the threat an unpredictable Kremlin poses to U.S. interests.

Experts, lawmakers and former administration officials describe a national security apparatus that, once teeming with experienced Russia specialists, including at the highest levels of decision-making, now relies on looser regime of more junior experts who lack the reach to directly influence policy. The result, they say, is a series of missed opportunities to anticipate Moscow’s recent moves in areas such as Ukraine and Syria, even when clues were readily available.

“We’ve been surprised at every turn,” said Senate Armed Services Committee Chairman John McCain (R-Ariz.). “We were surprised when they went into Crimea, we were surprised when they went into Syria.”

Senate Select Committee on Intelligence Chairman Richard Burr (R-N.C.) said there has been some “atrophy” in the government’s Russia expertise since the Cold War, a trend that needs to be reversed.

“We’ve gotta double down on re-looking at Russia,” he said.

Over the last several months, military and intelligence officials have repeatedly pointed to Russia as posing a potential existential threat to the United States, but the amount of resources dedicated to the expertise needed to gain a better understanding of Moscow and its plans does not reflect that reality. More details here.

***

 

A 68-page US Naval intelligence report, entitled The Russian Navy: A Historic Transition outlines the rising credibility and threat of Russia’s Navy.

The report details a situation where Russia’s navy, third largest behind the US and China, may soon be capable of denying the US Navy access to the Black and Baltic Sea.

Russia’s land grab in Crimea as well as their enclave in Kaliningrad could potentially lock US forces out of the Black or Baltic seas.

US Lt. General Ben Hodges spoke to this in a Pentagon press briefing earlier this month, saying that the nearly 25,000 Russian troops illegally stationed in Crimea “have the ability to really disrupt access into the Black Sea.”

Earlier this year, Russia’s Ministry of Defense announced plans to revive and increase the size and scope of its Black Sea submarine fleet.

The new submarines are designed to excel at warfare in shallower water while being arguably the quietest submarines in the world.

“The new submarine and ship classes will incorporate the latest advances in militarily significant areas such as: weapons; sensors; command, control and communication capabilities; signature reduction; electronic countermeasures; and automation and habitability,” the report states.

Thomson ReutersRussia’s diesel-electric submarine Rostov-on-Don is escorted by a Turkish Navy Coast Guard boat as it sets sail in the Bosphorus, on its way to the Black Sea, in Istanbul, Turkey

The report also describes Russia’s KALIBR missiles, which were put on display in October when Russian boats in the Caspian Sea fired missiles at ground targets in Syria.

In addition to the KALIBR missiles, the report speculates that Russia’s fifth-generation aircraft, the PAK FA aka T-50, could be ready for deployment as soon as 2016.

The increased stealth capabilities of the plane, as well as it’s potential role aboard a new Russian aircraft carrier could spell big problems for the US.

According to the report, Russia is “currently reorganizing its personnel structure to more accurately reflect the needs of modern warfare” and will do so by attempting to transition to an all-volunteer force.

The report acknowledges that Russia is under heavy financial strain due to sanctions and historically low oil-prices, but they are nonetheless determined to create a modern navy that is capable of undermining the military superiority of the West.

 

Every Registered Voter, Personal Data Leaked

In 2014, there were 142.2 million people registered to vote in the United States, according to the U.S. Census Bureau. Forbes is reporting that a database containing 191 million voter records, which includes personal data, has been found, available for anyone to access, online by a “whitehat hacker” named Chris Vickery.

It appears that the personal details of “every registered U.S. voter” are publicly available online. When asked to pull up details on random people by Forbes, Vickery was easily and quickly able to retrieve their names, addresses, birth dates, telephone numbers, and party affiliations, with data appearing to date as early as 2000. Reportedly, no financial information or social security numbers are included in the leaked information.

Vickery has reportedly been unable to pinpoint where the data came from and who might have made it available online. Some attributes of the database led Vickery and researchers with DataBreaches.net to pursue NationBuilder, which has been said to produce similar databases in the past. NationBuilder CEO Jim Gilliam has reportedly stated that IP addresses associated with the database were not associated with the group’s customers, but that it is possible that a customer working on a “non-hosted” system could have produced it.

“From what we’ve seen, the voter information included is already publicly available from each state government so no new or private information was released in this database,” Gilliam was quoted.

A long list of potential suspected political groups have denied responsibility for the voter data leak, including NGP VAN, Political Data, L2 Political, Aristotle, and Catalist.

Vickery and DataBreaches.net were reported to have made reports with the FBI in New York. Forbes reported that the FBI recommended making a report with the Secret Service, which was said to offer no response. DataBreaches.net was said to have made reports with the California Attorney General’s office as well, according to CNET.Information contained in voter records is a matter of public record in many states. South Dakota specifies that voter information may not be placed on the Internet for “unrestricted access” or “commercial purpose.” California has some of the strictest laws protecting voter information in the country, where records are private and may only be accessed “under certain circumstances.”

“I deal with criminals every day who know my name. The thought of some vindictive criminal being able to go to this site and get my address makes me uncomfortable,” an anonymous police officer was quoted. “I’m also annoyed that people can get my voting record. Whether I vote Republican or Democratic should be my private business.”

A Twitter user pointed out that an abusive ex-spouse could use the information to locate a previous partner who does not wish to be found. For that matter, with the information available on the Internet, just about anyone can.

The exposed voter records are said not to include who the voter actually voted for, but that party affiliations are available, which may make determining who an individual likely voted for a simple task. It is noted that the information could be particularly useful during an “issues-oriented campaign.”

Just last week, Chris Vickery exposed that the personal information, including e-mail addresses, user names, and password hints of 3.3 million users registered to the website of SanrioTown.com, home to Hello Kitty, was freely available online, according to CNET. Vickery also recently found a hole allowing the personal information, including usernames and e-mail addresses, of 13 million MacKeeper users to be freely accessed online, as reported by CNET. The MacKeeper software, perhaps ironically, is a suite of security programs aimed at making Mac users safe and secure online.

*** What to be concerned with in 2016: Gartner Report

Biggest Cyber Security Threats To Watch For In 2016; Gartner Forecasts 6.8B Devices Connected To Internet Of Things In 2016

    Harriet Taylor, in a December 28, 2015 article on CNBC’s website is the latest in a series of articles on the evolving cyber threat and what may be the top cyber threats next year.  “Headless worms, machine-to-machine attacks, jailbreaking, ghostware, and two-faced malware,” top the list of key cyber threats to prepare for next year.”   In the coming year,”hackers will launch increasingly sophisticated attacks on everything from critical infrastructure, to medical devices,” said Fortinet Global Security Strategist, Derek Manky.  “We are facing an arms race in terms of security.  Every minute we sleep, we are seeing about a half a million [cyber] attack attempts that are happening in cyber space,” he added.

Here’s How The 2016 Cyber Threat Landscape Looks To Some Experts:

The rise of machine-to-machine attacks:  Research company Gartner predicts there will be 6.8B connected devices in use in 2016; a 30 percent increase over 2015.  By 2020, that number will jump to more than 20B connected devices, the company forecasts.  That would mean an average of two to three Internet-connected devices for every human being on the planet.  The sheer number of connected devices, or ‘Internet of Things (IoT), presents an unprecedented opportunity for hackers.  “We’re facing a massive problem moving forward for growing attack surface,” said Manky.

     “That’s a very large playground for attackers, and consumer and corporate information is swimming in that playground,” he said.  In its 2016 Planning Guide for Security and Risk Management, Gartner said:  “The evolution of cloud and mobile technologies, as well as the emergence [maturation?] of the IoT,’ is elevating the importance of security and risk management foundations.”

     “Smartphones present the biggest risk category going forward,” Manky believes.  “They are particularly attractive to cyber thieves because of the sheer number in use, and multiple vectors of attack, including malicious apps and web browsing;

     “We call this drive-by-attacks — websites that will fingerprint your phone when you connect to them; and, understand what that phone is vulnerable to,” Manky said,.  “Apple devices are still the most secure,” he added.  But, he also cautioned that there is no such thing as a totally safe device connected to the IoT.

Are you nurturing a headless worm?:  “The new year will likely bring entirely new [cyber] worms and viruses able to propagate from device-to-device,” predicts Fortinet.  the new year will see the first “headless worms” — malicious code — targeting “headless devices,’ such as smartwatches, smartphones, and medical hardware;”  “These are nasty bits of code that will float through millions, and millions of computers,” Manky warns.  “The largest we’ve seen to date, is about 15 million infected machines, controlled by one network — with an attack surface of 20B devices.  Certainly that number can spike to 50M, or more.  You can suddenly have a massive outage globally, in terms of all these consumer devices just simply dying and going down [dark];”

Jailbreaking the cloud:  “Expect a proliferation of attacks on the cloud, and cloud infrastructure, including so-called virtual machines, which are software-based computers.  There will be malware specifically built to crack these cloud-based systems  “Growing reliance on virtualization; and both private and hybrid clouds — will make these kind of attacks even more fruitful for cyber criminals,” according to Fortinet.  “At the same time, because apps rely on the cloud, mobile devices running compromised apps will provide a way for hackers to remotely attack public and private clouds and gain access to corporate networks.”

Hackers will use Ghostware to conceal attacks:  “As law enforcement boosts its [cyber] forensic capabilities, hackers will adapt to evade surveillance and detection,  [Stealth] malware designed to penetrate networks, steal information, then cover up its tracks will emerge in 2016.  So-called Ghostware, will make it extremely difficult for companies to track exactly how much data has been compromised, and hinder the ability of law enforcement to prosecute cyber criminals.”  

     “The attacker and the adversaries are getting much more intelligent now,” Manky said.

     “Alongside Ghostware, cyber criminals will continue to employ so-called “blastware,” which destroys and disables a system/s when detected.  “Blastware can be used to take out things like critical infrastructure, and it’s much more of a damaging attack,” he added.

     “Because attackers may circumvent preventative controls, detection and response capabilities are becoming increasingly critical,” advises Gartner in its report.

Two-Faced malware:  “Many corporations now test software in a safe environment called a sandbox, before running it on their networks.”  “A sandbox is designed  to do deeper inspection to catch some of these different ways that they’re trying to change their behaviors,” Manky said.  “It’s a very effective way to look at these new threats as we move forward.”

     “That said,” Ms. Taylor writes, “hackers in turn, are creating malevolent software that seems benign under surveillance; but, morphs into malicious code, once it’s no longer under suspicion.  It’s called……two-faced malware.”

WHAT FORTINET DID NOT ADDRESS
 
     Lots to think about with these 2016 predictions in the cyber realm.  Clearly, there is no such thing as a digital Maginot Line; and, even if there were — we all know how that worked out for France.  Stealth malware, malware that goes dormant when under surveillance; and/or changes like a chameleon, infected clouds, deceptive clouds, combat clouds, hijack clouds — one is to some degree only limited by one’s imagination.  It truly is a digital wilderness of mirrors.
     Fortinet did not address encryption and the Dark Web.  What nasty surprises will the Dark Web have for us in 2016?  Will we be able to develop something akin to a router that cleans out our pipes at home — in the digital world?  How will we ever really know if our systems are ‘clean?’  How are stay-behinds, also known as the gifts that keep on giving — likely to evolve?  What about downloading, or stealing information in an encrypted and clandestine mode?  And, one must not forget the widespread practice of denial, and deception.  How will the field of digital forensic attribution evolve?  Will it get ‘easier’ to pin the tail on the donkey?; or, more complicated and difficult?  What about the purposeful; but, sophisticated corruption of data?
    Fortinet did not address the growing threat of ransomware.  Kaspersky Labs, in  its 2016 forecast, “expects to see the success of Ransomweare to spread to new frontiers.”  “Not only does Kaspersky lab expect Ransomware to gain ground on banking trojans; but, Kaspersky also expects it to transition to other platforms; i.e., cross the rubicon — to not only target Macs; but, also charge ‘Mac prices.  Then, in the longer term, there is the likelihood of the IoT ransomware — begging the question, how much would you be willing to regain acces to your TV programming?  Your fridge?  Your car?,” Kaspersky asks.  
     Kaspersky Labs also “expects the trend of cyber ‘guns-for-hire,’ to continue to evolve and grow.”  Will we see white-hat cyber mercenaries — i.e., a different version of Anonymous — or cyber militias for hire to ‘fight’ against the bad guys?  What about black-hat cyber mercenaries, and the potential emergence of a ‘Dr. No’ in the digital world. 
Will we see the emergence of lethal, offensive cyber weapons — where the objective is to cause loss of of life?  Or, will we see the emergence of a cyber weapon of mass disruption?  A Stuxnet on steroids?  
 
    What about cyber ‘bomb damage assessment?  Can we/have we achieved the ability to conduct elegant, targeted, offensive cyber offensive operations, that do not cause excessive digital collateral damage?
 
     Will 2016 finally see a larger-scale cyber attack here in the U.S. and abroad?  
 
     Will the cyber threat to our stand-alone systems become even more profound?  It has already been demonstrated by researchers at Ben Gurion University in 2014 — that stand-alone systems could be breached using the effluent heat coming off the system.
 
     Will the cyber/digital decision tree on when to respond, how, where, why, with what, come to the fore in the strategic realm?
 
     How will cyber tradecraft evolve and mature?
     Will the Islamic State, al Qaeda, other terrorist groups attempt to launch a major cyber attack on the U.S.?