C’mon Trump, the IRGC IS a Terror Organization

For a full report performed by European Iraqi Freedom Association on Iran’s Destructive Role in the Middle East, click here. In their report, EIFA alleges that the IRGC is “directly involved in the hidden occupation” of Iraq, Yemen, Syria and Lebanon and “meddling” in the internal affairs of at least eight countries, including Egypt, Bahrein, Jordan and Lebanon.

Revolutionary Guards Leading Iran’s Ballistic Missile Drive, Nuclear Weapons Program — Through Control Over Docks

Despite the United States placing the Iranian regime “on notice” for test-firing medium-range ballistic missiles in January, Tehran has taken no steps to change its behavior. Indeed, reports indicate that Iran test launched a new pair of ballistic missiles over the weekend.

New evidence was uncovered about the extent of control that the Islamic Revolutionary Guard Corps (IRGC), which is leading the mullahs’ ballistic missile drive, parallel to the nuclear program and pursuit of weapons of mass destruction, has over this.

In London on Tuesday, the National Council of Resistance of Iran (NCRI) held a press conference revealing that the IRGC has a growing grip over Iran’s key economic hubs. The NCRI cited intelligence gathered by sources linked to the People’s Mojahedin Organization of Iran (PMOI/MEK) from inside the regime, particularly among the IRGC rank and file. The data obtained in recent months clearly proves the IRGC has full control over 90 docks, which amount to 45% of Iran’s total official number of 212 piers.

Image result for irgc

The IRGC began setting up these “Bahman Docks” in 1982, by order of regime founder Ayatollah Ruhollah Khomeini. The group was instructed to manage its activities outside the authority of any state supervision and beneath the proverbial radar of international institutions.

Over the years since then, Supreme Leader Ali Khamenei has ordered the expansion of IRGC activity at these docks, and the further intertwining of the organization with the country’s economy. The main goal today, and previously, is to bypass international sanctions.

As a result, the IRGC now has complete control over Iran’s ground, sea and air borders, flooding the economy with a variety of imports without paying a single dollar in customs.

The IRGC has ports in Bandar Lengeh in Hormozgan Province, two docks in Abu Musa Island and another two in the Greater Tunb Island — among others.

Image result for irgc docks control

In addition to exporting arms to Middle East militias, the IRGC takes advantage of these docks to smuggle oil, gasoline, natural gas, chemical products, cigarettes, narcotics, alcoholic beverages, mobile phones and pharmaceuticals. The IRGC reportedly pockets an annual revenue of around $12 billion from importing and exporting illicit goods through the docks.

According to the NCRI, the IRGC has also established a number of front companies tasked specifically with transferring weapons caches through the docks. This flow of arms continues non-stop, with only a small percentage having been discovered and blocked by the international community in recent years. And all this is in addition to the colossal official budget the IRGC receives from Tehran.

The new revelation is but another reason for the international community to take firm and swift action against the IRGC.

***

These PMOI sources helped to identify three organizations – Admiral Group, Hafez Daya Arya and Valfajr – as shipping companies being used as fronts for smuggling weapons to other countries throughout the region, in particular, Yemen.

Since most Yemani docks are closed to Iranian ships, the IRGC’s shell companies began using ports in nearby Oman to smuggle weapons into Yemen. The PMOI alleges that they primarily used Soltan Qaboos Port in Muscat, Sohar Port in North Oman and Salalah Port in South Oman. For the rest of their operations, the guard is operating in ports in the Hormozgan and Bushehr Provinces  along the Persian Gulf, as well as, the Farsi and Faror Islands, the group charged. More here.

***

The Islamic Revolutionary Guard Corps (IRGC), reported that the IRGC is using civilian passenger jets operated by the Iranian airline Mahan Air to transfer weapons to Syria and Yemen and also to bring back the bodies of fallen fighters as well as injured fighters requiring treatment.

“In October 2016, a knowledgeable source at the U.S. Treasury Department told AP that the U.S. was trying to convince the E.U. to cooperate with American steps to disrupt Mahan Air’s financial flows. Five years ago, America leveled sanctions on Mahan Air due to its close ties to the IRGC and allegations that it was transferring weapons to Syria and Yemen, but thus far, the E.U. has not complied with these sanctions. More here.

Does the White House Know ‘all’ about North Korea?

Check your personal cell phone, who manufactured it… ZTE is the No. 4 smartphone vendor in the United States, selling handset devices to U.S. mobile carriers AT&T Inc (T.N), T-Mobile US Inc (TMUS.O) and Sprint Corp (S.N).

Since 1995, the United States has provided North Korea with over $1.2 billion in assistance, of which about 60% has paid for food aid and about 40% for energy assistance. As of early March 2010, the United States is not providing any aid to North Korea, except for a small medical assistance program. The Obama Administration, along with the South Korean government, have said that they would be willing to provide large-scale aid if North Korea takes steps to irreversibly dismantle its nuclear program. The main vehicle for persuading Pyongyang to denuclearize is the Six-Party Talks, involving North Korea, the United States, China, South Korea, Japan, and Russia. The Talks have not met since late 2008.

North Korea did not militarily threaten the region until the Obama administration. Since, North Korea has taken exceptional steps in the realm of illicit activities, collusion, theft and shadow companies to finesse sanctions. China is essentially in the diplomatic field responsible for checks and balances on North Korea and once again is calling for a truce of sorts. This objective is not new and has failed each time.

Enter Japan, where the Prime Minister, Shinzo Abe who has been in contact with the White House is escalating responsive military actions against North Korea. This could lead to a much more hostile region. It seems that the recent missile launches coordinated with Iran are part of a mission to strike U.S. bases in the region. There are 3 of distinction, however the United States maintains additional joint locations.

Image result for us military bases in japan 2017 Image result for us military bases in japan 2017

Rattled by North Korean military advances, influential Japanese lawmakers are pushing harder for Japan to develop the ability to strike preemptively at the missile facilities of its nuclear-armed neighbor.

Japan has so far avoided taking the controversial and costly step of acquiring bombers or weapons such as cruise missiles with enough range to strike other countries, relying instead on its U.S. ally to take the fight to its enemies.

But the growing threat posed by Pyongyang, including Monday’s simultaneous launch of four rockets, is adding weight to an argument that aiming for the archer rather than his arrows is a more effective defense.

“If bombers attacked us or warships bombarded us, we would fire back. Striking a country lobbing missiles at us is no different,” said Itsunori Onodera, a former defense minister who heads a ruling Liberal Democratic Party committee looking at how Japan can defend against the North Korean missile threat. “Technology has advanced and the nature of conflict has changed.”

*** Meanwhile, as an indication of illicit activities and fraud, below is a sample.

China’s ZTE pleads guilty, settles with U.S. over Iran, North Korea sales

NEW YORK (Reuters) – Chinese telecom equipment maker ZTE Corp <000063.SZ> has agreed to pay $892 million and plead guilty to criminal charges for violating U.S. laws that restrict the sale of American-made technology to Iran and North Korea.

While a guilty plea deals a blow to ZTE’s reputation, the resolution could lift some uncertainty for a company that relies on U.S. suppliers for 25 percent to 30 percent of its components.

A five-year investigation found ZTE conspired to evade U.S. embargoes by buying U.S. components, incorporating them into ZTE equipment and illegally shipping them to Iran.

In addition, it was charged in connection with 283 shipments of telecommunications equipment to North Korea.

“ZTE Corporation not only violated export controls that keep sensitive American technology out of the hands of hostile regimes like Iran’s, they lied … about their illegal acts,” U.S. Attorney General Jeff Sessions said in a statement.

The investigation, spearheaded by the U.S. Department of Commerce, followed reports by Reuters in 2012 that ZTE had signed contracts to ship millions of dollars worth of hardware and software from some of the best-known U.S. technology companies to Iran’s largest telecoms carrier.

The Justice Department noted one Reuters article in its statement announcing the plea deal on Tuesday. The original report can be read here: http://www.reuters.com/article/us-iran-telecoms-idUSBRE82L0B820120322.

The company’s guilty pleas, which must be approved by a judge, will take place in U.S. District Court in Texas. The Shenzhen-based company has a U.S. subsidiary in Richardson, Texas.

In March 2016, ZTE was placed on a list of entities that U.S. firm could not supply without a license. ZTE acted contrary to U.S. national security or foreign policy interests, the Commerce Department said at the time.

ZTE purchases about $2.6 billion worth of components a year from U.S. technology companies, according to a company spokesman. Qualcomm (QCOM.O), Microsoft (MSFT.O) and Intel (INTC.O) are among its suppliers.

Items shipped in violation of U.S. export laws included routers, microprocessors and servers controlled under export regulations.

Authorities said executives at ZTE approved the scheme to prevent disclosure of the sales. The scheme included a data team that destroyed or sanitized materials involving ZTE’s Iran business after March 2012.

“Despite ZTE’s repeated attempts to thwart the investigation, the dogged determination of investigators uncovered damning evidence,” said Douglas Hassebrock, director of the Commerce Department office that led the investigation.

Last year, Commerce released internal documents showing senior ZTE executives instructing the company to carry out a project for dodging export controls in Iran, North Korea, Syria, Sudan and Cuba.

The company on Tuesday agreed to a seven-year suspended denial of export privileges, which could be activated if there are further violations. A denial order would bar the receipt of U.S. origin goods and technology.

The denial order is key to keeping ZTE in line, said Eric Hirschhorn, former Under Secretary at the Commerce Department, who was involved in the investigation.

“If the suspension is removed, they’ll probably be put out of business,” he said.

ZTE also agreed to three years of probation, a compliance and ethics program, and a corporate monitor.

The settlement includes a $661 million penalty to Commerce; $430 million in combined criminal fines and forfeiture; and $101 million paid to the Treasury’s Office of Foreign Assets Control (OFAC). The action marks OFAC’s largest-ever settlement with a non-financial entity.

ZTE also agreed to an additional penalty of $300 million to the U.S. Commerce Department that will be suspended during a seven-year term on the condition the company complies with requirements in the agreement.

In addition to being one of the world’s biggest telecommunications gear makers, ZTE is the No. 4 smartphone vendor in the United States, selling handset devices to U.S. mobile carriers AT&T Inc (T.N), T-Mobile US Inc (TMUS.O) and Sprint Corp (S.N).

 

Fisherman Get Lawyers in Case Against Barack Obama

Fisherman Complaint

In December 2016, President Obama established the first national marine monument in the Atlantic Ocean. Situated 150 miles southeast of Cape Cod, the designation of the Northeast Canyons and Seamounts Marine National Monument, protects 4,913 square miles of deep-water habitat. This designation phases out commercial fishing and prohibits other extractive activities such as mining and drilling. In his final week of office, Obama expanded the California Coastal National Monument protecting more than 20,000 rocks and small islands located off the California coastline. Originally designated by President Clinton in 2000, the site has already been expanded by Obama once, when he added Point Arena-Stornetta in Mendocino County in 2014. The California Monument, was expanded by 6,230 acres and includes protection of six new sites under Obama. More here.

*** Unwinding Obama’s presidential legacy one step at a time. Likely, there will not be a section in his new presidential library that will include the Northeast Canyons…

***

American Antiquities Act of 1906

16 USC 431-433


Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, That any person who shall appropriate, excavate, injure, or destroy any historic or prehistoric ruin or monument, or any object of antiquity, situated on lands owned or controlled by the Government of the United States, without the permission of the Secretary of the Department of the Government having jurisdiction over the lands on which said antiquities are situated, shall, upon conviction, be fined in a sum of not more than five hundred dollars or be imprisoned for a period of not more than ninety days, or shall suffer both fine and imprisonment, in the discretion of the court. Read more here.

Image result for Northeast Canyons and Seamounts Marine National Monument  CBS Boston

New England fishermen challenge Obama’s
marine national monument

Creation of the Northeast Canyons and Seamounts Marine National Monument exceeded the Antiquities Act, which authorizes monuments only on federal land, not the ocean

BOSTON, MA;  March 7, 2017: A coalition of New England fishermen organizations filed suit today over former President Barack Obama’s designation of a vast area of ocean as a national monument — a dictate that could sink commercial fishing in New England.

The organizations filing the lawsuit are the Massachusetts Lobstermen’s Association, Atlantic Offshore Lobstermen’s Association, Long Island Commercial Fishing Association, Rhode Island Fisherman’s Alliance, and Garden State Seafood Association.

They are represented, free of charge, by Pacific Legal Foundation, a watchdog organization that litigates nationwide for limited government, property rights, and a balanced approach to environmental regulations.

The lawsuit challenges President Obama’s September 15, 2016, creation of the Northeast Canyons and Seamounts Marine National Monument, 130 miles off the coast of Cape Cod.

“By declaring over 5,000 square miles of ocean — an area the size of Connecticut — to be a national monument, President Obama set this entire area off-limits to most fishing immediately, with what remains of fishing opportunities to be phased out over the next few years,” said PLF attorney Jonathan Wood.  “This illegal, unilateral presidential action threatens economic distress for individuals and families who make their living through fishing, and for New England communities that rely on a vibrant fishing industry.”

A monumental abuse of presidential power

President Obama claimed to be relying on the federal Antiquities Act.  But as today’s lawsuit makes clear, his decree far exceeded the authority granted to presidents by that 1906 statute.  The Antiquities Act was enacted to protect ancient antiquities and human relics threatened by looting, giving the president broad powers to declare monuments consistent with that purpose.

However, the statute permits creation of national monuments only on “lands owned or controlled” by the federal government.  Moreover, any designation must be “confined to the smallest area” needed to protect the artifacts or objects that the monument is intended to safeguard.

“President Obama violated both of those core requirements of the law when he created the Northeast Canyons and Seamounts Marine National Monument,” Wood noted.  “Most fundamentally, the ocean, where the monument is located, is not ‘land,’ nor is it federally owned or controlled.  The monument designation is also not confined to the smallest necessary area; on the contrary, its sprawling boundaries bear no relation to the underwater canyons and seamounts it is supposed to protect.  In short, the designation of a vast area of ocean as a national monument was a blatant abuse of presidential power.

“Unfortunately, the Antiquities Act has morphed into a favorite tool for presidents to abuse,” Wood continued.  “Today, presidents use it to place vast areas of federal lands off limits to productive use with little input.  Monument designations are particularly common at the end of a chief executive’s term, once the president can no longer be held accountable.

“Former President Obama was the king of Antiquities Act abuse, invoking it more times than any prior president and including vastly more area within his designations than any predecessor,” said Wood.  “Our lawsuit is intended to rein in abuse of the Antiquities Act and underscore that it is not a blank check allowing presidents to do whatever they want.  The creation of the Northeast Canyons and Seamounts Marine National Monument is a clear example of a president exceeding his authority, and we are suing to make sure this edict is struck down and the rule of law prevails.”

No environmental justification

“Beyond its violation of the law, the monument designation also threatens to harm the environment by pushing fishermen to other, less sustainable fisheries, and increasing conflicts between their gear and whales,” said Wood.  “The president’s proclamation cites protection of coral as one of the reasons for the monument.  But the corals remain pristine after more than four decades of commercial fishing because fishermen know where the corals are, and carefully avoid them, out of environmental concern and because coral destroys their gear.

“Instead of punishing New England’s fishermen — and shutting down their businesses — federal officials should be acknowledging their positive role as stewards of the ocean’s environmental resources,” Wood added.  “This is shown in their laudable efforts to promote sustainability.  PLF’s clients, for instance, have spent years working to improve their methods and equipment and to retire excess fishing permits, knowing that these costly sacrifices will provide long-term benefits to their industry and the environment.  The monument designation undermines those sustainability efforts, by depriving the fishermen of any reward for their sacrifices.”

With a ‘stroke of the pen,’ Obama’s illegal action ‘puts men and women out of work’

“We are fighting every day to keep the men and women in the commercial fishing industry working, but with one stroke of President Obama’s pen — and his abuse of the Antiquities Act — they are out of work,” said Beth Casoni, executive director of the Massachusetts Lobstermen’s Association.

“The monument designation will have a negative rippling effect across the region as fishermen will have to search for new fishing grounds — only to find they are already being fished,” she said.  “The shoreside businesses will also feel the impacts, as fishermen have to go further and further to harvest their catch, leaving less funds to reinvest in their businesses.

“We are extremely grateful to have PLF at our side as we fight back against this legal travesty, which is causing so much hardship for the commercial fishing industry here in the Northeast.”

TrumpCare, DOA Already, Full Repeal Needed

Newly confirmed HHS Secretary Tom Price stated:

Secretary of Health and Human Services Tom Price on Tuesday wouldn’t commit the Trump administration to supporting everything in the GOP’s health care reform bill, calling it a “work in progress.”

“This is a work in progress and we’ll work with the House and the Senate,” Price said. “As you know, it’s a legislative process that occurs.”

Image result for new healthcare plan

The House leadership has said the bill will go through the full process and the ‘mark-up’ session has begun.

WASHINGTON – Sen. Mike Lee (R-UT) issued the following statement Tuesday in response to the release of the American Health Care Act:

“This is not the Obamacare repeal bill we’ve been waiting for. It is a missed opportunity and a step in the wrong direction,” Sen. Lee said.

“We promised the American people we would drain the swamp and end business as usual in Washington. This bill does not do that. We don’t know how many people would use this new tax credit, we don’t know how much it will cost, and we don’t know if this bill will make health care more affordable for Americans.”

“This is exactly the type of back-room dealing and rushed process that we criticized Democrats for and it is not what we promised the American people.”

“Let’s fulfill our Obamacare repeal promise immediately and then take our time and do reform right. Let’s pass the 2015 repeal bill that Republicans in both houses of Congress voted for and sent to the White House just 15 months ago. Once Obamacare has been properly sent to the dustbin of history then we can begin a deliberative, open, and honest process to reform our nation’s health care system.”

*** The full text of the proposed 123 page new healthcare bill is here.

Or this: Image result for gop healthcare plan

RYANCARE: 5 Serious Problems With The Republican Replacement For Obamacare

In 2010, angry Americans elected Republicans to the House of Representatives in the belief that Republicans would fight tooth and nail to repeal Obamacare. In 2014, Republicans took the Senate by making the same promise. In 2016, President Trump won election on the basis of repealing the “disaster” of Obamacare.

Now it’s 2017. Republicans have a majority in the House and Senate. President Trump is in the White House.

And instead of repealing Obamacare, they now plan to trim around the edges.

Their new Obamacare plan isn’t an attempt to shift America away from government-run healthcare. It’s an attempt to re-enshrine government as the center of the health care system, with a slightly rejiggered vision of its role. The plan isn’t likely to lower costs, promote competition, or curb moral hazard.

It’s not good.

Here are the five biggest problems:

1. It Retains Requirements That Insurance Cover People With Pre-Existing Conditions. The key component to Obamacare was always the nonsensical notion that government could force insurance companies to cover those with pre-existing conditions. This turns insurance companies into piggy banks rather than insurance companies – imagine a fire insurance company that allowed you to buy insurance after your house was on fire. That’s not an insurance company anymore. The same is true in health insurance – and the Republicans’ attempt to preserve this popular provision of Obamacare means that Republicans must also do something to ensure that insurance companies don’t go bankrupt. There are only two ways to do that: with a mandate to buy insurance, or with government subsidies.

2. It Creates A Back Door Mandate. The Republican plan gets rid of the overt Obamacare mandate. But it does allow insurance companies to charge an elevated 30% fine for those whose insurance lapses for more than two months at any point in the last 12 months. This means that you’re essentially fined in the future for not buying insurance now. Which has nothing to do with the Constitutional role of government.

3. It Creates Individual Healthcare Subsidies. The problem is that this back door mandate isn’t enough. What about people who are high risk or have pre-existing conditions, but haven’t bought insurance? We have to give them money to buy health insurance. Which is what the bill does: it includes an advanceable, refundable tax credit based on age. This is effectively a subsidy, since the tax credits apply to people who don’t pay much in taxes, just as the Earned Income Tax Credit is actually a giveaway to people who don’t pay taxes.

4. It Subsidizes Medicaid. The Obamacare boondoggle was sold by allowing the federal government to pick up the tab for Medicaid expansion in the states. This bill would allow the feds to cover Obamacare Medicaid expansion for three years – and there’s no way a future Congress will actually cut these subsidies, fearing political backlash. This is like every other long-promised sunsetted spending program: it’s not going anywhere.

5. It Subsidizes High-Risk Pools On The State Level. The bill sends $100 billion to states over the next ten years to help cover those who are high risk and can’t afford insurance. This, of course, won’t be nearly enough – it incentivizes the state to sign people up, then look to the federal government for more cash.

The bill does have good points – it’s revocation of Obamacare taxes and sponsorship of Planned Parenthood are great. But it doesn’t do any of the key things Republicans would want to do, and it actually ends up allowing Democrats to keep most of what Obama created while simultaneously blaming Republicans for its shortcomings as well as the budget blowout that will follow Republicans killing both the individual mandate and the Cadillac tax.

So, well done, Republicans. Instead of putting forward a gradual repeal of Obamacare, you’ve actually created a gradual cementing of key elements of Obamacare, all to avoid the political blowback.

WikiLeaks Releases CIA Cyber Docs, Problem?

Primer: Steve Bannon works for President Trump in the White House.

Steve Bannon is a star – for Al-Qaeda, that featured him on the cover of their newspaper

steve-bannon-is-a-star---for-al-qaeda-that-featured-him-on-the-cover-of-their-paper

Then this headline….

The new scandal headlines for today is WikiLeaks, telling us they published the largest cache of secret CIA documents relating to the CIA’s ability to hack, break encryption and install malware. This is a problem? The problem is not the tools the CIA has, the problem is that someone inside the agency stole them and delivered them to WikiLeaks.

It is a good thing that the agency has these resources, why you ask?

Well….try this…The threat is real from Russians, Chinese, North Korea, Iran, Syria, Ukraine, al Qaeda and Islamic State…

Image result for stuxnet

Remember Stuxnet? This was a successful joint program under the Bush presidency with Israel to infect the Iranian nuclear program and it was to forces the centrifuges to spin out of control, which they did. Ultimately, it caused the progress of the Iranian infrastructure to be delayed substantially. It was in fact later uncovered by cyber scientists working for Siemens, the hardware and software platform used as the operating system. Good right? Yes.

Image result for u.s. cyber command

Well, there is more…

In recent years, Iran and North Korea have been sharing nuclear scientists and engineers, parts, testing and missile collaboration. So far, the missiles launched by North Korea for the most part have been unsuccessful, or at least did not achieve the ultimate objective and that is an official target strike. Why? Because of the United States. How so you ask?

Over the weekend, North Korea fired off 4 missiles in succession toward Japan. They did not reach the mainland but did reach the waterway that is part of the Japanese economic zone for maritime operations. We have American cyberwarriors that are doing effective work causing the missiles to fly off course or to technically fail. The objective is to use non-explosive weaponry to foul the North Korea and hence Iran’s missile program and while North Korea is not especially connected to the internet, some related systems are connected and then there is electronic warfare.

Image result for foreign hacking omb

We know that Islamic State is a terror operation that has militant cells in an estimated 30 countries. While they have depraved methods of murder, rape and terror, they too have a cyber operation.

The Will to Act

One question is whether ISIS will be consumed with the protection and continued expansion of its immediate fighting fronts, i.e., the “near enemy,” or whether its scope of vision includes America’s homeland. The Economist advances a strong case that desire for such expansion not only exists but will be exercised: “With its ideological ferocity, platoons of Western passport holders, hatred of America and determination to become the leader of global jihadism, ISIS will surely turn, sooner or later, to the ‘far enemy’ of America and Europe.”

And perhaps any doubt the militant’s sights are on America was removed by ISIS leader Abu Bakr al-Baghdadi’s Sept. 22 call for jihadists to not wait for the order but to rise, take up arms, and “kill Americans and other infidels” wherever they are. Clearly the group is showing no hesitancy in its desire to strike the U.S. heartland on a personal scale.

Cyber Operations Capability?

As to whether ISIS will have the capability to mount cyber operations against the U.S., David DeWalt, head of cybersecurity firm FireEye, believes that ISIS will follow in the footsteps of the Syrian Electronic Army and the Iran-based Ajax Security Team to target the United States and other Western nations.

“We’ve begun to see signs that rebel terrorist organizations are attempting to gain access to cyber weaponry,” DeWalt stated recently. He added that booming underground markets dealing in malicious software make offensive cyber weapons just an “Internet transaction” away for groups such as ISIS. More here.

Is there more to this that we should know? Yes…

There is the Middle East and we have a major vested interest in the region.

***

Cybersecurity in the Gulf: The Middle East’s Virtual Frontline

Cybersecurity is often discussed in relation to the major global powers: China’s economic espionage, Russian influence operations, and U.S. dragnet global surveillance to thwart terrorism.

However, as other countries move to digitize their economies, cybercriminals are zeroing in on these new and lucrative targets while regional players are quickly incorporating cyber capabilities into their own arsenals for achieving strategic ends.

The Middle East, particularly the Gulf states, are quickly recognizing the urgent need for better cybersecurity, while regional adversaries such as Iran have begun weaponizing code as an extension of broader strategic goals within the region. What, though, is the Gulf’s current cybersecurity atmosphere, and how does Iran’s emerging use of offensive cyber capabilities fit into its broader strategy in the Middle East?

Wajdi Al Quliti, the Director of Information Technology at the Organization of Islamic Cooperation, notes that “the region’s dramatic strides towards digitization—expected to add over $800 billion to GDP and over 4 million jobs by 2020—is making the Gulf a major target for fast evolving cyber threats.” Much like other regions, the Gulf is finding it difficult to sufficiently create criminal deterrence due to segmented laws and difficulties in attribution. Al Quliti argues “cross-border cooperation and common cybersecurity structures could prove to be a game-changing advantage in the fight against cybercrime.” However, “the elephant in the room,” according to Al Quliti, “is the issue of state-sponsored hacking, in which case harmonized laws are unlikely to make a difference.”

A critical point in nation-state hacking in the Middle East begins with the Stuxnet worm. Discovered in 2010 burrowed deep in Iranian networks, the worm had slowly been sabotaging Iran’s nuclear ambitions. Then in 2011 CrySyS Lab discovered Duqu, a cyber espionage tool tailored to gather information from industrial control systems, and in 2012, Kaspersky Labs identified Flame, another espionage tool, targeting various organizations in the Middle East. Both Duqu and Flame are associated with Stuxnet and attributed back to the Equation Group, widely considered an arm of the National Security Agency.

In 2012, Iranian officials found a wiper virus erasing files in the network of the Oil Ministry headquarters in Tehran, leading the ministry to disconnect all oil terminals from the Internet to prevent the virus from spreading. It is uncertain who was behind the attacks, but a mere four months later, Saudi Arabia’s largest oil company, Saudi Aramco, was hit with a similar wiper virus known as Disttrack—possibly coopted from the previous attack on Iran’s oil industry.

The data-erasing malware sabotaged three-quarters, some 35,000 of the company’s computers while branding screens with an image of a burning American flag. A few months later, another wiper virus attacked Qatar’s RasGas.

Al Quliti identifies “the region’s heavy dependence on oil and gas—as well as the oil and gas-powered desalination plants that provide much of the region’s fresh water”—as “a source of cyber vulnerability,” adding that “any cyber attack on these installations could prove catastrophic and might result in a humanitarian disaster.”

The sabotage operations against the Gulf’s oil industry have been attributed by various cybersecurity firms—but not officially by any government—to a group called Shamoon, thought to be an arm of the Iranian government.

Michael Eisenstadt, the Director of the Military and Security Studies Program at the Washington Institute for Near East Policy, notes that “cyber allows Iran to strike at adversaries globally, instantaneously, and on a sustained basis, and to potentially achieve strategic effects in ways it cannot in the physical domain.” For example, in March 2016, the Justice Department indicted seven Iranian Revolutionary Guard members for distributed denial of service attacks against U.S. banks in 2012 in retaliation for Iran sanctions imposed the previous year, as well as for infiltrating the systems of a small New York dam in 2013—a possible testing ground for penetrating larger pieces of U.S. critical infrastructure. In 2014, the same year North Korea set its sights on Sony Pictures, Iran’s cyber capabilities again reached into the United States, using another wiper virus to sabotage the operations of the Las Vegas Sands casino, whose chief executive, a staunch supporter of Israel, had suggested detonating a nuclear bomb in the heart of Tehran.

Last November, right before a major OPEC meeting, a variation of the Disttrack wiper used against Saudi Aramco struck again, now fitted with a picture of Alan Kurdi, the drowned Syrian toddler who washed up in Turkey in 2015. The virus targeted six Saudi organizations, most notably the Saudi General Authority of Civil Aviation, delivering its payload at the close of business on a Thursday, the start of the Islamic weekend, for maximum impact. Some experts speculate the November attack could have also been a false-flag operation to derail the Iranian nuclear deal.

Interestingly, for both the 2012 and 2016 Shamoon attacks, the wiper came fitted with stolen login credentials that Symantec now believes could have been gleaned from a cyber espionage tool, known as Greenbug, found on one of the administrator computers of a Saudi organization targeted in November. The potential link between Greenbug and the Shamoon group opens up possible investigations into the group’s involvement in a host of other Greenbug attacks throughout the Middle East, including breaches in Saudi Arabia, Bahrain, Iraq, Qatar, Kuwait, Turkey, and even Iran—though likely for domestic surveillance on dissidents. Just last week, another wiper virus hit 15 Saudi organizations, including the Ministry of Labor, prompting the government to issue an urgent warning of pending Shamoon attacks.

Eisenstadt points out that “Iran’s cyber activities show that a third-tier cyber power can carry out significant nuisance and cost-imposing attacks,” and “its network reconnaissance activities seem to indicate that it is developing contingency plans to attack its enemies’ critical infrastructure.” According to Eisentadt, is now seems that “in the past decade, Iran’s cyber toolkit has evolved from a low-tech means of lashing out at its enemies by defacing websites and conducting DDoS attacks, to a central pillar of its national security concept.”

Beginning to understand why the CIA and the other agencies are building cyber command war-rooms?