Iran to Increase Power of Destructive Missiles

For additional reference on Iran’s compliance and sanction money, the International Monetary Fund releases are here.

TEHRAN (FNA)- The destruction power and precision of Iran’s missiles will increase, Defense Minister Brigadier General Hossein Dehqan said Saturday following the recent presidential decree that required the defense ministry to speed up development of Iran’s missile capability.  

“Following o the president’s letter, we held numerous meetings with the executive officials, commanders and officials in the missile sector and decided work out appropriate plans as soon as possible to enhance the defensive power and capability as well as the effective deterrence power of our missiles contrary to the will of the hegemonic system which seeks to restrict the Islamic Republic militarily,” Dehqan told reporters in Tehran on Saturday.  

He also underscored the country’s serious intention to further develop its missile power.  

Stressing that the defense ministry seeks to optimize its ballistic missiles in different aspect, Dehqan said, “Increasing the precision-striking, destructive and blast power of our missiles… are among the defense ministry’s plans in the missile field.”  

In his letter on Thursday, President Rouhani noted the United States’

“hostile policies and illegal and illegitimate meddling against Iran’s right to develop its defensive power”, and ordered the defense minister to accelerate production of various types of missiles needed by the Iranian Armed Forces more powerfully.  

“As the United States seems to plan to include the names of new individuals and firms in its previous list of cruel sanctions in line with its hostile policies and illegitimate and illegal meddling in the Islamic Republic of Iran’s right to reinvigorate its defense power, the program for the production of the Armed Forces’ needed missiles is required to continue more speedily and seriously,” President Rouhani’s written order to the Defense Minister read.  

President Rouhani’s decree came in reaction to the US Treasury Department’s announcement that it is preparing sanctions on two Iran-linked networks helping develop the missile program.  

The presidential decree also required the defense ministry to think of new missile production programs at a much wider scale in case Washington continues its sanctions policy against Iran’s defense industries.  

“In case such wrong and interventionist measures are repeated by the United States, the Defense Ministry will be duty-bound to make use of all possibilities to bring up new planning to develop the country’s missile capability,” it stressed.  

The president further described Iran’s defense capabilities as a contributor to regional stability and security, and not a threat to any other state or party. Rather it is a means to “safeguard the country’s sovereignty, independence and territorial integrity and to combat the evil phenomenon of terrorism and extremism in line with common regional and global interests”.  

President Rouhani further reminded that Tehran has time and again underlined all throughout the nuclear negotiations with the six world powers – that ended up in the nuclear deal in Vienna in July – that it would “never negotiate with anyone about its defense power, including the missile program, and would never accept any restriction in this field, emphasizing its entitlement to the legitimate right of defense”.  

“It is crystal-clear that Iran’s missile program is not at all a part of the Joint Comprehensive Plan of Action (JCPOA) – also known as the nuclear deal – and this is acknowledged by the US officials as well,” said the decree, and added, “As repeatedly stated, nuclear weapons have no room in Iran’s defense doctrine, and therefore, the development and production of Iran’s ballistic missiles which have never been designed to carry nuclear warheads, will continue powerfully and firmly as a crucial and conventional tool for defending the country.”  

According to Washington officials, the US is preparing sanctions against firms and individuals in Iran, Hong Kong and the United Arab Emirates over alleged links to Iran’s ballistic missile program, a move seen by many in and outside Iran as a major blow to the nuclear deal between Tehran and the

5+1 group of powers that include the US, Russia, China, France and 5+Britain plus Germany.  

Under the planned restrictions, the US or foreign nationals would be barred from doing business with the firms and people in the networks. US banks would also freeze any US-held assets.  

The Washington’s antagonistic move comes after Iran took the first two major steps under the nuclear deal – that included reducing the number of its operating centrifuge machines from around 10,000 to 6,000 and sending its over 8.5 tons of low-enriched uranium stockpile to Russia.  

Once Iran takes out the heart of its Heavy Water Reactor in Arak and the International Atomic Energy Agency (IAEA) confirms implementation of these three steps in coming weeks, Iran will be through with fulfilling its undertakings, and it will be the United States’ turn to hold up its end of the bargain and remove all the sanctions against Iran, according to the deal.  

But now with the US intensifying sanctions against Iran, those who stood against the deal in Tehran are rallying increasing support for their pessimistic views about Washington’s loyalty to the deal.  

After Iran reduced its centrifuges to around 6,000 last month, the US imposed a new sanction against Iran through changes in its Visa Waiver Program.  

The US senate passed a bill related to the Visa Waiver Program (VWP) which allows citizens of 38 countries — namely European states, Australia, Japan and South Korea — to travel to the United States without having to obtain a visa but excludes from this program all dual nationals from Iran, Iraq, Syria and Sudan, and anyone else who has traveled to those countries in the past five years.  

The bill is seen by the EU as a serious effort to deter expansion of economic and tourism ties between Europe and Iran after the removal of the sanctions against Tehran. Senior EU officials have voiced strong protest at the US for its biased action against the block and are running debates with counterparts in Washington to drop the bill.

 

When Countries Fail, Terror Spreads

While Donald Trump is cresting the political wave running for President, he did get one thing wrong. His statement about ‘letting Syria and Islamic State fight’, it becomes a matter of 300,000 dead and an estimated 4 million displaced people, many that are flowing into Europe and causing epic financial burdens on other countries.

In the case of the most recent Paris attack, Syria and Belgium failed causing a massacre in France.

Investigation Uncovers New Details About How the Paris Terror Attacks Unfolded

ViceNews: As the investigation into the Paris terror attacks continues, one thing has become clear: The attacks started in — and may have been directed from — neighboring Belgium.

After accessing 6,000 official records from the ongoing police investigation, French daily Le Monde has reconstructed the days that led to the coordinated attacks that brought the French capital to a standstill and left 130 people dead.

On November 13, three teams of gunmen attacked three targets in Paris: the Stade de France, the Bataclan concert hall, and cafés and restaurants in the 11th and 12th Arrondissements. The attackers used three vehicles: a Renault Clio, a SEAT, and a Volkswagen Polo.

In the early hours of November 12, the Clio and the SEAT were spotted in a backstreet of Molenbeek, a neighborhood of Brussels that has been labeled “the heart of jihadism” in Europe. Three men reportedly exited the vehicles and exchanged a package.

According to investigators, the men in the cars were Salah Abdeslam, now one of the world’s most wanted fugitives, his brother Brahim, who blew himself up at the Comptoir Voltaire café, and Mohamed Abrini, a 30-year-old Belgian man who helped mastermind the attack. Like Abdeslam, Abrini still remains at large.

First Stop: Charleroi
Le Monde revealed that, prior to meeting up in Molenbeek, the cars made a brief stop in the Belgian city of Charleroi, spending time in a neighborhood infamous for weapons and drugs trafficking.

At around 4pm on November 12, the two cars set off for Paris. There, they were met by a third vehicle, which would transport the third team of attackers.

In Paris, the attackers split up into two groups. The Bataclan attackers took a hotel room in the southeast Paris suburb of Alfortville. The men who would carry out the attacks at the stadium and along the busy sidewalks of the 11th and 12th Arrondissements spent the night in a house in the northeastern Paris suburb of Bobigny. Investigators found a roll of Scotch tape in the house that the attackers used to assemble their explosive belts.

A Mysterious Trip to the Airport
At 6pm on November 13, the Clio traveled to the Charles de Gaulle airport in Paris and remained there until 7:20pm. Investigators still aren’t sure about the purpose of this brief stop. At 7:40pm, the three Bataclan attackers left their hotel in the Polo. At 8:29pm, Salah Abdeslam drove the third car to the Stade de France, where he dropped off three of his accomplices, each of them wearing a belt packed with explosives. At 8:39pm, the SEAT continued toward the 11th Arrondissement.

Salah Abdeslam, Bilal Hadfi, and two unidentified men carrying fake Syrian passports rode in the Clio. So far, the only thing known about the unidentified men is that they entered Europe at the start of October.

Riding in the SEAT were Abdelhamid Abaaoud, Brahim Abdeslam, and a third man, who may have died in the police raid on Abaaoud’s hideout in Saint-Denis, in the early hours of November 18.

Omar Ismail Mostefaï, Samy Amimour, and Foued Mohamed-Aggad rode in the Polo. Their car was headed to the Bataclan concert hall, where 1,500 people gathered to hear the Eagles of Death Metal perform.

Attacks Likely Coordinated in Belgium
Le Monde also confirmed earlier reports that three Bataclan gunmen were communicating with an individual in Belgium until the moment the attack began. Investigators found a white Samsung mobile phone bearing the DNA of Mostefaï and Mohamed-Aggad in a trash can near the Bataclan. The discarded phone contained a text message sent at 9:42pm to an unknown contact in Belgium.

“We’ve left,” the message said. “We’re starting.” The contact communicated a total of 25 times with the attackers, disabling the line immediately after receiving the text message announcing the start of the attack.

Abaaoud was also in touch with someone in Belgium on the night of November 13. Investigators have established that the two Belgian phone lines were situated at the exact same location, suggesting both teams in Paris were communicating with the same person.

Paris Associate Killed in Syria
An associate of the Paris attackers was recently killed in an airstrike in Syria. Charaffe Al-Mouadan, a 26-year-old Syria-based member of the Islamic State (IS), was born in the northeastern Paris suburb of Bondy and was a close friend of Amimour, one of the Bataclan gunman. They were both arrested in October 2012 for suspected terror activity, a year before Al-Mouadan relocated to Syria to join IS.

Al-Mouadan — who went by the nickname “Souleymane” — was also friends with Abaaoud. Radio station France Info revealed the existence of a photograph that shows Al-Mouadan posing with Abaaoud’s younger brother in Syria.

Investigators turned their attention to Al-Mouadan after one of the Bataclan survivors said he overheard Mostefaï refer to a man called “Souleymane.” According to the witness, Mostefaï asked Amimour whether he was planning to “get in touch with Souleymane.”

In a statement released on Tuesday, US coalition spokesman Steve Warren said that Al-Mouadan was one of 10 IS leaders killed in targeted airstrikes. Several of these leaders, he noted, were directly linked to attacks abroad — including the Paris attacks.

According to David Thompson, a reporter for French radio station RFI, Al-Mouadan was not a leader of the group — just a fighter with a strong social media presence.

Muslim Brotherhood in U.S. Gets Millions in Grants

The Muslim Brotherhood in the United States document is here.

The House Intelligence Committee Testimony on the Muslim Brotherhood is here.

Mosque Linked To Muslim Brotherhood Has Received Millions In Federal Grants

DailyCaller: A Kansas City mosque owned by an Islamic umbrella organization with deep ties to the U.S. arm of the Muslim Brotherhood has received millions of dollars in federal grants over the past several years, according to a federal spending database.

The Islamic Center of Greater Kansas City has received $2,739,891 from the Department of Agriculture since 2010, a Daily Caller analysis has found. The money largely went to the mosque’s Crescent Clinic to provide services through the Women, Infant and Children nutrition program, known as WIC.

The most recent federal payment — in the amount of $327,436 — was handed out Oct. 1.

Property records show the mosque is owned by the North American Islamic Trust (NAIT), which acts as a financial holding company for Islamic organizations. It offers sharia-compliant financial products to Muslim investors, operates Islamic schools and owns more than 300 other mosques throughout the U.S.

Founded in 1973 as an offshoot of the Muslim Brotherhood-backed Muslim Students Association, NAIT’s most controversial connection is to the 2007 and 2008 Holy Land Foundation terror financing cases. Along with other Muslim Brotherhood-linked organizations like the Islamic Society of North America (ISNA) and the Council on American-Islamic Relations (CAIR), NAIT was named a co-conspirator in the federal case but was not indicted.

At the Holy Land Foundation trial, evidence was presented that ISNA diverted funds from the accounts it held with NAIT to institutions linked to Hamas and to Mousa Abu Marzook, a senior Hamas leader.

Federal prosecutors introduced evidence in the case that “established that ISNA and NAIT were among those organizations created by the U.S.-Muslim Brotherhood.” Hundreds of thousands of dollars worth of checks drawn from ISNA’s account and deposited in the Holy Land Foundation’s account with NAIT were made payable to “the Palestinian Mujahadeen,” which is the original name for Hamas’ military wing.

While Hamas was designated as a foreign terrorist organization by the U.S. government in 1997 and is considered the Palestinian branch of the Muslim Brotherhood, the larger Muslim Brotherhood is not itself designated as a terrorist group.

NAIT has other ties to the Holy Land Foundation case. Its newly-appointed executive director, Salah Obeidallah, was a founding member and former president of the Islamic Center of Passaic County in Paterson, N.J.

In the 1990s, the imam at that mosque was Mohammad El-Mezain, a founding member of the Holy Land Foundation who was sentenced to 15 years in prison for helping fund Hamas. Obeidallah has said that he was not aware of El-Mezain’s terror funding activities.

In being owned by NAIT, the Kansas City organization is in company with numerous mosques with ties to known terrorists, terror sympathizers and fundamentalist Islamists.

Purportedly backed by money from Saudi Arabia and supporting a fundamentalist branch of Sunni Islam known as Wahhabism, NAIT holds the deed to the Islamic Society of Boston, which operates the mosque attended by Dzhokhar and Tamerlan Tsarnaev, the so-called Boston Marathon bombers.

It also controls the Islamic Center of San Diego, which was attended by Khalid al-Mihdhar and Nawaf al-Hazmi, two al-Qaeda members who helped fly American Flight 77 into the Pentagon on Sept. 11, 2001.

According to a 2002 Newsweek investigation, members of the San Diego mosque helped the two terrorists obtain housing, driver’s licences and social security numbers. They claimed not to have known about the men’s terror plans.

NAIT also owns the Dar Al-Hijrah mosque in Fairfax Co., Va. — a known hotbed of terrorist activity. Al-Qaeda recruiter Anwar al-Awlaki served as imam at that location in 2001 and 2002. He was killed by an American drone in Yemen in 2011.

The Islamic Center of Greater Kansas City has its own loose links to terrorist activities. The mosque made news earlier this year when it held the funeral for Nadir Soofi, one of the two jihadis who attempted to pull off a terrorist attack in Garland, Tex. Soofi, who was 34, and his accomplice, 30-year-old Elton Simpson, opened fire outside of an art exhibit featuring cartoons of Muhammad, but were killed by a security guard.

Both Soofi and Simpson attended the Islamic Community Center in Phoenix, which land deeds show is owned by NAIT.

That particular mosque posted $100,000 bond for Simpson following his 2010 arrest for lying to FBI agents about his plans to travel to Somalia to join a terrorist group. Simpson was given three years probation in that case.

The Islamic Center of Greater Kansas City has also hosted Imam Khalid Yasin, an American-born convert to Islam, who has publicly supported sharia law and claimed that homosexuals should receive the death penalty.

As a May 2010 Yahoo! message board post shows, Yasin visited the Islamic Center of Greater Kansas City and other area mosques that month to hold a series of lectures and workshops about Islam.

That was nearly two years after Yasin touted the virtues of sharia law and capital punishment in a speech at a British mosque. Full article here.

 

 

 

 

 

 

Afghanistan is a Growing Festering War, Again

WASHINGTON —Afghanistan’s security situation is so tenuous that the top U.S. commander there wants to keep as many U.S. troops there as possible through 2016 to boost beleaguered Afghan soldiers and may seek additional American forces to assist them.

Army Gen. John Campbell said in an interview with USA TODAY that maintaining the current force of 9,800 U.S. troops to train Afghan forces and conduct counter-terrorism raids is vital, and that the scheduled reduction to 5,500 by Jan. 1, 2017, should be put off as long as possible.

“My intent would be to keep as much as I could for as long as I could,” Campbell said by telephone from Kabul. “At some point it becomes physics. I’m going to have to get them out.”

News from Afghanistan in 2015, when American troops ended their daily combat mission after 14 years, has been grim. Taliban insurgents stormed the northern provincial capital of Kunduz in October and were pushed out after fierce fighting that included an inadvertent attack by a U.S. warplane on hospital that killed 42 civilians. In the south, Taliban insurgents have battered Afghan troops in Helmand province; an al-Qaeda training camp was also discovered there and destroyed. Islamic State fighters have set up outposts in the east. Last week, six U.S. airmen were killed by a suicide bomber outside Bagram Air Base.

The Pentagon’s own quarterly assessment of security in Afghanistan this month noted that in “the second half of 2015, the overall security situation in Afghanistan deteriorated with an increase in effective insurgent attacks and higher (Afghan security force) and Taliban casualties.”

Campbell will be Washington soon to brief senior leaders on the security situation in Afghanistan and troop levels required for their missions. He declined to offer specifics on his recommendations, saying they were classified. More here from USAToday.

Report: Russia Signals Readiness to Ease UN Sanctions Against Taliban

A senior Russian diplomat reportedly said Moscow is ready “to show flexibility” on possibly easing United Nations Security Council sanctions imposed on Afghanistan’s Taliban, which has intensified attacks against U.S. service members and American-trained Afghan security forces.

Breitbart: The Taliban recently claimed responsibility for killing six U.S. troops, and the group has been behind a record number of casualties incurred by the Afghan National Defense and Security Forces (ANDSF), which includes army, police, and militia units.

“He appeared to be suggesting that major powers should consider an accommodation with the Taliban to stop the spread of rival Islamic State [ISIS/ISIL] militants, deemed a much bigger, international menace by the West,” Reuters reports, referring to Zamir Kabulov, a department chief at Russia’s Foreign Ministry and President Vladimir Putin’s special envoy on Afghanistan.

“We are ready to approach in a flexible way the issues of a possible easing of the regime of sanctions under Security Council Resolution 1988 on the Taliban, if this does not contradict Afghanistan’s national interests,” the Tass news agency quoted Kabulov as saying, according to Reuters.

“No one is talking today about achieving a victory by military means over the Taliban, while the implementation of the national reconciliation policy would in practice mean their return to power,” he added.

Kabulov noted that Russia supports the U.S.-backed Afghanistan government police aimed at achieving national reconciliation.

In 2011, the UN Security Council Resolution 1988 was passed, designating the Taliban insurgency as a threat to international peace and imposing a freezing of assets, bans on travel, and other restrictions on individuals deemed to be associated with the terrorist group.

Although the Taliban branch in Pakistan—Tehrik-e Taliban Pakistan (TTP)—is listed as a foreign terrorist organization by the United States, the Afghan Taliban is not. TTP is also known to carry out attacks on the Afghanistan side of the country’s border with Pakistan.

ISIS terrorists, which have seized swaths of Iraq and Syria, have established a presence in eastern Afghanistan and have been engaged in turf battles with the Taliban, which has labeled ISIS as “barbaric” in the Afghan territory it has captured.

Last week, Kabulov said that Russian interests in Afghanistan “objectively coincide” with those of the Taliban movement in the fight against ISIS.

He noted that Russia had established communication channels to exchange information on ISIS with the Taliban.

“Moscow, currently conducting a bombing campaign in Syria it says is aimed at Islamic State forces, has been concerned about the possible spread of Islamic State from Afghanistan into neighboring ex-Soviet states like Tajikistan, Uzbekistan and Turkmenistan,” points out Reuters.

U.S. Gen. John Campbell, the top commander of U.S. and NATO forces in Afghanistan, and the Pentagon have acknowledged that ISIS is growing in Afghanistan.

“Groups associated with Islamic State have made growing inroads in Afghanistan, attracting fighters and support away from disenchanted members of the Taliban,” reports Reuters.

“They have been battling government forces and the Taliban in a challenge for supremacy of the Islamist insurgency, and its rise has caused alarm outside Afghanistan, with U.S. commanders citing the movement as a reason to delay troop withdrawals,” it adds.

Militants from the ethnic Uzbek minority in Afghanistan have been linked to the Islamic State.

Russian is reportedly helping to strengthen the Afghan security forces.

In September, a United Nations report revealed that ISIS is actively recruiting supporters in nearly three-quarters (25) of the country’s 34 provinces.

Kabulov estimated in October that there were nearly 3,500 ISIS-linked jihadists in Afghanistan, adding that the number was growing.

Gen. Campbell recently said that between 1,000 to 3,000 ISIS-linked militants were operating in Afghanistan.

 

Every Registered Voter, Personal Data Leaked

In 2014, there were 142.2 million people registered to vote in the United States, according to the U.S. Census Bureau. Forbes is reporting that a database containing 191 million voter records, which includes personal data, has been found, available for anyone to access, online by a “whitehat hacker” named Chris Vickery.

It appears that the personal details of “every registered U.S. voter” are publicly available online. When asked to pull up details on random people by Forbes, Vickery was easily and quickly able to retrieve their names, addresses, birth dates, telephone numbers, and party affiliations, with data appearing to date as early as 2000. Reportedly, no financial information or social security numbers are included in the leaked information.

Vickery has reportedly been unable to pinpoint where the data came from and who might have made it available online. Some attributes of the database led Vickery and researchers with DataBreaches.net to pursue NationBuilder, which has been said to produce similar databases in the past. NationBuilder CEO Jim Gilliam has reportedly stated that IP addresses associated with the database were not associated with the group’s customers, but that it is possible that a customer working on a “non-hosted” system could have produced it.

“From what we’ve seen, the voter information included is already publicly available from each state government so no new or private information was released in this database,” Gilliam was quoted.

A long list of potential suspected political groups have denied responsibility for the voter data leak, including NGP VAN, Political Data, L2 Political, Aristotle, and Catalist.

Vickery and DataBreaches.net were reported to have made reports with the FBI in New York. Forbes reported that the FBI recommended making a report with the Secret Service, which was said to offer no response. DataBreaches.net was said to have made reports with the California Attorney General’s office as well, according to CNET.Information contained in voter records is a matter of public record in many states. South Dakota specifies that voter information may not be placed on the Internet for “unrestricted access” or “commercial purpose.” California has some of the strictest laws protecting voter information in the country, where records are private and may only be accessed “under certain circumstances.”

“I deal with criminals every day who know my name. The thought of some vindictive criminal being able to go to this site and get my address makes me uncomfortable,” an anonymous police officer was quoted. “I’m also annoyed that people can get my voting record. Whether I vote Republican or Democratic should be my private business.”

A Twitter user pointed out that an abusive ex-spouse could use the information to locate a previous partner who does not wish to be found. For that matter, with the information available on the Internet, just about anyone can.

The exposed voter records are said not to include who the voter actually voted for, but that party affiliations are available, which may make determining who an individual likely voted for a simple task. It is noted that the information could be particularly useful during an “issues-oriented campaign.”

Just last week, Chris Vickery exposed that the personal information, including e-mail addresses, user names, and password hints of 3.3 million users registered to the website of SanrioTown.com, home to Hello Kitty, was freely available online, according to CNET. Vickery also recently found a hole allowing the personal information, including usernames and e-mail addresses, of 13 million MacKeeper users to be freely accessed online, as reported by CNET. The MacKeeper software, perhaps ironically, is a suite of security programs aimed at making Mac users safe and secure online.

*** What to be concerned with in 2016: Gartner Report

Biggest Cyber Security Threats To Watch For In 2016; Gartner Forecasts 6.8B Devices Connected To Internet Of Things In 2016

    Harriet Taylor, in a December 28, 2015 article on CNBC’s website is the latest in a series of articles on the evolving cyber threat and what may be the top cyber threats next year.  “Headless worms, machine-to-machine attacks, jailbreaking, ghostware, and two-faced malware,” top the list of key cyber threats to prepare for next year.”   In the coming year,”hackers will launch increasingly sophisticated attacks on everything from critical infrastructure, to medical devices,” said Fortinet Global Security Strategist, Derek Manky.  “We are facing an arms race in terms of security.  Every minute we sleep, we are seeing about a half a million [cyber] attack attempts that are happening in cyber space,” he added.

Here’s How The 2016 Cyber Threat Landscape Looks To Some Experts:

The rise of machine-to-machine attacks:  Research company Gartner predicts there will be 6.8B connected devices in use in 2016; a 30 percent increase over 2015.  By 2020, that number will jump to more than 20B connected devices, the company forecasts.  That would mean an average of two to three Internet-connected devices for every human being on the planet.  The sheer number of connected devices, or ‘Internet of Things (IoT), presents an unprecedented opportunity for hackers.  “We’re facing a massive problem moving forward for growing attack surface,” said Manky.

     “That’s a very large playground for attackers, and consumer and corporate information is swimming in that playground,” he said.  In its 2016 Planning Guide for Security and Risk Management, Gartner said:  “The evolution of cloud and mobile technologies, as well as the emergence [maturation?] of the IoT,’ is elevating the importance of security and risk management foundations.”

     “Smartphones present the biggest risk category going forward,” Manky believes.  “They are particularly attractive to cyber thieves because of the sheer number in use, and multiple vectors of attack, including malicious apps and web browsing;

     “We call this drive-by-attacks — websites that will fingerprint your phone when you connect to them; and, understand what that phone is vulnerable to,” Manky said,.  “Apple devices are still the most secure,” he added.  But, he also cautioned that there is no such thing as a totally safe device connected to the IoT.

Are you nurturing a headless worm?:  “The new year will likely bring entirely new [cyber] worms and viruses able to propagate from device-to-device,” predicts Fortinet.  the new year will see the first “headless worms” — malicious code — targeting “headless devices,’ such as smartwatches, smartphones, and medical hardware;”  “These are nasty bits of code that will float through millions, and millions of computers,” Manky warns.  “The largest we’ve seen to date, is about 15 million infected machines, controlled by one network — with an attack surface of 20B devices.  Certainly that number can spike to 50M, or more.  You can suddenly have a massive outage globally, in terms of all these consumer devices just simply dying and going down [dark];”

Jailbreaking the cloud:  “Expect a proliferation of attacks on the cloud, and cloud infrastructure, including so-called virtual machines, which are software-based computers.  There will be malware specifically built to crack these cloud-based systems  “Growing reliance on virtualization; and both private and hybrid clouds — will make these kind of attacks even more fruitful for cyber criminals,” according to Fortinet.  “At the same time, because apps rely on the cloud, mobile devices running compromised apps will provide a way for hackers to remotely attack public and private clouds and gain access to corporate networks.”

Hackers will use Ghostware to conceal attacks:  “As law enforcement boosts its [cyber] forensic capabilities, hackers will adapt to evade surveillance and detection,  [Stealth] malware designed to penetrate networks, steal information, then cover up its tracks will emerge in 2016.  So-called Ghostware, will make it extremely difficult for companies to track exactly how much data has been compromised, and hinder the ability of law enforcement to prosecute cyber criminals.”  

     “The attacker and the adversaries are getting much more intelligent now,” Manky said.

     “Alongside Ghostware, cyber criminals will continue to employ so-called “blastware,” which destroys and disables a system/s when detected.  “Blastware can be used to take out things like critical infrastructure, and it’s much more of a damaging attack,” he added.

     “Because attackers may circumvent preventative controls, detection and response capabilities are becoming increasingly critical,” advises Gartner in its report.

Two-Faced malware:  “Many corporations now test software in a safe environment called a sandbox, before running it on their networks.”  “A sandbox is designed  to do deeper inspection to catch some of these different ways that they’re trying to change their behaviors,” Manky said.  “It’s a very effective way to look at these new threats as we move forward.”

     “That said,” Ms. Taylor writes, “hackers in turn, are creating malevolent software that seems benign under surveillance; but, morphs into malicious code, once it’s no longer under suspicion.  It’s called……two-faced malware.”

WHAT FORTINET DID NOT ADDRESS
 
     Lots to think about with these 2016 predictions in the cyber realm.  Clearly, there is no such thing as a digital Maginot Line; and, even if there were — we all know how that worked out for France.  Stealth malware, malware that goes dormant when under surveillance; and/or changes like a chameleon, infected clouds, deceptive clouds, combat clouds, hijack clouds — one is to some degree only limited by one’s imagination.  It truly is a digital wilderness of mirrors.
     Fortinet did not address encryption and the Dark Web.  What nasty surprises will the Dark Web have for us in 2016?  Will we be able to develop something akin to a router that cleans out our pipes at home — in the digital world?  How will we ever really know if our systems are ‘clean?’  How are stay-behinds, also known as the gifts that keep on giving — likely to evolve?  What about downloading, or stealing information in an encrypted and clandestine mode?  And, one must not forget the widespread practice of denial, and deception.  How will the field of digital forensic attribution evolve?  Will it get ‘easier’ to pin the tail on the donkey?; or, more complicated and difficult?  What about the purposeful; but, sophisticated corruption of data?
    Fortinet did not address the growing threat of ransomware.  Kaspersky Labs, in  its 2016 forecast, “expects to see the success of Ransomweare to spread to new frontiers.”  “Not only does Kaspersky lab expect Ransomware to gain ground on banking trojans; but, Kaspersky also expects it to transition to other platforms; i.e., cross the rubicon — to not only target Macs; but, also charge ‘Mac prices.  Then, in the longer term, there is the likelihood of the IoT ransomware — begging the question, how much would you be willing to regain acces to your TV programming?  Your fridge?  Your car?,” Kaspersky asks.  
     Kaspersky Labs also “expects the trend of cyber ‘guns-for-hire,’ to continue to evolve and grow.”  Will we see white-hat cyber mercenaries — i.e., a different version of Anonymous — or cyber militias for hire to ‘fight’ against the bad guys?  What about black-hat cyber mercenaries, and the potential emergence of a ‘Dr. No’ in the digital world. 
Will we see the emergence of lethal, offensive cyber weapons — where the objective is to cause loss of of life?  Or, will we see the emergence of a cyber weapon of mass disruption?  A Stuxnet on steroids?  
 
    What about cyber ‘bomb damage assessment?  Can we/have we achieved the ability to conduct elegant, targeted, offensive cyber offensive operations, that do not cause excessive digital collateral damage?
 
     Will 2016 finally see a larger-scale cyber attack here in the U.S. and abroad?  
 
     Will the cyber threat to our stand-alone systems become even more profound?  It has already been demonstrated by researchers at Ben Gurion University in 2014 — that stand-alone systems could be breached using the effluent heat coming off the system.
 
     Will the cyber/digital decision tree on when to respond, how, where, why, with what, come to the fore in the strategic realm?
 
     How will cyber tradecraft evolve and mature?
     Will the Islamic State, al Qaeda, other terrorist groups attempt to launch a major cyber attack on the U.S.?