Iran’s Mullahs Say Thank You to Obama

MEMRI October 15, 2015 Special Dispatch No.6187 Senior Iranian Negotiators Salehi, Kamalvandi: On October 19 President Obama Will Announce Lifting Of American Sanctions http://www.memri.org/report/en/0/0/0/0/0/0/8799.htm    

According to senior Iranian negotiators, Ali Akbar Salehi, the head of the Atomic Energy Organization of Iran and an architect of the nuclear agreement (JCPOA), and Beherouz Kamalvandi, the spokesman for the Atomic Energy Organization of Iran, on October 19, 2015 President Obama will announce that sanctions will be lifted and not merely suspended, contrary to the July 14,

2015 text of the agreement to which Iran is obligated.[1]  

If this report proves accurate, it means that President Obama surrendered to the threats and demands of Iran’s Supreme Leader Ali Khamenei to amend the nuclear agreement (JCPOA) on this critical point, because lifting sanctions instead of suspending them will not allow their automatic reimposition (“snapback”). In this way, President Obama’s promise that the agreement incorporates the security mechanism of restoring the sanctions in the event of an Iranian violation, has been broken. 

It should be emphasized that Salehi’s statement has not been verified at this stage by any Western or American source.  

Khamenei issued his demands and threat on September 3, 2015 in a public address before Iran’s Assembly of Experts[2] and the Iranian Majlis incorporated them in the text that it approved on October 13, 2015.[3]  

Following Khamenei’s address in early September 2015, contacts between Iran and the US and the P5 +1 powers took place September 28, 2015, on the sidelines of the UN General Assembly but their results were not published[4] and subsequently Khamenei issued a guideline on October 7, 2015 banning contacts with the US.[5]  

Endnotes:  

[1] Fars (Iran), October 15, 2015; ILNA (Iran), October 15, 2015.  

[2] See MEMRI Special Dispatch No. 6151, Khamenei Declares That He Will Not Honor The Agreement If Sanctions Are Merely Suspended And Not Lifted, September 4, 2015.  

[3] See MEMRI Inquiry and Analysis No. 1192, The Iranian Majlis Has Not Approved The JCPOA But Iran’s Amended Version Of It, October 13, 2015.  

[4] See MEMRI Special Dispatch No. 6162, Expected September 28 NY Meeting

Between P5+1 Foreign Ministers And Iran Could Signify Reopening Of Nuclear

Negotiations To Address Khamenei’s September 3 Threat That If Sanctions Are

Not Lifted, But Merely Suspended, There Will Be No Agreement, September 21,

2015.

 

 

[5] Twitter.com/khamenei_ir, October 7, 2015.

 

Quote of the Day:

President Obama and his foreign-policy admirers—a dwindling lot—hoped that the nuclear deal would make Iran more open to cooperation in the Middle East and with the U.S. Mark this down as another case in which the world is disappointing the American President.

–Wall Street Journal editorial headlined “The Mullahs Say Thanks”

The Iran deal seemed to be predicated on the notion that if we made all sorts of concessions to Iran it would become a different kind of regime. It would play nicer with President Obama’s imaginary friend “the international community.”

It hasn’t gotten off to a good start. For starters, Washington Post journalist Jason Rezaian, held captive for more than a year, was just convicted of espionage. Reporters keep referring to the Iranian “justice” system, as if there had been a fair trial open to the public. Sure.

The verdict was announced on Monday.  As the Wall Street Journal notes:

The timing of the conviction won’t escape students of history. Friday was the 444th day of his captivity. That was the number of days U.S. diplomats in Iran spent as hostages following the 1979 Islamic Revolution. Mr. Rezaian’s conviction three days later is the mullah equivalent of mailing a dead fish to an adversary.

Mr. Rezaian’s brother has said that he thinks our government should let the Iranians know that “there will be consequences.” Strongly worded letter to follow. But even if our government responded (and it won’t), the mullahs aren’t listening.You see, the Supreme Leader Ali Khamenei just banned further diplomatic negotiations with Washington.

In other news from our Iranian friends, the regime tested on Sunday a guided ballistic missile that code-named Emad (“Pillar”), which the Journal notes is in violation of the nuclear deal. This is also in violation of a recent U.N. Security Council resolution banning any Iranian tests of guided missiles for eight years. It will be difficult for Secretary of State John Kerry’s crack team to glean further information directly, however, because of that Iranian ban on talking to Washington.

If Iran were not a regime bent on nuclear power and destruction and if this were not so dangerous for the world, particularly our mistreated ally (?) Israel, you’d almost have to cheer the mullahs for their gutsiness. But the regime is a totalitarian monstrosity and Israel is in danger of annihilation, which makes it all very unfunny. The Wall Street Journal comments:

The more likely outcome is that the Obama Administration will find a way to explain that the missile test doesn’t violate the nuclear accord that Mr. Obama considers a crowning achievement. Meanwhile, Iran’s government will bank up to $150 billion that it can deploy to back its militia proxies in the Middle East. Add the new Iran-Russia offensive in Syria, and Tehran would appear to have taken the nuclear deal as a signal that it can now do whatever it wants without consequence.

The American recessional continues apace with word that the U.S. is pulling our Patriot missile defense systems from Turkey. This is a nice bookend to one of President Obama’s earliest foreign affairs initiatives, scrapping the missile-defense system for Poland, which would actually be rather nice to have just now as Vladimir Putin is raging through the neighborhood.

Don’t worry, though. President Obama is heading for a climate change conference. Hat tip for this post.

Meanwhile, the IAEA completed it’s first report on an inspection site:

VIENNA (AFP) – 

The UN atomic watchdog said Thursday it has completed on schedule gathering information in its probe into Iran’s alleged past efforts to develop nuclear weapons.

The International Atomic Energy Agency said that, in line with a plan agreed with Iran in July, its chief Yukiya Amano will now provide a “final assessment” on the investigation by December 15.

The IAEA keeps close tabs on Iran’s declared nuclear facilities to ensure that no atomic material is diverted by Iran to any covert weapons programme, an aim denied strenuously by Tehran.

Under a landmark July deal between Iran and six major powers, Iran will dramatically scale down its nuclear activities in order to render any effort to make an atomic bomb virtually impossible.

But the IAEA also wants to probe claims that at least until 2003, Iran conducted research into making nuclear weapons, including with explosives tests at the Parchin military base, something it also denies.

On July 14 — the same day as the wider deal with major powers — Iran and the IAEA agreed a separate “road map” agreement aimed at completing an investigation into these activities by December 15.

The plan included Iran providing the IAEA with information by August 15, which happened on schedule although the IAEA said that there remained “ambiguities” to be resolved.

Thursday’s announcement by the IAEA also helps clear the way for preparations to begin for the implementation of the wider deal between Iran and major powers.

The accord, hailed as a massive diplomatic achievement after over decade of rising tensions, won final approval in Iran on Wednesday as a top panel of jurists and clerics gave it the green light.

Members of the US Congress failed in September to torpedo the deal, with President Barack Obama securing enough support in the Senate to protect the agreement.

In return for downscaling its programme, painful UN and Western sanctions on Iran are due to be lifted. Iranian officials have said this should happen by the end of 2015 or January at the latest.

 

Iran to Obama and Kerry, in Your Faces Dudes

U.N. Security Council Resolution 1929 stipulates that Iran cannot engage in any activities related to ballistic missiles.

U.S. to refer Iran missile test to U.N. over possible violation

Washington (CNN) The State Department said Tuesday it would refer Iran’s firing of a new surface-to-surface ballistic missile to the United Nations Security Council for review to determine whether the test violated a U.N. resolution.

“It’s deeply concerning that this latest violation does appear to be a violation of U.N. Security Council resolution 1929, and we’ll obviously raise this at the [Security Council] as we have done with previous launches,” State Department deputy spokesman Mark Toner told reporters.

“We’ve seen for the past years that Iran has consistently ignored U.N. Security Council resolutions,” he added.

White House spokesman Josh Earnest told reporters Tuesday that while the launch was likely a violation of a Security Council resolution, it was distinct and separate from the nuclear accord reached with Iran earlier this year.

“In contrast to the repeated violations of the U.N. Security Council resolution that pertains to their ballistic missile activities, we’ve seen that Iran over the last couple of years has demonstrated a track record of abiding by the commitments that they made in the context of the nuclear talks,” he said.

Iran entered a final nuclear deal with the U.S. and five other world powers in July that is focused on restricting Iran’s path to a nuclear weapon.

U.N. Security Council Resolution 1929 stipulates that Iran cannot engage in any activities related to ballistic missiles.

A newer U.N. Security Council resolution, number 2231, implementing the deal and banning Iran from engaging in activities related to ballistic missiles designed to carry nuclear warheads is not yet in effect.

Over the weekend, state-run media reported that Iran successfully test-fired a new precision-guided, long-range missile.

The Emad (Pillar) surface-to-surface missile, designed and built by Iranian experts, is the country’s first long-range missile that can be precision-guided until it reaches its target, said Brig. Gen. Hossein Dehqan, Iran’s defense minister.

The Emad would be Tehran’s first precision-guided missile with the range to reach its enemy, Israel.

Israel is bitterly opposed to Iran’s nuclear program, and observers have speculated that it could be prepared to launch pre-emptive strikes on Iranian nuclear sites in an effort to derail their progress.

Dehqan said after the launch that the Emad would greatly increase Iran’s strategic deterrence capability, state media reported.

“To follow our defense programs, we don’t ask permission from anyone,” he said, according to state-run news agency IRNA. *** Due to regional fighter jet activity and testing missiles, commercial flights either get canceled or rerouted.

Hong Kong airline Cathay Pacific said Wednesday it has stopped flying over Iran and the Caspian Sea following an air safety agency warning about Russian missiles fired at Syria.

The airline’s decision to reroute flights comes after Russia stepped up its military campaign against Islamic State group fighters in Syria. It started firing cruise missiles from its military warships in the Caspian Sea on Sept. 30.

“In view of the situation in the region, Cathay Pacific suspended all flights over Iran and Caspian Sea since last Thursday until further notice,” the airline said in a statement. “We continue to monitor and review the situation on a daily basis.”

The European Aviation Safety Agency issued a safety bulletin to airlines last week about cruise missiles targeted at Syrian rebels fired by Russian warships in the Caspian Sea. It said the missiles must cross Iran and Iraq below flight routes used by commercial aircraft.

Cathay added that it has had a long-term policy of not overflying Iraq, Afghanistan, Ukraine and Syria.

The agency said it was not making specific recommendations with its bulletin, which was issued to inform airspace users about the potential hazard. Air France said earlier this week it was taking special measures regarding overflying Iran and the Caspian Sea following the agency’s warning.

Airlines are more cautious about flying over conflict zones since the downing of a Malaysia Airlines Boeing 777 last year amid a conflict between Russia-backed separatists and Ukrainian government forces. Two-thirds of the 298 people who died were Dutch and a Dutch Safety Board report released this week said the jet was destroyed by a Buk surface-to-air missile fired from an area controlled by Russia-backed separatist rebels.

Not finished yet, it gets worse:

JPost: Iran’s Revolutionary Guard on Wednesday revealed an underground bunker in which it stores long-range ballistic missiles, Iran’s semi-official Fars News Agency reported.

Footage of the underground missile bunker was aired on Iranian state television. According to Fars, a number of ballistic missiles were shown in the underground tunnel including a model with a range of 2,000 kilometers.

Fars quoted Amir Ali Hajizadeh, head of the Revolutionary Guard’s aerospace branch, as saying that the missiles represented the next generation of Iranian long-range missile technology.

The missile bunker shown is one of many that are buried as deep as “500 meters below the high mountains,” Fars reported.

Iran state television showed on Sunday what it said was a successful launch of the new Iranian missile, named Emad, which appears to be Tehran’s first precision-guided weapon with the range to strike its regional enemy Israel.

A total of 220 of Iran’s 290 lawmakers praised the missile test on Wednesday, announcing their full support of measures that “strengthen Iran’s defense capabilities.”

The US State Department said that the missile test was an apparent violation of a UN Security Council resolution and Washington will raise it at the United Nations.

“We’ll obviously raise this at the UNSC as we have done in previous launches,” State Department spokesman Mark Toner told reporters, noting the test appeared to be a violation of U.N. Security resolution 1929.

He and White House spokesman Josh Earnest both said the issue was separate from a deal Iran struck in July with six world powers, which seeks to curb Tehran’s atomic program in return for having sanctions against it eased.

Ballistic missile tests by Iran are banned under Security Council resolution 1929, which dates from 2010 and remains valid until the July 14 nuclear deal goes into effect.

Once the deal takes effect, Iran will still be “called upon” not to undertake any ballistic missiles work designed to deliver nuclear weapons for a period of up to eight years, according to a Security Council resolution adopted in July.

The resolution says that when the deal is in effect countries will be allowed to transfer missile technology and heavy weapons to Iran on a case-by-case basis with council approval.

However, at the time the resolution was drafted, a U.S. official called this provision meaningless and said the United States would veto any suggested transfer of missile technology to Iran.

Speaking on Tuesday, White House spokesman Earnest made clear countries could more to stop the flow of ballistic missile technology to Iran.

“That is work that requires international cooperation,” he said, adding that Washington was ready to work with Gulf allies to counter Iran’s ballistic missile program.

Putin’s Coalition Forces in Syria vs. Obama’s

  1. Iran: Iranian MPs arrive in Damascus before joint offensive ~ A delegation of Iranian lawmakers arrived in Damascus on Wednesday in the build-up to a joint operation against insurgents in northwest Syria, and said U.S.-led efforts to fight rebels had failed.The visit, led by the chairman of the Iranian parliament’s National Security and Foreign Policy Commission, Alaeddin Boroujerdi, came as Iranian troops prepared to bolster a Syrian army offensive that two senior officials told Reuters would target rebels in Aleppo.

    The attack, which the officials said would be backed by Russian air strikes, underlined the growing involvement in the civil war of Syrian President Bashar al-Assad’s two main allies, which has alarmed a U.S.-led coalition opposed to the president that is bombing Islamic State militants.

    “The international coalition led by America has failed in the fight against terrorism. The cooperation between Syria, Iraq, Iran and Russia has been positive and successful,” Boroujerdi was quoted as saying by Iran’s state broadcaster IRIB as he arrived at Damascus airport.

    The delegation was due to meet Assad, said officials.

    Iran has sent thousands of troops into Syria in recent days to bolster the planned ground offensive in Aleppo, the two officials told Reuters. More here.

  2. China: China’s Syria Connection ~A 2011 report by the U.S. Congressional Research Service highlighted the role China has played in arming Assad’s military, providing $300 million worth of arms from 2007 to 2010.

    For proof of continuing support, February 2013 saw the United States impose sanctions on China Precision Machinery Import and Export Corporation, a state-owned company, for allegedly conducting military transfers to Syria in violation of nonproliferation legislation.

    China seems happy to let Russia and Iran take on the role as Assad’s main supporters. Even though China is less obvious than the other two nations, it is nonetheless far from neutral.

    Despite Chinese rhetoric of supporting a political solution, its actions suggest otherwise.

    China’s selective use of its “noninterference” policy has seen them (alongside Russia) veto three Western-backed Security Council resolutions seeking to bring Assad to the negotiating table. As a permanent member of the Security Council, any international solution would require Chinese acquiescence.

    Furthermore, in an interview given to the Financial Times in June, Kadri Jamil, Syrian deputy prime minister for the economy, boasted that China has joined Iran and Russia in delivering $500 million a month in oil and credit to Syria. The majority of Syria’s oil is in the largely rebel-held north and northeast of the country, and the network of pipelines connecting the wells to the population centres are vulnerable to rebel attack. As a result, Syrian oil production has fallen by as much as 95 percent during the ongoing conflict, and the importance of Chinese aid should not be underestimated. Chinese financial and material support supplements Russian and Iranian aid and has allowed the Assad war machine to remain militarily effective. More here.

  3. Cuba: Cuban Troops Join the Russian Offensive in Syria ~ Russian President Vladimir Putin has made waves of late with his military offensive in Syria, and now he has on-the-ground backing of the Cuban variety. One of the world’s leading centers for research on Cuba has released breaking details of the Castro regime’s presence in the war-torn Middle Eastern nation.+

    The Institute for Cuban and Cuban-American Studies (ICCAS) at the University of Miami shared via email on October 13, 2015, that General Leopoldo Cintra Frías, head of the Cuban Armed Forces, had already landed in Syria. He is, they write, “leading a group of Cuban military personnel … in support of Syria’s dictator Assad” and, in Cold War fashion, the Russian contingent.+

    The ICCAS researchers shared with the PanAm Post that the intelligence came directly from a spokesman of the US Defense Department, and is corroborated by an unnamed but friendly military in the Middle East. They report two Russian-made planes arriving in Syria carrying approximately 300 Cuban soldiers.+

    They further detail that the Cuban soldiers will man Russian tanks that have been provided to Syrian head-of-state Bashar al-Assad. Their duty will be to fight Islamic State forces and others who threaten Assad’s grip on power. More here.

Back in 2014, Obama announced his member nation coalition to take on Islamic State and the Khorasan Group:

President Barack Obama on Tuesday morning called the U.S.-led attacks against terrorist targets in Syria a sign that Arab nations in the Middle East and Congress at home are committed to destroying the Islamic State, the terrorist group that occupies large swathes of land in Iraq and Syria.

Saudi Arabia, the United Arab Eremites, Jordan, Bahrain and Qatar all joined the U.S. in the attacks against the Islamic State that included a strike package of stealth fighters, bombers, drones and Tomahawk missiles, Obama said.

“America is proud to stand shoulder-to-shoulder with these nations as part of our common security,” the President said in brief remarks from the South Lawn of the White House, just before departing for New York City. “The strength of the coalition makes clear that it is not America’s fight alone.”

In addition to hitting Islamic State targets, Obama said the coalition operation in Syria was meant to disrupt a plot “against the United States and our allies by seasoned al-Qaeda operatives [there] known as the Khorosan Group.”

Rashid Khalidi, Palestinians and Death

Shocking moment Palestinian drives his car into crowd of Israelis at bus stop and then hacks one of them to death before he is shot by police

Israeli emergency personnel work at the scene of an attack in Malchei Israel Street, Jerusalem. A Palestinian rammed his car into a bus stop before getting out and stabbing pedestrians

As Palestinians Stab Jews, Obama Friend Khalidi Says US Should Stop Supporting Israel

BenShapiro: Rashid Khalidi, President Obama’s favorite Palestinian terrorist apologist, has a piece defending the latest spate of Palestinian terrorism in The New Yorker today.

Khalidi made his name as an advisor to Yassar Arafat’s terrorist Palestine Liberation Organization. He then got a job as a professor at the University of Chicago before moving onto Columbia University, where he took over as chair of the Middle East Studies program, named in honor of terror apologist Edward Said. Khalidi has been a longtime Obama friend and ally; Obama infamously attended a 2003 dinner in honor of Khalidi, tape of which was obtained by the Los Angeles Times. The Times then suppressed the tape.

In today’s New Yorker, Khalidi argues that the Oslo Accords should never have taken place – that somehow, Israel handing over guns and land to Palestinian terrorists, as well as paying all their water and power bills, has been a boon for Israel. Khalidi called Palestinian Authority dictator Mahmoud Abbas’ declaration of an end to Oslo at the United Nations “long overdue” and said that Oslo had resulted in “the current upsurge in violence against Palestinians and settlers in the occupied territories.”

Actually, Jews are being stabbed to death in Jerusalem, the Jewish capital of the State of Israel. And Oslo’s main result was the legitimization of an international terrorist group on the world stage. But Khalidi explains that Oslo was never designed as part of a peace process; instead, it was all a sophisticated Jewish ruse to keep those innocent Palestinians under their thumb. In fact, says Khalidi, “The only part of Oslo that was faithfully implemented, in fact, is the protection that the P.A. provides to Israel by policing its own people.”

If by “policing its own people,” Khalidi means using the guns Israel gave the PA to pursue terrorist activities against Jews, that’s exactly correct. But Khalidi says that now that Abbas has disowned Oslo, it’s time for the United States to embrace a “new paradigm.” That paradigm would follow the lead of “young people, people of color and progressives,” who “oppose unconditional US support for Israel.” Khalidi enthusiastically embraces the possibility of sanctions on Israel, and cheers new polls showing that Democrats only favor Israel over Palestinians by ten points.

Khalidi concludes:

It is time for American politicians and policymakers to stop hiding behind the fictions of Oslo. If they really wish to avoid more of the same, they must abandon bankrupt strategies and meaningless platitudes and act vigorously to end a system of military occupation and colonization that would crumble without their support.

The Khalidi family used to babysit the Obama children. They are ideologically and philosophically aligned. Obama said at the 2003 bash for Khalidi – a bash at which a Palestinian likened Zionists to Osama Bin Laden – that Khalidi’s conversations provided “consistent reminders to me of my own blind spots and my own biases….It’s for that reason that I’m hoping that, for many years to come, we continue that conversation — a conversation that is necessary not just around Mona and Rashid’s dinner table, [but around] this entire world.”

Khalidi told The Los Angeles Times that Obama took a pro-Israel position in 2008 in order to win the election.

The mask is off now, however. President Obama’s ideological allies, from Jeremiah Wright to Khalidi, have spent this week attempting to rip down Israeli self-defense even as Palestinians stab Jewish children in the streets of Israel’s capital. And Obama’s administration says and does nothing. Why would they? They’re on Rashid Khalidi’s side.

 

Arms Race, Cyber Defenses Fail

By: Damian Paletta, Danny Yadron and Jennifer Valentino-DeVries
Countries toiled for years and spent billions of dollars to build elaborate facilities that would allow them to join the exclusive club of nations that possessed nuclear weapons.
Getting into the cyberweapon club is easier, cheaper and available to almost anyone with cash and a computer.
A series of successful computer attacks carried out by the U.S. and others has kicked off a frantic and destabilizing digital arms race, with dozens of countries amassing stockpiles of malicious code. The programs range from the most elementary, such as typo-ridden emails asking for a password, to software that takes orders from a rotating list of Twitter handles.
The proliferation of these weapons has spread so widely that the U.S. and China-longtime cyber adversaries-brokered a limited agreement last month not to conduct certain types of cyberattacks against each other, such as intrusions that steal corporate information and then pass it along to domestic companies. Cyberattacks that steal government secrets, however, remain fair game.
This comes after other countries have begun to amass cyberweaponry on an unprecedented scale. Pakistan and India, two nuclear-armed rivals, regularly hack each other’s companies and governments, security researchers said. Estonia and Belarus are racing to build defensive shields to counter Russia. Denmark and the Netherlands have begun programs to develop offensive computer weapons, as have Argentina and France.
In total, at least 29 countries have formal military or intelligence units dedicated to offensive hacking efforts, according to a Wall Street Journal compilation of government records and interviews with U.S. and foreign officials. Some 50 countries have bought off-the-shelf hacking software that can be used for domestic and international surveillance. The U.S. has among the most-advanced operations.
In the nuclear arms race, “the acronym was MAD-mutually assured destruction-which kept everything nice and tidy,” said Matthijs Veenendaal, a researcher at the NATO Cooperative Cyber Defence Centre of Excellence, a research group in Estonia. “Here you have the same acronym, but it’s ‘mutually assured doubt,’ because you can never be sure what the attack will be.”
Governments have used computer attacks to mine and steal information, erase computers, disable bank networks and-in one extreme case-destroy nuclear centrifuges.
Nation states have also looked into using cyberweapons to knock out electrical grids, disable domestic airline networks, jam Internet connectivity, erase money from bank accounts and confuse radar systems, experts believe.
Large conventional militaries and nuclear forces are ill-suited to this new kind of warfare, which evens the playing field between big and small countries. Cyberattacks are hard to stop and sometimes impossible to trace. The West, as a result, has been forced to start reconfiguring its militaries to better meet the threat.
 
Access to cyberweapons, according to U.S. and foreign officials and security researchers, is far more widespread than access to nuclear weapons was at the height of the nuclear arms race, a result of inexpensive technology and the power of distributed computing.
More than two dozen countries have accumulated advanced cyberweapons in the past decade. Some Defense Department officials compare the current moment to the lull between the World Wars when militaries realized the potential of armed planes.
“It’s not like developing an air force,” in terms of cost and expertise, said Michael Schmitt, a professor at the U.S. Naval War College and part of an international group studying how international law relates to cyberwarfare. “You don’t need to have your own cyberforce to have a very robust and very scary offensive capability.”
For example, hackers aligned with the Syrian government have spied into the computers of rebel militias, stolen tactical information and then used the stolen intelligence in the ongoing and bloody battle, according to several researchers, including FireEye Inc.
Most cyberattacks linked to the U.S. and foreign governments in recent years involve cyberspying-breaking into a computer network and stealing data. More-aggressive covert weapons go further, either erasing computer records or destroying physical property.
“With some countries, we’re comfortable with knowing what their capabilities are, but with other countries we’re still lost,” said Andre McGregor, a former cyber special agent at the Federal Bureau of Investigation and now the director of security at Tanium Inc., a Silicon Valley cybersecurity startup. “We don’t have the visibility into their toolset.”
The Military Balance, a widely read annual assessment of global military powers published by the International Institute for Strategic Studies in London, tallies tanks, battalions and aircraft carriers. When it comes to national cyberforces it says “capabilities are not assessed quantitatively.”
In the U.S., the National Security Agency, Central Intelligence Agency, FBI and others all play roles in combing through intelligence.
U.S. officials say their biggest concerns are the cyberweapons held by the Chinese, Russians, Iranians and North Koreans, countries that have deployed advanced attacks that either dug inside U.S. government networks or targeted top U.S. companies. Even Israel, a U.S. ally, was linked to hacking tools found on the computers of European hotels used for America’s diplomatic talks with Iran, according to the analysis of the spyware by a top cybersecurity firm. Israeli officials have denied spying on the U.S.
Cyberarmies tend to be integrated with a country’s military, its intelligence services, or both, as is the case in China and the U.S.
In China, hackers are famous for the relatively low-tech tactic of “phishing”-sending a flood of disguised emails to trick corporate employees and government bureaucrats to letting them into their networks.
The U.S. suspects that is how they penetrated the Office of Personnel Management, using a phishing email to breach an OPM contractor and then crack the agency’s network. The records of more than 21 million people were exposed in the 2014 and 2015 data breach, disclosed this summer. China has said it wasn’t involved.
China’s army has divisions devoted to cyberattacks, and recent evidence shows links between the country’s military and hackers who appear to be pressing the country’s interests abroad.
“They used to be snap and grab-get in and dump everything they can,” said Tommy Stiansen, co-founder and chief technology officer at Norse Corp., a California cybersecurity firm that tracks nation-state activity. “Now they trickle out the information, stay hidden in the system. We’ve even seen Chinese actors patch and repair networks once they’ve broken in.”
China opposes the militarization of cyberspace or a cyberarms race, said Zhu Haiquan, a spokesman for the Chinese Embassy in Washington, adding China “firmly opposes and combats all forms of cyberattacks in accordance with law.”
Choosy in targets
 
Russian hackers have targeted diplomatic and political data, burrowing inside unclassified networks at the Pentagon, State Department and White House, also using emails laced with malware, according to security researchers and U.S. officials.
They have stolen President Barack Obama‘s daily schedule and diplomatic correspondence sent across the State Department’s unclassified network, according to people briefed on the investigation. A Russian government spokesman in April denied Russia’s involvement.
“Russia has never waged cyberwarfare against anyone,” Andrey Akulchev, a spokesman for the Russian Embassy in Washington, said in a written statement Friday. “Russia believes that the cybersphere should be used exclusively for peaceful purposes.”
Russia’s top hackers tend to be choosier in their targets, tailoring email attacks to those they believe might unwittingly open links or attachments.
“They are sitting there trying to think through ‘how do I really want to compromise this target?’ ” said Laura Galante, director of threat intelligence at FireEye, a Silicon Valley cybersecurity company that works closely with Washington. “The Chinese just want a foothold into the target. Russian theft is very personal.”
U.S. spies and security researchers say Russia is particularly skilled at developing hacking tools. Some malicious software linked to Russia by security researchers has a feature meant to help it target computers on classified government networks usually not connected to the Internet.
The virus does this by jumping onto USB thumb drives connected to targeted computers, in the hopes that the user-such as U.S. military personnel-will then plug that USB drive into a computer on the classified network.
Russian hackers also make efforts to hide stolen data in normal network traffic. In one example, a piece of malware hides its communications in consumer Web services to fool cybersecurity defenses. The code downloads its instructions from a set of Twitter accounts. It then exports data to commercial storage services. This tactic is effective because corporate cybersecurity systems often don’t block traffic to and from these sites.
Government investigators believe Iranian hackers implanted the Shamoon virus on computers at Saudi Arabia’s Saudi Aramco, the world’s largest energy firm, in 2012. The Aramco attack erased 75% of the company’s computers and replaced screen images with burning American flags. The attack didn’t affect oil production, but it rattled the company, and security officials, as it revealed the extent of Iran’s cybercapabilities. A spokesman for Aramco didn’t respond to a request for comment.
The move was at least partly in retaliation for the alleged U.S.-Israeli attack on Iran discovered in 2010 that deployed the Stuxnet computer worm to destroy Iranian nuclear centrifuges-considered to be the most successful and advanced cyberattack ever. The U.S. and Israel haven’t confirmed or denied involvement with Stuxnet.
Director of National Intelligence James R. Clapper has said that Iran used malware to destroy computers last year at Las Vegas Sands Corp., a casino company run by Sheldon Adelson, a major critic of the Iranian government. A Sands spokesman declined to comment.
Adm. Michael Rogers, center, director of the National Security Agency and commander of the U.S. Cyber Command, confers with Deputy Defense Secretary Robert Work ahead of testifying before the Senate Armed Services Committee in September. Photo: Win McNamee/Getty Images
Defense officials have also said Iranian hackers have temporarily overwhelmed the websites of numerous U.S. banks, in an annoying but relatively pedestrian technique known as a “denial of service” attack. The attack was allegedly in response to a YouTube video depicting the Prophet Muhammad. Some U.S. officials suspected it was retaliation for sanctions and the Stuxnet attack.
In 2012, Iran’s Supreme Leader Ayatollah Ali Khamenei publicly announced the creation of the Supreme Council of Cyberspace charged to oversee the defense of Iran’s computer networks and develop “new ways of infiltrating or attacking the computer networks of its enemies.”
National Security Agency Director Adm. Michael Rogers said Iranian cyberattacks have slowed since nuclear talks intensified last year, but that Tehran appears “fully committed” to using cyberattacks as part of its national strategy.
A spokesman for the Iranian government didn’t respond to request for comment.
Sony hack
 
U.S. officials accused North Korea of destroying computer files and records at Sony Corp.’s Hollywood film unit in 2014, allegedly in retaliation for “The Interview,” a satirical movie about assassins of North Korean leader Kim Jong Un. The breach was considered one of the most successful nation-state attacks. North Korea successfully implanted malware on Sony computers, which allowed them to both steal and destroy company records, the FBI alleged.
South Korea has also accused North Korea of trying to hack a nuclear reactor, television networks and at least one bank.
“Cybercapability, especially offensive cybercapability, is a relatively inexpensive method that a country can exploit to ‘hit above its weight class,’ which North Korea is fully aware of and is attempting to leverage,” said Steve Sin, a former U.S. Army counterintelligence officer who now researches unconventional weapons and technology.
Defense contractor Northrop Grumman Corp., meanwhile, has advertised for a “cyber operations planner” to “facilitate” offensive computer attacks with the South Korean and U.S. governments, according to a job posting it listed online.
A Northrop spokesman said the customer determines the scope of work performed.
A spokesman for North Korea couldn’t be reached for comment. The country hasn’t commented publicly on cyberprograms.
Many cybersecurity experts, however, consider the U.S. government to have the most advanced operations. When Kaspersky Lab ZAO, a Russian cybersecurity company, this year released a report on a group it called the Equation Group-which U.S. officials confirmed was a thinly veiled reference to the NSA-it referred to the operatives as the “crown creator of cyberespionage.”
Former National Security Agency contractor Edward Snowden leaked documents that showed the NSA had implanted malware on tens of thousands of foreign computers. That allowed the U.S. government secret access to data and, potentially, the industrial control systems behind power plants and pipelines. The Pentagon’s U.S. Cyber Command didn’t respond to a request for comment.
In some instances, Kaspersky found, the NSA was able to burrow so deeply into computers that it infected the code that controls how a hard drive spins. So-called firmware isn’t scanned by computer defenses.
“We, too, practice cyberespionage, and, in a public forum, I’m not going to say how successful we are, but we’re not bad,” Mr. Clapper, the Director of National Intelligence, told a Senate panel in September.
U.S. Cyber Command now has nine “National Mission Teams” with plans to build four more. These each comprise 60 military personnel that will “conduct full-spectrum cyberspace operations to provide cyber options to senior policy makers in response to attacks against our nation,” a Pentagon spokesperson said.
The Navy, Army, and Air Force will each build four teams, with the Marines building a single unit. Each will have a “separate mission with a specific focus area,” though these have so far remained secret.
Air Force Chief of Staff Gen. Mark A. Welsh III told a group of reporters in April that he wanted to see the military develop “blunt force trauma” powers with their cyberweapons. He gave examples of computer codes that could “make an enemy air defense system go completely blank” or have an enemy’s “radar show a thousand false targets that all look real.” He didn’t say the military had finished designing such powers.
Defense Secretary Ash Carter has made the development of new cyberweapons a priority, although the policy seems in flux after questions were raised by the Pentagon’s inspector general.
This activity has prompted other countries to join the digital buildup.
In 2014, the Netherlands announced it would begin training its own Internet troops through a domestic cybersecurity company, called Fox-IT. The head of the Dutch armed forces, Major Gen. Tom Middendorp, said in a symposium the group should be prepared to carry out attacks, not just block them, according to a Dutch media report. The Netherlands’ military strategy, laid out in various documents, refers to hacking as a “force multiplier.” A Dutch military spokesman confirmed the efforts but declined to make Gen. Middendorp available for an interview.
In 2013, Denmark’s Defense Ministry began allocating about $10 million a year for “computer network operations,” which include “defensive and offensive military operations,” according to government budget documents. That amount is just 0.24% of the Danish defense budget, reflecting the tiny barrier of entry.
Countries unable to develop their own weapons can buy off-the-shelf systems from private parties. Earlier this year, an attack and document leak on the Italian firm Hacking Team revealed the company had sold its surveillance tools to dozens of countries, including Sudan, Egypt, Ethiopia and Azerbaijan.
Hacking Team touted its product as “the hacking suite for governmental interception,” and computer security researchers who studied its program said it took advantage of holes in popular software to get onto opponents’ computers and mobile devices. The FBI is among the groups listed as clients of Hacking Team. An FBI spokesman said it didn’t comment on specific tools or techniques.
Most of these countries use surveillance software on domestic enemies or insurgent groups, according to officials with numerous countries and researchers.
States aren’t the only players. About 30 Arabic-fluent hackers in the Palestinian territories, Egypt and Turkey are building their own tools to hit targets in Egypt, Israel and the U.S., according to researchers at Kaspersky Lab.
And in August, the U.S. used a drone to kill Islamic State hacker Junaid Hussain in Raqqa, Syria, showing the extent to which digital warfare has upset the balance of power on the modern battlefield.
The British citizen had used inexpensive tools to hack more than 1,000 U.S. military personnel and published personal and financial details online for others to exploit. He helped sharpen the terror group’s defense against Western surveillance and built hacking tools to penetrate computer systems, according to people familiar with the matter.
National-security and cyberweapon experts are watching the growing digital arms stockpile nervously, worried that one-off attacks could eventually turn messier, particularly given how little is known about what each country is capable of doing.
“What we can do, we can expect done back to us,” said Howard Schmidt, who was the White House’s cybersecurity coordinator until 2012. The U.S. is thinking, “Yeah, I don’t want to pull that trigger because it’s going to be more than a single shot that goes off.”