SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Clown-Free Zone... sorry, no clowns allowed -- Ignore unavailable to you. Want to Upgrade?


To: S. maltophilia who wrote (431737)3/6/2017 2:16:54 AM
From: Broken_Clock  Respond to of 436258
 
Republicans about to teach Dem-a-wannabes just how bad Obamacare can really get.Hang on to your hope

What Are Republicans Hiding In Obamacare Replacement Plan?

Remember when Nancy Pelosi famously declared, "We have to pass the bill so that you can find out what’s in it?" Fast forward seven years, and now it’s the Republicans doing the exact same thing with their Obamacare replacement bill.



To: S. maltophilia who wrote (431737)3/7/2017 1:57:08 PM
From: Broken_Clock  Respond to of 436258
 
zerohedge.com

Another profound revelation is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.




"With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."

As Kim Dotcom summarizes this finding, "CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE"

CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

— Kim Dotcom (@KimDotcom) March 7, 2017

.....................................

How long can it go on before WW3 blows the seams out?