SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : 2026 TeoTwawKi ... 2032 Darkest Interregnum -- Ignore unavailable to you. Want to Upgrade?


To: Elroy Jetson who wrote (131744)3/8/2017 4:53:02 AM
From: TobagoJack  Read Replies (1) | Respond to of 217670
 
delicious

wonder how many 'china'-originated cyber attacks / hacks actually were done out of c i a

and am wondering whether the c i a can use the tools at its disposal to operate a hedge fund or better, direct policy by causing market events

we must wait for vault8

note: this post is clearly cafe material and not political in nature. should any disagree, say so now or forever hold thought

zerohedge.com

Wikileaks Exposes CIA Exploit Capable Of Cyber "False Flag" Attack To Blame Russia Via Whitney Webb of TheAntiMedia.org,

Earlier today, Wikileaks once again made headlines following its release of the “largest ever publication of U.S. Central Intelligence Agency (CIA) documents.” The massive release – just the first batch in a trove of documents code-named “Vault 7” by Wikileaks – details the CIA’s global covert hacking program and its arsenal of weaponized exploits.

While most coverage thus far has focused on the CIA’s ability to infiltrate and hack smartphones, smart TVs and several encrypted messaging applications, another crucial aspect of this latest leak has been skimmed over – one with potentially far-reaching geopolitical implications.

According to a Wikileaks press release, the 8,761 newly published files came from the CIA’s Center for Cyber Intelligence (CCI) in Langley, Virginia. The release says that the UMBRAGE group, a subdivision of the center’s Remote Development Branch (RDB), has been collecting and maintaining a substantial library of attack techniques ‘stolen’ from malware produced in other states, including the Russian Federation.”

As Wikileaks notes, the UMBRAGE group and its related projects allow the CIA to misdirect the attribution of cyber attacks by “leaving behind the ‘fingerprints’ of the very groups that the attack techniques were stolen from.”

In other words, the CIA’s sophisticated hacking tools all have a “signature” marking them as originating from the agency. In order to avoid arousing suspicion as to the true extent of its covert cyber operations, the CIA has employed UMBRAGE’s techniques in order to create signatures that allow multiple attacks to be attributed to various entities – instead of the real point of origin at the CIA – while also increasing its total number of attack types.

Other parts of the release similarly focus on avoiding the attribution of cyberattacks or malware infestations to the CIA during forensic reviews of such attacks. In a document titled “ Development Tradecraft DOs and DON’Ts,” hackers and code writers are warned “DO NOT leave data in a binary file that demonstrates CIA, U.S. [government] or its witting partner companies’ involvement in the creation or use of the binary/tool.” It then states that “attribution of binary/tool/etc. by an adversary can cause irreversible impacts to past, present and future U.S. [government] operations and equities.”

While a major motivating factor in the CIA’s use of UMBRAGE is to cover it tracks, events over the past few months suggest that UMBRAGE may have been used for other, more nefarious purposes. After the outcome of the 2016 U.S. presidential election shocked many within the U.S. political establishment and corporate-owned media, the CIA emerged claiming that Russia mounted a “covert intelligence operation” to help Donald Trump edge out his rival Hillary Clinton.

Prior to the election, Clinton’s campaign had also accused Russia of being behind the leak of John Podesta’s emails, as well as the emails of employees of the Democratic National Committee (DNC).

Last December, Director of National Intelligence James Clapper – a man known for lying under oath about NSA surveillance – briefed senators in a closed-door meeting where he described findings on Russian government “hacks and other interference” in the election.

Following the meeting, Rep. Adam Schiff (D-CA), a ranking member of the House Intelligence Committee, remarked: “After many briefings by our intelligence community, it is clear to me that the Russians hacked our democratic institutions and sought to interfere in our elections and sow discord.”

Incidentally, the U.S. intelligence community’s assertions that Russia used cyber-attacks to interfere with the election overshadowed reports that the U.S. government had actually been responsible for several hacking attempts that targeted state election systems. For instance, the state of Georgia reported numerous hacking attempts on its election agencies’ networks, nearly all of which were traced back to the U.S. Department of Homeland Security.

Now that the CIA has been shown to not only have the capability but also the express intention of replacing the “fingerprint” of cyber-attacks it conducts with those of another state actor, the CIA’s alleged evidence that Russia hacked the U.S. election – or anything else for that matter – is immediately suspect. There is no longer any way to determine if the CIA’s proof of Russian hacks on U.S. infrastructure is legitimate, as it could very well be a “false flag” attack.

Given that accusations of Russian government cyber-attacks also coincide with a historic low in diplomatic relations between Russia and the U.S., the CIA’s long history of using covert means to justify hostile actions against foreign powers – typically in the name of national security – once again seems to be in play.



To: Elroy Jetson who wrote (131744)3/8/2017 6:58:43 AM
From: TobagoJack1 Recommendation

Recommended By
dvdw©

  Read Replies (1) | Respond to of 217670
 
re batteries, per watch & brief in in-tray

On 4 Mar 2017, at 7:13 AM, M wrote:

Or perhaps increase range by 50% to about 400 miles, yet cut the weight (and cost) of a battery in half.
If the battery today costs $11,000 alone, that would push the cost under $6,000.

M

On Sat, Mar 4, 2017 at 7:11 AM, M wrote:

If true, and easily applied, this changes the game for electric cars....three times the density.
That would imply that a Tesla could double its range (500 miles?) but cut the battery (and its weight) by 1/3rd....

M

electrek.co

In collaboration with senior research fellow Maria Helena Braga, the 94-year-old scientist published a recent paper in the journal Energy & Environmental Science that claims to solve some of those problems.

Goodenough said about the findings (via the University of Texas at Austin):

“Cost, safety, energy density, rates of charge and discharge and cycle life are critical for battery-driven cars to be more widely adopted. We believe our discovery solves many of the problems that are inherent in today’s batteries,”

They have actually produced the new solid-state cells with “glass electrolytes that enable the use of an alkali-metal anode”. The materials overcome the dendrite problem that comes with fast-charging the cells.

It could also enable cost reductions in mass production.

Braga said about the new electrolyte:

“The glass electrolytes allow for the substitution of low-cost sodium for lithium. Sodium is extracted from seawater that is widely available,”

They are making impressive claims about the prototype cells that they produced with this new technology. They say that it enables “at least three times as much energy density”, demonstrated “more than 1,200 cycles with low cell resistance”, and can operate “from -20 degrees Celsius to under 60 degree Celsius.”