Recent Intel processors contain a Spy Engine
Newsletter published (again) on April 7, 2019
I sent this newsletter out
about a year ago; but it's worth repeating.
I do my main work, including
this newsletter, on a 2002 Apple Mac G4,
running Mac OS 9, with Javascript
turned off. Big Brother finds it hard
to hack; but they used to hack it when
Javascript was on.
Mac OS 9, being incompatible with Intel computers, is
the safest OS you
can use. Next safe are middle-aged computers, such as
Intel core i-5
Sandy Bridge (eg 2011 iMac).
My Intel Macs are 9-10
years old. More recent computers are designed to
allow access to
intelligence agencies, as Edward Snowden warned.
Forget about speed. Who
wants a computer that runs at lightning speed,
if it's
compromised?
Don't bother to encrypt your data; you're only fooling
yourself.
Remember to back up your computer to external drives. Then
disconnect
them from power & ethernet - Peter M.
(1) 7th
Generation Intel® Core™ i7 processors DESIGNED and MADE IN ISRAEL
(2) Intel
7th generation processors, developed and designed in Israel
(3) The creator
of Minix warns that Intel may use it in a George Orwell
1984 device
(4)
Intel ATM can operate a computer remotely; even when computer is
sleeping
(5) Are (Intel) chipsets spying on us?
(6) Intel vPro
processors allow remote access even when computer is
turned off -
Infowars
(7) Secret 3G Intel Chip provides Backdoors
(8) How do we remain
in charge of our own data? Are there ways to escape
the digital
dystopia?
(9) Snowden: The NSA planted backdoors in Cisco products
(10)
Dell may let you disable the Intel vPro Management Engine (ME)
(11) Mossad
offers seed money to I.T. Startups to develop technology for
Spying
(12)
Mossad to put out another call for applications to develop
cutting-edge
technology
(1) 7th Generation Intel® Core™ i7 processors DESIGNED and
MADE IN ISRAEL
From: dmdeedee <dmdeedee@yahoo.com>
Peter, I do
hope you realize that the Intel Processor chips are made and
designed in
Israel.
Diane
(2) Intel 7th generation processors, developed and
designed in Israel
https://www.jpost.com/Business-and-Innovation/Tech/Intel-launches-next-gen-processors-developed-and-designed-in-Israel-477358
Intel
launches next-gen processors, developed and designed in Israel
The 7th
generation processors provide record-breaking performance rates
and are the
fastest, strongest processors available to the general
public, as well as
being energy-saving.
By Michael Zeff
January 3, 2017
19:01
Intel announced on Tuesday the official launch of its full line of
advanced seventh generation computer processors.
According to Intel’s
Israel division, the majority of development and
design for the new
high-performance processors came from the company’s
Haifa development
center.
"Today, many of Intel’s core products are being developed through
Intel
Israel’s development branch, specifically the sixth generation
processors that were announced last year and the seventh generation that
was just announced today," Ran Sanderovitz, vice president and general
manager of Intel Israel’s development centers, told The Jerusalem Post
on Tuesday.
According to Sanderovitz, employees at the center in
Haifa, and in Yakum
north of Tel Aviv, are behind many of the improvements
to the 7th
generation processors, with support from the firm’s
communications
platforms in Petah Tikva and Jerusalem.
"Of course, we
work collaboratively with other international teams.
Nothing you do is 100%
local, but I would say that the majority of the
design and the innovation –
the big core improvements in physical
design, architecture, built-in
hardware security and device connectivity
– were driven from our development
center here," he said.
"The ability to improve the existing performance
rates of the processors
was a very innovative task and was driven from
Israel and done by the
Intel Israel team. This is one of the best, if not
the best, processor
team in the world today.
I think it’s a result of
chutzpah and the audacity to dare stretch the
limits of capability. This is
also what makes companies like Intel
invest in Israel," Sanderovitz
said.
According to Intel’s announcement, the new processors provide
record-breaking performance rates and are the fastest, strongest
processors available today for the general public, as well as being
energy-saving.
"Every year our team manages to add more and more
performance power to
the processors. Every year we manage to improve
computing power by an
average of 10%. With this line, our Israel team broke
the world record
once more, by 12%," said Sanderovitz.
Intel’s first
batch of seventh generation processors already hit the
markets in August
2016, with a line focused more on low-power,
lightweight and portable
devices better suited for private individual
use. Tuesday’s announcement
brings the full range of processors to
consumers who are professionals who
use the Intel-powered devices for
work or art, and for enterprises which
also require non-portable devices.
"Now our full portfolio of products is
out there. With this launch we
are addressing the high-performance needs of
the enterprise market
segment and those who have more specialized needs from
their machines,"
Sanderovitz said.
The new processors are also a boon
for gamers and the gaming industry,
he said, as well as for anyone who deals
with virtual reality, as they
were specifically designed with the gamers and
the VR sector in mind.
"The Israel team is very much in tune with the
public, and is inspired
to excel by consumer needs."
Hours before
Intel officially announced the launch, Japan’s Toshiba
Corporation announced
that, as of this month, nine of Toshiba’s computer
models will be updated
with the new processors. Chinese computer
manufacturer Lenovo made a similar
announcement in December.
"This is probably the crown jewel of Israeli
high-tech. Very few
products that are designed in Israel generate so much
value by consumers
worldwide, considering how many people are getting
devices with an Intel
processor," Sanderovitz said.
(3) The creator
of Minix warns that Intel may use it in a George Orwell
1984
device
https://www.cs.vu.nl/~ast/intel/
An
Open Letter to Intel
Dear Mr. Krzanich,
Thanks for putting a
version of MINIX inside the ME-11 management engine
chip used on almost all
recent desktop and laptop computers in the
world. I guess that makes MINIX
the most widely used computer operating
system in the world, even more than
Windows, Linux, or MacOS. And I
didn't even know until I read a press report
about it. Also here and
here and here and here and here (in Dutch), and a
bunch of other places.
I knew that Intel had some potential interest in
MINIX several years ago
when one of your engineering teams contacted me
about some secret
internal project and asked a large number of technical
questions about
MINIX, which I was happy to answer. I got another clue when
your
engineers began asking me to make a number of changes to MINIX, for
example, making the memory footprint smaller and adding #ifdefs around
pieces of code so they could be statically disabled by setting flags in
the main configuration file. This made it possible to reduce the memory
footprint even more by selectively disabling a number of features not
always needed, such as floating point support. This made the system,
which was already very modular since nearly all of the OS runs as a
collection of separate processes (normally in user mode), all of which
can be included or excluded in a build, as needed, even more
modular.
Also a hint was the discussion about the license. I (implicitly)
gathered that the fact that MINIX uses the Berkeley license was very
important. I have run across this before, when companies have told me
that they hate the GPL because they are not keen on spending a lot of
time, energy, and money modifying some piece of code, only to be
required to give it to their competitors for free. These discussions
were why we put MINIX out under the Berkeley license in 2000 (after
prying it loose from my publisher).
After that intitial burst of
activity, there was radio silence for a
couple of years, until I read in the
media (see above) that a modified
version of MINIX was running on most x86
computers, deep inside one of
the Intel chips. This was a complete surprise.
I don't mind, of course,
and was not expecting any kind of payment since
that is not required.
There isn't even any suggestion in the license that it
would be appreciated.
The only thing that would have been nice is that
after the project had
been finished and the chip deployed, that someone from
Intel would have
told me, just as a courtesy, that MINIX was now probably
the most widely
used operating system in the world on x86 computers. That
certainly
wasn't required in any way, but I think it would have been polite
to
give me a heads up, that's all.
If nothing else, this bit of news
reaffirms my view that the Berkeley
license provides the maximum amount of
freedom to potential users. If
they want to publicize what they have done,
fine. By all means, do so.
If there are good reasons not to release the
modfied code, that's fine
with me, too.
Yours truly,
Andrew S.
Tanenbaum
Note added later: Some people have pointed out online that if
MINIX had
a GPL license, Intel might not have used it since then it would
have had
to publish the modifications to the code. Maybe yes, maybe no, but
the
modifications were no doubt technical issues involving which mode
processes run in, etc. My understanding, however, is that the small size
and modular microkernel structure were the primary attractions. Many
people (including me) don't like the idea of an all-powerful management
engine in there at all (since it is a possible security hole and a
dangerous idea in the first place), but that is Intel's business
decision and a separate issue from the code it runs. A company as big as
Intel could obviously write its own OS if it had to. My point is that
big companies with lots of resources and expertise sometimes use
microkernels, especially in embedded systems. The L4 microkernel has
been running inside smartphone chips for years. I certainly hope Intel
did thorough security hardening and testing before deploying the chip,
since apparently an older version of MINIX was used. Older versions were
primarily for education and newer ones were for high availability.
Military-grade security was never a goal.
Second note added later:
The online discussion got completely
sidetracked from my original points as
noted above. For the record, I
would like to state that when Intel contacted
me, they didn't say what
they were working on. Companies rarely talk about
future products
without NDAs. I figured it was a new Ethernet chip or
graphics chip or
something like that. If I had suspected they might be
building a spy
engine, I certainly wouldn't have cooperated, even though all
they
wanted was reducing the memory footprint (= chip area for them). I
think
creating George Orwell's 1984 is an extremely bad idea, even if Orwell
was off by about 30 years. People should have complete control over
their own computers, not Intel and not the government. In the U.S. the
Fourth Amendment makes it very clear that the government is forbidden
from searching anyone's property without a search warrant. Many other
countries have privacy laws that are in the same spirit. Putting a
possible spy in every computer is a terrible development.
(4) Intel
ATM can operate a computer remotely; even when computer is
sleeping
https://en.wikipedia.org/wiki/Intel_Active_Management_Technology
Intel
Active Management Technology
A part of the Intel AMT web management
interface, accessible even when
the computer is sleeping
Intel Active
Management Technology (AMT) is hardware and firmware
technology for remote
out-of-band management of personal
computers,[1][2][3][4][5] in order to
monitor, maintain, update,
upgrade, and repair them.[1] Out-of-band (OOB) or
hardware-based
management is different from software-based (or in-band)
management and
software management agents.[1][2]
Hardware-based
management works at a different level from software
applications, and uses a
communication channel (through the TCP/IP
stack) that is different from
software-based communication (which is
through the software stack in the
operating system). Hardware-based
management does not depend on the presence
of an OS or locally installed
management agent. Hardware-based management
has been available on
Intel/AMD based computers in the past, but it has
largely been limited
to auto-configuration using DHCP or BOOTP for dynamic
IP address
allocation and diskless workstations, as well as wake-on-LAN
(WOL) for
remotely powering on systems.[6] AMT is not intended to be used by
itself; it is intended to be used with a software management
application.[1] It gives a management application (and thus, the system
administrator who uses it) access to the PC down the wire, in order to
remotely do tasks that are difficult or sometimes impossible when
working on a PC that does not have remote functionalities built into
it.[1][3][7]
AMT is designed into a secondary (service) processor
located on the
motherboard,[8] and uses TLS-secured communication and strong
encryption
to provide additional security.[2] AMT is built into PCs with
Intel vPro
technology and is based on the Intel Management Engine (ME).[2]
AMT has
moved towards increasing support for DMTF Desktop and mobile
Architecture for System Hardware (DASH) standards and AMT Release 5.1
and later releases are an implementation of DASH version 1.0/1.1
standards for out-of-band management.[9] AMT provides similar
functionality to IPMI, although AMT is designed for client computing
systems as compared with the typically server-based IPMI.
Currently,
AMT is available in desktops, servers, ultrabooks, tablets,
and laptops with
Intel Core vPro processor family, including Intel Core
i5, i7, and Intel
Xeon processor E3-1200 product family.[...]
Intel AMT includes
hardware-based remote management, security, power
management, and remote
configuration features that enable independent
remote access to AMT-enabled
PCs.[1][7][19] Intel AMT is security and
management technology that is built
into PCs with Intel vPro
technology.[1][6] PCs with Intel vPro include many
other[clarification
needed] "platform" (general PC) technologies and
features.[citation needed]
Intel AMT uses a hardware-based out-of-band
(OOB) communication
channel[1] that operates regardless of the presence of a
working
operating system. The communication channel is independent of the
PC's
power state, the presence of a management agent, and the state of many
hardware components such as hard disk drives and memory.
Most AMT
features are available OOB, regardless of PC power state.[1]
Other features
require the PC to be powered up (such as console
redirection via serial over
LAN (SOL), agent presence checking, and
network traffic filtering).[1] Intel
AMT has remote power-up capability.
Hardware-based features can be
combined with scripting to automate
maintenance and
service.[1]
Hardware-based AMT features on laptop and desktop PCs
include:
Encrypted, remote communication channel for network traffic
between the
IT console and Intel AMT.[1][2] Ability for a wired PC
(physically
connected to the network) outside the company's firewall on an
open LAN
to establish a secure communication tunnel (via AMT) back to the IT
console.[1][2] Examples of an open LAN include a wired laptop at home or
at an SMB site that does not have a proxy server. [...]
Laptops with
AMT also include wireless technologies:
Software updates provide upgrades
to the next minor version of Intel
AMT. New major releases of Intel AMT are
built into a new chipset, and
are updated through new
hardware.[2]
Applications
Almost all AMT features are available
even if the PC is in a powered-off
state but with its power cord attached,
if the operating system has
crashed, if the software agent is missing, or if
hardware (such as a
hard drive or memory) has failed. ...
Intel AMT
supports these management tasks:
Remotely power up, power down, power
cycle, and power reset the
computer.[1] Remote boot the PC by remotely
redirecting the PC's boot
process, causing it to boot from a different
image, such as a network
share, bootable CD-ROM or DVD, remediation drive,
or other boot
device.[1][7] This feature supports remote booting a PC that
has a
corrupted or missing OS. ...
This page was last edited on 26
May 2018, at 19:42.
(5) Are (Intel) chipsets spying on us?
https://security.stackexchange.com/questions/171478/are-intel-chipsets-spying-on-us
Are
(Intel) chipsets spying on us?
I had a conversation yesterday where
someone claimed that I should only
use (Intel) computers from before 2006.
This was allegedly because after
this, software has been embedded in the
chipsets that have the ability
to "phone home" or let them "phone in" in
various ways. The exact
details of how and what were not elaborated
further.
This sounded a bit like runaway paranoia, but stories about
things like
secret 3g chips that can switch off your computer remotely don't
seem
like total science-fiction to me, and are deeply worrying.
...
Recently (October 2017) Purism published a guide on what's involved
in
the IME and information on how to disable it. That article had a link to
this page which has more details on how IME can be disabled. ...
(6)
Intel vPro processors allow remote access even when computer is
turned off -
Infowars
http://www.infowars.com/91497
"SECRET"
3G INTEL CHIP GIVES SNOOPS BACKDOOR PC ACCESS
SEPTEMBER 26,
2013
vPro processors allow remote access even when computer is turned
off
Paul Joseph Watson
September 26, 2013
Intel Core vPro
processors contain a "secret" 3G chip that allows remote
disabling and
backdoor access to any computer even when it is turned off.
Although the
technology has actually been around for a while, the
attendant privacy
concerns are only just being aired. The "secret" 3G
chip that Intel added to
its processors in 2011 caused little
consternation until the NSA spying
issue exploded earlier this year as a
result of Edward Snowden’s
revelations.
In a promotional video for the technology, Intel brags that
the chips
actually offer enhanced security because they don’t require
computers to
be "powered on" and allow problems to be fixed remotely. The
promo also
highlights the ability for an administrator to shut down PCs
remotely
"even if the PC is not connected to the network," as well as the
ability
to bypass hard drive encryption.
"Intel actually embedded the
3G radio chip in order to enable its Anti
Theft 3.0 technology. And since
that technology is found on every Core
i3/i5/i7 CPU after Sandy Bridge, that
means a lot of CPUs, not just new
vPro, might have a secret 3G connection
nobody knew about until
now,"reports Softpedia.
Jeff Marek, director
of business client engineering for Intel,
acknowledged that the company’s
Sandy Bridge" microprocessor, which was
released in 2011, had "the ability
to remotely kill and restore a lost
or stolen PC via 3G."
"Core vPro
processors contain a second physical processor embedded
within the main
processor which has it’s own operating system embedded
on the chip itself,"
writes Jim Stone. "As long as the power supply is
available and in working
condition, it can be woken up by the Core vPro
processor, which runs on the
system’s phantom power and is able to
quietly turn individual hardware
components on and access anything on them."
Although the technology is
being promoted as a convenient way for IT
experts to troubleshoot PC issues
remotely, it also allows hackers or
NSA snoops to view the entire contents
of somebody’s hard drive, even
when the power is off and the computer is not
connected to a wi-fi network.
It also allows third parties to remotely
disable any computer via the
"secret" 3G chip that is built into Intel’s
Sandy Bridge processors.
Webcams could also be remotely
accessed.
"This combination of hardware from Intel enables vPro access
ports which
operate independently of normal user operations," reports TG
Daily.
"These include out-of-band communications (communications that exist
outside of the scope of anything the machine might be doing through an
OS or hypervisor), monitoring and altering of incoming and outgoing
network traffic. In short, it operates covertly and snoops and
potentially manipulates data."
Not only does this represent a privacy
nightmare, it also dramatically
increases the risk of industrial
espionage.
The ability for third parties to have remote 3G access to PCs
would also
allow unwanted content to be placed on somebody’s hard drive,
making it
easier for intelligence agencies and corrupt law enforcement
bodies to
frame people.
"The bottom line? The Core vPro processor is
the end of any pretend
privacy," writes Stone. "If you think encryption,
Norton, or anything
else is going to ensure your privacy, including never
hooking up to the
web at all, think again. There is now more than just a
ghost in the
machine." ***
Paul Joseph Watson is the editor and
writer for Infowars.com and Prison
Planet.com. He is the author of Order Out
Of Chaos. Watson is also a
host for Infowars Nightly News.
(7) Secret
3G Intel Chip provides Backdoors
https://www.wilderssecurity.com/threads/secret-3g-intel-chip-provides-backdoors.353866/
Secret
3G Intel Chip provides Backdoors
Discussion in 'privacy general' started
by CloneRanger, Sep 26, 2013.
"Secret" 3G Intel Chip Gives Snoops
Backdoor PC Access
Intel Core vPro processors contain a "secret" 3G chip
that allows remote
disabling and backdoor access to any computer even when
it is turned off.
The promo also highlights the ability for an
administrator to shut down
PCs remotely "even if the PC is not connected to
the network," as well
as the ability to bypass hard drive
encryption.
"Core vPro processors contain a second physical processor
embedded
within the main processor which has it’s own operating system
embedded
on the chip itself," writes Jim Stone. "As long as the power supply
is
available and in working condition, it can be woken up by the Core vPro
processor, which runs on the system’s phantom power and is able to
quietly turn individual hardware components on and access anything on
them." [...]
"The bottom line? The Core vPro processor is the end of
any pretend
privacy," writes Stone. "If you think encryption, Norton, or
anything
else is going to ensure your privacy, including never hooking up to
the
web at all, think again. There is now more than just a ghost in the
machine." ...
(8) How do we remain in charge of our own data? Are
there ways to escape
the digital dystopia?
https://www.youtube.com/watch?v=ycd9Xgrjz8U
Published
on 4 Jun 2017
How do we remain in charge of our own data? Are there ways
to escape the
digital dystopia, where your data tells everything about you?
We live in
the world after Edward Snowden. The communication of citizens and
consumers is widely intercepted and monitored. Your data is being
monitored and analyzed, and now even sold. We seem to be trapped in a
global digital web, created by governments and Silicon Valley.
We
thought the digital revolution would make us the world of
communication. But
now we are caught in a global digital web. Your
smartphone, your bonus card,
your modem, your DigiD, your medical
patient file, your search request, your
Facebook account, your heating
thermostat, your text messages. At each
headline, it just seems to be
closing on you. The patch on our webcam
illustrates: The Big Brothers
and Little Sisters are getting
closer.
Backlight looks behind the madness of the day and asks the
question: how
do we remain in charge of our own data? Are there ways to
escape the
digital dystopia?
(9) Snowden: The NSA planted backdoors
in Cisco products
https://www.youtube.com/watch?v=8meX2l7CjtA
Edward
Snowden open source ethics, cloud computing, and what’s at stake
https://www.infoworld.com/article/2608141/internet-privacy/snowden--the-nsa-planted-backdoors-in-cisco-products.html
TECH'S
BOTTOM LINE
By Bill Snyder, InfoWorld | MAY 15, 2014
Snowden: The
NSA planted backdoors in Cisco products
'No Place to Hide,' the new book
by Glenn Greenwald, says the NSA
eavesdrops on 20 billion communications a
day -- and planted bugs in
Cisco equipment headed overseas
If you
worked in IT sales, can you image how difficult your life would
be if your
foreign customers assumed that the hardware you sold them had
backdoors to
let the U.S. government spy on them at will?
That's not a hypothetical
question.
Incredible as it seems, routers built for export by Cisco (and
probably
other companies) are routinely intercepted without Cisco's
knowledge by
the National Security Agency and equipped with hidden
surveillance
tools. We know this because it's one of the new details of the
spy
agency's vast data gathering programs revealed in "No Place to Hide," a
just-published book by Glenn Greenwald. Greenwald, of course, is the
journalist who broke the story of Edward Snowden, the one-time NSA
employee who has leaked thousands of secret documents.
We learn that
the scale of the NSA's data gathering operations was much,
much larger than
we could have imagined: "As of mid-2012, the agency was
processing more than
twenty billion communications events (both Internet
and telephone) from
around the world each day," Greenwald writes.
Greenwald reveals that a
program called X-KEYSCORE allows "real-time"
monitoring of a person's online
activities, enabling the NSA to observe
emails and browsing activities as
they happen, down to the keystroke.
The searches enabled by the program are
so specific that any NSA analyst
is able not only to find out which websites
a person has visited, but
also to assemble a comprehensive list of all
visits to a particular
website from specific computers.
You would
think that an analyst wanting to monitor someone's online
activities so
closely would need, at the very least, authorization from
a high-level
agency executive. Not so. All the analyst needs to do is
fill out an online
form "justifying" the surveillance and the system
returns the information
requested.
(10) Dell may let you disable the Intel vPro Management Engine
(ME)
https://www.extremetech.com/computing/260219-dell-sells-pcs-without-intel-management-engine-tradeoffs
Dell
has offered a configuration option to disable the Intel vPro
Management
Engine (ME) on select commercial client platforms for a
number of years
(termed Intel vPro – ME inoperable, custom order on
Dell.com). Some of our
commercial customers have requested such an
option from us, and in response,
we have provided the service of
disabling the Management Engine in the
factory to meet their specific
needs. As this SKU can also disable other
system functionality it was
not previously made available to the general
public.
Recently, this option was inadvertently offered online as a
configuration option for a couple of systems on Dell.com. Customers
interested in purchasing this SKU should contact their sales
representative as it is intended to be offered as a custom option for a
select number of customers who specifically require this
configuration.
We followed up with Dell with some additional questions
about the Intel
Management Engine and what it brings to the table. First,
all current
Intel Core and Intel Atom-derived systems from Dell ship with
the IME
enabled. As far as we know, this has been the case for years, both
at
Dell and at other OEMs. Dell explained that it enables IME because the
functionality is an "integral part of normal system operation." This
includes configuring system clocks, thermal management, and security
features used to ensure code integrity. It also enables DRM video
content playback.
Back in 2015, we covered Windows 10’s then-upcoming
PlayReady 3.0 DRM
system. One of the points Microsoft made up-front is that
DRM compliance
required a new hardware security processor and a secure media
pipeline
implemented within the GPU, and the Intel Management Engine seems
to be
designed to fit those goals (even if 4K streaming is confined to Kaby
Lake and other chips).
Dell also told us that it doesn’t use the
Intel Management Engine for
any custom purpose, though some of its
commercial products do use
Intel’s Active Management Technology (AMT). AMT
is only available on PCs
that also offer vPro and is used for remote system
maintenance. ...
(11) Mossad offers seed money to I.T. Startups to
develop technology
for Spying
https://www.jpost.com/Israel-News/Israels-Mossad-is-looking-for-a-few-good-startups-498063
ISRAEL'S
MOSSAD IS LOOKING FOR A FEW GOOD STARTUPS
"We are looking for companies
that are dealing in areas we are
interested in, that are at the beginning
stages, with a good idea and a
good staff."
BY HERB KEINON JUNE 27,
2017 16:00
That’s rights, after excelling in various forms of spy craft,
the
Israeli intelligence agency is dipping into the field of seed money for
start-ups. Only it’s not trying to turn a profit, but rather to stay a
step ahead of the next big thing in technology.
Eli Groner, the
director-general of the Prime Minister’s Office, said in
a conference call
with journalists that the overall aim of the project,
which has been in the
works for 18 months and officially launched on
Tuesday, is to enable the
Mossad to take advantage of Israel’s unique
start-up ecosystem to ensure its
technological superiority.
A Mossad employee, identified on the call only
as "Aleph," said the
Mossad has come to the conclusion that in today’s
technological world,
there is a need to find a way to work with
start-ups.
"We are looking for companies that are dealing in areas we are
interested in, that are at the beginning stages, with a good idea and a
good staff. We want a relationship with them and invest in their idea,
so that they can fulfill their dreams and we can get the technology that
we can use," he said.
Both Groner and Aleph said the idea was not to
buy technology that
already exists, but rather to be involved in the early
stages so that
the Mossad gets the technology it feels it needs. Groner said
nobody
will know what the Mossad will ultimately do with the
technology.
The US has something similar, called In-Q-Tel, which is
defined as the
"strategic investor for the US intelligence and defense
communities that
identifies and adapts cutting- edge
technologies."
According to the slick website for Libertad (www.libertad.gov.il), it
"seeks to
strengthen both start-up companies and the Mossad’s knowledge
base,
operating at the forefront of technological innovation."
The fund is
offering up to NIS 2 million in equity free capital for R&D
of relevant,
viable and groundbreaking projects. A larger investment may
be approved in
special cases. Groner said that the expectation is that
in the beginning
stages the Mossad will invest in five projects a year.
On Tuesday it
issued calls for proposal in the fields of robotics,
energy, encryption, web
intelligence and big data and text analysis. ...
The names of the
start-ups the Mossad works with will not be published.
(12) Mossad to put
out another call for applications to develop
cutting-edge
technology
https://www.jpost.com/Jpost-Tech/Start-up-spies-Mossad-enters-the-world-of-venture-capitalism-544833
START-UP
SPIES? MOSSAD ENTERS THE WORLD OF VENTURE CAPITALISM
The fund, named
Libertad Ventures, is expected to put out another call
for applications to
develop cutting-edge technology for its spying
purposes, later this
year.
BY YONAH JEREMY BOB MARCH 12, 2018 11:22
Israel's secret
spy agency, the Mossad, announced on Sunday that it had
successfully
finished its first round of start-up investments.
The fund, named
Libertad Ventures, is expected to put out another call
for applications to
develop cutting-edge technology for its spying
purposes, later this
year.
Be the first to know - Join our Facebook page.
In June,
the fund was made public for the first time and previous
announcements have
indicated that it would invest NIS 10 million per
year in five companies
following a similar model to the CIA in this arena.
The CIA’s parallel
outfit is called Q-Tel, which is defined as the
"strategic investor for the
US intelligence and defense communities that
identifies and adapts
cutting-edge technologies."
Mossad director Yossi Cohen praised the first
round of funding, saying:
"In Israel, there is cutting-edge technology which
will widen the
envelope from which the Mossad operates and will place it in
a better
position to confront future challenges. Our cooperation with
civilian
companies is excellent and we will continue to strengthen
it."
Those start-ups already selected by the Mossad are expected to
execute
their research and development plans in 2018-2019 and to provide the
Mossad with the results of their efforts with no licensing or other
conditions of use between the parties.
Libertad was established to
achieve the strategic goal of building
long-term advanced technological
capabilities and to take advantage of
Israel’s innovative and creative
hi-tech atmosphere.
The initial round of applications was focused in five
areas identified
by the Mossad, but the Mossad also got applications in
other areas from
companies all over the world.
Initially, the Mossad
called for proposals in the fields of robotics,
energy, encryption, web
intelligence and big data and text analysis. ...
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.