20 orbit bitcoin mining in order to further the development of its technologies and spacecraft. Deep Space Industries won a contract to design a bitcoin spacecraft and associated constellation to broadcast the latest completed bitcoin block in April 2014. NASA awarded the company two contracts for analysis and advice on the space agency’s Asteroid Redirect Mission in June 2014. This larger craft was to have been approximately 0.
The mothership would provide deep space communication capability with Earth for the entire swarm of smallsats. DSI hoped to begin actively mining asteroids for their metals and water by 2023. These may initially be used in disaster-stricken areas and military bases before they are used for clean power and communications across the planet. The conceptual MGF-3 Series is planned for in space as an exterior module rack attachment.
Future versions of this technology, represented by the MGF-4 series, were intended to be a much larger-scale version of the MGF-3 module exterior rack attachment series. Episode 206: Is Space the Place? The announcement of DSI was met with both praise and criticism. Several unnamed scientists have questioned whether cost-effective asteroid mining could even be accomplished given competition in Earth terrestrial markets and the high-cost of returning high-value minerals to Earth. 5 to 8 million per month.
In particular, Planetary Resources has not released information on their intentions for processing, power generation, or in-space manufacturing hardware and equipment. Prospector-X and Prospector-1 overview concept of operations video, July 2016. This page was last edited on 7 January 2018, at 04:30. They stole data, demanded payment in bitcoin, and disabled computer systems if the victims didn’t pay up.
Log out of your CBC account. Matthew Braga is the senior technology reporter for CBC News. He was previously the Canadian editor of Motherboard, Vice Media’s science and technology website, and a business and technology reporter for the Financial Post. A “financially motivated” and digitally-savvy criminal hacking group has spent at least three years infiltrating computers at several unnamed Canadian mining companies and casinos, stealing sensitive data and holding it for ransom. He could not attribute FIN10 to a particular country or location — a notoriously difficult problem in cybersecurity investigations — but noted that its members appeared to be native English speakers, despite attempts to appear otherwise. A security expert says investigators have ‘no idea’ why a newly identified hacking group has gone after Canadian mining companies and casinos over the last three years — holding stolen data for ransom and turning off essential systems of uncooperative victims.
The group then threatened to release some of the stolen data to the public if no payment was received within 10 days, and to release more data if there was still no payment three days later. FIN10 also wreaked havoc on targets who did not meet their demands “by essentially shutting off production systems so that the mine or casino couldn’t operate for a period of time,” according to Charles Carmakal, another investigator and Mandiant vice president, resulting in “real” but unspecified revenue loss. The attacks follow a common playbook among criminals operating in the digital realm. Democratic National Committee email in the summer of 2015. In one case, the attackers hid their code in a malicious webpage claiming to be an updated holiday schedule for staff. In another, they disguised a malicious Microsoft Word document as an employee questionnaire. Three Canadian casino operators suffered highly publicized data breaches last year — one of which, Cowboy’s Casino, had stolen information published online just this past week.
It is not known if the hacking group FIN10 was behind the breach. Those tools allowed FIN10 to gain a foothold into its targets’ networks, remove data and run basic commands that deleted important operating system files — effectively knocking out casino money handling computers, critical mining databases and systems that were required to let employees log into their workstations. The attackers “scheduled them just like a timebomb,” Prevost said — in one client’s case, taking 60 critical systems offline overnight. But previous breaches offer some possible clues. And in November, the Casino Rama Resort in Rama, Ont. A previous version of this story misstated the current value of bitcoin in Canadian dollars.