Date: September 21, 2016 Source: NASA/Jet Propulsion Laboratory Summary: The puzzling appearance of an ice cloud seemingly out of thin air has prompted NASA scientists to suggest that a different process than previously thought — possibly similar to one… Read More ›
Technology
China’s Tiangong-1 space station is falling – officials
Tuesday, 20 September 2016 China’s maiden space station, Tiangong-1, has ended its operations and will fall to Earth sometime in late 2017, Chinese officials have confirmed in a press conference Wednesday. Tiangong-1, which was launched in September 2011 and… Read More ›
Hillary Clinton’s computer server has been targeted by hackers in Russia and China at least four times, claims report
Hillary Clinton was the target of three hacking attacks from China in 2014 and one from Russia in 2013 The attacks happened while she was still secretary of state and afterward Feds have said Clinton’s people were ‘careless… Read More ›
John Deutch and Hillary Clinton, How History Has Repeated–Leaking Classified Data
For those not familar, please refer to the National Reviews article: Déjà Vu: When Bill Clinton Pardoned His Former CIA Director over Classified Documents on His Home Computer CIA PDF HERE: UNCLASSIFIED/ /FOUO Central Intelligence Agency Inspector General REPORT OF INVESTIGATION IMPROPER… Read More ›
YouTube now Censoring Americans who Criticize their Government ?
Editors Note: (Ralph Turchiano): Youtube is a semi free service, in which I have also been banned to this mysterious algorithm through invalid click activity with no chance of appeal in 2012. I do believe Youtube has a right to… Read More ›
Decryption Key to MegaCloud DNC 2.0 File Dump
This will get you through the first wall of encryption; However, each file from there is passcoded Link mega.nz/#!uwBGyCoQ Decryption key: !ZSPbUeUjmeSt0GEovBrEYV9V_3CX09hROm3JQJmr0HU
Open Source Code algorithm now available through here to detect Online fraudsters and politicians
Public Release: 8-Sep-2016 Carnegie Mellon algorithm detects online fraudsters Method sees through camouflage to reveal fake followers, reviewers Carnegie Mellon University PITTSBURGH — An algorithm developed at Carnegie Mellon University makes it easier to determine if someone has faked an… Read More ›
Researchers find vulnerabilities in cars connected to smartphones
Public Release: 1-Sep-2016 NYU Tandon School of Engineering Caption This is a hardware setup in which an Android phone is integrated with the head unit of a 2015 model vehicle (left). MirrorLink is the connection protocol and allows the… Read More ›
Researchers discover machines can learn by simply observing
Public Release: 30-Aug-2016 Researchers working with swarm robots make major breakthrough University of Sheffield It is now possible for machines to learn how natural or artificial systems work by simply observing them, without being told what to look… Read More ›
A Fifth force of nature may have been discovered , first consistency check passed
Public Release: 17-Aug-2016 Nuclear puzzle may be clue to fifth force If confirmed, fifth force of nature would have far-reaching consequences on fundamental physics University of California – Riverside IMAGE: A schematic description of the experimental anomaly that Tanedo… Read More ›
People ignore software security warnings up to 90 percent of the time
Public Release: 17-Aug-2016 Why? Poor timing Brigham Young University IMAGE: A security message from the Google Chrome Cleanup Tool is shown. Credit: Google Chrome Software developers listen up: if you want people to pay attention to your security warnings… Read More ›
China takes the lead in quantum communication satellites
BEIJING, Aug. 16 (Xinhua) — China plans to send more quantum communication satellites into orbit after the successful launch of the Quantum Experiments at Space Scale (QUESS) satellite, according to the chief scientist of the project. Early Tuesday… Read More ›
Equation Group – Cyber Weapons Auction (File Copy- Unverified)
Editors Note: (Ralph Turchiano) – This is a picture format – The current source link is here: CLICK LINKS BELOW AT YOUR OWN RISK !!! https://archive.is/rdYpc#selection-373.0-373.38 rawdownloadcloneembedreportprinttext 6.64 KB —–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 From: bitmessage = BM-NBvAHfp5Y6wBykgbirVLndZtEFCYGht8… Read More ›
The NSA leaking Hillary’s Emails?
Monday, 01 August 2016 Over a year before Edward Snowden shocked the world in the summer of 2013 with revelations that have since changed everything from domestic to foreign US policy but most of all, provided everyone a glimpse… Read More ›
US State Department lacks any cyber-security whatsoever, including no passwords needed (Repost from Oct 2013)
Editors Note: (Ralph Turchiano)- Requested Repost from Oct 2103 Published time: October 28, 2013 02:01 Reuters / Jim Young Access classified data without authorization, use your account after you’ve been fired, or anonymously request a new account for an… Read More ›
Compromised Code Names, Operations and Equipment / Recent and in progress ( Updated 12:37PM PST / 27OCT2013 )
Editors Note: (Ralph Turchiano) Requested Repost from the archives (Oct 2013) EEV: Recently Compromised or exposed Code names, Operations, Software and facilities. The list is in no particular order and is being updated frequently. These are just the discoveries from… Read More ›
New artificial intelligence beats tactical experts in combat simulation
Public Release: 27-Jun-2016 University of Cincinnati Retired United States Air Force Colonel Gene Lee, in a flight simulator, takes part in simulated air combat versus artificial intelligence technology developed by a team comprised of industry, US Air Force and… Read More ›
Your browsing behavior can indicate your personality and provide a unique digital signature which can identify you
Public Release: 7-Jun-2016 You are not as anonymous as you think online Hiding online is harder than you’d think Frontiers You may not be anonymous as you think you are online; reveals a new study published on Frontiers in ICT…. Read More ›
Cyber criminals took down London Stock Exchange website for two hours
Hackers attack the Stock Exchange: Cyber criminals take down website for more than two hours as part of protest against world’s banks The attack was carried out by a ‘hacktivist’ group based in the Philippines By JABER MOHAMED FOR THE… Read More ›
Audit Slams U.S. for Money Pit of Ancient Technology
“the Department of Defense uses 8-inch floppy disks in a legacy system that coordinates the operational functions of the nation’s nuclear forces,” By DANIEL W. STAPLES WASHINGTON (CN) — The U.S. government is spending $61 billion of its $89… Read More ›
Computing a secret, unbreakable key
Public Release: 20-May-2016 Researchers develop the first available software to evaluate the security of any protocol for Quantum Key Distribution University of Waterloo What once took months by some of the world’s leading scientists can now be done in… Read More ›
Artificial intelligence replaces physicists
Public Release: 16-May-2016 Physicists are putting themselves out of a job, using artificial intelligence to run a complex experiment Australian National University Physicists are putting themselves out of a job, using artificial intelligence to run a complex experiment. The… Read More ›
Social engineering: Password in exchange for chocolate
Public Release: 12-May-2016 Large-scale study on password security University of Luxembourg It requires a lot of effort and expense for computer hackers to program a Trojan virus and infiltrate individual or company computers. They are therefore increasingly relying on… Read More ›
Deleting QuickTime off Windows is advised: US
AFPApril 17, 2016, 12:40 am TWN SAN FRANCISCO — A cyber security team at the U.S. Department of Homeland Security is advising people to remove QuickTime media software from Windows computers to avoid being hacked. The U.S. Computer Security… Read More ›
Are humans the new supercomputer?
Public Release: 13-Apr-2016 Today, people of all backgrounds can contribute to solving serious scientific problems by playing computer games. A Danish research group has extended the limits of quantum physics calculations and simultaneously blurred the boundaries between man and… Read More ›
Of the Requirements for Successful GPS Spoofing Attacks
Requested Repost from 28 APR 2015 (Editors Note – Ralph Turchiano) The information has already been highly compromised . PDF FILE ORIGINAL AND IN PROPER FORMAT On the Requirements for Successful GPS Spoofing Attacks ABSTRACT An increasing number of wireless applications… Read More ›
Feds Unlock Terrorist’s IPhone Without Apple’s Help
By MATT REYNOLDS RIVERSIDE, Calif. (CN) – The FBI has unlocked the iPhone of San Bernardino terrorist Syed Farook and asked a federal judge to vacate its court case against tech giant Apple. “The government has now… Read More ›
Saving Government Email an Open Question with December 2016 Deadline Looming
The National Security Archive’s 2016 “Email Alert” Finds 1 in 6 Federal Agencies Failed Even to File Key Report on Email Management DIA, Treasury, and Nuclear Regulatory Commission Admit They Will Miss December 31, 2016 Deadline for Electronic… Read More ›
Hacker who uncovered Clinton’s emails, extradited to U.S.
Monday, 07 March 2016 Guccifer, the infamous Romanian hacker who accessed emails of celebrities and top US officials, will be extradited to the United States, after losing a case in his home country’s top court. Reuters reports that Lehel… Read More ›
New ‘Radar’ Billboards Spy on Unsuspecting Public, Then Track Them by Phone
00:40 02.03.2016(updated 03:46 02.03.2016) Clear Channel releases legally-dubious Big Brother billboards that intrude on privacy. A troubling new revelation of domestic consumer intelligence gathering emerged Sunday, when privacy advocates revealed a new kind of billboard that uses surveillance triangulation…. Read More ›
Learn how to fly a plane from expert-pilot brainwave patterns
HRL demonstrates the potential to enhance the human intellect’s existing capacity to learn new skills HRL Laboratories IMAGE: Low-current electrical brain stimulation can modulate the learning of complex real-world skills. Credit: Copyright 2016 HRL Laboratories – All Rights… Read More ›
Building living, breathing supercomputers
Public Release: 26-Feb-2016 Discovery opens doors to creation of biological supercomputers that are about the size of a book McGill University IMAGE: Protein molecules travel around the circuit, forced in certain directions in directed ways, a bit like cars… Read More ›
Five-dimensional black hole could ‘break’ general relativity
Public Release: 18-Feb-2016 University of Cambridge Researchers have shown how a bizarrely shaped black hole could cause Einstein’s general theory of relativity, a foundation of modern physics, to break down. However, such an object could only exist in a… Read More ›
Eternal 5D data storage could record the history of humankind
Public Release: 15-Feb-2016 University of Southampton Scientists at the University of Southampton have made a major step forward in the development of digital data storage that is capable of surviving for billions of years. Using nanostructured glass, scientists from… Read More ›
When machines can do any job, what will humans do?
Public Release: 13-Feb-2016 Human labor may be obsolete by 2045 Rice computer scientist Moshe Vardi: Human labor may be obsolete by 2045 Rice University HOUSTON — (Feb. 13, 2016) — Rice University computer scientist Moshe Vardi expects that within 30… Read More ›
Using stories to teach human values to artificial intelligence
Public Release: 12-Feb-2016 Georgia Institute of Technology Caption The Quixote system by researchers Mark Riedl and Brent Harrison teaches robots how to behave like the protagonist when interacting with humans and is as part of a larger effort to… Read More ›
FBI officials STILL can’t unlock San Bernardino killer’s phone – TWO MONTHS after massacre
OFFICIALS are still unable to unlock a phone owned by one of the terrorists behind December’s terror attacks in San Bernardino. By TOM PARFITT PUBLISHED: 03:22, Wed, Feb 10, 2016 | UPDATED: 03:48, Wed, Feb 10, 2016 HANDOUT Syed… Read More ›
Is it possible for humans to regenerate limbs?
Public Release: 8-Feb-2016 Mary Ann Liebert, Inc./Genetic Engineering News New Rochelle, NY, February 8, 2016–Unlocking the complex biological and regenerative processes that would enable humans to regrow digits and limbs “would radically change the prognosis and quality of… Read More ›
Carbon dioxide captured from air converted directly to methanol fuel for the first time
Public Release: 2-Feb-2016 Research could one day create a sustainable fuel source from greenhouse gas emissions University of Southern California They’re making fuel from thin air at the USC Loker Hydrocarbon Research Institute. For the first time, researchers there… Read More ›
Senior citizens may accept robot helpers, but fear robot masters
Public Release: 1-Feb-2016 Penn State Senior citizens would likely accept robots as helpers and entertainment providers, but are leery of giving up too much control to the machines, according to researchers. Based on a study of senior citizens, the researchers… Read More ›
Stop killer robots before it is too late, scientists tell Davos forum
“It may be too late,” she told a debate in Davos. TECHNOLOGY JAN. 24, 2016 – 06:45AM JST ( 14 ) DAVOS — The world must act quickly to avert a future in which autonomous robots with artificial intelligence roam… Read More ›
The aliens are silent because they’re dead
Public Release: 21-Jan-2016 Life on other planets would probably go extinct soon after its origin, due to runaway heating or cooling on their fledgling planets Australian National University IMAGE: CSIRO’s Parkes radio telescope will search for alien civilisations, as… Read More ›
Will computers ever truly understand what we’re saying?
Public Release: 11-Jan-2016 Brain scans during communication game pinpoint areas where minds meet University of California – Berkeley From Apple’s Siri to Honda’s robot Asimo, machines seem to be getting better and better at communicating with humans. But some… Read More ›
‘Right to Be Forgotten’ Gets a Boost in Europe
Monday, December 21, 2015 By WILLIAM DOTINGA (CN) – European lawmakers agreed on a sweeping reform of the EU’s data-protection law on Monday, replacing a patchwork of national laws with a single rule that includes the right to… Read More ›
Swedish researchers reveal quantum security hole
“They found that energy-time entanglement – the method that today forms the basis for many systems of quantum cryptography – is vulnerable to attack.” Public Release: 18-Dec-2015 Hacking the Bell Test using classical light in energy-time entanglement-based quantum key… Read More ›
U mad bro? Computers now know when you’re angry
“Websites can go beyond just presenting information, but they can sense you. They can understand not just what you’re providing, but what you’re feeling.” Public Release: 14-Dec-2015 The way you move a computer mouse reveals negative emotions Brigham Young… Read More ›
U.S. State Dept. Employee Admits to Cyberstalking
“When one victim begged him to leave her alone, authorities said Ford wrote in one email “don’t worry, it’s not like I know where you live,” then sent another email to the same victim with her home address and… Read More ›
Columbia engineers build biologically powered chip
Public Release: 7-Dec-2015 System combines biological ion channels with solid-state transistors to create a new kind of electronics Columbia University School of Engineering and Applied Science IMAGE: Illustration depicting biocell attached to CMOS integrated circuit with membrane containing sodium-potassium… Read More ›
UW roboticists learn to teach robots from babies
Public Release: 1-Dec-2015 Collaboration combines child development research with machine learning approaches University of Washington A collaboration between UW developmental psychologists and computer scientists aims to enable robots to learn in the same way that children naturally do. The team… Read More ›