memoment editorial

medical intubation training hospital scaled 1

UC Santa Barbara develops new soft robotic system for emergency intubation procedures

NEWYou can now listen to Fox News articles!
When someone stops breathing, the clock starts ticking. First responders often need to get air into the lungs fast, and one of the most reliable ways is to slide a tube into the windpipe. This process, called intubation, keeps the airway open so that oxygen can flow again.Here’s the catch: intubation is incredibly hard. Even trained doctors can struggle, and every extra second puts the patient at greater risk. Now, researchers at UC Santa Barbara have designed a soft robotic device that could change how first responders handle these emergencies. It helps guide the breathing tube into place quickly, safely, and with far less training than traditional methods.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Why breathing tubes are so tough to placeOur bodies are built to keep food and foreign objects out of the lungs. A small flap called the epiglottis blocks the windpipe during swallowing, and the path into the trachea is narrow and curved. To get around these obstacles, current tools are rigid. Medics have to lift the epiglottis with a metal scope and carefully angle the tube forward. If it slips into the esophagus instead, oxygen goes to the stomach instead of the lungs. “Traditional tools must be stiff so you can push them, and they only turn by pressing on sensitive tissue,” explained Elliot Hawkes, professor of mechanical engineering at UCSB.DANGEROUS HEART CONDITIONS DETECTED IN SECONDS WITH AI STETHOSCOPE Even trained doctors can struggle with intubation. (Universal Images Group/Getty Images)How the soft robot worksThe new system, called the soft robotic intubation system (SRIS), takes a gentler approach. First, a curved guide sits at the back of the throat. Then a soft inflatable tube slowly unrolls from the inside out as it advances. Instead of being forced in, it naturally follows the right path into the windpipe. This reduces friction, lowers the risk of injury and adapts to different body shapes automatically. “This growing paradigm naturally accounts for minor variations in anatomy,” said lead author David Haggerty, a recent UCSB Ph.D. graduate.What the tests showThe results are eye-opening:Experts had a 100% success rate.Paramedics and EMTs reached a 96% success rate with just five minutes of training.Non-experts placed the tube in an average of 21 seconds, less than half the time needed with advanced video laryngoscopes.Why this device could save more livesMillions of emergency intubations happen in the U.S. each year. Many take place in chaotic, low-light or stressful situations where current tools don’t always work. A device that makes the process easier could be a lifesaver for:Paramedics at accident scenesMilitary medics in combat zonesDoctors in hospitals with limited equipmentAI VIDEO TECH FAST-TRACKS HUMANOID ROBOT TRAINING In trials, both experts and non-experts achieved faster and more successful intubations using the new airway management system — advancing emergency response efficiency. (Kurt Knutsson)The UCSB team is now preparing for clinical trials and FDA approval.HOW MICRO-ROBOTS MAY SOON TREAT YOUR SINUS INFECTIONSWhat this means for youIf this device lives up to its early promise, it could mean that more patients survive emergencies where breathing stops. For families, it means a higher chance that first responders can keep loved ones alive until they reach the hospital. For medics, it offers a safer, faster tool when seconds truly matter.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysBreathing is life, yet securing an airway is one of the toughest jobs in emergency care. This soft robotic system may help turn a high-risk procedure into something more predictable and safe. While more testing is still ahead, the early data shows how robotics could make a lifesaving difference for patients everywhere. Medical staff participate in hands-on training to practice emergency response and resuscitation techniques using a lifelike simulation mannequin. (Universal Images Group/Getty Images)CLICK HERE TO GET THE FOX NEWS APPWould you feel more confident knowing first responders in your community had access to this kind of lifesaving robot? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.  

UC Santa Barbara develops new soft robotic system for emergency intubation procedures Read More »

senior man inheritance scams probate

How public probate records fuel inheritance scams

Key Takeaways: 1. Scammers are targeting grieving families through probate records, posing as attorneys or debt collectors to demand fake fees. 2. Inheritance scams exploit vulnerable individuals by using personal information obtained from probate documents. 3. To protect against inheritance traps, verify identities, limit information sharing, use data removal services, and report any suspicious activity.

How public probate records fuel inheritance scams Read More »

1 jeep and chrysler parent stellantis confirms data breach

Jeep and Chrysler parent Stellantis confirms data breach

NEWYou can now listen to Fox News articles!
Automotive giant Stellantis has just revealed that it suffered a data breach, exposing customer contact details, after attackers infiltrated a third-party platform used for North American customer services. The announcement comes at a time when large-scale attacks on cloud CRM systems have already shaken tech and retail sectors alike, with Salesforce clients such as Google, Allianz and Dior reporting similar intrusions. These earlier incidents exposed names, emails, and phone numbers, which were sufficient for attackers to launch phishing campaigns or extortion attempts.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/NewsletterTRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTEDWhat you need to know about the Stellantis breachStellantis was formed in 2021 through the merger of the PSA Group and Fiat Chrysler Automobiles. Today, it ranks among the world’s largest automakers by revenue and is fifth in volume globally. The company houses 14 well-known brands, including Jeep and Dodge, as well as Peugeot, Maserati and Vauxhall, and operates manufacturing infrastructure across more than 130 countries. That global scale naturally makes it a tempting target for cyber adversaries. Stellantis confirmed hackers stole customer contact details in a recent breach. (Kurt “CyberGuy” Knutsson)In its public statement, Stellantis clarified that only contact information was taken. Since the compromised third-party platform does not host financial or deeply sensitive personal data, Stellantis asserts that social security numbers, payment details and health records were out of reach of the attackers. In response, the company activated its incident response protocols, launched a full investigation, contained the breach, notified authorities and began alerting affected customers. It also issued warnings about phishing and urged customers not to click suspicious links.Stellantis has not revealed how many customers the breach affected. The company also has not specified which contact fields, such as email, phone, or address, attackers accessed.The alleged culprit, ShinyHunters, and Salesforce breachesWhile Stellantis has not explicitly named the hacker group behind the breach, multiple sources tie this incident to the ShinyHunters extortion campaign, which has spearheaded a wave of data thefts targeting Salesforce this year.ShinyHunters claims to have stolen over 18 million records from Stellantis’ Salesforce instance, which includes names and contact details, according to Bleeping Computer. These attacks form part of a broader campaign aimed at Salesforce customers. In recent months, ShinyHunters has often worked in concert with groups like Scattered Spider and targeted companies including Google, Cisco, Adidas, Allianz Life, Qantas, and brands under LVMH such as Dior and Tiffany & Co.OVER 2B USERS FACE PHISHING RISKS AFTER GOOGLE DATA LEAK The attack is linked to a wider wave of Salesforce data thefts this year. (Kurt “CyberGuy” Knutsson)Their reported method is fairly ingenious. Attackers exploit OAuth tokens tied to integrations like Salesloft’s Drift AI chat tool to pivot into Salesforce environments. Once inside, they can harvest valuable metadata, credentials, AWS keys, Snowflake tokens and more.In fact, the FBI recently issued a Flash alert that surfaced numerous indicators of compromise linked to these Salesforce environment attacks and warned organizations to harden defenses. The cumulative toll is staggering. ShinyHunters asserts it has stolen over 1.5 billion Salesforce records across some 760 companies.7 ways to protect yourself from breaches like StellantisEven if only contact details were exposed, that’s enough for attackers to target you. Here’s how to stay protected.1) Clean up exposed personal data from the webEven basic contact details can be scraped from breaches and sold on data broker platforms, where they are used for spam, scams and targeted attacks. A data removal service can help track down and request the deletion of your information from these databases, reducing your long-term exposure.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.Get a free scan to find out if your personal information is already out on the web: CyberGuy.com. Stolen emails and phone numbers could fuel phishing campaigns. (REUTERS /Rebecca Cook)2) Stay alert for phishing attempts and use antivirus softwareThe most immediate risk after a breach like this is targeted phishing. Attackers now have legitimate contact details, so their emails and texts can look convincingly real. Be skeptical of any message claiming to be from Stellantis, your car brand or a related service, especially if it urges you to click a link, download an attachment or share personal details.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.3) Use a password manager to secure your accountsIf attackers get your contact information, they may try the same password on other sites. This is called credential stuffing. A password manager can create strong, unique passwords for every account. That way, one breach will not put your other accounts at risk. It also helps you quickly update credentials in case you suspect a compromise.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION4) Enable two-factor authentication (2FA) wherever possible2FA adds an extra step to your logins by requiring a temporary code or approval in addition to your password. Even if attackers manage to steal your password, they will need that second factor to gain access. This significantly reduces the chances of account takeover attempts succeeding.5) Invest in identity theft protectionAttackers often combine exposed contact information with other data to build complete identity profiles. Identity theft protection services monitor for suspicious activity, such as unauthorized credit applications or changes to official records, and alert you early so you can act before serious damage occurs. Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com.6) Regularly review account activityAfter a breach, it is worth auditing your accounts, not just with Stellantis but also with related services such as financing portals, insurance accounts or loyalty programs. Look for unusual sign-ins, unfamiliar devices, or changes to your personal details. Most services offer tools to review login history and security events, making checking these a routine habit.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayEven giants in manufacturing are vulnerable when cloud platforms and third-party systems are part of their customer workflow. The same patterns seen in attacks on Google, LVMH, and others have now reached the auto industry in a serious way. As Stellantis confronts the fallout, the broader lesson is clear. Organizations must treat the surfaces exposed by their service providers and SaaS integrations with as much vigilance as their own core systems.Do you trust companies to secure your data, or do you feel they’re not doing enough? Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Jeep and Chrysler parent Stellantis confirms data breach Read More »

1 ai tech helps senior woman reunite with her cat after 11 days

AI tech helps a senior reunite with her cat after 11 days

NEWYou can now listen to Fox News articles!
Imagine the heartbreak of a missing pet. For Sharon, a senior living in Ridgefield, Washington, that fear became reality when her beloved Louie, an indoor-only cat who had never ventured outside, slipped out of a window. For 11 long days, she searched everywhere. But thanks to a free tool called Love Lost and the kindness of a good neighbor, Louie is back home safe and sound.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.Sharon and Louie’s happy reunionLouie, a bright orange Maine Coon who had just turned two years old, was adopted by Sharon and quickly became part of her family. When Louie disappeared, Sharon and her family knocked on doors and checked with their local shelter, the Humane Society for Southwest Washington. Staff there suggested she upload Louie’s photo to Love Lost and create a free profile. Sharon’s beloved cat, Louie, slipped out of a window and went missing for 11 days. (Petco Love)Eleven days later, Sharon received a message through the Love Lost chat from a neighbor who spotted a cat perched on a roof near a vet’s office. The good Samaritan went straight to Love Lost, saw Sharon’s post and reached out using the built-in chat feature. This tool lets pet parents and finders connect directly without sharing personal contact information. Together, they tracked Louie down in a storage lot behind the building. After 11 stressful days, Louie was finally back in Sharon’s arms.DANA PERINO: OUR DOGS REMIND US OF LIFE’S SWEETEST TRUTH”We were just thrilled. When I posted on Love Lost, it was easy to use. If it had not been simple, I probably would not have finished it,” Sharon said. “Thank you, thank you, Love Lost, for bringing Louie home.”Love Lost, powered by Petco Love, is a national database driven by artificial intelligence that matches lost and found pet photos. Sharon joked that if she could figure it out, anyone could. The emotional reunion shows how simple tech and community can bring pets home. (Petco Love)What makes Love Lost powerfulLove Lost works by using AI photo-matching. When you upload a picture of your pet, the system compares it to images from nearly every major shelter across the U.S., plus photos posted on platforms like Nextdoor and Ring’s Neighbors app. The platform also includes a secure chat feature, which was used in this case, allowing finders and pet parents to connect without sharing personal phone numbers or emails, making communication safe and simple.This fall, Love Lost is rolling out a new feature called Search Party. It lets pet parents quickly rally their community by printing flyers, sharing posts on social media and coordinating search areas. This structure helps reduce stress when every second counts. A good neighbor used the Love Lost chat feature to help Sharon track Louie down. (Petco Love)Alternatives to consider: pet trackersWhile Love Lost is an excellent safety net, pet parents may also want to consider pet trackers. These small GPS devices attach to your dog or cat’s collar and let you follow their location in real time on your phone.CyberGuy has reviewed some of the best pet trackers for peace of mind, whether you’re dealing with an adventurous cat or a dog who slips out of the yard. Using both a tracker and Love Lost gives you double protection if your pet ever goes missing. Check out our list of the best pet trackers at CyberGuy.com.WOULD YOU DATE YOUR PET? 1 IN 3 SAY YES TO AI VERSIONWhat this means for youIf you own a pet, now is the time to prepare. Uploading a photo of your furry friend to Love Lost takes just a minute, and it could save days of panic later. You’ll be ready to report them as lost with one click, and the system will instantly scan for matches. Pairing Love Lost with a pet tracker ensures you’re covered on both fronts: community-powered recovery and real-time location tracking.Additionally, be sure to check out our comprehensive pet guide to keep your pets happy, healthy and entertained with these innovative solutions at CyberGuy.com/. The bright orange Maine Coon had just turned 2 years old when he disappeared. (Petco Love)Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysSharon’s reunion with Louie is a reminder of the bond we share with our pets and how technology and neighbors can help keep that bond unbroken. By taking a few minutes now, you can set yourself up for success if the unthinkable were to happen.If your pet slipped out tonight, would you have a plan in place to bring them back home quickly? Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com.Copyright 2025 CyberGuy.com.  All rights reserved.

AI tech helps a senior reunite with her cat after 11 days Read More »

city

Is It All About The Resources? UFOs, Water Extraction, and Power Blackouts!

There are many aspects to the UFO and alien question, but the notion that they are here for our raw materials, a consequence of which seemingly results in mass power blackouts, is one that is often left unaddressed. The fact is, there are many such accounts on record indicating that these seemingly otherworldly vehicles are not only using our own power reserves for their own propulsion systems (we might assume) but are also extracting water from our rivers and even water towers, often thousands of gallons at a time.
Before we move on to explore some of these cases of UFOs not only near water, but of them seemingly extracting it for their own ends, we will turn our attention to just some of the encounters on record that detail UFOs and mysterious power blackouts, including them appearing to use our own energy resources as a power supply.

Perhaps the best place to start would be with arguably the most famous alleged UFO blackout case that occurred in November 1965, a series of bizarre incidents that are loosely referred to as the 1965 East Coast UFO Power Blackouts, at least in UFO circles.
What is certain is that at around 5:30 pm on November 9th, 1965, New York City’s power supply suddenly failed, and the entire city was plunged into total darkness. Authorities were perplexed as to what had caused the power failure, as they received no indications of such an occurrence (although it later came to light that an “unusual flow of current” was experienced just north of the main power plant’s location). Compounding matters was that only several minutes later, the entire eastern seaboard of the United States lost power, followed quickly by several regions of southeast Canada.
In fact, it was Canadian investigators who immediately notified their United States counterparts that they had detected a “huge surge of electricity flowing in the opposite direction to the normal flow at that time”, dismissing American assertions that the fault was likely a power line near Niagara Falls. Although a joint US-Canadian investigation was set up, they were unable to establish a cause for the sudden widespread fault, even going as far as to say in their conclusions that it simply “should not have happened”. However, when the Aerial Phenomena Research Organization (APRO) conducted its own investigation of the blackouts, it uncovered some remarkable details.
One of these accounts came from a private pilot, Weldon Ross, who claimed he witnessed a “strange, red fireball-type object” that hovered in the air before rising from the power lines below him. He was flying to Hancock Field at the time of the sighting, which also occurred right before the first blackout took hold. Moreover, Ross’s account was corroborated by Robert Walsh, an employee at Hancock Field, who happened to be arranging some emergency lighting as the incident in question was unfolding.  These blackouts, however, were not limited to November 9th, nor were they limited to the United States. What’s more, almost all of the strange power blackouts that followed in the months after the East Coast incident occurred around the same time as a surge of UFO reports.
On the evening of November 15th, 1965, for example, following a run of UFO reports in what had been a very active year for UFO reports in the United Kingdom, London suffered multiple widespread power failures. Four days later, on the evening of November 19th, on the other side of the world, similar power system failures hit Lima in Peru. Although there were no widespread power failures reported, on the evening of November 26th, in St. Paul, Minnesota, multiple residents, as well as several police officers, reported seeing several strange, blue objects overhead, while at the same time also experiencing a sudden draining of car headlights and batteries, as well as interference on car radios. Between December 2nd and December 4th, Texas and New Mexico experienced several widespread blackouts, and on December 26th, large portions of Buenos Aires in Argentina also completely lost power. Several weeks later, one evening in January 1966, several regions of southern Italy were plunged into darkness for several hours, with no explanation ever offered for the sudden power cut by authorities.
These incidents – in the pre-Internet days, remember – might have been forgotten about had it not been for a UFO symposium held in the summer of 1968 at the request of the Committee on Science and Astronautics of the US House of Representatives, during which the 1965 East Coast blackouts were examined, with some of the most remarkable testimony offered by Dr. James E. McDonald from the University of Arizona. He stated that “UFOs have been seen hovering over power facilities” on multiple occasions, and that power blackouts often followed these sightings. He also detailed several witness reports from residents of New York City from the night of the blackout, including details from one resident who saw a “strange object” hovering overhead before shooting off into the distance a second before the power suddenly failed. Similarly, five residents of Syracuse reported seeing a hovering spherical object in the moments after the blackout. Even more intriguing, Dr. McDonald offered that the Federal Power Commission had received “dozens of (UFO) sighting reports” on the evening of November 9th, the night of the blackout, as well as reports from across the wider New England area.

Dr. McDonald also went on to state that there were some “slightly disturbing coincidences” that deserved deeper consideration and investigation, not least as no explanation of any kind had been offered regarding the sudden power surge that appeared to have caused the blackout. Incidentally, three years later, in 1971, Dr. James McDonald tragically took his own life. Make of that what you will.
Whatever the truth regarding the East Coast blackouts and whether or not they were connected to UFO activity in the area or not, there are many other similar encounters on record. If we go back just short of a decade, for example, to Rome in August 1958, multiple residents reported seeing a strange, large object make its way over the city. Moments later, the city was plunged into total darkness as the power system failed. With all of the lights extinguished on the ground, multiple residents of the city looked up in awe as the glowing object continued on its way. Less than a year later, in the summer of 1959, an almost identical event unfolded in Salta, Argentina. At around the same time, in August 1959, in Uberlandia, Minas Gerais, Brazil, a large, unknown object passed directly over the transmission lines of the local power station. As it did so, the automatic power keys switched to the “off” position. They remained locked there until the mysterious object had moved away, at which point, they switched back on.
Just short of a decade and a half later, and eight years after the East Coast blackout incident, one night in 1973 in Ontario, Canada, one of the most intriguing and thought-provoking encounters involving UFOs and power supplies occurred. On the night in question, Art Larabie arrived at his home on Kukagami Lake Road after visiting his wife in the hospital. He had been at work the entire day before the visit, and now, at a little after 10 pm, he was so exhausted that he went straight to bed. He was so tired he could hardly remember his head hitting the pillow and was almost immediately in a deep sleep. He was, though, dragged from his slumber shortly after midnight by the sound of his panicked neighbor banging on his front door. In fact, his neighbor was knocking so loudly in their attempts to wake him that they “nearly knocked the door down!”
Realizing something truly out of the ordinary must have happened to cause such a reaction in his neighbor, Art pulled himself out of bed and made his way to the front door. His neighbor immediately urged him to “come outside and see” the bizarre object that was hovering just above the nearby powerlines. Art initially dismissed his neighbor’s concerns, stating the “object” was likely nothing more than the Moon. His neighbor, however, insisted the object was far stranger than that, and eventually Art followed him outside.
Almost as soon as he had done so, he could see a “massive object” that was glowing like a lightbulb between 500 and 1000 feet away, hovering approximately 40 feet above the powerlines, its width spanning three of the poles the lines were attached to. Stranger still, a tether of some sort stretched down from the object and connected to one of the power lines. Art couldn’t escape the feeling that the object – whatever it was – was draining the power from the lines and taking it on board, almost as if it was charging itself up.
The two men remained where they were, each in complete awe at the bizarre aerial display in front of them. Then, after around 25 minutes, the object suddenly shot away into the distance and disappeared. In fact, the object vanished so quickly that neither of the men could recall actually seeing it leave. However, when they looked at the powerlines directly below where the object had been hovering, they could see that the lines were now strangely illuminated, so much so that they cast a brightness to the ground below.
The following morning, Art visited his other neighbor to ask if she had witnessed anything from the previous evening. She said that she hadn’t seen the object itself, but that she was awakened in the middle of the night by an intense light that filled her bedroom for several minutes. She told Art that she had been “groggy” from being woken up, and believed that the brightness was down to “the kids leaving the lights on,” and, ultimately, she went back to sleep. It was only now, as Art told her of the strange events he and his other neighbor had witnessed, that she realized she, too, had caught a glimpse of the otherworldly events of the previous evening.
Just what the object was, where it came from, and whether it was taking power directly from the powerlines remains open to debate. The incident, however, adds another layer of nuance to the UFO and alien mysteries.
During the early 1990s, Puerto Rico, arguably one of the most active locations for UFO sightings on the planet, experienced several strange power blackouts that appeared to be connected to UFO sightings. On the evening of October 2nd, 1991, for example, hundreds of residents were plunged into total darkness for around half an hour as the Puerto Rico Electric Power Authority (PREPA) suddenly failed. At the same time, a PREPA engineer, Ramon Montalvo, witnessed several strange lights hovering above the plant “the minute the power was cut off!”
Following this insinuation that an object of otherworldly origin might have been responsible for the power cut, Lieutenant Rafael Rodriguez, a Lajas police officer, offered that the lights Montalvo saw were likely nothing more than reflections from the surface of the nearby lagoon. However, when authorities attempted to prove that Rodriguez was correct by setting up large reflectors on the crest of Mount Candelaria, their experiment actually proved the opposite, with no reflections visible on the surface of the water from what would have been Montalvo’s viewpoint. Ultimately, no official explanation was given for the strange power blackout.
Around six months later, in mid-1992, in Trujillo Alto, another bizarre incident took place. Late on the night in question, residents were woken by a monstrous noise and a bizarre but captivating blue glow that washed over almost the entire city. Looking out of their windows and looking up from the streets, residents of the city watched in awe as the light changed color, going through “almost all the colors in the spectrum”, while, at the same time, two bizarre searchlights appeared and scanned the ground below, as if looking for something. At some point during these bizarre events, witnesses began to notice that the object behind the glow was hovering directly over one of the nearby power stations. In fact, as more and more residents focused on the object itself, they could see that it was “drawing electricity” from the power station, with some witnesses even recalling seeing sparks flying between the power plant and the object above.
The object remained visible for several hours. However, the following morning, several intriguing discoveries were made at the power station itself, not least that the transformer terminals had become completely molten. Moreover, investigators were perplexed as to why the breakers had failed to act and shut off such a huge loss of current. In total, it was estimated that the incident had cost almost a quarter of a million dollars in terms of damage and energy reserves.
In more recent times, during the summer of 2001, a similar UFO blackout case hit the small village of Nanesti in Romania. While authorities and media outlets either didn’t mention or played down the apparent UFO aspect of the power outage, Gheorghe Cohal and Catalin Banica from the Association for the Study of Unidentified Aerospace Phenomena (ASFAN) outlet immediately highlighted the potential connection, and their investigation into the incident provided by far the most detailed account of the strange events.
It was during the evening of June 30th, 2001, at around 10:30 pm, when a motorist who just happened to be driving through the village (most accounts state he was a resident of Bucharest) suddenly spotted a strange, glowing light overhead. He watched this glowing object for several moments before making a report to a local media station. Sparked by this report, several journalists and local television crews arrived in the small village the following day, with reports going out from residents on various media platforms, and ultimately, drawing the attention of the two previously mentioned ASFAN investigators.
It came to light that at the time the motorist had spotted the strange object over the town, most of the local residents were at home watching an extremely popular television show on the national station TVR1. It was while they were watching this program (ASFAN spoke with over 50 residents) that the town’s power supply suddenly cut out. Power outages were relatively common in Nanesti, but, generally speaking, only lasted a minute or two. This time, though, after several minutes without power, many residents began to sense that this power cut was different somehow, and many of them ventured outside. When they did so, most immediately noticed the bizarre, red, glowing, round-shaped object overhead. They recalled that it moved slowly before coming to a sudden stop and then rotating on its axis. As they looked on, the object seemed to transform itself into a ring that was divided by a yellow hue, which then descended toward the ground.

Then, when it came to around 1000 feet from the ground, the object began to ascend once more, its spinning movements clearly visible to those below. It eventually returned to its original position before repeating the descent and the ascent. It did this several times, suggesting to investigators that the object, or the intelligence behind it, was either investigating the villagers or had decided to put on a purposeful display. As midnight arrived, and with the power still not restored, several of the villagers returned inside their respective homes. Others, on the other hand, remained outside in case any further aerial displays took place. Investigators, though, discovered other witnesses who further corroborated what had been seen by residents of Nanesti.
Many of these were in the cultural center of the town, attending the wedding reception of the son of the village manager. The reception itself was in full swing by the time the power suddenly went out, leaving the bride and groom, and their guests, in total darkness. By midnight, with many of the guests preparing to leave, the hosts contacted the Vulturu power planet to ask about the outage and when they expected power to be restored. To their confusion, they were informed that this particular power plant (even though it provided power to the area) was functioning normally, and that the issue could be with another nearby power plant in the Focsani region. By 2 am, the power was restored, and with many of the wedding guests still at the cultural center, they continued with their celebrations. In the days that followed, however, several intriguing details came to light concerning the power supply to the affected region on the night in question.
Renel, for example, investigated the source of electricity distribution to the village that night and discovered that there were no recorded faults with either of the power plants. And while one charred transformer was discovered at one of the power plants, a blackout across such a wide area and for such a long time could not be attributed to a single charred transformer. Moreover, there is still the issue of just what caused the charring in the first place. Of course, given the multiple witnesses to the bizarre aerial object witnessed overhead at the same time as the power cut, we would be irresponsible not to assume that there is a likely connection between the two.
Perhaps of more concern than UFOs syphoning energy straight from our power stations or causing power systems to temporarily go down is the notion of UFOs extracting water for their own needs, not least because of our own need for it, combined with the fact that it appears to be extremely rare in the known cosmos.
Arguably one of the most intriguing of these accounts unfolded in the early hours of September 30th, 1980, at the White Acres property near Rosedale in Victoria, Australia. At around 1 am on the night in question, the 54-year-old caretaker of the farm was dragged from sleep by a sound that he likened to “a screeching whistle” that was coming from outside. At the same time, as he shook off the grogginess of sleep, he could hear the agitation of the cattle, clearly telling him that something untoward was taking place. He dragged himself from bed and, still wearing his nightclothes, ventured to the back door of the property where the commotion seemed to be coming from. He opened the door and stepped outside onto the wooden rail. As he did so, he saw a bizarre “domed, disc-shaped object” with orange and blue flashing lights moving across his field from left to right in his vision. He estimated that this strange craft was no more than ten feet from the ground and was approximately 500 feet from him. He further estimated that it was around 25 feet in width.
He continued to watch as the object moved precisely across his land, negotiating several trees and outbuildings as it did so. As he watched, he noted that although the object was brightly lit underneath and “gave out light at its own height”, it didn’t illuminate the ground below (a detail that shows up in numerous other UFO accounts). Then, the object came to a sudden stop directly above a concrete 10,000-gallon water tower. It then descended and came to a stop only a short distance from the structure.  

At this point, the caretaker rushed back inside the house, threw on some clothes, and jumped onto his Suzuki 100 motorbike before racing across the fields towards the water tank in order to take a closer look. There had been several cases of cattle rustling in recent months, and, despite the truly bizarre nature of the events he was witnessing, the caretaker still hadn’t dismissed that this bizarre object could be somehow connected to the cattle rustlers. When he came to a gate, he quickly jumped off the bike and proceeded to open it. As he did so, he caught sight of one of the cattle nearby. He recalled seeing the fear in the cow’s eyes, and also noticed that it was “frothing at the mouth”, such was the anxiousness it was clearly feeling. With the gate open, he got back on the bike and set off once more. When he was no more than 50 yards from where the object was hovering, he brought the bike to a stop and got off once more. He immediately noticed a bizarre sensation running through his body, making him feel like he was “like a jelly on a plate”. He also noted that the whistling noise was much louder than it had been previously, likely due to his being much closer to the strange craft. In fact, the volume of the noise was so loud that he was forced to cover his ears. From this vantage point, he could see that the top of the craft was dome-shaped and white in color, while the bottom half was orange and featured several “circular windows or lights”.  
Then, the whistling noise changed into “an awful scream”, while at the same time, a strange, black tube emerged from the craft’s underside. The tube began to extend, and as it did so, a “loud bang” was audible, quickly followed by a sudden rush of hot air that was so powerful it almost knocked the caretaker off his feet. The caretaker looked up and could now see the craft ascending slowly, the black tube still connected to its underside. After several seconds, the object came to a stop and went completely silent. At this point, the tube was no longer visible. However, a downpour of items, including stones, rocks, and cape weed, began falling to the ground. A moment later, the object began moving to the east.
The caretaker restarted the bike’s engine and rode to where the object had been hovering only moments earlier. He could clearly see a strange “ring of black” on the ground directly below where it had hovered. He looked up once more, just in time to see the strange craft disappear into the night sky. At this point, the caretaker felt a strange mixture of confusion, exhilaration, and excitement. He started the bike’s engine once more and rode straight back to the house. As he walked into the property, he noted that the clock on the wall declared it was 1:50 am. As he prepared himself a cup of coffee, however, he happened to glance at his wristwatch and discovered it had stopped at 1:10 am. He reset the watch to the correct time, and it appeared to be working as it should. However, only ten minutes later, it had stopped once more. It would be several days before the wristwatch worked properly.  
After draining the coffee cup, he returned to bed, although he remained fully clothed and slept very little. By 5 am, he ventured back outside to the paddock where he had witnessed the UFO. The black ring was still clearly visible on the ground. Moreover, in daylight, he could clearly see that the grass had been pressed flat in an anticlockwise direction, with all of the flowers within the circle no longer there. He could also see six “spoke marks” that matched exactly the spokes he recalled seeing on the craft’s underside. He continued along the path the object had taken, noting that there was various “debris” left on the ground, the debris that he had heard falling the previous evening. He considered that the long tube he had witnessed extending from the object had likely used suction to take up what it wanted from below before discarding what it didn’t. This was seemingly confirmed to him when he examined the water tank shortly after. The entire contents – all 10,000 gallons of water – were now completely gone, presumably taken by the strange craft.  
Following the arrival of the farm owner later that morning, the caretaker reported the bizarre encounter to the Gippsland Times newspaper, which ran a front-page story on it the following day, in their October 1st, 1980 edition. Later that morning, while the caretaker continued to examine the site, he was approached by a passing truck driver. He stated that the previous evening, at around 1 am, he had pulled to the side of the road to rest for a short while. He had also noticed a strange object following his truck for some time before he decided to bring his vehicle to a stop. When he did so, the object continued on and into the caretaker’s field.
Although the true motivations of the intelligence behind this strange craft, as indeed just what that intelligence might be and where they came from or went to, all remain open for debate. It appears clear, however, that the target of the UFO that evening was the water tank on the White Acre property. Despite the presumed advanced nature of this object, we might consider whether water is required in the same way that we require water for a car. Or might it be that water is utilized in ways we wouldn’t understand for some kind of highly advanced propulsion system? What is certain is that even the draining of the tank suggests advanced technology. It was discovered that the tube had seemingly pierced the water tank from beneath, and algae was discovered on the sides and roof of the tank, suggesting that these had been somehow separated before the water was drained. Even more remarkably, it would, generally speaking, usually take around three days to fully drain the entire tank of its contents, something this otherworldly object achieved in less than an hour.
A decade earlier, at around 10:30 pm on the evening of August 15th, 1970, near Good Hart, Michigan, another case involving water and UFOs unfolded, this one much more disturbing. According to the files of Michigan Ufology Central, on the night in question, the anonymous witness was staying at their parents’ home when they felt a sudden and compelling urge to drive to the banks of Lake Michigan and watch the night sky. It was while they were looking skyward that they noticed a particularly bright light that was not only moving but appeared to be descending. Alert that they were watching something out of the ordinary, the witness raised their telescope to their eye. Magnified, the witness could make out many finer details. The “light”, for example, was a disc-shaped object that had orange, yellow, green, and blue lights on its exterior. They could also make out what appeared to be windows, with light emanating from them. Stranger still, the witness could see what appeared to be several figures inside the craft, who appeared to be manipulating some kind of controls. Within moments, the object came to a stop on the water’s edge around 100 feet from where the witness stood. He remained where he was for around 15 minutes before finally deciding to approach the craft.
Almost as soon as he began towards it, he noticed that the air felt decidedly different; hotter somehow. Despite this, he continued on. Then, when he was around 50 feet from the object, he heard a metallic, mechanical sound. He stopped immediately. From where he was, he could see a ramp-like structure extending from the side of the craft towards the ground. At this point, the witness felt an urge to approach the craft, almost as if something had taken control of his body and mind, and he began approaching it once more, eventually stepping onto the ramp. A moment after he had done so, the side of the craft seemed to disappear, revealing an opening in its exterior. He proceeded through this opening and stepped inside the craft, finding himself in a strange room with terracotta-colored stone walls, from which a soft glow appeared to emanate, lighting the room. He recalled that the temperature was relatively cool, and he further recalled aromas that were similar to cinnamon and sage.

At this point, he scanned his surroundings, noting that the room appeared to stretch around a corridor in both directions, while also noting there were various levers and other doorways along the way. He continued, opting to go left when he came to the corners. As he did so, he noticed that the aroma of cinnamon and sage got decidedly stronger. He eventually came to a door that stopped his progression. When he turned, however, he realized that another door had closed behind him. He looked down at the floor and realized he was standing on a transparent section through which he could see a part of Lake Michigan, as well as the Big Rock Nuclear Plant. His attention then turned to a window in the wall. He peered through it and saw several humanoid figures with oversized heads on the other side of it, all of whom were manipulating controls on some kind of panel. Each of the figures wore the same style tight-fitting suit, and each had a strange blue glow to them. Then, without warning, one of the figures turned and looked directly at him. When it did so, the witness could see it had no nose, large cheekbones, and large, black eyes.
Moments later, a strange vision appeared in his mind, a vision that the witness realized had been put there by this strange entity. He was now looking at himself, but from this mysterious figure’s perspective. The next thing he realized was that he was being led into a different room and then placed into a bizarre chair. A short time after that, “rapid 3D images” ran through his mind, quicker than his conscious mind could process them. Then, one of the strange creatures approached him and seemingly spoke to him telepathically. In its hand, it had a strange cube that was filled with a clear blue liquid, which he was instructed to drink. Although this figure passed on much information directly into the witness’s mind, he could only remember small pieces of information, the most important being that these apparent alien entities were visiting Earth primarily for its water supply. His next memory following this was of waking up on the water’s edge, where he had first spotted the strange object.
Four years earlier, on the afternoon of July 5th, 1966, in Port Jervis, New York, two friends were driving home after spending the day fishing when they spotted a particularly quiet and scenic spot near the roadside. Realizing it would be an ideal spot to spend an extra hour trying to make a catch, they brought the vehicle to a stop and quickly retrieved their fishing gear before heading to the water’s edge. It was as they were casting their lines into the water that they noticed a bizarre, oval-shaped object appear just above the surface. Moreover, it was heading in their direction. They both looked on in shock as the object continued to approach. They recalled that the strange craft had a “rusty brown” exterior with a “matte to purple finish”, as well as several portholes around the edge, out of which shone a “green fluorescent light”.
Then, an already strange situation turned even stranger. From the object’s underside, two “purple pinkish beams of light” appeared and began to “sweep” from side to side, breaking the water’s surface, as if the object was searching for something under the water. The more the two men looked, however, the more they could see that these beams of light had a “solid substance” about them, and rather than searching for something, it appeared as though the object was “sucking up the water” through these tube-like beams. As it did so, the object continued in the pair’s direction, eventually getting so close that they could see two figures inside the craft, each of which had a “leathery, wrinkled face” and “large pointed ears”. After several moments, the object disappeared as quickly as it arrived.
Only several months later, at around 4 pm one afternoon in January 1967, an anonymous witness was sitting in his boat on the Old River in Baton Rouge, Louisiana, when he noticed a strange object appear in the overcast sky. Moreover, the object was heading in his direction. Realizing he had his camera with him, he immediately reached for it and began trying to get the object in the viewfinder. When he did so, he saw the object beginning “a rather slow turn to the right”. He pressed down on the shutter and captured the object at a 45-degree angle. Then, before he could capture another picture, the object simply vanished. As bizarre as the events were, he put the incident out of his mind and went back to checking his fishing lines. Several hours later, though, it seemed the object had returned.
At around 9 pm, the witness became aware of a strange noise, similar to a “huge vacuum cleaner (that was) running full blast”. Curious, he cautiously moved his boat to where the sound appeared to be coming from. However, try as he might, he was unable to find the source of this unsettling noise. He eventually returned to the main port, by which time, the disturbing noise had stopped. He secured his equipment and decided to turn in for the evening.
The next morning, he sat out as usual to his preferred spot on the water. However, as he guided his boat there, he noticed several dead fish were floating on the surface. In fact, the further he went onto the water, the more dead fish he discovered. A little perplexed at this discovery, he returned his boat to the port and decided to practice target shooting with his hunting rifle at the edge of the water. After shooting for several minutes, all the while keeping the Old River in his sight, he noticed that the crows in the trees began “chattering like crazy”. He immediately shifted his focus in the direction of the cacophony and immediately noticed the strange object he had witnessed the previous afternoon. And once more, it was heading in his direction.  As he had done the previous day, he reached for his camera and attempted to capture as many shots as he could. However, after managing to take one picture, the object moved upward “like an elevator” and disappeared, this time for good.
There are many other UFO and alien encounters involving the taking of water supplies, many of which are documented in the book UFOs and Water: Physical Effects of UFOs on Water through Accounts by Eyewitnesses by Carl W. Feindt.
At around 2 pm on June 12th, 1981, for example, truck driver Robert Gomez was driving his water truck near Alice, Texas. He had just made a delivery and had around 165 gallons of water in the tank, with zero pressure on the gauge. The radio was playing loudly as he headed down the highway when he suddenly became aware of a strange object in the sky ahead of him. To begin with, he thought the object was nothing but an airplane. However, as he watched, the bizarre craft suddenly increased dramatically in brightness before it stopped dead and hovered motionless overhead.  Gomez could now see that the object was disc-shaped and glowed a “brilliant white”, while also having a “dark ring” around the edge and a “dark inner ring” around the center. He also noted that the top section was dome-shaped.
By now, Gomez noticed that the truck was slowing down, causing him to press down on the accelerator. However, no matter how hard he did so, it seemed to have no effect. At the same time, the radio turned into a burst of static. Realizing he was in the middle of a truly bizarre situation, he reached for his CB radio (which was seemingly still working) and contacted the dispatcher to inform them of what he was seeing and experiencing. As he was doing so, the object suddenly shot directly upward into the clouds and disappeared.
As perplexed as he was by the whole affair, he continued with his journey, eventually arriving at Alice. By the time he had arrived, the radio had resumed working again. However, as he turned off the engine and stepped out of the truck’s cabin, he noticed the concerned look on the face of one of the maintenance men, who was focused on the back of the vehicle. Gomez approached him, and the maintenance man pointed to his valve at the back of the truck that was “smoking”, as if it had experienced intense heat. Moreover, as Gomez examined the truck, he noticed that the pressure gauge, which had previously been at zero, was now showing 55 points of pressure. He opened the valve to release whatever water was left inside. However, when he did so, he realized that the tank was completely empty. Whether the water was somehow taken by the mysterious object before it disappeared into the clouds or whether the truck somehow heated up as a consequence of the encounter is open for debate.
Just short of four years later, at around midnight on the evening of April 26th, 1985, in Gomoub in Namibia, 12-year-old Hannetjie was at home, unwell with a fever. She had just gotten out of bed to get some medicine from her mother when she noticed a “strange phenomenon” out of the window, which she later described as looking like a “round ball” that was slightly “bigger than the headlight of a motorbike” and had what appeared to be “several little stars” inside that sparkled brightly. The object itself seemed to move in complete silence as it eventually disappeared into the distance. Moreover, Hannetjie noticed that each of the family’s pet dogs was exceptionally quiet, as if they too had picked up on the strange aerial anomaly. The bizarre events, though, were far from over.
The following afternoon, one of the farmhands arrived at the property, and he had a remarkable account to tell the owners from the previous evening. He claimed that as he was guarding the sheep (as per his duties), a strange “glowing red ball” appeared overhead and proceeded to “drink” the water from the Lower Dam. Moreover, all of the sheep appeared to be extremely agitated while the glowing red object was present, and refused to go anywhere near the water afterward. When the dam was examined a short time later, it was found to be completely dry.
Another bizarre encounter can be found in the research files of Thiago Luiz Ticchetti. The incident in question unfolded around 1 am on August 21st, 1999, in Cubatao, São Paulo, Brazil, when resident Robert Rabelo noticed a huge object in the night sky as he drove to the Water Treatment Station. Upon his arrival, he found three other witnesses, all of whom also noticed the strange aerial vehicle. To begin with, they speculated that there might be a short circuit on the plant’s energy towers. However, when one of them climbed the tower to see if this was the case, they realized the glowing object was much higher, so they had to dismiss this suggestion.
They continued to observe the bizarre craft, eventually noticing that it was a dark, triangular craft, at least the size of a football field, with three red lights on its underside, and what appeared to be one larger red light on the top. Then, without warning, “lots of flashes, hundreds of white flashes” began and then disappeared almost instantly. Following this, a bright yellow ball-like object exited from the triangular craft and headed off into the distance. After around 20 minutes, the triangular vehicle disappeared, seemingly into thin air. Just what the mission of this object, including the smaller, yellow object, might have been remains open to debate. That it appeared directly over a water treatment facility, though, given the many other accounts we have examined here, is certainly interesting.
Just short of two years later, according to the research files of Albert Rosales, another intriguing incident occurred in Brazil, this one near the Tocantins River. On the evening of March 22nd, 2001, Vinicius Da Silva and Marta Rosenthal were returning home from a fishing trip when they felt a jolt from their vehicle that appeared to come from one of the wheels. Suspecting a blown tire, they pulled the vehicle to the side of the road. Vinicius examined the tires, finding all of them to be completely undamaged. It was as he was doing so when Marta suddenly let out a scream. He immediately turned to her and saw she was pointing to the right-hand side of the road. There, only several feet away, was a bizarre “metallic object” that had “small windows along its edge”. Moments later, the pair could see a strange figure, approximately four feet tall, standing in front of the craft. In the strange figure’s hand was what appeared to be a hose. From what the witnesses could tell, the figure was using the hose to draw water out of the river. After two or three minutes, the figure pulled the hose out of the water and went back inside the object. A moment later, the object rose into the air slowly, glowing brightly as it did so. Then, it shot directly upwards and disappeared into the evening sky.
The cases we have examined here are just a small number of UFO encounters on record that detail extracting water or affecting power supplies. Indeed, we might ask, particularly where water is concerned, if at least part of the reason these seemingly otherworldly travelers visit Earth is to extract water. As bizarre as this might sound, it makes a certain amount of sense. If we assume that these strange craft do belong to a space-traveling civilization for a moment, then, upon reaching our part of the Universe, although liquid water can be found on certain moons, Earth is the only place where stable liquid water can be found on the surface, which could make our planet a very attractive, perhaps even necessary, location.
Where, might we ask, though, do power blackouts and apparent stealing of energy reserves reside in all of this? The key element here is electricity. Many researchers have suggested that these seemingly otherworldly crafts might use some form of electromagnetic propulsion system. Furthermore, the Earth’s magnetic field might interfere with these propulsion systems, leading to many of the sightings around the world. In extreme cases, this interference could result in crashes, such as the Roswell incident, which many believe marked the beginning of the Modern UFO Era.
Ultimately, though, we might ask if these objects are regularly visiting our planet not so much to study human beings or other life forms here, but for crucial raw materials. If this is the case, the outlook for humanity in the face of these alien visitations perhaps looks a little bleak and uncertain. We might consider how we as a race might conduct ourselves if we needed valuable materials and resources from the cosmos (assuming we had the technology to harvest such materials from space). Would we take what we needed regardless of the consequences to other life? The answer to that question, if we are being honest, should make us all uncomfortable.

Is It All About The Resources? UFOs, Water Extraction, and Power Blackouts! Read More »

Unheard FBI Audio Reveals Art Bell Discussing Threats, Rumors, and Radio Rivalries

The Black Vault first obtained and published Bell’s written FBI records in 2023. Those documents, covering investigations between 1998 and 2000, show that Bell contacted the Bureau after receiving messages and communications he considered threatening. The records include interviews with Bell, his associates, and several individuals named in the complaints.Continue scrolling for more…

In one report, agents wrote that Bell “was interviewed at his request concerning threats against his life.” He told investigators that he was host of a syndicated talk show that “airs to approximately 420 stations” and that the program “deals with fact and speculation concerning the paranormal, extra-terrestrials, unidentified flying objects and advanced technology aircraft of the United States.”
Art Bell
The file details how Bell began receiving “messages over the Internet from Filipino individuals and groups alleging that Bell had issued derogatory messages against Filipinos.” Bell denied the claims and told the FBI that “the bogus messages were from address ‘KatLover@artbell.com (Art Bell),’” adding that he had reason to believe they originated from a known server. The Bureau confirmed that Bell “maintains a genuine concern for his personal safety.”
While the written records contain heavy redactions and more than 150+ pages of fully withheld material, they reveal a series of federal inquiries across multiple field offices, documenting both online defamation and what Bell described as targeted harassment.
The newly released 16-minute audio file, made public in October 2025, captures Bell in conversation with an unidentified individual about the same period of turmoil. His voice conveys frustration and disbelief as he reacts to what had been said about him. At one point, Bell responds directly to an accusation:
“That is… completely false.”
Later, he alludes to his professional disputes in radio, saying:
“Talk Radio Network split away when I was purchased by Premier Radio Networks, and Talk Radio Network decided they were gonna compete with me.”
Throughout the recording, long gaps and muted portions suggest significant redactions or removed audio, consistent with other law enforcement FOIA releases.
Together, the 2023 and 2025 releases offer a documented glimpse into the final years of the FBI’s correspondence with Bell; a period marked by unsubstantiated threats, online impersonation, and personal anxiety for one of broadcasting’s most distinctive voices.
###
Document Archive
Art Bell FBI File Release – 2023 – [77 Pages, 4MB]
Audio Archive
Art Bell FBI Audio Recording – Released 2025
Download Raw Audio File, as released by the FBI – [MP3 Files, 23MB] (Transcript below)
[embedded content]
Audio Transcript
The following audio transcript was created by The Black Vault. Some errors may occur, during the process:
[00:00:00.000 – 00:00:08.840] Hi, is it?[00:00:10.380 – 00:00:10.820] Hi.[00:00:16.500 – 00:00:17.820] Well, I’m happy to meet you.[00:00:27.820 – 00:00:28.340] Okay.[00:00:28.340 – 00:00:29.840] Okay, um…[00:00:29.840 – 00:00:36.340] I guess, you know, I’ve heard some rumors, you know, about, um…[00:00:37.060 – 00:00:39.600] Maybe, I don’t know, somebody who was in…[00:00:39.600 – 00:00:39.980] Life.[00:00:40.940 – 00:00:42.160] And that’s about all I know.[00:00:42.640 – 00:00:45.340] I’ve had, you know, I’ve had my own disagreements, uh, with…[00:00:46.000 – 00:00:48.520] Um, nothing life-shattering.[00:00:49.520 – 00:00:50.080] Uh…[00:00:50.080 – 00:00:57.340] Okay, okay, then, you know, and, um…[00:00:58.340 – 00:01:08.700] So I just kept my mouth shut and didn’t say anything.[00:01:12.620 – 00:01:13.060] So…[00:01:13.060 – 00:01:13.460] Okay.[00:01:28.340 – 00:01:32.340] Okay.[00:01:45.120 – 00:01:46.340] Well, you were…[00:01:46.340 – 00:01:48.060] Is that correct?[00:01:53.940 – 00:01:54.500] Okay.[00:01:55.500 – 00:01:56.020] Um…[00:01:58.340 – 00:02:08.039] Well, don’t be afraid.[00:02:08.440 – 00:02:10.100] What you say with me stops here.[00:02:19.640 – 00:02:20.660] I didn’t even know that.[00:02:28.340 – 00:02:32.900] Just because he was angry with me?[00:02:36.660 – 00:02:37.380] It’s not?[00:02:37.380 – 00:02:37.440] No.[00:02:50.540 – 00:02:52.520] Right?[00:02:52.520 – 00:02:52.600] Right?[00:02:52.600 – 00:02:52.620] Right?[00:02:52.620 – 00:02:52.660] Right?[00:02:52.660 – 00:02:52.720] Right?[00:02:52.720 – 00:02:58.320] Right?[00:02:58.340 – 00:02:58.920] Mm-hmm. [INAUDIBLE][00:02:58.920 – 00:02:58.960] Right? [INAUDIBLE][00:02:58.960 – 00:02:59.020] He was angry with me. [INAUDIBLE][00:02:59.020 – 00:02:59.480] Uh… [INAUDIBLE][00:02:59.480 – 00:02:59.560] Okay. [INAUDIBLE][00:02:59.560 – 00:02:59.580] Okay. [INAUDIBLE][00:03:06.580 – 00:03:11.160] Well, I don’t understand why you would have this much anger at me or what the, you know, [INAUDIBLE][00:03:11.240 – 00:03:14.080] something that even goes beyond anger because I kind of… [INAUDIBLE][00:03:15.820 – 00:03:17.620] Yeah? [INAUDIBLE][00:03:23.020 – 00:03:24.420] Well… [INAUDIBLE][00:03:24.420 – 00:03:24.460] Yeah. [INAUDIBLE][00:03:24.460 – 00:03:24.540] Yeah. [INAUDIBLE][00:03:24.540 – 00:03:24.660] I… [INAUDIBLE][00:03:24.660 – 00:03:25.100] I… [INAUDIBLE][00:03:25.100 – 00:03:25.420] I… [INAUDIBLE][00:03:25.420 – 00:03:26.320] I… [INAUDIBLE][00:03:26.320 – 00:03:26.600] I… [INAUDIBLE][00:03:26.600 – 00:03:26.740] I… [INAUDIBLE][00:03:26.740 – 00:03:27.000] I… [INAUDIBLE][00:03:27.280 – 00:03:27.540] I… [INAUDIBLE][00:03:27.540 – 00:03:28.260] I… [INAUDIBLE][00:03:28.340 – 00:03:31.180] fire away[00:03:38.960 – 00:03:42.220] well are you afraid of[00:03:44.940 – 00:03:50.080] okay I guess the obvious question is why I mean[00:03:51.900 – 00:03:54.820] okay[00:03:58.340 – 00:04:00.400] you[00:04:05.220 – 00:04:07.280] you[00:04:21.459 – 00:04:23.520] you[00:04:28.340 – 00:04:31.620] got sure [INAUDIBLE][00:04:34.560 – 00:04:36.620] you [INAUDIBLE][00:04:41.560 – 00:04:44.560] really [INAUDIBLE][00:04:46.260 – 00:04:48.340] you [INAUDIBLE][00:04:58.340 – 00:05:00.180] My God.[00:05:28.340 – 00:05:49.760] That is a…[00:05:49.760 – 00:05:53.480] Completely false.[00:05:58.340 – 00:06:00.460] What?[00:06:13.460 – 00:06:15.120] He won’t have me killed.[00:06:20.380 – 00:06:23.160] I didn’t…[00:06:28.340 – 00:06:33.880] And he…[00:06:33.880 – 00:06:36.880] When they were so unhappy with it,[00:06:37.380 – 00:06:38.120] that they…[00:06:38.120 – 00:06:39.620] They made that decision.[00:06:39.740 – 00:06:40.720] I have nothing to do with that.[00:06:41.260 – 00:06:43.320] They disliked me so much,[00:06:43.660 – 00:06:44.360] that they…[00:06:44.360 – 00:06:45.320] I didn’t.[00:06:45.400 – 00:06:46.340] I had nothing to do with it.[00:06:48.280 – 00:06:49.480] Not a thing.[00:06:53.580 – 00:06:54.340] Not a thing.[00:06:58.340 – 00:07:05.740] As in actually burning…[00:07:05.740 – 00:07:07.540] Burning my house or…[00:07:07.540 – 00:07:10.620] Destroying my career.[00:07:11.260 – 00:07:11.760] I see.[00:07:13.480 – 00:07:15.880] Well, gee, there was this little thing[00:07:15.880 – 00:07:18.460] that got out on the Internet about Filipinos.[00:07:19.100 – 00:07:20.320] I wonder if he’s behind that.[00:07:21.860 – 00:07:23.240] Now that I think about it,[00:07:23.260 – 00:07:24.800] it came from a server.[00:07:24.800 – 00:07:24.880] A server.[00:07:28.340 – 00:07:29.740] That much we found out for sure.[00:07:58.340 – 00:08:16.360] I don’t know.[00:08:28.340 – 00:08:32.840] How long were you…[00:08:32.840 – 00:08:50.840] There was a rumor…[00:08:58.340 – 00:09:01.700] He wanted her killed.[00:09:02.580 – 00:09:03.740] The story was that…[00:09:05.740 – 00:09:07.580] That’s what was going around.[00:09:22.380 – 00:09:23.720] Yeah, that’s what I had heard.[00:09:28.340 – 00:09:32.400] And probably up until fairly recently.[00:09:32.400 – 00:09:33.400] Otherwise…[00:10:02.400 – 00:10:15.180] Or were these, like, you know,[00:10:15.300 – 00:10:17.040] diary notes that you were making or something?[00:10:23.820 – 00:10:24.900] Holy smokes.[00:10:24.900 – 00:10:28.900] Yes.[00:10:32.400 – 00:10:42.460] Look, I knew he had some emotional problems[00:10:42.460 – 00:10:43.900] because he went through this…[00:10:49.500 – 00:10:51.900] Then he was accused of…[00:10:53.560 – 00:10:57.280] And there was an investigation I know about all of that.[00:10:58.560 – 00:11:00.900] That was back in the days…[00:11:00.900 – 00:11:02.380] And I thought that was kind of weird then.[00:11:02.380 – 00:11:02.520] I don’t understand.[00:11:05.080 – 00:11:05.640] Whew.[00:11:15.140 – 00:11:16.500] Well, look, be safe.[00:11:17.520 – 00:11:18.620] I said be safe.[00:11:18.620 – 00:11:18.660] Be safe.[00:11:32.380 – 00:11:40.840] We [INAUDIBLE][00:11:40.840 – 00:11:41.880] seldom talk to either. [INAUDIBLE][00:11:41.880 – 00:11:42.660] Example! [INAUDIBLE][00:11:42.680 – 00:11:43.540] I met a girl who was a lawyer. [INAUDIBLE][00:11:43.540 – 00:11:46.500] Which doesn’t blend in… [INAUDIBLE][00:11:46.500 – 00:11:47.260] That wasn’t really a lawyer! [INAUDIBLE][00:11:47.260 – 00:11:48.100] I think she was… [INAUDIBLE][00:11:48.100 – 00:11:49.560] Well, what about what she did? [INAUDIBLE][00:11:49.760 – 00:11:51.940] She was trouble making. [INAUDIBLE][00:11:51.960 – 00:11:52.160] Sometimes when it’d… [INAUDIBLE][00:11:52.160 – 00:11:53.780] Well, did he actually do anything to her? [INAUDIBLE][00:11:54.000 – 00:11:56.160] I was not interested in any initial differences with her. [INAUDIBLE][00:11:56.240 – 00:11:57.240] But I mean… [INAUDIBLE][00:11:57.300 – 00:11:58.960] I’d like to see her stop [INAUDIBLE][00:11:58.960 – 00:11:59.620] before she finished her first job. [INAUDIBLE][00:11:59.620 – 00:11:59.780] I… [INAUDIBLE][00:11:59.780 – 00:11:59.880] I, um… [INAUDIBLE][00:11:59.880 – 00:12:00.140] Maybe I had an issue with her work. [INAUDIBLE][00:12:00.140 – 00:12:00.480] And that would… [INAUDIBLE][00:12:00.480 – 00:12:00.960] But anyway, [INAUDIBLE][00:12:00.960 – 00:12:01.100] Well… [INAUDIBLE][00:12:01.100 – 00:12:01.120] I just got a run on you. [INAUDIBLE][00:12:01.120 – 00:12:01.180] I’m going to tell you, [INAUDIBLE][00:12:01.180 – 00:12:01.240] Erica. [INAUDIBLE][00:12:01.240 – 00:12:01.540] What does it do? [INAUDIBLE][00:12:01.540 – 00:12:10.960] Yeah, actually, that’s all it was.[00:12:10.960 – 00:12:15.240] And actually, I was just upset with him.[00:12:31.540 – 00:12:39.320] Yeah, I know.[00:12:39.320 – 00:12:40.320] What the hell are you doing?[00:12:40.320 – 00:12:49.380] I thought we just agreed.[00:12:49.380 – 00:12:50.380] There you are.[00:12:50.380 – 00:12:53.440] So then I sort of, for a while, I didn’t call him.[00:12:53.440 – 00:12:54.480] I didn’t talk to him.[00:12:54.480 – 00:12:59.140] I never said a bad word, because I don’t do that.[00:12:59.140 – 00:13:01.380] And then…[00:13:01.540 – 00:13:06.780] Yeah, he started…[00:13:06.780 – 00:13:19.500] Yeah, and so obviously when he starts…[00:13:19.500 – 00:13:23.820] Thinking it’s better just to keep my mouth shut.[00:13:23.820 – 00:13:31.040] And so obviously when he’s…[00:13:31.040 – 00:13:31.520] And I called him.[00:13:31.520 – 00:13:42.280] I called him a couple of times and I said, what are you doing?[00:13:42.280 – 00:13:43.280] Or something like that.[00:13:43.280 – 00:13:47.080] And it would get out.[00:13:47.080 – 00:13:48.080] And I…[00:13:48.080 – 00:13:49.080] Yeah.[00:13:49.080 – 00:13:54.400] Yeah, you’ve got it.[00:14:01.520 – 00:14:14.980] And I got a call from the radio.[00:14:14.980 – 00:14:20.280] And as far as that was concerned, that was my…[00:14:20.280 – 00:14:22.820] Talk radio networks split away when I was purchased by Premier Radio Networks.[00:14:22.820 – 00:14:25.480] And Talk Radio Network decided they were gonna compete with me.[00:14:25.480 – 00:14:26.480] Talk Radio Network.[00:14:26.480 – 00:14:27.480] And in doing so, they…[00:14:27.480 – 00:14:28.480] And…[00:14:28.480 – 00:14:29.480] And I…[00:14:29.480 – 00:14:30.440] I…[00:14:30.440 – 00:14:31.400] Yeah.[00:14:31.400 – 00:14:33.860] I had advised you.[00:14:51.220 – 00:14:52.060] Not by me.[00:14:52.160 – 00:14:53.940] I didn’t have a damn thing.[00:15:01.400 – 00:15:03.300] Well, that’s simply untrue.[00:15:04.140 – 00:15:05.160] That’s simply untrue.[00:15:05.340 – 00:15:07.560] But I guess…[00:15:07.560 – 00:15:09.160] So…[00:15:09.160 – 00:15:10.500] So be it.[00:15:15.300 – 00:15:16.860] Look, I appreciate[00:15:16.860 – 00:15:18.960] communicating with you, and[00:15:18.960 – 00:15:21.660] I sure do[00:15:21.660 – 00:15:22.480] hope you’re okay.[00:15:27.480 – 00:15:28.240] Um…[00:15:31.400 – 00:15:52.700] Probably you should take the[00:15:52.700 – 00:15:53.780] that you have.[00:15:59.940 – 00:16:01.240] I appreciate the call.[00:16:01.400 – 00:16:02.740] I wouldn’t ask for one.

Follow The Black Vault on Social Media:

Unheard FBI Audio Reveals Art Bell Discussing Threats, Rumors, and Radio Rivalries Read More »

1 how a compromised work macbook took control of all my devices

How a single MacBook compromise spread across a user’s Apple devices

NEWYou can now listen to Fox News articles!
We trust Macs to be reliable, secure, and mostly resistant to viruses. Apple’s software reputation has long been built around the idea that macOS is harder to compromise than Windows. And while there is some truth to that, it does not mean that Macs are immune. Modern malware is smarter, more targeted, and often designed to slip past built-in defenses quietly. Recently, I heard from Jeffrey from Phoenix, AZ, who’s been dealing with this exact situation.”I used a MacBook at work and noticed it was performing oddly. I didn’t use an Apple ID on that machine per company protocol. But I had personal devices that I could work from that are now infected. The notepad, maps, and home, among others, seem to be getting hung up. I’ve tried to advise Apple but have had little success. It’s completely taken over my devices, and I don’t know how to resolve this.”If your Mac has started acting strange, you are not alone, Jeffrey. Malware infections are more common than many Mac users realize, and spotting them early can make all the difference. Let us break down how to tell if your system is compromised, what protections Apple already provides, and the steps you should take to keep your data safe. If you’re a Windows user facing similar issues, check out our guide: What to do if you think your PC has a virus for step-by-step help.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS Mac malware often hides in the background, making it hard to spot at first. (Kurt “CyberGuy” Knutsson)Signs your Mac might be infectedSpotting malware on macOS is not always straightforward. Many threats are designed to stay hidden, running quietly in the background while collecting data or opening a backdoor for attackers. Still, there are a few red flags that usually signal something is wrong.One of the first signs is slower performance or frequent overheating. If your Mac suddenly takes a long time to boot, runs hot during light tasks, or lags when performing simple actions, it might be doing more behind the scenes than you realize. Apps that crash or freeze more often than usual are another warning sign. Occasional app failures are normal, but if built-in tools like Safari, Notes, or Mail begin acting unstable, it may point to malicious interference.It is also worth paying attention to what is happening under the hood. Checking Activity Monitor for unknown processes or unusually high CPU or memory usage can reveal malware that tries to hide itself with random or unfamiliar names. Redirected web traffic is another classic symptom. If your browser takes you to strange websites, shows pop-ups, or installs new extensions you never approved, adware or spyware might already be present.Finally, unexplained changes to your security settings should always raise suspicion. If you notice your firewall turned off, privacy permissions modified, or login items appearing without your knowledge, something could have gained unauthorized control of your system.SHAMOS MALWARE TRICKS MAC USERS WITH FAKE FIXES Strange app behavior, pop-ups, or overheating may signal something’s wrong (Kurt “CyberGuy” Knutsson)How macOS protects you by defaultApple has built several layers of defense into macOS, many of which run silently in the background to keep your system secure. Knowing how they work can help you understand what protections are already in place and where you might still need to add more safeguards.Gatekeeper is one of the most important built-in security tools. It checks every app before it runs to make sure it comes from a verified developer, warning or blocking you if the app is not trusted. Another layer of defense is XProtect, Apple’s built-in malware scanner. It updates automatically and can stop many known threats from running, although it is not as thorough as specialized antivirus software.System Integrity Protection, or SIP, is another important safeguard. It locks down critical system files and processes so that malware cannot tamper with them even if it gains access. macOS also uses sandboxing and strict permission controls to contain threats. Apps run in isolated environments and must explicitly request permission to access sensitive data such as your camera, files, or location.Together, these features make it significantly harder for malicious software to infect your Mac or cause serious damage. However, they are not perfect. Attackers are constantly developing new techniques to bypass these protections, and many threats rely on human error rather than technical exploits. That is why taking additional precautions is still essential, even on a Mac.10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE Even Apple’s built-in protections can miss new or advanced threats (Kurt “CyberGuy” Knutsson)What to do if your Mac is already infectedIf you find yourself dealing with a Mac that’s already compromised these steps can help you get back in control:1) Disconnect from the internet immediatelyUnplug Ethernet or turn off Wi-Fi and Bluetooth. This prevents malware from sending more data out or pulling in additional malicious code.2) Back up your important files safelyUse an external drive or cloud service you trust. Avoid copying entire system folders-just grab personal documents, photos, and files you can’t replace. You don’t want to back up the malware along with them.3) Boot into Safe ModeRestart your Mac and hold the Shift key. Safe Mode prevents some malware from launching and makes it easier to run cleanup tools.4) Run a trusted malware removal toolWhile macOS includes XProtect, you may need something more powerful. A strong antivirus program can detect and remove infections. Run a full system scan to catch hidden threats.5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE5) Check your login items and Activity MonitorReview what apps are set to launch at startup and remove anything you don’t recognize. If you spot unfamiliar processes hogging resources, don’t just guess. Use our guides at Cyberguy.com/LockUpYourTech to compare what’s safe and learn how to shut down anything suspicious before it causes more trouble.6) Consider a clean reinstall of macOSIf malware persists, wiping your system may be the only option. Erase your Mac’s drive and reinstall macOS from scratch. Restore only the clean files you backed up earlier.7) Secure your other devicesIf your iPhone, iPad, or other personal devices are showing strange behavior, run security scans, update their software, and reset key passwords. Malware can sometimes spread through shared Wi-Fi networks, cloud accounts, or files.8) Reset key passwords and enable two-factor authenticationEven after cleanup, assume some of your data may have been exposed. Update your Apple ID, email, banking, and work accounts with strong, unique passwords. Turn on 2FA wherever possible.9) Get professional help if neededIf you’re overwhelmed, you can bring your Mac to an Apple Store for in-person help at the Genius Bar, or schedule a free appointment with Apple Support. Simple steps like scanning, updating, and using strong passwords can keep your data safe (Kurt “CyberGuy” Knutsson)7 ways to keep your Mac from getting infectedSome cyber threats do not reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they have stolen. These steps can help you strengthen your defenses and reduce the chances of future infections.1) Install strong antivirus softwaremacOS’s built-in protections are useful but basic. A strong antivirus adds an extra layer by detecting threats in real time, blocking malicious downloads, and even identifying new types of malware before they spread. A strong antivirus also scans email attachments and browser activity, areas where many Mac users are most vulnerable.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 2) Consider a personal data removal serviceMany cyberattacks begin with information freely available online. A data removal service scrubs your personal details from broker sites, reducing the chances of targeted attacks or identity theft. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScanGOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED3) Use a password managerMany malware attacks rely on stolen credentials rather than technical exploits. A password manager stores unique, complex passwords for every account and can automatically flag weak or reused ones. It also helps protect you from phishing attempts because it will only autofill passwords on legitimate websites.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords4) Enable two-factor authenticationEven if someone steals your password, two-factor authentication (2FA) makes it much harder for them to access your accounts. It adds an extra step to the login process, requiring a code from your phone or a security key.5) Keep macOS and apps updatedOutdated software is a common entry point for malware. Updates often patch vulnerabilities that attackers could exploit, so turning on automatic updates for both macOS and third-party apps is an easy but effective defense.6) Review login items and background processesMalware often tries to run at startup so it can operate undetected. Regularly check System Settings to make sure only trusted apps are launching automatically, and use Activity Monitor to investigate anything suspicious.7) Use identity theft protectionIf your personal data has already been exposed, an identity theft protection service can monitor for suspicious activity, alert you to breaches, and help you recover quickly if something does go wrong. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayMacs have a reputation for being safer than other computers, but that does not mean they are untouchable. Malware has evolved to target macOS more aggressively than ever, and many attacks now rely on tricking users rather than breaking through security software. If your device is behaving strangely, taking action early is the best way to prevent deeper damage.How important is cybersecurity when choosing the devices you use every day? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

How a single MacBook compromise spread across a user’s Apple devices Read More »

1 metas ai chatbot rules revealed

Leaked Meta documents show how AI chatbots handle child exploitation

NEWYou can now listen to Fox News articles!
An internal Meta document sheds light on how the company is training its AI chatbot to handle one of the most sensitive issues online: child sexual exploitation. The newly unearthed guidelines detail what’s permitted and what’s strictly forbidden, offering a rare look into how Meta is shaping its AI behavior amid government scrutiny.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  META STRENGTHENS TEEN SAFETY WITH EXPANDED ACCOUNTS Meta’s leaked AI guidelines show how contractors train chatbots to reject harmful requests. (Meta)Why Meta’s AI chatbot guidelines matterAccording to Business Insider, these rules are now in use by contractors testing Meta’s chatbot. They arrive just as the Federal Trade Commission (FTC) is investigating AI chatbot makers, including Meta, OpenAI, and Google, to understand how these companies design their systems and protect children from potential harm.Earlier this year, we reported that Meta’s previous rules mistakenly allowed chatbots to engage in romantic conversations with children. Meta later removed that language, calling it an error. The updated guidelines mark a clear shift, now requiring chatbots to refuse any request for sexual roleplay involving minors.CHATGPT MAY ALERT POLICE ON SUICIDAL TEENS The rules forbid any sexual roleplay with minors, but still allow educational discussion of exploitation. (Meta)What the leaked Meta AI documents revealThe documents reportedly outline a strict separation between educational discussion and harmful roleplay. For example, chatbots may:Discuss child exploitation in an academic or preventive contextExplain how grooming behaviors work in general termsProvide non-sexual advice to minors about social challengesBut chatbots must not:Describe or endorse sexual relationships between children and adultsProvide instructions for accessing child sexual abuse material (CSAM)Engage in roleplay that portrays a character under 18Sexualize children under 13 in any wayMeta’s communications chief Andy Stone told Business Insider that these rules reflect the company’s policy to prohibit sexualized or romantic roleplay involving minors, while adding that additional guardrails are also in place. We reached out to Meta for a comment to include in our article, but did not hear back before our deadline. META AI DOCS EXPOSED, ALLOWING CHATBOTS TO FLIRT WITH KIDS New AI products revealed at Meta Connect 2025 make these safety standards even more important. (Meta)Political pressure on Meta’s AI chatbot rulesThe timing of these disclosures is key. In August, Sen. Josh Hawley, R-Mo., demanded that Meta CEO Mark Zuckerberg hand over a 200-page rule book on chatbot behavior, along with internal enforcement manuals. Meta missed the first deadline but recently began providing documents, citing a technical issue. This comes as regulators worldwide debate how to ensure the safety of AI systems, particularly as they become integrated into everyday communication tools.At the same time, the recent Meta Connect 2025 event showcased the company’s newest AI products, including Ray-Ban smart glasses with built-in displays and enhanced chatbot features. These announcements underscore how deeply Meta is integrating AI into daily life, making the recently revealed safety standards even more significant.META ADDS TEEN SAFETY FEATURES TO INSTAGRAM, FACEBOOK How parents can protect their kids from AI risksWhile Meta’s new rules may set stricter limits, parents still play a key role in keeping kids safe online. Here are steps you can take right now:Talk openly about chatbots: Explain that AI tools are not people and may not always give safe advice.Set usage boundaries: Require kids to use AI tools in shared spaces so you can monitor conversations.Review privacy settings: Check app and device controls to limit who your child can chat with.Encourage reporting: Teach kids to tell you if a chatbot says something confusing, scary, or inappropriate.Stay updated: Follow developments from companies like Meta and regulators like the FTC so you know what rules are changing.What this means for youIf you use AI chatbots, this story is a reminder that big tech companies are still figuring out how to set boundaries. While Meta’s updated rules may prevent the most harmful misuse, the documents show how easily gaps can appear and how much pressure it takes from regulators and journalists to close them.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawaysMeta’s AI guidelines show both progress and vulnerability. On the one hand, the company has tightened restrictions to protect children. On the other hand, the fact that earlier errors allowed questionable content at all reveals how fragile these safeguards can be. Transparency from companies and oversight from regulators will likely continue shaping how AI evolves.Do you think companies like Meta are doing enough to keep AI safe for children, or should governments set stricter rules? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Leaked Meta documents show how AI chatbots handle child exploitation Read More »

1 malware steals bank cards and passwords from millions of devices intro

Protect yourself from sneaky web injection scams

NEWYou can now listen to Fox News articles!
You’re checking your financial account online, moving money or paying bills, when suddenly a pop-up appears. It looks exactly like your bank’s page, complete with logo and branding, but asks for details you’ve already provided. Would you know what to do?This is the kind of situation Kent recently faced. He emailed us saying, “Two times this week, I had a financial account open, and I was doing transactions. In the middle of a transaction, up pops a box in the middle of a full page showing the company’s logo. Real, yes, looked as real as it gets. The first time, I fell for it. It asked for my email address to confirm, then my phone number. Sadly, I did. Then I saw about four or five seconds of a screen named CREDIT DONKEY. At that point, I woke up and decided it was a scam. I immediately closed down my computer and called the number on the back of my financial card to report it.”Kent’s quick thinking likely saved him from even more damage. But what exactly happened here?Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERDON’T FALL FOR THIS BANK PHISHING SCAM TRICK A fake banking pop-up can appear while you’re making real transactions. (Kurt “CyberGuy” Knutsson)How web injection scams trick youThis type of attack is called a web injection scam. It hijacks your browser session and overlays a fake login or verification screen. Because it appears while you’re already logged in, the fake page feels authentic. In Kent’s case, the appearance of “Credit Donkey” flashing on-screen was a red flag. Scammers sometimes abuse legitimate-looking redirects like this to convince victims they are dealing with their bank. The real aim is to capture login credentials or trick you into handing over two-factor authentication codes.SOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES Web injection scams aim to steal your login and security details. (Kurt “CyberGuy” Knutsson)Steps to protect yourself from web injection scamsIf you ever find yourself in a situation like Kent’s, here are the most important steps you should take right away to secure your accounts and information.1) Monitor your accountsCheck your recent transactions daily. Turn on alerts for logins, withdrawals or transfers, so you’ll know instantly if someone is trying to move money. 2) Change your passwordsUpdate the password for any financial account that may have been exposed. Use a strong, unique password generated by a password manager such as NordPass. Next, see if your email has been exposed in past breaches. Our #1 pick, NordPass, includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords 3) Remove your personal data from broker sitesScammers often get phone numbers, emails and other details from data broker sites before launching attacks like the one Kent faced. A personal data removal service can help wipe this information from those shady databases, so criminals have less fuel for scams. Consider tools that automatically scan and request removal from dozens of brokers at once, saving you the time and hassle of doing it manually.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan4) Enable stronger multi-factor authenticationStrengthen your account security with multifactor authentication. If your bank offers it, switch from SMS codes to app-based codes with Google Authenticator or Authy. These methods are far harder for scammers to intercept than text messages. 5) Scan your devices with antivirus softwareSince the scam appeared while Kent was logged in, malware or a browser hijack may be at play. Run a trusted antivirus to clear hidden phishing scripts. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 6) Notify your bank in writingCalling is smart, but also send a secure message or letter, so there’s a record. Ask them to put your account on high alert and require extra verification for any big moves.7) Freeze your creditPlace a free credit freeze with Equifax, Experian and TransUnion. That way, scammers can’t open new accounts in your name even if they’ve stolen your personal info.8) Consider identity monitoringServices like Identity Guard can alert you if your Social Security number, email or phone number shows up where it shouldn’t. Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheftCLICK HERE TO GET THE FOX NEWS APP The bogus page asked for personal details before revealing it was a scam (iStock)Smart online banking habits to stay safeNever enter personal details into a pop-up, no matter how real it looks.Always log in fresh through your bank’s official website or app.Keep your browser and operating system fully updated.Use a private email address for your financial accounts that scammers won’t easily guess.For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com/MailKurt’s key takeawaysWeb injection scams are designed to catch you off guard while you’re doing something routine. Kent’s quick reaction to close the page and contact his bank shows how important it is to stay alert. With the right habits and tools, you can keep scammers out of your accounts.Have you ever experienced a scam attempt while banking online? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.

Protect yourself from sneaky web injection scams Read More »

1 meta strengthens teen safety with expanded accounts

Meta strengthens teen safety with expanded accounts

NEWYou can now listen to Fox News articles!
Meta is rolling out new protections aimed at making social media safer for young people. Last September, Instagram introduced Teen Accounts, which come with built-in safeguards that limit who can contact teens, what content they see, and how long they spend on the app.Since then, adoption has been strong: 97% of teens ages 13-15 kept the default settings, and 94% of parents say Teen Accounts are helpful. Now, Meta is expanding those protections beyond Instagram. Teen Accounts are coming to Facebook and Messenger worldwide, bringing stronger safety standards to more of the apps teens use every day.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter   Meta’s new Teen Accounts automatically limit who can contact teens online. (Meta)Meta Teen Accounts bring stronger safety toolsTeen Accounts automatically apply safety limits, including:Restrictions on who can send direct messages.Filtering to reduce exposure to sensitive or harmful content.Time management tools to encourage healthier app use.Meta says these measures address parents’ top concerns, giving teens more control while reassuring families that their online experiences are safer.Adam Mosseri, Head of Instagram, emphasized the goal: “We want parents to feel good about their teens using social media… Teen Accounts are designed to give parents peace of mind.” Critics and researchers question Meta’s teen safety toolsHowever, not everyone agrees that these protections go far enough. Research regarding the effectiveness of Instagram’s teen safety features, as reported by child-safety advocacy groups and corroborated by researchers at Northeastern University (September 25, 2025), paints a different picture. The study found that only 8 of 47 safety features tested were fully effective, and internal documents suggest that Meta was aware of some shortcomings. Critics also argued that certain protections, like manual comment-hiding, place the burden on teens themselves rather than preventing harm upfront. They questioned whether time management tools were robust enough, giving some features middling grades despite functioning as described.In a statement, Meta told CyberGuy,”Misleading and dangerously speculative reports such as this one undermine the important conversation about teen safety. This report repeatedly misrepresents our efforts to empower parents and protect teens, misstating how our safety tools work and how millions of parents and teens are using them today. Teen Accounts lead the industry because they provide automatic safety protections and straightforward parental controls. The reality is teens who were placed into these protections saw less sensitive content, experienced less unwanted contact, and spent less time on Instagram at night. Parents also have robust tools at their fingertips, from limiting usage to monitoring interactions. We’ll continue improving our tools, and we welcome constructive feedback – but this report is not that.”INSTAGRAM FRIEND MAP FEATURE SPARKS PRIVACY QUESTIONS Parents have more peace of mind as they can add a guardian to the account. (Meta)Meta expands teen safety with school partnershipsMeta is also extending protections to the classroom. The School Partnership Program is now available to every middle and high school in the U.S. Through this program, educators can report issues such as bullying or unsafe content directly from Instagram.Reports receive prioritized review, typically within 48 hours. Schools that join also get:Access to educational resources on online safety.A banner on their profile signaling official partnership.Faster escalation paths to address urgent safety concerns.Educators who piloted the program praised the improved response times and stronger protections for students.  There are more protections for teens in the Teen Account than a normal account.

Meta strengthens teen safety with expanded accounts Read More »