memoment editorial

1 meta strengthens teen safety with expanded accounts

Meta strengthens teen safety with expanded accounts

NEWYou can now listen to Fox News articles!
Meta is rolling out new protections aimed at making social media safer for young people. Last September, Instagram introduced Teen Accounts, which come with built-in safeguards that limit who can contact teens, what content they see, and how long they spend on the app.Since then, adoption has been strong: 97% of teens ages 13-15 kept the default settings, and 94% of parents say Teen Accounts are helpful. Now, Meta is expanding those protections beyond Instagram. Teen Accounts are coming to Facebook and Messenger worldwide, bringing stronger safety standards to more of the apps teens use every day.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter   Meta’s new Teen Accounts automatically limit who can contact teens online. (Meta)Meta Teen Accounts bring stronger safety toolsTeen Accounts automatically apply safety limits, including:Restrictions on who can send direct messages.Filtering to reduce exposure to sensitive or harmful content.Time management tools to encourage healthier app use.Meta says these measures address parents’ top concerns, giving teens more control while reassuring families that their online experiences are safer.Adam Mosseri, Head of Instagram, emphasized the goal: “We want parents to feel good about their teens using social media… Teen Accounts are designed to give parents peace of mind.” Critics and researchers question Meta’s teen safety toolsHowever, not everyone agrees that these protections go far enough. Research regarding the effectiveness of Instagram’s teen safety features, as reported by child-safety advocacy groups and corroborated by researchers at Northeastern University (September 25, 2025), paints a different picture. The study found that only 8 of 47 safety features tested were fully effective, and internal documents suggest that Meta was aware of some shortcomings. Critics also argued that certain protections, like manual comment-hiding, place the burden on teens themselves rather than preventing harm upfront. They questioned whether time management tools were robust enough, giving some features middling grades despite functioning as described.In a statement, Meta told CyberGuy,”Misleading and dangerously speculative reports such as this one undermine the important conversation about teen safety. This report repeatedly misrepresents our efforts to empower parents and protect teens, misstating how our safety tools work and how millions of parents and teens are using them today. Teen Accounts lead the industry because they provide automatic safety protections and straightforward parental controls. The reality is teens who were placed into these protections saw less sensitive content, experienced less unwanted contact, and spent less time on Instagram at night. Parents also have robust tools at their fingertips, from limiting usage to monitoring interactions. We’ll continue improving our tools, and we welcome constructive feedback – but this report is not that.”INSTAGRAM FRIEND MAP FEATURE SPARKS PRIVACY QUESTIONS Parents have more peace of mind as they can add a guardian to the account. (Meta)Meta expands teen safety with school partnershipsMeta is also extending protections to the classroom. The School Partnership Program is now available to every middle and high school in the U.S. Through this program, educators can report issues such as bullying or unsafe content directly from Instagram.Reports receive prioritized review, typically within 48 hours. Schools that join also get:Access to educational resources on online safety.A banner on their profile signaling official partnership.Faster escalation paths to address urgent safety concerns.Educators who piloted the program praised the improved response times and stronger protections for students.  There are more protections for teens in the Teen Account than a normal account.

Meta strengthens teen safety with expanded accounts Read More »

trump signing

Fox News AI Newsletter: Trump order harnesses AI to fight childhood cancer

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Trump signs executive order to harness AI in fight against childhood cancers- Elon Musk’s xAI hiring video game developers- AI market explodes: $25 trillion tech valuation could hit $29 trillion by year’s end President Donald Trump signs an executive order in the Oval Office of the White House in Washington, D.C., on Jan. 30, 2025. (Bonnie Cash/UPI/Bloomberg via Getty Images)TECH RESCUE: President Donald Trump signed an executive order Tuesday aimed at improving ways to identify and treat pediatric cancers using artificial intelligence. TECH TIME: Elon Musk’s AI company, xAI, is expanding into video game development, seeking candidates with game design experience.VALUE EXPLOSION: Constellation Research founder R ‘Ray’ Wang warns AI intelligence is doubling every six months, fueling a $25 trillion tech market that could rival the U.S. economy and reshape industries from Microsoft to Tesla.ACTORS FIGHT BACK: The Screen Actors Guild–American Federation of Television and Radio Artists (SAG-AFTRA) condemned the creation of actress “Tilly Norwood” through artificial intelligence in a statement Tuesday. Video footage shared with Fox News Digital shows a demonstration of the AI-controlled lawnmowers on the National Mall, each carrying an American flag.  (Department of the Interior)WORK SMARTER: The Interior Department announced Tuesday it is testing autonomous lawnmowers on the National Mall in Washington, D.C., in an effort by the Trump administration to use artificial intelligence to “boost operational efficiency.”FALLING BEHIND: ‘The Big Money Show’ panel reacts to former Google CEO Eric Schmidt warning America is falling behind in the A.I. race.AT-RISK USERS: ChatGPT could soon alert police when teens discuss suicide. OpenAI CEO and co-founder Sam Altman revealed the change during a recent interview. ChatGPT, the widely used artificial intelligence chatbot that can answer questions and hold conversations, has become a daily tool for millions. His comments mark a major shift in how the AI company may handle mental health crises.KEEPING THE WATCH: A New Jersey school district has adopted artificial intelligence to help detect weapons and stop threats before they escalate. The Glassboro Public School District has become the first in the country to combine AI gun detection with a mass communication system that speeds up emergency responses and reduces the time it takes to notify law enforcement. South Jersey schools deploy AI to spot weapons and alert police in seconds. (Jay Janner/The Austin American-Statesman via Getty Images)Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeXLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Trump order harnesses AI to fight childhood cancer Read More »

3 FACEBOOK ON LAPTOP

Meta account suspension scam hides FileFix malware

NEWYou can now listen to Fox News articles!
Cybercriminals continue to find new ways to target social media users, and Meta accounts remain one of the most common lures. Losing access to Facebook or Instagram can have real consequences for both individuals and businesses, making people more likely to fall for urgent security warnings. Attackers exploit this by sending convincing notifications that pressure you into taking quick action without thinking. That’s exactly what makes the new FileFix campaign so dangerous; it looks like routine account maintenance, but it’s really a trap.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERHOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS Cybercriminals are targeting Facebook and Instagram accounts by sending fake security warnings. (Fox News)How the FileFix attack worksAs reported by researchers at Acronis, a leading cybersecurity and data protection company, the attack begins with a phishing page that looks like a message from Meta’s support team, claiming that your account will be disabled in seven days unless you view an “incident report.” Instead of providing an actual document, the page disguises a malicious PowerShell command as a file path.Victims are instructed to copy it, open File Explorer, and paste it into the address bar. While it appears harmless, this action secretly runs code that starts the malware infection process.This method is part of a family of attacks known as ClickFix, where people are tricked into pasting commands into system dialogs. FileFix, created by Red Team researcher mr.d0x, builds on that idea by exploiting the File Explorer address bar instead. In this campaign, the attackers improved the trick by hiding the malicious command behind long strings of spaces, so only the fake file path is visible to the victim.A hidden script then downloads what looks like a JPG image from Bitbucket, but the file contains embedded code. Once executed, it extracts another script and decrypts the final payload, bypassing many security tools in the process.DON’T FALL FOR THIS BANK PHISHING SCAM TRICK FileFix sends out fake alerts urging users to review their account security. (Acronis)What StealC tries to stealThe malware delivered by this campaign is StealC, an infostealer that collects a wide range of personal and organizational data. It is designed to grab browser credentials and authentication cookies from Chrome, Firefox, Opera, and other browsers.It also targets messaging apps like Discord, Telegram and Pidgin, along with cryptocurrency wallets such as Bitcoin, Ethereum and Exodus. StealC goes further by attempting to compromise cloud accounts from Amazon Web Services (AWS) and Azure, VPN services like ProtonVPN and even gaming accounts from Battle.net and Ubisoft. In addition, it can take screenshots of the victim’s desktop, giving attackers a live view of sensitive activity.Acronis reported that the campaign has already appeared in several different versions over a short period, with changes in payloads and infrastructure. This suggests that the attackers are actively testing and refining their methods to avoid detection and improve success rates.META DELETES 10 MILLION FACEBOOK ACCOUNTS THIS YEAR, BUT WHY? StealC also targets VPN software and cryptocurrency wallets. (iStock)5 ways you can protect yourself from FileFix attacksTo stay protected against attacks like FileFix and prevent malware such as StealC from stealing sensitive information, you need to combine caution with practical security measures. The following steps can help safeguard accounts, devices, and personal data.1) Be skeptical of urgent warningsAttackers rely on panic. Treat any message claiming your Meta account or other services will be disabled within days with caution. Verify the alert directly through official platforms rather than clicking links or following instructions from an email or web page.2) Avoid copying commands from unknown sourcesFileFix relies on convincing you to paste hidden PowerShell commands disguised as file paths. Never paste commands into system dialogs, File Explorer, or terminals unless you are absolutely certain of their origin.3) Invest in personal data removal servicesFileFix and StealC thrive on the information they can extract from a device or linked accounts. By using data removal services, you reduce the amount of sensitive personal information that can be found online or left exposed on old platforms. This minimizes what attackers can exploit if they manage to gain access.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan4) Install reliable antivirus softwareA strong antivirus software can detect malware like StealC before it fully executes. Many solutions now include behavior-based detection that can flag suspicious scripts or hidden downloads, helping catch threats even when attackers try to disguise commands as harmless actions.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech5) Use a password managerWhile FileFix targets stored credentials, using a reputable password manager reduces risk by creating unique passwords for every site. This way, even if one browser or app is compromised, attackers cannot access your accounts elsewhere.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayCybercriminals keep finding creative ways to trick social media users, and FileFix proves how convincing these scams can look. A fake Meta alert may feel urgent, but pausing before you click or copy anything is the best defense. Relying on strong habits and security tools gives you the upper hand. Data removal services, antivirus software, and password managers each reduce risk in different ways. When you combine them, you make it much harder for attackers to turn a scare tactic into a real threat.Should platforms like Meta do more to warn users about these evolving phishing tactics? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.

Meta account suspension scam hides FileFix malware Read More »

windows 11 update

Windows 10 support ends: Upgrade to Windows 11 safely

NEWYou can now listen to Fox News articles!
With Microsoft ending support for Windows 10 this October, many people are racing to upgrade. Catherine, a longtime HP desktop user, shared her concerns with us: “I need to purchase a new/updated computer with Windows 11 pretty darn quick. I’ve utilized HP desktops for years and would prefer to continue to do so. My concern deals with transferring everything from one computer to another, made more interesting since my husband and I have separate setups and log-ins. I had a My Passport running, but now I believe a lot is in the cloud. We are concerned about losing our emails/contacts, etc. I also use various programs for a couple of groups I’m involved with (Word, PowerPoint, Excel, Adobe Acrobat, etc.), which I cannot afford to lose. Any guidance for a smooth transition would be great.”If this sounds familiar, you’re not alone. The good news: you can move everything to a new HP computer running Windows 11 with the right preparation and tools. Here’s a step-by-step guide.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERWHAT HAPPENS WHEN WINDOWS 10 SUPPORT ENDS IN 2025? Microsoft will end support for Windows 10 this month. (Microsoft)What to prepare before you buy a new computerBefore you switch to a new Windows 11 PC, take these steps to organize your files, programs and accounts, so the move goes as smoothly as possible.1) Inventory what you have and make sure it’s backed up.List the programs/software you use (Word, PowerPoint, Excel, Acrobat, etc.), including any license/activation info.Find where your data is: local hard drive, external My Passport drive or cloud (OneDrive, Google Drive, etc.).Make sure you have backups of anything that’s only local.2) Check how your email is set up.If it’s a Microsoft/Outlook/Exchange account, a lot may already be stored in the cloud. Outlook contacts/calendars may sync automatically depending on how your accounts are configured.If you use POP (email downloaded locally), or “local only” Outlook data (.pst files), you’ll need to move those manually.3) Have your login accounts ready.Know your Microsoft account credentials (if you use one).Know admin passwords for existing software.4) Gather license keys/software installers.For paid apps (Adobe Acrobat etc.), make sure you have install files or know how to re-download, plus activation keys.Make a note of any special settings or plugins you use so they get restored.Choosing the right computer for your needs When choosing a new HP computer, confirm it runs Windows 11 out of the box. Pick a model with enough storage to hold all your files and plenty of RAM for multitasking. If you rely on external drives, make sure the new computer has the right ports, like USB-C or USB 3.0.You can browse CyberGuy’s best laptop picks or best desktop computers for solid options at Cyberguy.com. If you mainly use your computer for email, browsing, or video calls, a tablet, Chromebook, or iPad might be all you need. They’re low-maintenance, secure, and often more affordable than a new Windows laptop.WINDOWS 11 FLAW LETS HACKERS BYPASS SECURE BOOT PROTECTIONS Windows 11 and Windows 10 operating system logos are displayed on laptop screens. Krakow, Poland, on Feb. 3, 2022.  (Beata Zawrzel/NurPhoto)Step-by-step: Migrating to the new Windows 11 computer Moving to a new PC takes planning, but following these steps will help you transfer your files, programs and settings safely. This is especially important if you and your spouse use separate logins.Back up everythingStart by backing up your personal files, documents, pictures and desktop to both your external drive and a cloud service like OneDrive. If you use Outlook, export your email, contacts, and calendar if needed.For POP or local .pst files, go to File → Open & Export → Export → Outlook Data File (.pst) and make a copy.For IMAP or Exchange accounts, confirm that everything has synced properly online.Back up Windows and settingsUse Windows Backup or the built-in tools to save your settings and user folders. Apply the latest Windows updates on the old PC before making the switch.Set up the new PCWhen you turn on your new computer, sign in with your Microsoft account if you have one. This helps sync certain settings automatically. Reinstall your Office apps, Adobe Acrobat, and any other software using your license keys or installers.Transfer data and settingsIf both PCs are connected and supported, you can use Windows Backup’s “Transfer information to a new PC” option. Simply pair them and choose what to move. If that’s not an option, copy backups from your external drive or cloud storage onto the new computer. Restore email by importing your .pst file if required.Verify everything worksOpen your key programs to confirm licensing is valid. Check that your email, contacts and calendar are functioning correctly. Go through your files to make sure nothing is missing.Set up backup and ongoing syncOnce you’re up and running, turn on OneDrive or your preferred cloud service to sync important folders like Documents and Desktop. Finally, create a regular backup plan using either your external drive or the cloud, so your new PC stays protected.Common problems to avoidSome users run out of space on their new PC because they underestimated how much data they had. Others lose email when they forget to export .pst files. License activation can also cause headaches if the software is tied to the old machine, so always deactivate before reinstalling. And remember that older programs may not work perfectly on Windows 11, so check compatibility in advance.Tools that can help3rd party software: Transfers files, settings and some installed apps automatically. For our picks, search “First 10 things to do if you got a new PC” on Cyberguy.comWindows Backup and Transfer: Free but may require reinstalling programs manually.External hard drive backup: Still the simplest safety net for keeping copies of your important files. Copy everything important to your external drive as a safety measure before migrating.MICROSOFT AUTHENTICATOR IS DELETING YOUR PASSWORDS Experts recommend backing up your files to an external hard drive or a cloud service before making the switch. (Kurt “CyberGuy” Knutsson)How long the process takesUpgrading to a new computer isn’t instant, but knowing the timeline helps you plan your day. On average, you can expect the transition to take most of an afternoon. Here’s what it looks like step by step:Choose and order your new PC: Browsing, comparing models and making the purchase usually takes one to two hours.Initial setup and Windows updates: When the new computer arrives, the first startup and applying all current Windows updates can take another one to two hours.Install key programs: Installing Microsoft Office apps and Adobe Acrobat typically requires about one hour, depending on download speed and license activation.Back up data on your old PC: Creating backups of your documents, photos and email accounts usually takes one to three hours. The exact time depends on how much data you have and whether you use an external drive or the cloud.Transfer data and settings: Moving files, Outlook .pst backups and Windows settings to the new computer often takes one to two hours.Verify that everything works: Allow about an hour to test your programs, check your email and contacts, and confirm that none of your files were left behind.Reconnect devices and tweak settings: Finally, plan for 30 to 60 minutes to reconnect printers, set up Bluetooth accessories and customize your desktop and preferences.When you add it all together, the full migration can take anywhere from six to ten hours spread over a day. While it requires patience, completing each step carefully ensures that your new Windows 11 computer runs smoothly without losing important data.Pro tip: Once your new PC is ready, don’t forget security. Install strong antivirus software right away. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech What to do with your old PCOnce you’ve finished moving everything over to your new Windows 11 computer and confirmed it’s working, don’t forget about your old PC. Leaving files on it could expose your personal data if the computer is ever donated, recycled or resold.Before repurposing, always perform a secure wipe to erase all personal information. This step ensures that sensitive files, passwords and documents can’t be recovered later. After wiping, you can safely recycle the device, donate it or set it up for light use elsewhere in your home.For step-by-step instructions, check out how to securely get rid of your old computer before recycling, selling or donating it.  CLICK HERE TO GET THE FOX NEWS APPWhat if you’re not ready to upgrade?Not everyone wants to switch right away. The good news is that Microsoft recently added two ways to extend Windows 10 support until October 13, 2026.Use Microsoft Rewards: Redeem 1,000 points to keep your Windows 10 system covered.Back up with OneDrive: Sync your files through Windows Backup and get extended support for free.These options buy you more time, but remember: Windows 11 is the future. Planning now ensures you won’t be caught off guard when the final end date arrives.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com/QuizKurt’s key takeawaysUpgrading from Windows 10 to Windows 11 may feel overwhelming, but it doesn’t have to be. With the right preparation, backups and tools, you can make the switch smoothly and protect everything that matters.Are you ready to upgrade before Windows 10 support runs out, or will you risk sticking with an outdated system? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.

Windows 10 support ends: Upgrade to Windows 11 safely Read More »

saucer hiding

Elderly Bigfoot, Cleopatra’s Lost Tomb, Nessie in WWII, and More Mysterious News Briefly

A roundup of mysterious, paranormal and strange news stories from the past week.
Loch Ness monster believers may have a reason to cautiously celebrate with the revelation from Josh Gibbens that he found three letters sent to his grandfather, Lewis Taylor, who served in World War II on board the HMS Ocean Swell laying anti-submarine nets in Loch Ness; the letters, all sent in May 1967, were from David James of the Loch Ness Phenomena Investigation Bureau; the first read, ““Dear Sir, in May or June 1941, HMS Ocean Swell and HMS Norbreeze apparently had an exciting experience when some sort of unknown sea serpent got entangled in the anti-submarine nets and was partially hoisted out of the water before the gear gave way. If you have any recollection of this incident or could describe this incident or could describe the creature – size, shape, colour, texture, etc, I would be most grateful for it.” The second thanked Tyler for completing a questionnaire, and the third was a follow-up from James that his help “will prove most useful to me in my researches”. Tyler died in 1975 without sharing with his family any details of his experience with a ‘sea serpent’ or what he told the investigators. The letters about the monster must be authentic – the photos are blurry.
The US Space Force has been in existence since 1029, which is enough time for it to have conspiracy theories, scandals and a whistleblower who is revealing the sordid details; the whistleblower is Space Force veteran Jim Shell who wrote on social media that “There is a security control system within U.S. National Security Space fostering abuse and interfering with critical missions”; while he claims to have tried to resolve this problem from within, his lack of success has forced him to go public about this powerful, secretive “control structure” which acts above the chain of command, embezzled funds and concealed an alleged connection to Unidentified Anomalous Phenomena (UAP) programs; that there is a connection between these activities and Unidentified Anomalous Phenomena; Shell revealed an “unclassified document” he wrote and submitted to the Pentagon’s Inspector General’s Office in 2022 which he says will protect him from retaliation because “It’s in their interest that nothing happens to me”; Shell hopes revealing these allegations will trigger a full-scale investigation within the Department of Defense of this illegal and secretive takeover. Meanwhile, the aliens watch and shake their large heads.

I thought I told you to stay in the filing cabinet.

Harvard professor and astrophysicist Avi Loeb’s investigation/obsession into the upcoming arrival of interstellar comet/spaceship 3I/ATLAS with his recent speculation linking it to the famous “Wow! Signal” detected on August 15, 1977, by The Ohio State University’s Big Ear radio telescope and thought by many to have the potential to be a signal from extraterrestrial intelligence, while those looking for a scientific explanation think it came from an interstellar cloud created by a magnetar (a highly magnetized neutron star); Loeb notes in a new article that the “Wow! Signal” originated from the sky coordinates of Right Ascension (RA)=19h25m=291 degrees and Declination (Dec)=-27 degrees, which on August 12, 1977, just a few days before the 72-second WOW! signal was detected, 3I/ATLAS was in a part of the sky very close to where the signal came from; according to Loeb, it was “separated by approximately 4 degrees in RA and 8 degrees in Dec from the direction of 3I/ATLAS”; Loeb compares the power needed to send the Wow! to a nuclear power plant and speculates that “3I/ATLAS could be a spacecraft powered by nuclear energy”. Doesn’t he have any classes to teach this semester?
Intrepid armchair Loch Ness Monster hunter Eoin O’Faodhagain submitted another sighting which he describes as 17 feet long, five feet wide “large creature, brown-black in color, just breaking the surface, creating a strange circular movement”; O’Faodhagain was watching the webcam feed from the Clansman Hotel and its size caught his attention because “There are no known creatures in the loch that are that size” so obviously he thinks “it could be one of the Nessie family” he says the video shows something moving “in a swirling movement, for 2 minutes, and causes disturbance in a one area, surrounded by calm waters, in dry fine weather conditions”; O’Faodhagain compares it to a video from 1992 which he saw on a documentary called The Secrets of Loch Ness” that showed  “an object in the water that was moving in a circular manner also”. Based on this, do hunters need to be looking for a somewhat dizzy creature?
A video making the rounds in Colombia shows what the uploader describes as what they saw while traveling in the middle of the night on the Balsillas-Neiva highway in Huila – a “strange creature with human features that walked in an odd manner”; an occupant of the vehicle recorded the being with a cell phone and the video quickly got attention from both local and social media; while many commenters considered it to be a CGI hoax, a small boy or a monkey, anomalies like this in Colombia always turn speculations to the nahual or nagual  – a shapeshifting creature from indigenous folklore in both South and Central America; no one has a definitive answer and the witnesses continued on their way without stopping. It seems the videos of alleged shapeshifters are generally more shifty than shape-y.
If Bigfoot get old like humans, then there should be reports of them walking slowly and stoop-shouldered, possibly with a stick for a cane, or at least looking elderly – which is what a witness claimed to have recorded in a forest in Vancouver, British Columbia; the video uploaded to social media by @ncsquatchwatch is captioned: “White Elderly Bigfoot on Camera Making Tree Structure in Vancouver Wilderness!” and appears to show (in typically blurred fashion) what looks like a greying hairy face peering through the trees; it is difficult to tell if the Bigfoot, bear or costumed person is building anything from the short clip, so no many commenters had anything positive to say – one alluded to an interview with “the husband of the wife who took the video. They were hiking together on Vancouver Island (if I remember correctly). NOTHING was stated about the subject building anything”. While this video offers scant proof, it should generate thoughts on why we rarely (if ever) see photos or videos of elderly Sasquatch – unless they’ve perfected hairpieces and fur coloring.
One would be hard-pressed to find a city more committed to a wide variety of cryptids than Weston, West Virginia, especially after it unveiled the town’s fourth huge cryptid statue in its downtown – the giant Bigfoot statue was made by local artist Spring Hull who led the design and construction of the Sasquatch using mostly recycled materials; the statue is standing in Holt Square and will be maintained by Weston’s Parks and Recreation department; the Bigfoot joins statues of Mothman and the Flatwoods monster; Hull explains the cryptid obsession in a local media interview: “Cryptids are a lot of fun. They are not copyrighted, so we can do fun things with cryptids. Bigfoot, Mothman, and Flatwoods monster are friendly cryptids; they’re not really scary, so in this community we are trying to bring more everyday art”. Not scary? That sounds like a clip ready-made for the Weston bureau of tourism.

We deserve our own museum.

Mexico rivals Great Britain in haunted buildings and Mexico City is a hotbed of them, adding yet another recently when Ildelisa Langrave (@ildelisalangrave) posted a video on TikTok of the mysterious sounds of mournful wailing in the Cathedral of Azcapotzalco in Mexico City, which was empty at the time except for the witness; built in 1565, the atrium of the church was the site of the final battle of the Mexican War of Independence and is still in use for services; another ghostly legend in the cathedral has to do with a red ant as its atrium was the site of the final battle in the conflict, which could have provided the spirits which may still be haunting the church. Has anyone checked for a stained glass window with a small pane missing and wind blowing through?
Shane Plane and his son Bradley were driving on September 10 near Point Moore in Geraldton, Western Australia, about 420 km (260 miles) north of Perth when they saw and recorded three or four lights in the sky that moved in various formations but most often in a triangle; they sent the recording to Matt Woods at the Perth Observatory who told local media he had already received multiple reports of lights at about the same time stretching from the coast to inland locations like the northern Goldfields in the outback; Woods did his due diligence – he checked for aircraft activity and found none; the Department of Defense said there were no military training activities in the area that night; the Mid West Ports Authority harbor master Heathcliff Pimento said the lights were caused by atmospheric refraction, which  can make ship or fishing boat lights appear to hover, move and vanish – Woods points out that some reports were deep inland and too far from boats or water bodies to cause the refraction; he calls it a mystery but one he believes will be solved and looks forward to finding out the cause. Even if it’s aliens on a walkabout or flyabout?
After searching for two decades for the lost tomb of Cleopatra, Dominican archaeologist Kathleen Martínez announced her search led her away from Alexendria, where most Egyptologists believe the queen was buried, and instead to Taposiris Magna, an ancient harbor and temple complex about 30 miles west of Alexandria; Taposiris Magnais now 40 feet underwater but in its heyday it was also a religious center with a temple dedicated to Osiris, the god of death and resurrection; Cleopatra and Mark Antony died in 30 BCE following their defeat at the Battle of Actium and Martínez believes the queen had made arrangements to a secret burial beyond the reaches of Roman emperor Octavian; she must have thought the location was safe from natural disasters, but earthqkes eventually pulled it underwater; Martinez’s expeditions found coins bearing Cleopatra’s portrait, pottery, and mummies formerly covered in gold leaf she believes support her claim; however, she hasn’t found the body … yet. It’s too bad Elizabeth Taylor isn’t here to see which one was more beautiful.
From the ‘This could change everything’ file comes a study from China that a million-year-old human skull discovered in crushed pieces in Hubei province in 1990 and believed to be a member of the primitive human species Homo erectus is actually from a Homo longi or ‘Dragon Man’, which is an extinct species found in China that could be our closest relative and possibly closely related to the Denisovans; however, the recent reclassification of the skull known as Yunxian 2 may mean that the big split between our own ancestors, Neanderthals and Homo longi happened 400,000 years earlier than scientists thought and raises the possibility that our common ancestor and the first Homo sapiens arose in western Asia rather than Africa; Professor Chris Stringer, an anthropologist and research leader in human evolution at the Natural History Museum in London, says this: “We feel that this study is a landmark step towards resolving the ‘muddle in the middle’ (the confusing mishmash of human fossils from between 1 million and 300,000 years ago) that has preoccupied paleoanthropologists for decades”. While we’re still fighting among ourselves, this adds to the evidence that Asian erectus, homo heidelbergensis, homo sapiens, Neanderthals, Homo longi and the Denisovans all seemed to get along both communally and sexually.
Drones continue to plague planes, air traffic control and officials at airports around the world (Denmark’s Copenhagen Airport, Aalborg Airport and airports in the Danish towns of Esbjerg, Sonderborg and Skrydstrup are the most recent) and most of them believe the drones are controlled by either ignorant pranksters and hobbyists, domestic terrorists or foreign militaries; however, psychic spoon bender Uri Geller agrees with another group as he revealed in an interview – Geller thinks the drones are not from Russia but alien-controlled UFOs and governments know this but are covering it up from the public and even airports and pilots; Geller predicts more sightings in the coming months at “airports, cities and military bases worldwide” and warns that we should “watch the skies but don’t believe the lies’”. How about bending some drones, Uri?
Haunted houses usually mean something bad happened there once and now spirits stay there to torment the living, but they also mean big bucks to some owners, as the sellers of the Gardner Mansion in Massachusetts, better known as the S.K. Pierce Haunted Victorian Mansion, sold for a cool $1 million to a group that plans to continue to keep the house open as a paranormal investigation site and tourist attraction; the 10-bedrrom mansion was built 150 years ago by local businessman  Sylvester Knowlton Pierce, who spent a fortune on hand-carved moldings and cornices and other elegant amenities; owners of the home have opened it to guests like President Calvin Coolidge, Minnesota Fats, Bette Davis, P.T. Barnum and Norman Rockwell, but the most famous guests are the ghosts; the spirits may be of a prostitute who was strangled in  the home, a boarder who allegedly spontaneously combusted there, a young boy who drowned in the basement and other  “dark entities” who torment modern inhaitants and guests with strange voices, apparitions, moving furniture, slamming doors, footsteps in the halls, temperature changes, foul odors, shadow people, and even a lion’s roar; that appealed Robert and Allison Conti who bought the house in 2015 for $325,000, renovated it and turned it into a tourist attraction that the new buyers will continue. As always, we should warn the owners to give the ghosts a cut of the revenue if they want to make a profit.

Location, location, location – and ghosts, ghosts, ghosts. 

Tesla Monson and Andrew Weitz, professors of anthropology at Western Washington University, have published a paper in which they detail how the real human hobbits, Homo floresiensis, evolved their small stature and flourished on the Indonesian island of Flores from about 700,000 to 60,000 years ago; using wisdom teeth, which consistently have gotten proportionally smaller as brain size has gotten larger throughout human evolution for most species, they found this didn’t happen for the hobbits, whose brains stayed small as their wisdom teeth shrank; the team found that the hobbits “likely shrank from a larger-bodied Homo ancestor” as a result of “slowing down growth during childhood”; oddly, the hobbits showed bigger brains like humans while in the uterus; however, after birth, their growth slowed due to limited food availability on the island; the three-foot tall skeleton structure was then passed down by evolution and actually helped future generations survive; the team noted this is also why Flores was home to a species of dwarf elephants (Stegodon sondaarii) which the hobbits hunted; the study concluded that the hobbits and humans had a common ancestor were intelligent despite their small brain size. Small wisdom teeth also meant less work for hobbit dentists.
We mark the passing of Dr. Jane Goodall, DBE, the founder of the Jane Goodall Institute, UN Messenger of Peace and world-renowned ethologist, conservationist, and humanitarian; the 91-year-old Goodall had a stunning 65-year career studying wild chimpanzees in Gombe, Tanzania, while also fighting for human rights, animal welfare, species and environmental protection, and many other notable issues; she was known to the world of cryptozoology for her comments in a GQ interview where she described visiting a remote village in Ecuador and asked the people if they’d ever seen a monkey without a tail; she was surprised when “Three of the hunters came back and said, ‘Oh yes. We’ve seen monkeys without tails. They walk upright and they’re about six foot tall”; Goodall noted that “Every single country has its version. Yeti, Yowie in Australia, Wild Man in China. So I don’t know if it’s perhaps a myth that stems from maybe the last of the Neanderthals. But then, is the last of the Neanderthals still living in these remote forests? I don’t know. But I’m not going to say it doesn’t exist and I’m not going to say people who believe in it are stupid”. Thank you for your service, Dr. Jane Goodall.
NASA has long been the premier space agency when it comes to protecting the safety of astronauts, as seen in the movie, ‘Apollo 13’; the errors that caused the Challenger and Columbia space shuttle disasters were found and reforms were put in place to prevent similar accidents in the future – and there have not been any such disasters since; unfortunately, that could change with the severe budget cuts of the current administration according to a report released by U.S. Senator Maria Cantwell, of Washington and staff members for the Senate Committee on Commerce, Science and Transportation; the report, “The Destruction of NASA’s Mission”, the report states that “NASA whistleblowers have “already seen safety impacts” from the implementation of the President’s budget request; one whistleblower warns they’re “very concerned that we’re going to see an astronaut death within a few years” and “OMB’s Vought plans to use impoundment to gut NASA under a CR without guardrails, whistleblower docs show”; key points in the report include: “NASA Has Been Implementing the President’s Proposed Fiscal Year 2026 Budget Cuts Since Early Summer—In Clear Violation of the Constitution”, “Culture of Fear at NASA Jeopardizes Safety and Security”, “The Administration is Hiding OMB’s Budget Directives”, and “President’s Budget Cuts Will Kneecap the U.S. Innovation Economy”. Tom Hanks can’t save us from this one.

Elderly Bigfoot, Cleopatra’s Lost Tomb, Nessie in WWII, and More Mysterious News Briefly Read More »

2025 10 02 09 16 07

“Looked Like Iron Man”: Tucson Pilot’s “Drone” Report and Audio Recording Revealed in FAA Records

FOIA Release Letter
On December 17, 2022, a Cessna 172 pilot approaching Tucson, Arizona, reported an unusual airborne object to air traffic controllers. Now, following a Freedom of Information Act (FOIA) request filed by The  Black Vault, the FAA has released official documents and audio transcripts detailing the encounter.
The FOIA case, filed January 19, 2023, was prompted by a comment on Reddit in response to a Black Vault posting about pilot sightings. A user referenced a recording of air traffic control communications and mentioned a pilot describing a strange red and silver object. That tip led directly to the FOIA request, which the FAA confirmed in a February 28, 2023 disclosure letter responding to “records pertaining to the Red and Silver Ironman Unmanned Aircraft Systems on December 17, 2022, near Tucson, Arizona”.
The EncounterContinue scrolling for more…

The official FAA Mandatory Occurrence Report (MOR) states that Cessna N21272 “reported a red and silver drone at 80 at the TUS091006 moving east bound. N21272 advised drone looked like Iron Man. Possibly a balloon. No other sightings of drone”.
A Quality Assurance review further noted that “while descending through 8,400 feet, N21272 reported passing a silver and red drone that was off of their left side and slightly below them. No evasive action was reported”.
Air Traffic Control Audio
[embedded content]
The released air traffic control audio provides a clearer picture of what the pilot described in real time. At 12:06 p.m. local time, the pilot transmitted:
“There was something strange that just flew by off the left side. It looks like some type of drone, but it was like red and silver. I couldn’t really tell the altitude, just a little bit below me”.
Controllers later followed up to clarify the report:
“And the drone, you said at 8,000 feet?”
The pilot responded:
“It was a little bit below me, I was at 8,000, and it wasn’t like a normal looking drone. It looked more vertical than like the quadcopter type and it was silver and red”.
When asked again to describe the object, the pilot elaborated:
“Yeah, it was silver and red. It almost reminded me of, like, an Iron Man suit, although not exactly like that, but like a silvery red color. It was pretty weird”.
###
Document Archive
FOIA Case 2023-03232 Release Package [5 Pages, 0.5MB]

Follow The Black Vault on Social Media:

“Looked Like Iron Man”: Tucson Pilot’s “Drone” Report and Audio Recording Revealed in FAA Records Read More »

70702

Is Europe Stepping Up on Defense?

Well, is it? From defense innovation, to scaling capabilities, to budgets, the answers aren’t easy. Ryan was joined by General Sir Richard Barrons of the United Kingdom and Peter Michael Nielsen of Denmark to sort through these issues. Barrons had a storied military career and most recently co-led his country’s Strategic Defence Review. Nielsen is Denmark’s deputy national armaments director, a role that has unique weight now as Denmark holds the E.U. presidency.  This episode was recorded live at a reception in London hosted by our friends at Helsing (https://helsing.ai).

Is Europe Stepping Up on Defense? Read More »

1 these browser extensions put millions of google chrome users at risk how to stay safe intro

Update Chrome now: Google patches new zero-day threat

NEWYou can now listen to Fox News articles!
Google has released an urgent update for its Chrome browser to fix a newly discovered zero-day security flaw that hackers are already exploiting. This is the sixth zero-day Chrome has faced this year, highlighting just how quickly attackers move to take advantage of these hidden weaknesses. Because zero-day threats strike before developers can patch them, your personal data and browsing activity could be at risk if you don’t update right away. If you use Chrome, now is the time to upgrade.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERGOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP Chrome users are urged to update immediately to block active zero-day attacks. (Kurt “CyberGuy” Knutsson)A critical flaw in Chrome’s V8 engineThe newly patched vulnerability, tracked as CVE-2025-10585, stems from a type confusion weakness in Chrome’s V8 JavaScript engine. Google’s Threat Analysis Group (TAG) discovered and reported the bug on Tuesday, and the company shipped a fix the following day, Bleeping Computer reported.Google confirmed that the flaw was being exploited in the wild, though it did not share technical details or name the groups behind the attacks. TAG has a history of uncovering zero-days tied to government-sponsored spyware campaigns aimed at high-risk individuals such as opposition leaders, journalists and dissidents.The fix was delivered through Chrome version 140.0.7339.185/.186 for Windows and macOS, and version 140.0.7339.185 for Linux. These updates will gradually reach all users in the Stable Desktop channel over the coming weeks.While Chrome typically updates automatically, you can apply the patch immediately by navigating to the ‘About Google Chrome’ section. Google stated that it is withholding full technical details until most users have installed the update, a precaution meant to prevent attackers from exploiting lagging systems.GOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED Google races to patch the sixth major browser flaw discovered in 2025. (Kurt “CyberGuy” Knutsson)A growing list of zero-day attacks in 2025This marks the sixth zero-day flaw patched in Chrome this year. In March, Google addressed CVE-2025-2783, a sandbox escape bug exploited in espionage attacks against Russian organizations. In May, it pushed emergency updates for CVE-2025-4664, which let attackers hijack user accounts.Then in June, another flaw in the V8 engine, CVE-2025-5419, was patched after being spotted by TAG. July saw the release of a fix for CVE-2025-6558, which allowed attackers to bypass Chrome’s sandbox protection. With this latest patch, Google continues a busy year of racing to secure its browser against rapidly emerging threats. How to update Google Chrome on a desktopUpdating Chrome only takes a minute, whether you’re on Mac or Windows. Here are the steps.Open Chrome.Click the three dots in the top-right corner.Go to Help > About Google Chrome.Wait while Chrome checks for updates.Click Relaunch when the update finishes.How to update Chrome on iPhoneOpen the App Store on your iPhone.Tap your profile icon in the top-right corner.Scroll down to see pending updates.Find Google Chrome in the list.Tap Update next to it (or Update All if you want to update everything).How to update Chrome on AndroidSettings may vary depending on your Android phone’s manufacturer. Open the Google Play Store on your Android device.Tap your profile icon in the top-right corner.Select Manage apps & device.Under “Updates available,” look for Google Chrome.Tap Update to install the latest version.CLICK HERE TO GET THE FOX NEWS APP Hackers are already exploiting the bug to steal data from unprotected devices. (Kurt “CyberGuy” Knutsson)5 ways to stay safe from Chrome zero-day attacksUpdating Chrome is essential, but there are additional steps you can take to stay safe from attacks.1) Be cautious with links and downloads and use strong antivirus softwareMany zero-day attacks are delivered through malicious websites or email attachments. Avoid clicking unknown links or downloading files from unverified sources, especially if they prompt you to disable security settings. Also, use strong antivirus software to add another layer of defense to detect malicious code that tries to run through compromised browsers. A strong antivirus can spot suspicious activity before it takes hold. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 2) Enable two-factor authentication (2FA)Even if attackers manage to steal your login details through a browser exploit, 2FA makes it much harder for them to break into your accounts. Use an authenticator app instead of SMS when possible for stronger protection. 3) Rely on a password managerIf attackers exploit the browser to steal login data, a password manager keeps your credentials safe and helps generate unique, complex passwords. Even if one account is targeted, it prevents a domino effect across your logins.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords4) Limit browser extensionsSome extensions can be abused to make attacks worse. Stick to extensions from trusted developers, review permissions carefully and uninstall anything you no longer need.5) Keep your operating system updatedChrome updates are critical, but attackers can also exploit holes in Windows, macOS, Android or iOS. Regular OS updates patch vulnerabilities across the system, reducing the chances of a browser exploit spreading further. Kurt’s key takeawayThe fact that Chrome has already faced six zero-day attacks this year shows how relentless attackers are and how even the most popular software can have serious gaps. These flaws are not just bugs, but opportunities for hackers to exploit millions of users before fixes roll out. The pattern also highlights the growing sophistication of threat actors, including state-backed groups targeting high-risk individuals. No browser is completely safe, and the battle to secure widely used software is ongoing and far from over.Do you think Google is reacting fast enough to keep your data secure? Let us know in the comments below. Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.

Update Chrome now: Google patches new zero-day threat Read More »

hypershell x exoskeleton

New exoskeleton built to boost endurance and cut fatigue

NEWYou can now listen to Fox News articles!
If you have ever wanted to walk longer, hike farther, climb more challenging trails or cycle with less strain, the Hypershell X Ultra is ready to assist you in all of those activities. This latest exoskeleton improves on earlier models and shows how wearable tech can unlock new levels of outdoor performance.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERTHE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PAST Hypershell X exoskeleton aims to improve outdoor performance in running, hiking and other activities. (Hypershell)Power that pushes you forwardThe Hypershell X Ultra features the M-One Ultra motor system, which delivers up to 1000W of power. That is about 1.3 horsepower attached directly to your hips. The range has been extended to 18.6 miles, meaning you can travel longer on a single charge. With efficiency above 90% and AI algorithms that adjust in real time, the exoskeleton feels like part of your body. Smarter movement across terrainThe Hypershell X Ultra is designed to adapt automatically. A new descent mode protects your knees by reducing impact on joints and boosting support when walking downhill. The exoskeleton also provides smarter assistance when you accelerate, start a ride or pick up the pace on a run. With 12 terrain modes to choose from, it adjusts to almost any environment. These modes include Cycling+, Running+, Snow, Dune, Walking, Speed Walking, Uphill, Downhill, Mountain, Gravel, Up Stairs and Down Stairs.NEW CAPSULE DEVICE LETS YOU CONTROL ROBOTS WITH YOUR ENTIRE BODY Hypershell X Ultra features an improved motor system, allowing the user to travel longer on a single charge. (Hypershell)Built tough for real adventuresAt under 4 pounds, the X Ultra is lightweight but strong. It uses carbon fiber and titanium alloy for aerospace-level durability. With an IP54 rating, it resists dust, rain and snow. The Hypershell+ app, available for Android, iOS and Apple Watch, gives you easy access to settings and performance data. At $1,999, it is an investment, but one that could transform the way you move outdoors. For anyone looking to extend endurance and take on new challenges, it represents the future of adventure.Proven performance you can trustIndependent testing from SGS in Switzerland verified the X Ultra’s performance. In trials, users reduced exertion by up to 22% while walking, and 39% while cycling. Heart rates dropped as much as 40%, showing the impact this suit can make. These results confirm that the X Ultra is more than marketing talk.CLICK HERE TO GET THE FOX NEWS APP Hypershell X Ultra uses carbon fiber and titanium alloy for aerospace-level durability. (Hypershell)What this means for youWhether you are training for an endurance event, keeping pace with your kids on a hike or exploring places once out of reach, the Hypershell X Ultra provides extra support and reduces fatigue. It helps you go farther while protecting your body from strain.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/QuizKurt’s key takeawaysThe Hypershell X Ultra takes the strain out of steep climbs, long hikes and even tough bike rides. It helps you conserve energy, protects your joints and gives you that extra push when you need it most. Whether you are hiking mountain trails, cycling longer distances or exploring new terrain like snow and sand, this exoskeleton makes the journey feel easier and more exciting. For anyone ready to push past limits, it could be the future of outdoor adventure.Would you wear an exoskeleton to boost your outdoor performance, or would you rather stick to your natural limits? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.

New exoskeleton built to boost endurance and cut fatigue Read More »

2025 10 01 12 07 16

FBI Releases LAX “Jetpack” Case Files; Pilot Interview Contradicts Jetpack Description

A screengrab from a video posted Dec. 23, 2020, which shows an object flying through the air off the coast of California. Sling Pilot Academy/YouTube
The FBI has released a detailed set of investigative files on the so-called “Jetpack Man” sightings near Los Angeles International Airport (LAX). The release on October 1, 2025, followed a Freedom of Information Act (FOIA) request by The Black Vault first filed August 3, 2021 and resubmitted November 27, 2021 after an initial denial. The Bureau originally withheld all the records under FOIA exemption (b)(7)(A) for ongoing investigations but reversed its position with the second request after nearly four years.
When the sightings first made headlines in 2020 and 2021, they were widely portrayed as encounters with a person flying a jetpack near commercial aircraft. Yet the FBI’s files show that at least one pilot later walked back that description. In one case, the China Airlines captain who initially thought he saw a “jetpack” told investigators on reflection that “he did not believe it resembled the shape and size of a human” and noted that “there were no propellers or jet propulsion devices attached to the object.”
The records released mark the first “interim” disclosure for this case which remains open, indicating that additional material may still be forthcoming. For this release, 250 pages were reviewed, bit only 130 were released. It is unclear what is in the 120 pages completely withheld.Continue scrolling for more…

How the Investigation Began

The FBI’s first reference to the case appears in an internal summary of the August 30, 2020 incident, when pilots on American Airlines flight 1997 reported seeing “a person with a jet pack flying approximately 300 yards to the left of them” as they descended to land at LAX at about 3,000 feet. According to the records, “approximately one minute later, JetBlue flight 23 was approaching LAX and a pilot possibly saw the same person flying with the jet pack”.
The Bureau’s records show the FBI’s Los Angeles Resident Agency opened a file (164B-LA-3313857) on September 1, 2020 to investigate the sightings.
October 2020: Pilot Describes Object in Detail
A year later, on October 14, 2020, a China Airlines captain flying from Taipei to Los Angeles told FBI agents he saw an object at 6,000–6,500 feet over Culver City during descent. The pilot described it as moving horizontally and only visible for two seconds:
“He called out the sighting to the co-pilots… The object was approximately 100-200 meters away from the left wing tip when it went past the plane”.
At first, the October 14, 2020, sighting was linked to the idea of a jetpack or “fly suit.” But after an FBI interview, the China Airlines captain made a crucial clarification. He told investigators that, on reflection, “he did not believe it resembled the shape and size of a human.” He added that there were “no propellers or jet propulsion devices attached to the object.”
This reversal is noteworthy. The incident was widely described in headlines as another “jetpack man” encounter, yet the pilot himself cast doubt on that very interpretation. If the object did not look like a human, and carried no visible propulsion system, it leaves open the possibility that it was not a balloon, not a drone, and not a man in flight gear. The FBI documents stop short of offering an alternative explanation, but the pilot’s testimony underscores the unresolved nature of what was seen that night.
Social Media Tips and Public Leads
The files show that tips poured in through the FBI’s National Threat Operations Center (NTOC). One December 2020 e-tip accused a Los Angeles graffiti “tagger” of being the jetpack flyer, alleging he had “posted about this on social media — knowing the FBI was looking into this” and that he “clearly has no remorse… and finds it funny that he has got away with it so far”.

The tipster urged the FBI to “find out his real name, his cell phone, IG use location… and charge him appropriately” because “he is scaring people by being able to operate a jetpack”. No evidence in the released files confirms that lead produced results.
May 2021: Cessna Pilot Reports Jetpack-Like Figure Near Van Nuys
On May 9, 2021, a student pilot in a Cessna 172 with an instructor at Van Nuys Airport reported seeing “what appeared to be a person on a jetpack” for about six seconds at 2,400 feet, 400–500 feet from the plane:
“The person was going the opposite direction from the plane… standing up straight… wearing black and red clothing”.
The pilot compared the sighting to a prior photo and video and said it was “exactly the same” in shape and build, but with different colors.
July 2021: Cargo Pilot Describes “Reddish” Object
The July 28, 2021 incident involved a Kalitta Air cargo flight on final approach to LAX. The captain told the FBI he saw an “unidentified object” at 5,000 feet, initially thinking it was “a guy with a jet pack” but later noting it was “larger than a balloon and smaller than a helicopter or small airplane”.

He described the object as “reddish in color and 5 to 7 feet tall, similar to the height of a person” and said he observed it for seven to eight seconds, first trying to determine if it posed a collision risk before attempting to identify it. He was later sent a photo and video of a similar object but said “the color was wrong” — the comparison image showed black and white, not red.
(See other documents at: Jetpack Man Sighting over Los Angeles International Airport (LAX), July 28, 2021)
August 2021: Drone Sighting Tip

In November 2021, an individual reported seeing a man at San Pedro’s Lookout Point Park flying “a fast, advanced looking drone that landed on his arm like a hawk” and speculated it could be connected to the jetpack sightings.
No Definitive Conclusion in FBI Files
The released records contain no definitive identification of the object or person. Instead, they show a mix of pilot testimony, public tips, and FBI investigative activity, including interviews with flight instructors, pilots, and possible industry contacts.
One record shows agents retrieved at least one CD containing “video recording” evidence in December 2020 but the contents were not included in the FOIA release.
The FBI’s decision to initially withhold the records for years under exemption (b)(7)(A) signals how seriously the Bureau took the reports and their investigation. Yet the eventual release leaves the mystery unresolved. Pilots repeatedly described objects that appeared humanoid at altitudes and distances difficult for current consumer jetpacks, and the files reveal the Bureau explored but did not prove links to drones or social media personalities.
What the files do show, for the first time in an official release, is how pilots, airline crews, and tipsters perceived the incidents, and how the FBI documented them in its case file. The records also confirm that federal authorities obtained at least some video evidence but have not released it publicly.
Future releases will be highlighted on The Black Vault, and linked below, when available.
###
Document Archive
FBI Release Package #1 – October 1, 2025 – [147 Pages, 4MB]

Follow The Black Vault on Social Media:

FBI Releases LAX “Jetpack” Case Files; Pilot Interview Contradicts Jetpack Description Read More »