memoment editorial

70702

Is Strategy Possible Now? Ever?

The American president has a … different approach to strategy than his predecessors. To make sense of the extent American strategy can work and is working at the moment, Ryan was joined by Frank Hoffman, Justin Logan (Cato Institute), and Rebecca Friedman Lissner (Council on Foreign Relations). Join for the brilliant minds. Stay for the spicy takes on American statecraft in Latin America, Europe, the Middle East, and the Indo-Pacific. 

Is Strategy Possible Now? Ever? Read More »

russian ai robot falling face first in debut

Fox News AI Newsletter: Russian robot faceplants in humiliating debut

The humanoid robot AIdol fell down during its Wednesday, Nov. 12, 2025, debut in Moscow. (Moscow News Agency via AP)NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Russia’s first AI robot faceplants on stage in humiliating Moscow debut- Actor George Clooney claims the rise of AI technology is dangerous, says ‘genie is out of the bottle’- OpenAI accuses NY Times of wanting to invade millions of users’ privacy in paper’s lawsuit against tech giantTECH TRIP: Russia’s first humanoid robot was showcased to the world Wednesday with the unveiling dramatically cut short after it tripped within moments of stepping onto a Moscow stage.FAKE STAR PANIC: Actor George Clooney said Tuesday he is alarmed by the rise of artificial intelligence. In an interview with Variety’s Marc Malkin, the “Ocean’s Eleven” star said the Hollywood community is disturbed by how realistic AI depictions have become, particularly those created with the latest audio and video generation models.  During a recent interview with Variety, actor George Clooney said that artificial intelligence-generated videos are getting “dangerous” with how realistic they look.  (Anadolu/Getty)PRIVACY UNDER SIEGE?: OpenAI released a blistering statement accusing The New York Times of wanting to invade the privacy of its users as the paper proceeds with its lawsuit against the tech giant.AI RACE: Advanced Micro Devices chair and CEO Dr. Lisa Su joined “The Claman Countdown,” where she thanked the Trump administration for its support of artificial intelligence development and underscored the importance of maintaining American leadership in the global AI race.KIDS AT RISK: Kids are spending more time online than ever, and that early exposure is opening the door to a new kind of danger. Artificial intelligence has supercharged online scams, creating personalized and convincing traps that even adults can fall for. The latest Bitwarden “Cybersecurity Awareness Month 2025” poll shows that while parents know these risks exist, most still haven’t had a serious talk with their children about them. A new Bitwarden poll released for Cybersecurity Awareness Month 2025 finds parents are aware of AI-driven online scams but few have discussed them with their children. (iStock)VETS GET AI BOOST: For more than three decades, I had the honor of serving our country in uniform. I led soldiers at home and abroad. I commanded U.S. Cyber Command and the National Security Agency through some of the most complex technological shifts in our history. But the transition that came after my time in uniform came to an end was its own kind of mission. The structure, tempo and identity that comes with military service doesn’t simply disappear when you step out of it. The day you enter civilian life, you begin a new chapter – and you’re expected to write it while you’re living it.ROCKETS TO RUINS: Elon Musk is putting money toward a digital renaissance of archaeology aimed at reimagining life in ancient Rome — with the potential to rewrite history books.’IMMINENT’ THREAT: A new report from a conservative think tank says that artificial intelligence is the new “cold war” between the U.S. and China.EMPOWERED BY AI: Artificial intelligence giant OpenAI on Monday announced a new initiative that aims to make it easier for service members and veterans to use AI tools when they’re transitioning from military service to the workforce. Sam Altman, chief executive officer of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, US, on Tuesday, Sept. 23, 2025. (Kyle Grillot/Bloomberg via Getty Images)FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Russian robot faceplants in humiliating debut Read More »

10M Americans hit in government contractor data breach

NEWYou can now listen to Fox News articles!
Data breaches hit every kind of business, from hospitals to tech firms to major retailers. Now a leading government contractor has joined that list.Conduent, which manages critical public services across the United States, says hackers infiltrated its systems for nearly three months. The cyberattack exposed personal information linked to more than 10 million people.All about the Conduent breach and its scaleConduent discovered the intrusion in January 2025 and said hackers had infiltrated its network as early as Oct. 21, 2024. During this period, attackers reportedly stole large amounts of data linked to state-level programs such as Medicaid, child support, food assistance and toll systems. Conduent claims that its investigation found no ongoing malicious activity and said operations were safely restored after the breach was contained.Conduent manages technology and payment systems for dozens of U.S. state governments, processing roughly $85 billion in annual disbursements and handling over 2 billion customer service interactions every year. According to its own estimates, it supports around 100 million residents through various government health and welfare programs.MAJOR DATA BROKER HACK IMPACTS 364,000 INDIVIDUALS’ DATA Hackers accessed Conduent’s network for nearly three months, exposing sensitive data from major state programs like Medicaid and child support. (Felix Zahn/Photothek via Getty Images)The company reported that at least 400,000 people in Texas were affected, with compromised data including Social Security numbers, medical records and health insurance details. Other affected states include Washington, South Carolina, New Hampshire, Maine, Oregon, Massachusetts and California. Notifications are being sent to all impacted individuals, and a dedicated call center has been established to answer questions about the breach.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.How the Conduent breach unfoldedIn January, Conduent described the event as an “operational disruption caused by a third-party compromise.” The breach led to several days of downtime, disrupting vital services in multiple states. In Wisconsin, for instance, parents and beneficiaries were unable to process payments due to system outages, leaving many struggling to meet obligations related to child support and welfare programs.The SafePay ransomware group later claimed responsibility for the attack, alleging it had stolen 8.5 terabytes of data. Conduent confirmed in a Securities and Exchange Commission (SEC) filing that hackers had indeed exfiltrated files belonging to a limited number of clients. The company says it hired cybersecurity experts to analyze the stolen data and recently confirmed that it contained significant amounts of personal information from end-users across multiple programs.Despite the massive theft, Conduent said there is currently no evidence that the stolen data has been published online or on dark web marketplaces.HACKERS TARGET ONLINE STORES WITH NEW ATTACKWe reached out to Conduent for a comment, and a rep for the company provided CyberGuy with the following statement:”As previously disclosed in its April 2025 Form 8-K filing with the SEC, in January 2025, Conduent discovered that it was the victim of a cybersecurity incident.  With respect to that incident, Conduent has agreed to send notification letters, on behalf of its customers, to individuals whose personal information may have been affected by this incident.  In addition, a dedicated call center has been set up to address consumer inquiries. At this time, Conduent has no evidence of any attempted or actual misuse of any information potentially affected by this incident.Upon discovery of the incident, Conduent acted quickly to secure its networks, restore its systems and operations, notify law enforcement and conduct an investigation with the assistance of third-party forensics experts. In addition, given the nature and complexity of the data involved, Conduent has been working diligently with a dedicated review team, including internal and external experts, to conduct a detailed analysis of the affected files to identify the personal information contained therein, which was a time-intensive process. Conduent takes this matter seriously and regrets any inconvenience this incident may have caused.”6 steps you can take to protect yourself from Conduent data breachIf your information may have been exposed in the Conduent breach or any similar data leak, you’re not without defenses. There are several steps you can take right now to reduce the risks. The cyberattack disrupted critical public services across multiple states, with some families temporarily unable to process benefits or payments. (Kurt “CyberGuy” Knutsson)1) Consider a personal data removal serviceData brokers collect and sell personal information such as your name, home address, phone number and relatives’ names. This data can be used for scams or social engineering attacks. Personal data removal services find these records across dozens of sites and submit takedown requests on your behalf.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.HACKERS STEAL MEDICAL RECORDS AND FINANCIAL DATA FROM 1.2M PATIENTS IN MASSIVE HEALTHCARE BREACH2) Monitor your accounts regularlyAfter a major data breach, one of the most effective ways to protect yourself is to stay alert. Check your bank and credit card statements every few days for unusual transactions, even small ones. Watch your benefit accounts or tax filings for irregular activity. Early detection gives you time to freeze accounts or stop fraudulent charges before they escalate.3) Install a reputable antivirus programAntivirus software is your first line of defense against cyber threats that often follow large breaches. Stolen data can be used to launch targeted phishing attacks or spread malware through fake links and emails. A reliable antivirus solution actively scans for malicious activity, blocks suspicious downloads and keeps your devices safe from newer online threats through automatic updates.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.OVER 8M PATIENT RECORDS LEAKED IN HEALTHCARE DATA BREACH4) Enable two-factor authentication (2FA)Even if your login credentials are compromised, two-factor authentication (2FA) can stop attackers from getting in. It requires an additional code sent to your phone, email, or authentication app, making unauthorized access nearly impossible. Enable 2FA on your banking, email and government-related accounts, as these often hold the most sensitive information.5) Use a password managerMany breaches happen because people reuse the same password across multiple websites. A password manager eliminates that risk by creating and storing strong, unique passwords for every account.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com Conduent says the stolen files contained significant amounts of personal information,, but has found no signs the data has surfaced online or on dark web marketplaces. (Kurt Knutsson)6) Consider an identity theft protection serviceIdentity theft protection services monitor your personal data across multiple sources, including the dark web and public records. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.Kurt’s key takeawayEven though Conduent claims the stolen data hasn’t surfaced online, that doesn’t mean it’s safe. Data exfiltration on this scale has long-term implications, from identity theft to potential fraud within public benefit systems. The real test will be how both Conduent and its government partners adapt their cybersecurity oversight to prevent similar breaches. Because at this point, the question isn’t whether these systems will be targeted again, but whether they’ll be any better prepared when it happens.CLICK HERE TO DOWNLOAD THE FOX NEWS APPDo you think government contractors handling sensitive information should face stricter cybersecurity regulations? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

10M Americans hit in government contractor data breach Read More »

3d solar power towers

Texas startup raises $5.5M for revolutionary solar towers that produce 50% more energy

NEWYou can now listen to Fox News articles!
Texas startup Janta Power has secured $5.5 million in seed funding to expand its next-generation solar power towers, a vertical alternative to flat solar farms. The funding round was led by MaC Venture Capital with support from Collab Capital. The investment shows strong confidence in 3D solar systems that can reshape renewable energy worldwide.Why flat solar panels are no longer enoughTraditional solar panels cover large flat areas on rooftops or open fields. This approach uses a lot of land and misses much of the day’s available sunlight. The sun moves across the sky, but flat panels capture energy best only when it is directly overhead.Janta Power takes a different approach. The company’s pivoting solar towers stack panels vertically to create a compact three-dimensional structure that captures more sunlight throughout the day. Think of it as the solar version of a skyscraper: more power from less ground space. Janta Power’s 3D solar towers capture more sunlight throughout the day while using just a third of the land. (Janta Power)NEVER NEED AN EV CHARGING STATION AGAIN WITH THESE ROOFTOP SOLAR POWER PANELSHow Janta’s solar towers workEach tower uses smart tracking software that follows the sun’s path from sunrise to sunset. By adjusting its position throughout the day, the system collects more sunlight than traditional fixed panels. This design allows the towers to produce about 50% more energy while using only one-third of the land required by flat-panel systems.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Because of their vertical orientation, the towers can capture sunlight during early morning and late afternoon when flat arrays are least efficient. The result is a steadier flow of electricity across the entire day, reducing stress on power grids and lowering the need for short-term backup plants.Stronger, smarter and more efficientJanta’s towers are also built for strength. Each structure can withstand winds up to 170 miles per hour. The towers feature durable steel frames and modular foundations that simplify installation in a wide range of environments.Pilot programs are already operating at Munich International Airport, Dallas-Fort Worth International Airport and facilities managed by Aena, which oversees more than 70 airports worldwide. A game-changer for energy economicsThe company’s 3D geometry gives each site a capacity factor of around 32%, compared to roughly 22% for flat panels. This greater efficiency lowers the Levelized Cost of Energy (LCOE) to about $0.05 per kilowatt-hour, well below the global average of $0.15.That advantage can make renewable power more accessible for industries such as data centers, universities and telecom operations that need reliable and consistent energy. Built to endure 170 mph winds, Janta’s modular towers are already powering airports in Munich, Dallas–Fort Worth, and across Aena’s global network. (Shelby Tauber/Bloomberg via Getty Images)CHINESE-MADE SOLAR PANELS USED ON AMERICAN FARMS PUTS US POWER GRID AT RISK: FORMER NSA OFFICIALWhat this means for youFor businesses and communities, Janta Power’s technology could mean smaller solar installations that deliver more energy for less money. Because the towers need less land, they can fit into urban areas, airports or industrial zones that could not host traditional solar farms.For everyday consumers, these innovations can bring cleaner, more stable and more affordable power to local grids while supporting a greener energy future.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysJanta Power’s vertical tower design and intelligent tracking system show what happens when creativity meets clean energy. The company’s technology makes it possible to generate more power from less space, setting a new standard for solar innovation. Smart tracking software automatically pivots each tower from sunrise to sunset, boosting efficiency by up to 50% compared to traditional flat panels. (REUTERS/Dane Rhys)If we can rethink the shape of solar energy, what other parts of our world could we redesign for a smarter, more sustainable future? Let us know by writing to us at Cyberguy.comCLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.  

Texas startup raises $5.5M for revolutionary solar towers that produce 50% more energy Read More »

drop croc

Lucifer Bees, Fortean Cat, Idaho Bigfoot, Killer Goblins and More Mysterious News Briefly

A roundup of mysterious, paranormal and strange news stories from the past week.
The pyramid of Menkaure is the smallest of the three famous pyramids of the Giza necropolis near Cairo, Egypt, but the stature of the 200-foot-tall pyramid has grown recently when scans by researchers from Egypt’s Cairo University and the Technical University of Munich detected two hidden voids which may resolve the mystery of a lost entrance to Menkaure, which was completed around 2510 BCE; using georadar, ultrasound and electrical resistance tomography, the researchers detected two air-filled cavities – one measuring about 3.2 feet high by 4.9 feet wide, and the other just under 3 feet high and 2.3 feet wide – at depths of 4.6 and 3.7 feet under the pyramid’s eastern outer façade, whose smooth polished stones have long led scientists to speculate they were related to a secret entrance, especially since the only other entrance on the north side is also under smooth stones; “The hypothesis of another entrance is very plausible, and our results take us a big step closer to confirming it,” says Christian Grosse, Professor of Non-destructive Testing at TUM. Non-destructive testing works great – until it detects gold or other valuable items.
Alex Ellery, a mechanical and aerospace engineering professor at Carleton University, proposes in a new paper that the reason why we and Fermi (Enrico of the Fermi Paradox fame) haven’t seen any extraterrestrials is because they are actually self-replicating “von Neumann” machines that have evolved to remaking themselves into common items that helps them hide from us in plain sight; according to Ellery: “There could be probes everywhere: in craters on the Moon, or lurkers in the Asteroid Belt and Kuiper Belt”; he proposes that these self-replicating probes may very well be mining our Solar System’s planets, moons and asteroids for minerals and that action would leave behind technosignature evidence among the rocks, which would be slightly different yet significant enough to be detected; in fact, “Our search for such technosignatures will be side-effects of our own efforts to industrialize lunar and asteroid resources”. It’s too bad we can’t have a battle royale/debate on this topic between Ellery and Fermi; however, Avi Loeb might be available (see next item).
The interstellar comet (well, ‘comet’ to most, ‘spaceship to others) 3I/ATLAS  made its closest path to the Sun (perihelion) and is now on its way to its closest path to Earth – or perhaps we should say what’s left of it is coming this way, as British astronomers Michael Buechner and Frank Niebling release images of 3I/ATLAS showing it now has a massive “anti-tail” and a separate “smoking” trail as it picked up an unusual amount of speed; Harvard professor Avi Loeb also noted the presence of “seven jets” with “glowing halo” and he admits these could be signs 3I/ATLAS is breaking apart or even may have exploded as it passed by the Sun; Loeb is still holding on to hope it is a spaceship, but admits that Earth-based satellites will be unable to capture particles from these jets to identify them, nor will the particle detectors on NASA’s Juno spacecraft around Jupiter, which will probe 3I/ATLAS on March 16, 2026; the first radio signal from 3I/ATLAS was picked up by the MeerKAT radio telescope in South Africa, causing some to suggest ay this is evidence of extraterrestrial intelligence on a spaceship, but astronomers say they are the result of specific wavelength absorption related to the presence of OH molecules in the comet’s coma – in other words, a natural signal made by comets. This is really going to screw up the ‘3I/Atlas – comet or spaceship?’ betting lines in Las Vegas.
We’ve had Africanized ‘killer’ bees and Asian giant ‘murder’ hornets – now comes a new discovery in Western Australia of a bee so terrifying, it is named after the devil himself; researchers from Curtin University found the bees in goldfields and named them Megachile (Hackeriapis) lucifer because the females bees have “highly distinctive, prominent horns”; unlike the killer bees and murder hornets, these horned Lucifer bees are harmless to humans – the horns are tools to collect food from flowers while protecting the bees from caterpillars, other enemies, and rival bees; unfortunately, they feed on endangered wildflowers so the Lucifer bees may want to use those horns to broaden their horizons and take on new challenges and food sources. Just in case, be on the lookout for a combination beekeeper-exorcist.
Many cultures have tales of strange animals they use to scare children into behaving or scare invaders into going back to their home countries; one such animal was the ‘drop crocodile’ in Australia – tales of tree-climbing crocodiles who ‘drop’ down on unsuspecting prey are popular in Australia; now, there is evidence of a real drop croc as researchers from UNSW Sydney and Spain’s Miquel Crusafont Catalan Institute of Paleontology have been examining eggshell fragments from Australia’s oldest crocodiles, dating back 55 million years ago, and found evidence that these mekosuchine crocodiles were “very weird crocodiles” that hunted in forests and leaped onto their prey from trees; the real drop crocs had no competition from freshwater or saltwater crocodiles which hadn’t appeared yet, but they were done in by climate changes which turned their forests into dryland and forced them into areas with less big prey and new predators to compete with. They’re not drop crocs, but this is the season to beware of falling iguanas in Florida, where the lizards freeze in trees and topple to the ground.

This sure beats holding your breath and waiting for swimmers.

The goal of exploring a haunted house is to find a ghost, but a ghost hunter in Reynosa, Mexico, got what can best be described as the precursor of a ghost – while filming his excursion through the haunted house, called the ‘Mansion of the Goblins’, he detected a foul odor which he followed to a bathroom where he found the decomposing body of a dead person; the ghost hunter called the police, who believed the old man was homeless and died of natural causes; there is no word on whether the ghost hunter encountered the man’s spirit, any other ghosts or a goblin in the haunted mansion. Finding a dead body in a haunted house is lower than finding a ghost, but is it the same or higher than finding a skeleton? (Asking for a friend developing a Ghosthunter game.)
In a last-minute attempt to keep 2025 from being one of the worst years ever for Loch Ness Monster sightings, 28 October 2025. Mishawn Mielke of Texas was visiting Urquhart Castle when she saw what looked like a black head rising out of the water around 2.45 pm on October 28; she noted in her report to the Official Loch Ness Monster Sighting Registry that her first impression was: “… wow, that looks just like images I saw from the sightings website. It didn’t look like a wave; it actually looked like the head of something popping up. it made a distinct pattern in the water I couldn’t see anywhere else, kind of like its own wake. And then it was gone. From that distance, I’d say the water pattern was at least 3 meters long”; fortunately, she managed to capture a photograph which skeptics will decry as too blurred for identification, while believers will call this the fifth on-site Nessie sighting of 2025. If there are any Apple engineers out there, isn’t it time for an iPhone Nessie with a better camera?
A popular Fortean phenomena of earlier times was the one-eyed ‘Cyclops’ animal which was often a farm animal in a remote country where over-breeding could cause what has since proven to be a genetic defect, but the reports still pop up as was the case recently in Vilhena, in the state of Rondônia, Brazil, where farmhand Gilberto Almeida uploaded to social media a video of a “Cyclops Cat” born with one eye in the middle of its forehead; as is often the case in these births, the kitten died two days later; Brazilian veterinarian Janete Silva explained to disbelievers crying “A.I. eye!” that the kitten suffered from cyclopia, a rare congenital disorder which happens “When the embryo is developing, instead of the brain structure dividing into two parts, a single mass forms. As the eye follows this division, it ends up positioned in the center”; cyclopia can occur in humans, albeit at the extremely rare rate of under 1 in 100,000 babies. Cyclops may have been born in Greek mythology, but his legacy lives on – we could use his giant size and wall-building abilities these days.

A Cyclops Cat that’s movie and bedtime story worthy.

Yet another sign of the permeation of cryptids into modern society comes from Ada County, Idaho, where voters on the most recent Election Day received the obligatory ‘I Voted’ stickers with a new and unusually paranormal design – behind the message was a silhouette of a Sasquatch; the state has its own deep affinity for Bigfoot. “We see him on car stickers all over,” Ada County Clerk Trent Tripple told local media that “”We see him on car stickers all over. He has such a hold in Idaho” even though the state is low on the list of states with Bigfoot sightings. This could attract more Bigfoot to Idaho – even if they don’t particularly care for potatoes.
The decades-long quest to solve the mystery of the identity of infamous hijacker D.B. Cooper lost another valuable witness with the passing of William Rataczak, who was the co-pilot of the ill-fated Northwest Airlines flight in 1971 when the man who came to be known as D.B. Cooper hijacked the Boeing 727 during its flight from Portland, Oregon, to Seattle, Washington, and forced it to land in Seattle, where he released the passengers and picked up four parachutes and a suitcase containing $200,000 in ransom cash; after telling the crew to head to Mexico, Cooper went alone in into the cabin, opened the rear door and jumped; he’s never been positively identified and, although some of the money ahs been found, his whereabouts from that day to today remain a mystery; Rataczak was often questioned about the case and said, “My mind tells me he’s dead. And my heart tells me I hope he is, because he caused a great number of people a great deal of grief”. Will Cooper go down in history as the best hide-and-seek player since Bigfoot?
It’s a far cry from remote viewing, but researchers at Queen Mary University of London and University College London say that they have identified a mysterious seventh sense they call “remote touch”, which is the ability to sense a buried object simply by touching the ground and reacting to subtle cues outside of the normal five senses; Elisabetta Versace of Queen Mary University said the experiment “changes our conception of the perceptual world” – it involved 12 volunteers who moved their index fingers across a box of dry sand while flowing a strip of LED lights to maintain a common speed; a small plastic cube was buried in the sand and the volunteers were asked to keep going until something felt “off”; out of 216 passes, in 79 cases the test subjects accurately detected the buried objects, and correctly detected “no object” 58 times – showing sensitivity levels well above mere chance; this research will be used to build robots with a “seventh sense” to locate people or objects buried by earthquakes or avalanches – or even to find evidence of aliens on other planets. Can they find my remote and missing left socks first?

Having a seventh sense isn’t all it’s cracked up to be. 

A family in Zimbabwe fears that goblins are attacking, sexually molesting – and murdering – their close relatives and fear they have no way to protect themselves; the Nola family is originally from Malawi but now live in Overspill, Epworth, Zimbabwe, where the mysterious attacks and deaths have been increasing since family matriarch, Mbuya Menalla Pangeti Nota, died in 2019 – they lost five after the patriarch died in 2000 and six more family members since 2019; they fear for the lives of their 52 grandchildren after the deaths – a family spokesperson told the media that “our daughters are being divorced or widowed frequently, while the sons are also being abandoned by their wives. People say our family is cursed, that we have goblins”; they also found “a pot placed on top of our father’s grave, with a knife inside and pieces of cloth of different colors” – signs of possible curses; some of the younger family members are blaming their elders for the deaths, and local officials and religious leaders are finally investigating – with no answers so far. And you thought the fights at YOUR family reunions were bad.
Everyone has heard of the mysterious crop circles which pop up on farms in England and in a few other countries, but farmer Raúl Zamer of the Santa Fe province in Argentina may have expanded the genre with his report of a crop ‘doodle’ – while scanning the area with a drone prior to harvest, Zamer spotted the strange circle and line squiggles; on the ground, he was puzzled: “We can’t figure out what it is. It’s a single, wide footprint; we thought it was a motorcycle and ruled that out, and it’s not a vehicle either, there’s no visible track, and the shape is very precise”; not only that, “The other thing we noticed is that where the markings were made, we see the wheat threshed. There are no grains on the ground either. The ear is completely shattered”; while no one is saying “it’s aliens”, Zamer compared the phenomenon to what happens when a person or machine steps on wheat: “If a human or a tire steps on it, you can see that the ears of wheat remain intact; they aren’t harvested without the grain. They lie flat, but with the grain inside. Here, in the footprint, it’s completely threshed. It’s a mystery”. This could be a sign of bored crop circle makers, but who is more bored: aliens making crop circles, humans making crop circles, or humans finding crop circles and not being able to make any money off of them?
In his new book, “Inside the U.S. Government Covert UFO Program: New Insights,” Dr. James Lacatski reveals information that he claims the Defense Intelligence Agency, which he worked for, and the Advanced Aerospace Weapon System Applications Program, which he designed and managed, have kept hidden for 14 years after AAWSAP; according to what Lacatski told George Knapp, UFOs and paranormal phenomena related to UFOs are created by someone or something very strange: “Can we say they are human? I don’t think you can, no. We can be pretty well sure we’re not dealing with humans. How can we ever know the ultimate answer?”; in the book, he tells of UFO cases where airline pilots were followed by huge unknown craft which changed shapes while in the air, eyewitnesses who experienced inexplicable physiological changes or major medical problems after close encounters, and entities in the homes of dozens of people who had earlier seen orbs, triangles, or other weird craft; Lacatski says he and the late Senator Harry Reid, a longtime proponent of UFO disclosure, knew our adversaries had craft which they reverse-engineered – craft that could fly without wings, engines, fuel or no fuel tanks; he told Knapp he saw them fly himself. Kudos to Lacatski and George Knapp, and all others risking their careers and more to reveal what is hidden.
Psychics have enough problems without this kind of publicity: reality TV personality Kim Kardashian has been bragging that she would pass the bar exam and become a lawyer, but when the results showed she had failed, Kim blamed her family’s team of psychics, saying, “They all collectively—maybe four of them—have told me it was gonna pass the bar. So they’re all full pathological liars. Don’t believe anything they say”; in a more graphic interview, she noted that “I’m just letting you guys know that all of the f–king psychics that we have met with and that we’re obsessed with are all f–king full of s–t”. Maybe what the family needs is a team of tutors.
The stress of seeing a UFO and/or aliens can take a toll on witnesses as they are both questioned and attacked from all sides – an example of this is Dr. Italo Venturelli, the head neurosurgeon at Regional Hospital who claimed to have had face-to-face communications with an alien captured after a famous UFO crash in Varginha, Brazil, in 1996; he at one time denied this account, according to documentary film director James Fox who recently interviewed Venturelli, explaining “He wasn’t prepared. He suffered a heart attack a few months later and stared at the ICU ceiling, thinking, ‘ I can’t take this to the grave. So much to lose and so little to gain.’  And he’s willing to take a polygraph test in public with his hand on the Bible”; this is from Fox’s soon-to-be-released documentary, “Moment of Contact: New Revelations of Alien Encounters”. That’s nice to finally know, but how did the alien feel about it?
Large-scale mass pareidolia experiences occurred recently in India and Colombia – recently in Matigara, near the city of Siliguri in West Bengal, India, many people reported seeing a light in the night sky that they agreed looked like a human face lying on its side; at least two people photographed the face as it moved across the sky until it disintegrated, and posted the pics and videos on social media where discussions ranged from religious experience to mass aliens to pareidolia; meanwhile, hundreds of people are overrunning the village of Morcá north-east of Bogotá, Colombia, after descriptions and photos travelled across the Internet of a rock face that many believe looks like the face of the Virgin Mary and see it as a divine sign; while geologists sat the shape formed naturally two months ago when rock fragments broke away from the cliff, its close proximity to the nearby shrine of the Virgin of the O of Morcá has many making a pilgrimage to both locations. See what you want to see … just don’t pay suspicious characters for tickets to see it.

Lucifer Bees, Fortean Cat, Idaho Bigfoot, Killer Goblins and More Mysterious News Briefly Read More »

iss073e0575226orig

A Robotic Helping Hand

NASA astronaut Jonny Kim took this photo on July 23, 2025, as the International Space Station orbited 259 miles above a cloudy Pacific Ocean southwest of Mexico. Visible in the image is the 57.7-foot-long Canadarm2 robotic arm, which extends from a data grapple fixture on the International Space Station’s Harmony module. Attached to its latching end effector is Dextre, the station’s fine-tuned robotic hand designed for delicate external maintenance tasks. Station crew use Canadarm2 to perform maintenance tasks, capture visiting spacecraft, and move supplies, equipment, and even astronauts.
On Nov. 2, 2025, the space station reached 25 years of continuous human presence. The orbital lab remains a training and proving ground for deep space missions, enabling NASA to focus on Artemis missions to the Moon and Mars.
Image credit: NASA/Jonny Kim

A Robotic Helping Hand Read More »

space image

Blue Origin launches New Glenn rocket to Mars after delays

NEWYou can now listen to Fox News articles!
Blue Origin’s New Glenn Mission NG-2 launched a second mission from Cape Canaveral Thursday, carrying NASA’s twin ESCAPADE spacecraft to Mars.The spacecraft is expected to reach the Red Planet by 2027.The launch was previously delayed due to extreme solar activity and bad weather.This launch is to support ESCAPADE’s science objectives as the twin spacecraft progress on their journey to the Red Planet. UFO MANIA GRIPS SMALL TOWN AFTER MYSTERIOUS GLOWING OBJECT SIGHTING GOES VIRALAlso onboard is a technology demonstration from Viasat in support of NASA’s Communications Services Project.United Launch Alliance is also said to be targeting a nighttime launch from Cape Canaveral Space Force Station.Its Atlas V rocket will lift off from Space Launch Complex 41 at 10:04 p.m. EST, carrying a ViaSat broadband satellite. ULA’s mission had been delayed twice last week due to a vent valve issue with its booster’s liquid-oxygen tank.CLICK HERE TO DOWNLOAD THE FOX NEWS APPIf both launches are successful, they will mark the ninety-fifth and ninety-sixth launches of the year on Florida’s Space Coast bringing the region closer to a record 100 launches in 2025.The milestone follows SpaceX’s Starlink mission earlier this month, which set a new annual record.

Blue Origin launches New Glenn rocket to Mars after delays Read More »

iPhone

Never forget to reply to an email again with hidden phone trick that actually works

NEWYou can now listen to Fox News articles!
If you’ve ever told yourself you’d reply to an email later and then forgot, there’s a simple fix built right into your phone. iPhone and Android users both have ways to set reminders that bring messages back to your attention at the perfect time. Whether you use Apple’s Mail app or Gmail on Android, these features help you stay organized, reduce stress and never miss an important reply again.Why the message reminder feature mattersMany people leave emails unread as a reminder to reply later, but that method often fails. The built-in Mail reminder gives you a clear alert at a time you choose. It helps you follow through on tasks, maintain better communication and avoid missed opportunities.WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS Reminders can be set in the iPhone Mail app to ensure you don’t miss an email. (REUTERS/Thomas Peter/File Photo)To make sure you can use this feature, update your iPhone to the latest iOS version. Here’s how:Open Settings.Tap General.Select Software Update.If an update is available, tap Download and Install.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.If you’re on Android, you’ll also want to make sure your Gmail app and system software are up-to-date so the Snooze feature runs smoothly. Here’s how:Settings may vary depending on your Android phone’s manufacturerOpen the Google Play Store.Tap your profile icon in the upper right corner.Select Manage apps and device.Tap Update all or locate Gmail and tap Update.To check your Android version, open Settings > About phone > Android version.5 HIDDEN BATTERY DRAINERS YOU CAN FIX RIGHT NOWKeeping your phone updated ensures you have the newest tools, features, and security improvements.How to set up a reminder in the Mail app on iPhone Open the Mail app.Find the email you want to be reminded about and swipe right on it.Tap Remind Me.Choose a preset time or tap Remind Me Later to pick your own.Select the date and time that fits your schedule and tap the check mark in the upper right corner of the screen.That’s it. When the time comes, you’ll get a fresh notification as if you just received the email again. It’s a great way to stay organized without using third-party apps. iPhone and Android users can set built-in email reminders to manage messages and stay organized through Apple’s Mail and Gmail apps. (Sean Gallup/Getty Images)10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONEHow to cancel a reminder early in the Mail app on iPhone If you’ve already handled the message and no longer need the alert, you can end it early:Open the Mail app and go to Mailboxes.Tap Remind Me.Swipe left on the email you want to remove.Tap Clear to cancel the reminder.This prevents duplicate notifications and keeps your inbox tidy.Android users can do this, tooIf you’re on Android, you can set up a similar email reminder using Gmail’s built-in Snooze feature. It works much like Apple’s Mail reminder. Instead of choosing “Remind Me,” Gmail lets you snooze an email so it pops back to the top of your inbox later, right when you want to deal with it.5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINEHow to snooze an email in Gmail on Android Settings may vary depending on your Android phone’s manufacturerOpen the Gmail app on your Android phone.Tap and hold the email you want to be reminded about.Tap the three dots in the upper right corner or the clock icon at the top.Select Snooze.Choose a preset time or tap Pick date & time to set a custom reminder.When the time arrives, Gmail automatically moves the message back to the top of your inbox and marks it unread so it stands out.BEST WAYS TO TRACK YOUR MEDS ON IPHONE AND ANDROIDHow to cancel a snooze quickly in Gmail on Android If you change your mind before the reminder triggers, you can easily cancel it:Settings may vary depending on your Android phone’s manufacturerOpen the Gmail app.Tap the Menu icon (three lines) in the top left corner.Select Snoozed.Find the email and swipe it left or right, or open it and tap Unsnooze.Your email will return to its original spot in the inbox right away, so you can handle it or leave it as is. Built-in reminder features on iPhone and Android help users follow up on emails and prevent missed messages. (Cyberguy.com)What this means for youIf you manage a busy inbox, this feature can be a game-changer. It helps reduce mental clutter since you won’t have to rely on memory or endless email flags. You decide when you want to be reminded, and your phone takes care of the rest.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysWhether you’re using an iPhone or Android device, built-in email reminders can keep your digital life running smoothly. These features help you manage your inbox with less effort and more control. By setting a time to follow up, you stay productive and avoid letting key emails slip through the cracks. Both platforms make it easy to stay focused and keep your conversations on track.CLICK HERE TO DOWNLOAD THE FOX NEWS APPWould a reminder like this have saved you from missing an important email recently? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

Never forget to reply to an email again with hidden phone trick that actually works Read More »

2 how to easily transfer files and photos off of a computer to your hard drive

Apple passkey technology transforms Mac security with biometric authentication, encrypted storage

NEWYou can now listen to Fox News articles!
Your Mac holds a lot more than just files. It carries your personal information, payment data, messages and every online account you access. Keeping that information safe starts with how you sign in. For years, passwords have been the standard way to protect accounts, but they are also one of the weakest links in digital security. They can be guessed, stolen or reused across multiple sites.Apple’s introduction of passkeys marks a major step forward. Instead of relying on something you need to remember, passkeys rely on something you have (your trusted Apple device) and something you are, like your fingerprint or face. Together with iCloud Keychain and two-factor authentication, passkeys create a seamless and much safer way to secure your Mac and your digital life.What are passkeys?Passkeys are a modern alternative to passwords. They use public key cryptography to let you sign in without ever creating or typing a password. When you register for an account using a passkey, your Mac creates two unique keys. One is public and stored by the website or app, and the other is private and stays securely on your device.The public key is not sensitive information. The private key, on the other hand, never leaves your Mac and is protected behind your device’s security features. When you sign in, Touch ID or Face ID confirms your identity before your Mac uses the private key to authenticate you. This process prevents phishing and password leaks because no shared secret is ever transmitted to the website.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.HOW TO USE PASSKEYS TO KEEP YOUR COMPUTER SAFE A passkey on your Mac replaces passwords with a faster, more secure way to sign in. (Kurt “CyberGuy” Knutsson)How Apple keeps passkeys securePasskeys are stored and synced across your devices through iCloud Keychain, which is protected by end-to-end encryption. This means that not even Apple can access your passkeys or passwords. iCloud Keychain also has built-in protection against brute force attacks, even if someone were to gain unauthorized access to Apple’s servers.If you lose your devices, you can still recover your passkeys through iCloud Keychain recovery. To do this, you must sign in with your Apple ID and password, verify your identity with a code sent to your trusted number and confirm using your device passcode. The system limits the number of attempts, and if too many failed attempts occur, the recovery record is locked or destroyed to prevent misuse.You can also set an account recovery contact to make sure you never lose access, even if you forget your Apple ID password or device passcode. This multi-layered design ensures that your data remains secure even in extreme scenarios, such as a compromised Apple account or cloud breach.How to set up passkeys on your MacSetting up passkeys is simple and requires iCloud Keychain to be enabled.Choose the Apple menu, then select System Settings.Click your name, then click iCloud.Click Passwords. In macOS Sonoma or earlier, click Passwords & Keychain.Click Sync this Mac, then click Done.When you sign up for a website or app that supports passkeys, you’ll now see the option to create a passkey.If your Mac has Touch ID, place your finger on the sensor to confirm.If you are using an iPhone or iPad nearby, select Other Options and scan the QR code shown on your Mac to confirm with Face ID.You can also replace an existing password by visiting the account settings of a supported website or app and selecting the option to switch to a passkey.Once created, your passkeys are automatically stored in iCloud Keychain and available on all devices signed in with the same Apple ID.Major services that support passkeysPasskey adoption is growing quickly across major tech platforms. As of now, many of the biggest online services already let you sign in without a password.Some of the key ones include:GoogleMicrosoftAppleAmazonPayPalGitHubUbereBayWhatsAppFacebookSupport for passkeys continues to expand every month as more companies integrate the technology into their login systems. On most of these platforms, you can now create new accounts or switch your existing ones to passkeys for faster, more secure sign-ins. Each passkey is unique to your account and safely stored in your device’s iCloud Keychain. (iStock)6 additional steps to keep your Mac safePasskeys add a strong layer of protection, but good security habits still matter. Here are more steps to strengthen your Mac’s defenses. 1) Enable two-factor authenticationTwo-factor authentication (2FA) adds another layer of protection to your Apple ID. It works by requiring two forms of verification: your password and a one-time code sent to a trusted device or phone number. This means that even if someone somehow gets your password, they still cannot access your account without also having your device.10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE2) Review your trusted devices and numbersRegularly check which devices and phone numbers are linked to your Apple ID. On your Mac, click the Apple icon in the upper left of the screen. Then go to System Settings → Apple ID → Devices and remove anything you don’t recognize. Make sure your trusted phone number is still current, since it’s critical for account recovery.3) Use a password managerEven though passkeys are replacing passwords, many sites still rely on traditional logins. A password manager helps you create, store and fill in unique passwords for every account. iCloud Keychain can do this automatically across all your Apple devices, but if you want more flexibility, you might want to consider a third-party password manager.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.4) Be wary of phishing attempts and install strong antivirus softwarePhishing remains one of the most common ways attackers try to steal personal information. They may send fake emails or messages pretending to be from Apple or other trusted companies, urging you to click links or provide login details. Always double-check the sender’s address and avoid clicking on links that seem suspicious. Instead, visit the website directly by typing the address into your browser.While macOS has strong built-in defenses such as Gatekeeper and XProtect, installing strong antivirus software adds another layer of protection against malware, adware and potentially unwanted programs. Strong antivirus software continuously monitors your system for suspicious behavior and can alert you to threats before they cause damage. It is especially useful if you download files from outside the App Store or connect external drives frequently.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com. Using a passkey with Touch ID or Face ID keeps your information protected from phishing and leaks. (Kurt “CyberGuy” Knutsson)5) Turn On FileVault disk encryptionFileVault protects everything stored on your Mac by encrypting the entire hard drive. That means if your computer is ever lost or stolen, your data stays locked away from prying eyes. Go to System Settings → Privacy & Security → FileVault to enable it.6) Keep macOS updated automaticallyApple regularly releases software updates that include important security patches. Cybercriminals often target outdated systems because they contain known vulnerabilities. By keeping macOS and your apps up to date, you make it harder for attackers to exploit weaknesses. To make this effortless, turn on Automatic Updates under System Settings → General → Software Update → Automatic Updates.7) Back up with time machineBacking up your Mac is just as important as protecting it. Time Machine automatically backs up your files to an external drive or network disk, keeping your data safe from ransomware, hardware failure or accidental deletion. Make sure your backup drive is encrypted for extra protection.HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES8) Use a data removal serviceEven with passkeys, your personal information can still be exposed through data broker sites that collect and sell your details. Using a data removal service can help remove your private data from hundreds of these sites automatically. It’s an effective way to reduce your online footprint and protect your identity, especially when combined with Apple’s built-in security tools.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawayPasswords have served us for decades, but they are no longer enough to protect our digital identities. Passkeys make signing in faster, easier and significantly more secure by removing the weaknesses of traditional passwords. Combined with Apple’s encryption, iCloud Keychain and two-factor authentication, they represent one of the safest ways to protect your Mac and everything on it.Have you tried using passkeys yet on your Mac, and what was your experience like? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

Apple passkey technology transforms Mac security with biometric authentication, encrypted storage Read More »

blobid1762861936768

Bizarre Zones of High Strangeness

There seem to be certain places in this world that, for whatever reasons, just have strangeness gravitate towards them. Perhaps it is due to lying on some sort of Earth energy line. Maybe it’s because of portals for aliens. Or possibly it is some innate quality of the land itself that draws in these bizarre forces. Whatever the case may be, these places in a way lie outside of normal reality, steeped in mystery and surrounded by strange phenomena. Here we will take a journey through some of these places, where reality and the paranormal collide. 
One very strange such place lies in Mexico. What has become known as the “Zone of Silence,” or La Zona Del Silencio, is located in a barren patch of desert in the Bolsón de Mapimí region in Durango, Mexico, around 400 miles south of El Paso, Texas. It is a remote area, with the nearest human settlement of any size being the quiet town of Ceballos, some 25 miles away, which ekes out a living in the harsh, parched landscape. The area was once under a vast ocean in prehistoric times, and marine fossils and shells can be found among the scrub, which has given the area its other nickname, the Mar de Tetys, or The Sea of Thetys. This is a desolate, lonely place seemingly as barren and alien as the surface of some other planet, and over the centuries has become synonymous with a wide range of strange, inexplicable phenomena.
Locals have known something was weird about the area since at least the mid-nineteenth century, when farmers would occasionally complain of searing hot pebbles that mysteriously rained down from the sky from time to time, even on clear days. It was also said that some of the plants and animals living here displayed mutations and deformities. There have also long been reports that the area has the effect of instilling a certain sense of deep unease, and can distort perceptions or cause visual and auditory hallucinations.
The region has been known as an intense UFO hotspot for many years. Over the years, many reports accrued of travelers and ranchers in the area seeing orbs of light or fireballs cavorting about in the sky or streaking across the horizon. On occasion, these lights were said to descend and set the scrub brush ablaze. Nevertheless, despite the weird stories, this bizarre swath of desert remained mostly unknown to the outside world.

The area first came into the public consciousness in the 1930s, when a Mexican pilot by the name of Francisco Sarabia reported that his plane’s instrumentation had gone haywire and his radio had ceased to function while on a routine flight over the region. In the 1970s, an Athena missile carrying containers of the radioactive element cobalt 57 launched from White Sands Missile Base in New Mexico and suddenly and inexplicably malfunctioned over the area and crashed. It was reported that the missile had suddenly veered wildly off course, almost as if it had been drawn by some mysterious force. Considering the rocket’s radioactive payload, a recovery mission was immediately launched. The missile was eventually found in a remote area and removed along with tons of irradiated soil. When the military went to investigate, it was also found that radio signals and all communications equipment failed to work there for some unknown reason. A few years later, it was reported that booster rockets used for the Apollo project broke up and crashed into the area as well.
An organic chemist by the name of Harry de la Pena had already documented the zone’s unique characteristic of creating a “dark zone” of radio communications in 1966 while on a photographic survey. While out exploring with some companions, it was noticed that walkie-talkies ceased to operate in the area, and portable radios showed a dramatically diminished capacity, only barely audible even at full volume. It would be later found that television signals also failed to penetrate the zone, and to this day, it is said that TVs will not work here. For whatever reason, the Zone of Silence seems to have the ability to severely dampen all television, radio, short wave, microwave, or satellite signals, rendering all devices utilizing these all but useless.
This phenomenon has since been studied by scientists from all over the world, yet no definite cause has been found. It is thought that perhaps the effect is created by magnetic anomalies caused by a large amount of the iron ore magnetite in the area, as well as a high level of meteorite activity, which has imbued the soil with various minerals and ores that could create magnetic disturbances that have an effect on radio waves. There have also been discovered in recent years large reserves of uranium in the mountains facing the zone, although it is unclear what effect this would have on transmissions. One of the strangest things about the Zone of Silence is that it tends to move around, with its exact location shifting and unpredictable.
Magnetic anomalies and the inability of all manner of radio waves to work here are far from the only bizarreness of the Zone of Silence. For years, there have been various strange accounts from people passing through the region of all manner of high strangeness. One recurring story is that of a trio of blonde-haired strangers who are occasionally seen wandering the landscape here. Allegedly, the trio is made up of two males and one female who are dressed in clothes that are inappropriate for the desert environment. Those who have met them say they are very physically attractive, extremely polite, and speak perfect Spanish with a slightly musical lilt. The strangers are said to sometimes ask ranchers for water, but never for food or anything else. When asked where they are from, their typical response is to say “from above.”

These beings, whoever they are, are said to be non-threatening and, in fact, are rather benevolent in nature. One scientist working at the desert “Biosphere” research station in the area reported how he had wandered away from the facility and became lost. It was then that he was approached by a trio of tall, blonde humanoids who guided him back to the research station before vanishing. Interestingly, the Biosphere itself has garnered a reputation for mystery. Although its official purpose is to study desert life, it has often been rumored to be doing secret experiments with animals, researching UFO phenomena, and conducting psychic research.
One bizarre account connected to the Biosphere and this strange trio comes from journalist Luis Ramirez Reyes, who visited the zone in November of 1978 as part of a news team covering the mysteries of the area. At the time, their destination was the mysterious Biosphere research station, but Reyes and his photographer got lost in the desert on their way. Since they had not brought food or water with them, the gravity of their situation was abundantly clear. As they drove along, Reyes saw a trio of figures walking ahead and told the photographer, who was driving, to stop so they could ask for directions, but the photographer didn’t see anyone and so continued on without stopping.
A short while later, much further down the road, the truck again bizarrely passed by the same trio, and once again, the startled Reyes told the driver to stop, but his companion still did not see anyone. Nevertheless, at the imploring of Reyes, he stopped the truck. Reyes claimed to have asked the trio if they had seen a truck like theirs pass earlier, but they said they had not. It was at this point that Reyes noticed that the people were not dressed or equipped at all for the harsh desert environment, despite the fact that they were on foot out in the middle of nowhere, far from any settlement. When asked where the Biosphere was, the odd strangers were only too happy to help and pointed the journalists in the right direction. When they arrived at the Biosphere, they told the staff there of their encounter, but were met with the insistence that the research faculty were the only people out there for hundreds of miles. Who were those strangers? No one knows.
There are other reports of strange beings here as well. Perhaps one of the most well-known accounts comes from a couple by the name of Ernesto and Josefina Diaz, who ventured into the area to collect fossils on October 13, 1975. As they sifted through rocks, they noticed that a storm was brewing on the horizon. Aware of the danger of flash floods and sudden storms in the area, the couple hastily packed up and drove off, but were soon caught up in a deluge of rain. Their new pickup truck became swiftly mired in mud, the tires quickly sinking into the muck. As the couple struggled to free their vehicle, they noticed two unusually tall men wearing yellow raincoats and caps approaching them. The two strangers instructed the couple to get in their car while they pushed. When they complied, the truck was soon freed from the mud, but when Ernesto got out to thank the men, they were nowhere to be seen even though the terrain was totally flat and devoid of places to hide. There were also allegedly no footprints of any kind in the mud to show that anyone had been there at all.

Yet another odd tale was related by a Ruben Lopez, who was on his way to visit a relative in Ceballos when his engine began to experience difficulties and stalled. He then noticed 5 small figures several feet tall by the side of the road, whom he at first mistook to be children. Upon closer inspection, he could see that the figures were wearing silver outfits and wearing helmets that opened in front, revealing clearly adult faces rather than the children he had been expecting. The figures began approaching the truck of the increasingly unnerved Lopez, who gunned the engine until it sputtered back to life enough for him to leave the weird beings in the dust. As soon as they were out of sight, the truck allegedly began working normally.
The region in which the Zone of Silence lies also remains a hotbed of UFO sightings, with many high-profile accounts made here. One impressive sighting in particular happened in September 1976, at around 8:59 p.m. Residents of the town of Ceballos reported a truly immense flying object hovering at the outskirts of town, which was estimated to be a staggering 300 meters in length. The craft was described as being rectangular and ringed with pulsing lights that changed colors from green to white to blue. From deep within it, some inscrutable machinery produced a deep thrumming and humming noise from its bowels. Allegedly, all of the dogs in the area went berserk, howling and barking incessantly until the immense object finally floated over the landscape to disappear from view in the direction of the Zone of Silence.
The heavy UFO activity reported in the zone has caused speculation running the gamut from plausible to fringe. Scientists tend to attribute the many UFO sightings here to the large number of meteorites that pass through the area. The Zone of Silence region boasts one of the highest concentrations of meteor strikes in the world, with small meteorites falling here practically daily. In fact, one of the largest known meteors to have ever struck the Earth crashed into the ground here at a place called Pueblito de Allende in February 1969. What is now known as the Allende Meteorite came down at an estimated speed of 10 miles per second, creating a massive shockwave and a cracking boom heard over vast distances that was one of the loudest sounds ever recorded. Witnesses said the flash produced by the meteor impact was like looking into a flashbulb. Another odd meteorite containing unusual crystalline structures estimated as being around 13 billion years old, far older than our solar system, crashed here in the 1950s, and there are constant falls of small, metallic orbs in the area that locals call guíjolas.
Incidentally, the presence of such spectacular meteorite activity may lie behind an archeological mystery to be found in the zone. Mystery ruins that show no known link to known peoples of the area have been found that are estimated to be thousands of years old and are thought to have served as some sort of astronomical observatory, perhaps somehow linked with the intense meteorite activity. As of yet, no one knows the true purpose of this ancient observatory. It is also possible that the area’s magnetic aberrations can cause potent hallucinations, a phenomenon that has long been reported from here by locals and travelers alike.
Other theories point to aliens, with some theorizing that the zone represents a stopping zone for aliens or even a portal through which extraterrestrials or inter-dimensional beings travel. Magnetic anomalies such as those found in the Zone of Silence have long been associated with UFO activity and the ancient astronaut theory, with such travelers being said to be drawn to these potent magnetic zones for unknown purposes. Those who subscribe to this theory point out that Mexico’s Zone of Silence is near the Tropic of Cancer and lies along the same latitude south of the 30th parallel shared by other mystical sites such as the Egyptian Pyramids and the Bermuda Triangle. Could the Zone of Silence be demonstrating phenomena similar phenomena that is seen with the Bermuda Triangle or other mystery zones?
Although the presence of alien spacecraft and beings from another world cannot be supported by any evidence, it certainly seems that something strange is going on in the Zone of Silence. The area with its magnetic aberrations seems to have the ability to draw things into it, perhaps the reason why so many meteorites and rockets have come down here, and is quite feasibly somehow connected to the various other phenomena reported from here. To this day, no one is quite sure just what is going on here, and TVs and communications equipment still fail to work properly when caught up in the roving, ever-shifting zone.

What so imbues this patch of Mexican desert with its bizarre oddities? Does this have anything to do at all with ancient aliens, inter-dimensional portals, and travelers from other worlds? Or is this all merely an unexplained curiosity of the natural world, perhaps mixed in with a healthy dose of folklore and overactive imaginations? It seems this remote, searing land of brutal heat, scrub brush, and parched earth seems to be a place that holds mysteries that continue to elude us, and perhaps always will.
Moving along, sprawled out across a vast expanse of remote wilderness in Russia, just about 600 miles east of Moscow, are the Perm region and the Sverdlovsk regions, and here buried within this sea of trees is a 45 square kilometer area of densely forested land near where the Sylva and Molyobka rivers and merge and not far from the village of Molyobka, that has long been a place full of strangeness and wonder, and which has come to be called the Triangle Molebsky, the Perm Anomalous Zone, or simply the M-zone, and has become a hotspot for all manner of high strangeness.
The native Mansi people once considered this a very sacred place, and long regarded it as a realm of spirits and gods, and locals and visitors alike have over the centuries reported a wide variety of strange phenomena from here such as mysterious lights in the sky, luminous translucent beings that stalk through the woods, dark figures, strange colored lightning, weather anomalies, and the sounds of disembodied voices or singing. Compasses won’t work here, and electrical equipment is prone to stop working as well; cell phones go dead, and witnesses have even talked of how watches will sometimes begin to spin backwards in the zone.
There are also numerous physical effects experienced by those who come here, both positive and negative. It is not uncommon at all for people in the zone to be beset with fierce headaches, nosebleeds, nausea, dizziness, and muscle pain. They are also prone to visual and aural hallucinations and powerful, inexplicable mood swings. There are also conversely more favorable effects. For instance, it is thought that the area has healing abilities, and there are countless tales of people claiming to have been cured of all manner of ailments here, and even healthy people report feeling enhanced and improved somehow, gaining youthful vigor and emerging with increased intelligence. They also supposedly feel spiritually cleansed, with Russian UFOlogist Valery Yakimov saying of this:

“Healthy people feel the general improvement in all spheres: physical, mental, spiritual, moral, etc. It is necessary to mention the ” moral effects ” of M-zone: the drawbacks of one’s character seem to disappear here, the good intentions and high feelings come to life. One’s soul becomes cleaner, higher and calmer. You can almost feel yourself becoming a better man. Also the “creative effect” of M-zone is quite noticeable: the abilities of people are sharpening there and sometimes new talents and capacities, unknown before, begin to realize themselves.”

There are supposedly some spectacular cases of this in effect, such as the alleged case of the journalist and cosmonaut Pavel Mukhortov, who had apparently once been a military dropout who had been forced to turn to journalism because of physical disabilities. He then decided to make a trip to the M-Zone to investigate its many odd tales for a possible story, making his way to the remote area with a group of others on an expedition. While in the region, Mukhortov would claim that although he and his crew had fallen mysteriously ill at first, they were then overcome with an intense sense of well-being, and found their heads filled with visions, emotions, and knowledge forced into them that they could not explain. In Mukhortov’s case, he claimed that the knowledge he gleaned from that mystical place allowed him to recover shortly after from his disabilities and pass the tests to enter the Soviet Space Program as a cosmonaut, and he would go on to largely credit his success with the mysterious effects and powers the Perm Anomalous Zone had bestowed upon him.

By far one of the most well-known of the many phenomena of the Perm Anomalous Zone is the unusually high concentration of UFO sightings here, and indeed, it is considered by many to be one of the biggest UFO hotspots in the country. One of the most famous UFO-related incidents in the region supposedly happened in 1983, when Russian UFOlogist Emil Bachurin claimed to have seen a purple ball of light rise out of the thick forest to leave behind a patch of melted snow and ice measuring 206 feet across. Bachurin would also claim that he and his expedition had been chased by orbs of light through the trees that had burnt them with some sort of rays, with one of the team even completely knocked unconscious by one of the lights.
Even more intriguing still is a case from 2005, when an expedition of UFOlogists from Yekaterinburg was in the zone and purportedly spotted a giant glowing ball above the trees. One of the expedition members would mysteriously go missing the following morning, and rather chillingly, a picture purportedly snapped of the UFO allegedly shows a beam of light extending from the object to the missing man. What is going on here? The strange phenomena from the M-Zone are such that it has even managed to capture quite a lot of interest from outside of Russia. The American TV show Sightings did an investigation of the area, and apparently, things got off to an odd start when the Russian government warned them that to stay any longer than 24 hours in the zone was very dangerous. So far, so strange, but when they began their investigation, it would all get even weirder still when their camp was apparently surrounded by encircling orbs of light. The locals of the area were also interviewed by the crew, and they confirmed that UFO sightings were a regular, almost mundane fact of life for them.
With such a remote, strange part of the world hidden out away in this wild and rugged exotic land, it is interesting to think about what could be behind all of these stories. How can we explain all of these disparate phenomena coming from this one patch of wilderness? Of course, other than the obvious theories that UFOs are drawn here for some reason, there are also other attempts to try and rationalize it. Considering that electromagnetic readings within the zone are amazingly high in some places, it is thought that this could be having some kind of physical effects, including hallucinations of perceived UFOs. Connected to this is the idea that it could be the result of infrasound, which is subaudible sounds that have been shown to have a wide range of physical and psychological effects on human beings. So are we dealing with UFOs and powers beyond our comprehension or mundane phenomena that can be explained? It doesn’t seem settled yet, and it would seem the only way to find out for yourself is to get out there and check it out.

Finally, we come to the United States, to the state of Florida. There was a time when Florida was nothing more than untamed wilderness ruled by the proud Native peoples of the area, yet by the 1860s and 70s, the region was steadily built up and settled by Europeans en masse. The Natives of the area would go on to be displaced, sent to reservations, or killed in fighting such as the Seminole Wars, and the pristine area witnessed a surge of settlers looking to make a life out of this new, uncharted land, along with numerous railroads and roads that penetrated and crisscrossed the wilds. People poured into the region at the time, and cities and towns began to pop up all over the place, transforming the landscape in the process.
One of the first of these settlers was a businessman named Henry Sanford, who in 1877 bought up land just north of present-day Orlando along the St. Johns River, for the purpose of creating a Catholic farming community called St. Joseph’s. It was more of a get-rich-quick scheme than anything religious as far as Hawkins was concerned, and he sat back waiting for suckers to come rolling in. Things would not go according to plan, and instead of the vast profits Sanford had imagined making on the land, he only ended up selling a few plots, and not long after, the settlement experienced a devastating fire and an epidemic of Yellow Fever that swept out from the mosquito-choked swamps. The disease was catastrophic for St. Joseph’s, with quite a few who died simply being buried out in the woods or on their property, and by 1887, the settlement was all but a ghost town.
Sanford would go on to found the bustling nearby town of Sanford, Florida, and the area would later make a comeback at the turn of the century, while the site of St. Joseph’s would become absorbed by a township called Lake Monroe, but this dark history remained there to haunt it, perhaps literally. In 1905, a settler named Albert Hawkins bought up some land on which a family of Dutch immigrants had once lived before becoming victims of the Yellow Fever epidemic that had helped to wipe out the original St. Joseph’s colony. He figured out the grim secret buried on his rural land quite by accident, stumbling upon the weed infested unnamed graves as he explored the area one day, but he was respectful and decided not to have the bodies moved, rather maintaining the plot and their decrepit unmarked wooden crosses like a miniature cemetery, complete with a fence around it, and telling people to stay away from it. However, it would soon appear as though these mysterious graves held some sort of dark power that infused them.
Neighbors sometimes complained to Hawkins that they could see mysterious lights roaming about at night in the vicinity of the graves, and that all manner of ghostly phenomena, such as moving objects and strange noises, had been plaguing their homes. On top of this were some ominous claims that the graves were actually cursed, seeking grim revenge on those who would try and defile them. In one instance, a neighbor allegedly got tired of the graves being there and tore down the fence surrounding them, yet later that same day, this man’s house would supposedly be struck by lightning and razed to the ground. In another incident from the 1950s, a grandson of Hawkins himself was fooling around at the gravesite and kicked over one of the wooden crosses marking one of the graves. The very next day, he would be killed in an auto accident involving a hit and run, with the perpetrator never caught. Even Hawkins himself purportedly had his own house catch fire after he tried replacing the time-worn, rotted old wooden grave markers with new ones, prompting him to take it as a warning to leave them as they were.

All of these strange phenomena and deaths earned the area of that little cemetery the name “The Field of Death,” and locals became too terrified to go anywhere near it. Despite this, Florida’s popularity at the time, and the surging population and droves of tourists coming through, meant that more and more highways were being built in order to meet the demands of the rampant development going on. One of these was the proposed Interstate-4 (I-4), which was meant to connect Tampa and Daytona Beach, and which would cut right through the property on which those haunted graves rested. Hawkins had died in 1939, but he was survived by his widow, and there was not much that she could do at the time because she had sold the land, and it had become eminent domain. However, she did inform the state of the secluded little cemetery and suggested that they move the graves before construction began.
The officials supposedly promised that they would have the bodies moved and interred at a proper cemetery, but this apparently never happened, and when construction commenced in 1960, the highway just ended up going up right over the graves and their forgotten remains. This would seem to have been a bad idea, because almost immediately, there was tragedy that befell the project in the form of the catastrophic Hurricane Donna, which tore across Florida at that exact time and even eerily changed directions to follow the path of the proposed I-4. Also odd was that meteorologists had predicted that Donna was going to just pass by relatively harmlessly off the coast, yet it suddenly made a sharp turn right towards the state for no apparent reason, and even more eerily still, passed right over the construction site. Whether this was all merely a coincidence or not, it was one of the worst hurricanes the state has ever seen, and it stalled construction on the highway for months.
When the highway was eventually finished, it began to accrue a sinister reputation almost immediately, when a truck went wildly out of control and crashed right in the vicinity of the graves, claiming several lives on the very day I-4 opened to traffic in 1963. This would be merely the beginning of an ongoing phenomenon that has plagued the stretch of highway where the graves are said to be, which is right at the banks of the St. John’s River at the interstate bridge overpass, and has earned the ominous name “The Dead Zone.”
By far the most notorious of the many strange and quite frightening phenomena linked to this patch of road is the inordinately high concentration of traffic accidents that occur here. Depending on the source, there have been anywhere from 1,500 to over 2,000 traffic accidents in this one spot along a mere quarter mile stretch since the opening of the highway, with the Florida State Highway Department saying that there were 44 accidents over the course of 1995 and 1996 alone in this one place, and from 1999 to 2006 there were 440 accidents, many of them fatal. The rate of accidents at the Dead Zone of I-4 is so intense that many locals still absolutely refuse to drive over that area, instead going through great lengths to take roundabout routes around it. Officially, this is explained away as the unfortunate result of so much traffic through the area, but even considering this, the rate is quite high, and there are even reports of people claiming that it often seems as if something has actually taken control of their vehicle. is there something more supernatural going on here, and if there is, does it have anything to do with those graves? It is hard to say.

In addition to the uncommonly high rate of traffic accidents along the road are the frequent tornadoes that tear through, often seeming to follow the path of the I-4 as if attracted by it, as well as yet another strange hurricane, hurricane Charley, which eerily passed right over the cursed site in 2004 as if aiming for it. Researcher and author of the book Strange Florida, Charlie Carlson, has said of this particular hurricane:

“Charley followed almost the same route as Donna. They referred to Charley as the ‘I-4 Hurricane.’ Strangely enough, there was construction going on around the graves. The land where the graves are was being disturbed again. It was almost like a repeat of Donna.”

Besides harrowing car crashes and deadly tornadoes and hurricanes, the I-4 Dead Zone has gathered about itself all manner of other assorted paranormal phenomena and high strangeness. One very frequently reported oddity is that radios, cell phones, and CBs go dead and refuse to work over the site, or that there will be picked up ghostly disembodied voices or anomalous static on the devices. Commonly reported are the sounds of children’s laughter, or of voices that desperately ask “Who’s there?” or “Why?”, yet never responding if one is to try and talk with the entities. Some people have even reported hearing not voices, but rather an ominous growling or snarling echoing out from their radios as they drive through. Considering that the immediate area has no radio or cell phone antennas, nor any microwave emitters, it is hard to tell what could be causing these disturbances. Is there a rational explanation, or something far odder at work here? Who knows?
There are numerous other strange phenomena reported from the I-4 Dead Zone as well, including ghost lights, shadow people, roving cold spots, sudden thick fogs from nowhere, phantom hitchhikers, and ghostly vehicles. Add all of this to the death and tragedy that also seem to cling to it like flies to a corpse, and I-4 has gone on to be considered one of the strangest, most haunted places in the state. Is this just urban legend mixed with spooky history and superstition? Is it all overactive imaginations? Or could it be that this length of highway holds to it the specters of the dead, damned to remain tethered here and compelled to lash out at those who have desecrated their graves?
What is it about these places that makes them such magnets for all of these disparate, strange phenomena? What is it about these places that makes them so different and bizarre? Is there some quality permeating these places that makes them so special? Do they represent some thin spot between what we know and other, parallel realities? We may never know the answers, and these places remain out there, with many more like them, eluding our understanding and occupying some minimal zone between what we know and what we don’t. 

Bizarre Zones of High Strangeness Read More »