memoment editorial

aixcc afc podium atlanta wins

AI Cyber Challenge marks pivotal inflection point for cyber defense

A cyber reasoning system (CRS) designed by Team Atlanta is the winner of the DARPA AI Cyber Challenge (AIxCC), a two-year, first-of-its-kind competition in collaboration with the Advanced Research Projects Agency for Health (ARPA-H) and frontier labs. Competitors successfully demonstrated the ability of novel autonomous systems using AI to secure the open-source software that underlies critical infrastructure.Numerous attacks in recent years have illuminated the ability for malicious cyber actors to exploit vulnerable software that runs everything from financial systems and public utilities to the health care ecosystem.“AIxCC exemplifies what DARPA is all about: rigorous, innovative, high-risk and high-reward programs that push the boundaries of technology. By releasing the cyber reasoning systems open source — four of the seven today — we are immediately making these tools available for cyber defenders,” said DARPA Director Stephen Winchell. “Finding vulnerabilities and patching codebases using current methods is slow, expensive, and depends on a limited workforce – especially as adversaries use AI to amplify their exploits. AIxCC-developed technology will give defenders a much-needed edge in identifying and patching vulnerabilities at speed and scale.”To further accelerate adoption, DARPA and ARPA-H are adding $1.4 million in prizes for the competing teams to integrate AIxCC technology into real-world critical infrastructure- relevant software.“The success of today’s AIxCC finalists demonstrates the real-world potential of AI to address vulnerabilities in our health care system,” said ARPA-H Acting Director Jason Roos. “ARPA-H is committed to supporting these teams to transition their technologies and make a meaningful impact in health care security and patient safety.”Team Atlanta comprises experts from Georgia Tech, Samsung Research, the Korea Advanced Institute of Science & Technology (KAIST), and the Pohang University of Science and Technology (POSTECH).Trail of Bits, a New York City-based small business, won second place, and Theori, comprising AI researchers and security professionals in the U.S. and South Korea, won third place.The top three teams will receive $4 million, $3 million, and $1.5 million, respectively, for their performance in the Final Competition.All seven competing teams, including teams all_you_need_is_a_fuzzing_brain, Shellphish, 42-beyond-bug and Lacrosse, worked on aggressively tight timelines to design automated systems that significantly advance cybersecurity research.Deep Dive: Final Competition Findings, Highlights In the Final Competition scored round, teams’ systems attempted to identify and generate patches for synthetic vulnerabilities across 54 million lines of code. Since the competition was based on real-world software, team CRSs could discover vulnerabilities not intentionally introduced to the competition. The scoring algorithm prioritized competitors’ performance based on the ability to create patches for vulnerabilities quickly and their analysis of bug reports. The winning team performed best at finding and proving vulnerabilities, generating patches, pairing vulnerabilities and patches, and scoring with the highest rate of accurate and quality submissions.In total, competitors’ systems discovered 54 unique synthetic vulnerabilities in the Final Competition’s 70 challenges. Of those, they patched 43.In the Final Competition, teams also discovered 18 real, non-synthetic vulnerabilities that are being responsibly disclosed to open source project maintainers. Of these, six were in C codebases—including one vulnerability that was discovered and patched in parallel by maintainers—and 12 were in Java codebases. Teams also provided 11 patches for real, non-synthetic vulnerabilities.“Since the launch of AIxCC, community members have moved from AI skeptics to advocates and adopters. Quality patching is a crucial accomplishment that demonstrates the value of combining AI with other cyber defense techniques,” said AIxCC Program Manager Andrew Carney. “What’s more, we see evidence that the process of a cyber reasoning system finding a vulnerability may empower patch development in situations where other code synthesis techniques struggle.”Competitor CRSs proved they can create valuable bug reports and patches for a fraction of the cost of traditional methods, with an average cost per competition task of about $152. Bug bounties can range from hundreds to hundreds of thousands of dollars.AIxCC technology has advanced significantly from the Semifinal Competition held in August 2024. In the Final Competition scored round, teams identified 77% of the competition’s synthetic vulnerabilities, an increase from 37% at semifinals, and patched 61% of the vulnerabilities identified, an increase from 25% at semifinals. In semifinals, teams were most successful in finding and patching vulnerabilities in C codebases. In finals, teams had similar success rates at finding and patching vulnerabilities across C codebases and Java codebases.Other key competition highlights include:Teams submitted patches in an average of 45 minutesEvery team identified a real-world vulnerabilityFour teams generated patches that were one line longThree teams scored on three different challenge tasks in a one-minute spanOne team scored for a patch that was greater than 300 lines longCompetitors’ CRSs analyzed more than 45 million lines of codeTeams spent about $152 per competition task AIxCC is a collaboration between the public sector and leading AI companies. Anthropic, Google, and OpenAI provided technical support and each donated $350,000 in large language model credits – $50,000 to each team – to support CRS development for the Final Competition, in addition to $5,000 in large language model credits that Anthropic, Google, and OpenAI provided and Azure credits that Microsoft provided to each team for the Semifinal Competition. Microsoft and the Linux Foundation’s Open Source Security Foundation provided subject matter expertise to challenge organizers and participants throughout the competition.Next StepsAll seven finalist teams’ CRSs will be made available as open-source software under a license approved by the Open Source Initiative. Four teams made their CRSs available Friday; others will be released in the coming weeks. Other competition data, to include competition framework, competition challenges, competition telemetry, and other tools and data will also be open sourced in the coming weeks to help advance the technology’s use and allow others to experiment and improve on AIxCC-developed technology.DARPA is working with public and private sector partners, including the teams, to transition the technology to widespread use.Anyone who maintains or develops software in critical infrastructure and wants to integrate AIxCC technology into the software development process is encouraged to contact aixcc-at-darpa-dot-mil.To learn more about AIxCC, visit www.aicyberchallenge.com.

AI Cyber Challenge marks pivotal inflection point for cyber defense Read More »

1 how to tell if your samsung galaxy tablet has been hacked

How to tell if your Samsung Galaxy tablet has been hacked

NEWYou can now listen to Fox News articles!
Tablets aren’t just for streaming and strolling anymore. For many people, they serve as a digital wallet, photo album, document hub and even a mobile office. That’s especially true for Samsung Galaxy tablets, which offer powerful features and device sync capabilities that make them incredibly convenient and, unfortunately, a tempting target for criminals.Unlike traditional computer hacks, compromising a tablet doesn’t always require elite technical skills. Sometimes, all it takes is a convincing phishing message, a shady app download or a moment of distraction in public. Once someone has access, your stored passwords, banking apps and private files could be up for grabs.If your Galaxy tablet is acting strange or showing signs of compromise, don’t ignore it. Here’s how to spot the warning signs and what to do next.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE Samsung Galaxy Tablet on a table   (Kurt “CyberGuy” Knutsson)Why Samsung Galaxy tablets get targeted by hackersSamsung Galaxy tablets are capable of storing everything from passwords and payment methods to sensitive documents. They can even act as authentication devices for logging into other accounts. That makes them valuable, not just to you, but to hackers looking for a way in. Unlike Apple devices, Galaxy tablets run on Android, which is known for its flexibility and open-source ecosystem. While this gives users more freedom, it also opens the door to greater risk. Third-party apps, less strict app store screening and inconsistent update habits across devices can leave Galaxy tablets exposed to malware and data theft. In short, the more essential your tablet becomes in your daily life, the more attractive it becomes to cybercriminals.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Common ways Galaxy tablets get compromisedHackers don’t always need complex software or advanced skills to gain access to your tablet. In many cases, they rely on user behavior and weak security settings. Here are some of the most common entry points:Malicious app downloads: Downloading apps from third-party stores or even from the Google Play Store without checking reviews or permissions can introduce malware, spyware or adware onto your device.Phishing links and fake websites: Tapping a link in a sketchy email or message can direct you to a fake login page or trigger a silent download. Just one click can compromise your credentials or install spyware.Public Wi-Fi traps: Using unsecured public Wi-Fi can expose your data to anyone else on the network. In some cases, hackers even set up fake hot spots to intercept your information.Outdated software: Skipping system or app updates might feel harmless, but updates often patch critical security flaws. Delaying them gives hackers more time to exploit known vulnerabilities.Lost or unattended devices: Leaving your tablet unlocked in public or misplacing it without tracking enabled makes it easy for someone to gain access with no hacking required. Samsung logo on a Galaxy tablet  (Kurt “CyberGuy” Knutsson)Signs your Samsung Galaxy tablet may be hackedIt’s not always obvious when something’s wrong. A hacked tablet won’t flash a red alert, but it will start acting in ways that just don’t feel normal. Small changes in performance or behavior can be early signs that something’s off. If you notice one or more of the following issues, it’s worth taking a closer look:Rapid battery drain or unexplained overheating: Malware running in the background can quietly eat up your system resources, causing your battery to deplete quickly or your device to feel hot, even when you’re not actively using it.Strange apps suddenly appear: If you notice unfamiliar apps you didn’t download, it could be a sign that someone else installed them either manually or through malware. Avoid opening them and investigate right away.Pop-ups, ads or odd redirects: An increase in aggressive pop-ups, full-screen ads or random redirects in your browser may indicate adware or other intrusive software hiding in your system.Your tablet crashes, freezes or restarts randomly: Frequent glitches or restarts can point to deeper issues with your operating system, especially if they started happening suddenly. Malicious apps or corrupted files could be behind the instability.Spikes in data usage: If your tablet starts consuming way more data than usual, even when idle, it might be sending information to a third party in the background.Suspicious activity on your accounts: If you notice password reset emails, login alerts from unknown locations,or new devices linked to your accounts, your tablet might be the weak link someone used to gain access.Unexpected calls, messages or charges: Receiving strange texts or calls, or seeing unfamiliar charges from apps or services, can be signs that someone has gained remote access and is abusing your device or its linked payment methods. Man using Samsung Galaxy tablet  (Kurt “CyberGuy” Knutsson)How to secure your Samsung Galaxy tablet after a hackIf your tablet is acting strange, or you’ve spotted signs of compromise, don’t wait it out. Taking action quickly can help stop further damage and keep your personal data safe. Here’s what to do:1. Use Safe Mode to spot suspicious apps on your Samsung Galaxy tablet Safe Mode is a helpful troubleshooting tool that disables all third-party apps, allowing you to determine if an issue is caused by a downloaded app. If problems disappear in Safe Mode, a third-party app is likely to be the cause.Enable Safe Mode while your tablet is turned off:Power off the tablet completely.Turn it on, and when the Samsung logo appears, press and hold the Volume Down button.If done correctly, “Safe mode” will appear in the bottom left corner. If not, repeat the steps.Enable Safe Mode from the power menu (when the tablet is on):Press and hold the Power button and Volume Down button at the same time, or swipe down from the top right of the screen and tap the Power icon.Touch and hold the “Power off” icon until the “Safe mode” icon appears.Tap the “Safe mode” icon to restart in Safe Mode.To exit Safe Mode, restart your tablet normally or swipe down to access the Safe Mode notification and tap “Turn off.”2. Uninstall apps you don’t recognize from your Samsung Galaxy tablet Review your installed apps and remove anything unfamiliar or suspicious. Pay extra attention to apps without clear names or icons that resemble system tools but weren’t preloaded.Steps to uninstall unknown apps from a Samsung Galaxy Tablet:Unlock your tablet and go to the Home screen.Swipe up from the bottom of the screen (or tap Apps) to open the App Drawer.Scroll through the list of apps and look for any app you don’t recognize.Tap and hold the suspicious or unfamiliar app icon.In the pop-up menu, tap Uninstall.A confirmation message will appear; tap OK to confirm.If “uninstall” isn’t an option:Some system or preinstalled apps can’t be fully removed but can be disabled:Go to Settings Tap Apps.Scroll through the list and tap the app you want to remove or disable.Tap Uninstall or, if that’s unavailable, tap Disable.Confirm when prompted.3. Avoid clicking pop-ups or suspicious ads and use strong antivirus softwarePop-ups and in-app ads can trick you into tapping fake links or downloading harmful files. Even if they look trustworthy, avoid clicking on them on your Samsung Galaxy tablet. Frequent pop-ups may signal hidden adware or an app behaving badly. To protect your device, install strong antivirus software with real-time protection. A trusted security app can scan for malware, block unsafe websites and detect suspicious apps running in the background. It also helps remove hidden threats like spyware and keeps your tablet secure and running smoothly. Taking these steps boosts your privacy and gives you peace of mind while browsing or using apps.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech 4. Check for strange texts, calls or settings changesLook through your messages and call logs for anything you didn’t initiate. Also, check for unusual permission changes, especially for apps that access your location, contacts, camera or microphone.5. Monitor battery and data usageCheck for unusual battery or data consumption, which can indicate malicious or misbehaving apps.Go to Settings > Device Care > Battery.Review which apps are consuming the most power and data.If rarely used apps are draining resources, they may be running in the background without your knowledge.6. Enable built-in Samsung security toolsUse Samsung’s built-in tools for stronger protection. If your tablet runs One UI 6.0 (Android 14) or later:Turn on Auto Blocker: Go to Settings > Security and privacy > Auto Blocker.Enable Secure Folder: Create a secure, encrypted space for sensitive apps and files.Set up biometric authentication: Use fingerprint or facial recognition to lock down your device. GET FOX BUSINESS ON THE GO BY CLICKING HERE7. Change your passwords immediatelyStart with your Samsung account, email and bank logins, especially if you used them on your tablet. Consider using a password manager to generate and store strong passwords.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords8. Consider using a VPN going forwardA VPN encrypts your connection and protects your data when you’re on public Wi-Fi. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com/VPN9. Update your operating system and appsHackers often exploit outdated software. Go to Settings > Software update > Download and install to check for the latest updates. Also, open the Galaxy Store and Google Play Store, tap your profile, and update all apps. Updates often include security patches that close known vulnerabilities. 10. Check Google and Samsung account activitySee if any unknown devices or sessions are logged into your account:Google Account: Visit myaccount.google.com/securitySamsung Account: Go to Settings > Security and privacy > Samsung Account > DevicesRemove any devices you don’t recognize and change your account passwords.11. Turn off app installation from unknown sourcesMake sure only trusted sources can install apps:Go to Settings > Security and privacy > Install unknown appsDisable permission for anything other than the Galaxy Store or Play Store12. Scan device with Google’s built-in Play ProtectEven with a strong third-party antivirus, it’s smart to run Google’s native security check:Open the Google Play StoreTap your profile icon > Play Protect  > Scan13. Alert your contacts if neededIf you suspect your device was used to send scam messages, let your contacts know. This can prevent further phishing attacks from spreading from your hacked account.14. Check accessibility and device admin permissionsMalware sometimes hides in accessibility settings:Go to Settings > Accessibility > Installed appsDisable anything suspiciousAlso, go to Settings > Security and privacy > Device admin apps and revoke access to anything you don’t trust.15. Factory reset as a last resortIf the problems persist, and you can’t identify the source, back up your data and perform a factory reset.Back up your dataBefore resetting, make sure your important files are saved. A factory reset will erase everything.Go to Settings.Tap Accounts and backup.Under Samsung Cloud or Google Drive, choose Backup data.Follow the prompts to back up your photos, apps, messages, and other content.You can also connect to a computer and copy files manually if you prefer.Perform a factory resetOpen Settings.Scroll down and tap General Management.Tap Reset.Select Factory data reset.Review what will be erased, then tap Reset at the bottom.Enter your PIN, password, or pattern if prompted.Tap Delete all to confirm.Your tablet will restart and begin the reset process. This may take several minutes. After the reset, you’ll need to sign in with your Google account to complete the setup. This is part of Factory Reset Protection (FRP) to prevent unauthorized access.16. Use a personal data removal serviceHackers often scrape personal details from public data broker sites. Even if you secure your tablet, your name, email, phone number and home address may still be circulating online, making you a target for future scams, identity theft or phishing attempts. A personal data removal service scans these broker sites and submits removal requests on your behalf. It’s a helpful way to reduce your digital footprint and stop criminals from exploiting your exposed information.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScanCLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysIf your Samsung Galaxy tablet is running hot, glitching or showing apps you don’t recognize, it might not be a fluke. These are often early signs of malware or a security breach. Hackers don’t always need advanced tools to get in. A single bad link or outdated setting can expose your personal data. Take action right away by removing suspicious apps, checking your settings and running a trusted antivirus scan. Using Safe Mode can help pinpoint the problem, and Samsung’s built-in security tools offer extra protection moving forward. For even more security, consider adding a VPN and password manager to your daily routine. If nothing else works, back up your data and perform a factory reset to start fresh and protect your information.Have you ever had your tablet hacked or noticed something suspicious on your device? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

How to tell if your Samsung Galaxy tablet has been hacked Read More »

1 ai companions replace real friends for many teens

AI companions replace real friends for many teens

NEWYou can now listen to Fox News articles!
Artificial intelligence is no longer just a tool for homework or simple tasks. Today, many teens use AI-powered companions for emotional support, advice and even simulated relationships. These apps simulate conversation in ways that feel deeply personal and, for some teens, deeply real.Recent survey data shows that nearly three-quarters of teens aged 13 to 17 have tried a digital companion at least once, and more than half continue to use them regularly. About one in eight say they use these tools daily, often to talk about personal challenges, vent feelings or practice social interaction.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERWOULD YOU DATE YOUR PET? 1 IN 3 SAY YES TO AI VERSION A man using ChatGPT on his laptop 

AI companions replace real friends for many teens Read More »

google ai tools 2025 fox news 001

Forget SEO: How to get found by AI tools in 2025

NEWYou can now listen to Fox News articles!
Three years ago, I said Google was going the way of the dial-up modem. People called me crazy with a capital K. Well, I was spot on.  We don’t use the web the same way anymore. We’re giving away a new iPhone. No purchase required. Enter now!Look at the numbers. ChatGPT now has over 180 million users and powers more than 800 million sessions each week. Google’s own AI Overviews appear in over 60% of search results. One Pew study found that when those AI blurbs show up, only 8% of people bother to click through to a website. Ouch.SEO is dead.IF YOU DON’T KNOW ABOUT THESE VIDEO TOOLS, YOU’RE ALREADY BEHINDIf you’re still focused on keywords, backlinks, and trying to land on page one of Google, you’re playing last year’s game. You now need to make sure AI tools like ChatGPT, Perplexity, Claude, and Gemini find you when someone asks a question.You need to know about GEO (Generative Engine Optimization) and AIO (Artificial Intelligence Optimization). Traditional SEO is dead – here’s how to rise from the ashes. (Serene Lee/SOPA Images/LightRocket via Getty Images)Get found by AIAI tools are trained on huge datasets: Reddit threads, Wikipedia entries, product reviews, how-to guides, forums, FAQs and even customer service transcripts. To get found in AI answers, you need to think less like a blogger and more like a helpful expert. Here’s how:Answer real questions, directly. Get specific. Think “What’s the best dog food for older pugs with allergies?” instead of “Top 10 pet nutrition trends.”Use structured formatting. Bullet points, FAQs, tables, and comparison charts are AI gold. They’re easy to scrape, summarize, and quote.Flex your expertise. Mention credentials, years of experience, client testimonials. AI systems weigh trusted sources higher.Be where the people are. Conversations on Reddit, Quora, and Facebook groups matter. When someone mentions your product or service in those places, AI notices.Test it. Ask ChatGPT or Perplexity to recommend something in your space. Are you part of the answer? If not, it’s time for a rewrite.MIKE ROWE ANALYZES THE THREAT OF AI FOR NEW COLLEGE GRADS ChatGPT can be a valuable tool to see if you’re getting left behind by the SEO revolution. (Jaap Arriens/NurPhoto via Getty Images)Geeky stuff matters tooLet’s use this article as an example of how you’d post it on your site.1. Your meta title should be short, sharp, and targeted. Under 60 characters. Something like: “Forget SEO: How to Get Found by AI Tools in 2025″2. Add a clear, benefit-driven description, under 160 characters, like: “SEO is dead. Learn how to optimize your content for ChatGPT, Perplexity, and Gemini to stay visible in the AI era.”3. Don’t forget schema markup. Yes, Google still reads it, and so do other AI crawlers. It’s behind-the-scenes code that tells machines, “This is an article,” “This is a product review,” or “Here’s a list of FAQs.” Need help? Just ask ChatGPT, “Can you generate a FAQ schema for my blog post?” and you’ll get copy-paste code in seconds.  Perplexity is another easy-to-use AI model that can help you with SEO. (Photo Illustration by Pavlo Gonchar/SOPA Images/LightRocket via Getty Images)It’s AI or die time There’s no more gaming Google. No more squeezing 400 variations of the same keyword into a blog post. If your business, blog, or store isn’t showing up in AI results, it’s invisible.Now, if you found this helpful, send it to a friend. Let’s help each other stay ten steps ahead of the tech curve. CLICK HERE TO GET THE FOX NEWS APPGet tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio: Airing on 500+ stations across the US – Find yours or get the free podcast.Daily newsletter: Join 650,000 people who read the Current (free!)Watch: On Kim’s YouTube channelCopyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Forget SEO: How to get found by AI tools in 2025 Read More »

70702

Forging Minds for Future Wars

In a time of rapid change and global danger, how should the warriors of the future be educated? Ryan sat down with Vice Adm. Peter Garvin, president of the National Defense University, to tackle this question — one that cuts to the core of American military power. Garvin offers a frank assessment of how professional military education needs to evolve to prepare leaders for a world defined by great-power rivalry, disruptive technologies (including and especially AI), and dynamic battlefields. 

Forging Minds for Future Wars Read More »

1 off grid cabin design required a helicopter installation

Off-grid cabin design required a helicopter installation

NEWYou can now listen to Fox News articles!
Perched on the highest point of British Columbia’s Keats Island is The Nest, a stunning off-grid retreat that balances sustainability with bold architecture. Designed by Vancouver-based Daria Sheina Studio, this prefabricated cabin feels like a modern sculpture dropped in the middle of a moss-covered forest. But don’t let its sleek lines fool you. This structure runs entirely off the grid and was installed in just two days after arriving by truck, barge and helicopter.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER SUSTAINABLE 3D-PRINTED HOME BUILT PRIMARILY FROM SOIL The Nest by Daria Sheina Studio  (Andrew Latreille)How an early sketch inspired The Nest’s iconic designDuring early design discussions, Daria Sheina skimmed past a rough sketch of two rotated cuboid volumes, thinking it wasn’t fully developed. But her clients, Sean Sikorski and Chadd Andre, immediately paused on it, drawn to its bold simplicity. Their reaction sparked what would become the defining form of The Nest — two interlocked geometric shapes, rotated and stacked like modern building blocks carved out of wood.Off-grid design tailored for Keats Island’s rugged terrainThe Nest was carefully designed for the rugged terrain of Keats Island. With no road access, every construction decision had to account for tricky logistics. In collaboration with BC Passive House, the components were prefabricated to exact weights and dimensions. Once on site, a helicopter airlifted them to the build location like a life-sized puzzle coming together midair. Inside, the three-story structure opens up with a minimalist design. Exposed wood, green Marmoleum floors and large sliding doors keep the space connected to nature. The cabin includes an open-concept first floor with a living area, kitchen and bathroom, while the upper levels house cozy bedrooms.  The Nest by Daria Sheina Studio (Andrew Latreille)Powered by the sun, shaped by its surroundingsEverything about The Nest speaks to sustainable living. Solar panels power the home. A rainwater collection and filtration system supplies drinking water. There’s even an incinerating toilet to handle waste. Its foundation minimizes environmental impact by reducing the need for concrete, and its Western red cedar exterior will age naturally into the forest surroundings.GET FOX BUSINESS ON THE GO BY CLICKING HERE The Nest by Daria Sheina Studio  (Andrew Latreille)Why The Nest off-grid retreat lives up to its nameThe name The Nest was chosen for the sense of shelter, intimacy and belonging it conveys, themes that guided both the architecture and the experience. Rather than a sprawling footprint, the design centers around circular movement, thoughtful flow and a deep connection to place. Inside, expansive glass frames moss-covered trees and sweeping views of Howe Sound, creating the feeling that the entire island is yours. The Nest by Daria Sheina Studio  (Andrew Latreille)What this means for youWhether you dream of an off-grid lifestyle or just love good design, The Nest shows what’s possible when creativity meets eco-conscious building. It’s not just about remote living. It’s about living better with less footprint and more intention. Prefabrication, smart logistics and sustainable systems make this model repeatable in other locations.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThe Nest proves that off-grid doesn’t mean off-limits when it comes to comfort, beauty or sustainability. With a compact footprint and low environmental impact, this cabin offers a luxury escape without leaving a heavy mark. It’s a case study in how thoughtful design can rise to meet even the wildest of settings.Would you trade modern convenience for complete privacy and connection to nature?  Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Off-grid cabin design required a helicopter installation Read More »

1 the 12k ev that could change everything

$12K EV that could change everything

NEWYou can now listen to Fox News articles!
Electric vehicles often grab headlines for innovation, but they rarely get credit for affordability. That’s where Chinese automaker BYD is flipping the script. The company introduced the Atto 1 at the Gaikindo Indonesia International Auto Show, and it’s turning heads for all the right reasons. Priced at around $12,000, this fully electric hatchback offers modern features, urban-ready performance, and a price tag that could finally bring EVs to the masses.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.THIS EV HAS A FACE, AND IT TALKS BACK WITH AI Exterior of Atto 1  (BYD)Atto 1’s features and affordable EV performanceThe Atto 1 may fall into the budget category, but it delivers solid specs for city driving. It produces 55 kilowatts, or about 75 horsepower, along with 100 pound-feet of torque. Its top speed is 80 miles per hour, and it accelerates from zero to 30 miles per hour in just under five seconds. These numbers won’t blow anyone away at the track, but they hit the sweet spot for daily use.The standard version comes with a 30.08-kilowatt-hour Blade battery, which gives the car a range of up to 186 miles under the NEDC testing cycle. Drivers looking for a bit more distance can opt for the long-range model. That version features a 38.88-kilowatt-hour battery and extends the range to about 236 miles. Even with the larger battery, the car remains affordable at roughly $14,500.Charging the Atto 1 is straightforward. It supports AC charging at speeds up to 6.6 kilowatts. It also accepts DC fast charging, with the base model charging at 30 kilowatts and the extended-range version charging at 40 kilowatts. Each version includes a vehicle-to-load system, so you can power small devices using the car’s battery if needed. Exterior of Atto 1  (BYD)Inside the Atto 1: Compact electric car with smart comfortDespite its price, the Atto 1 delivers more than the bare essentials. It comes equipped with a 7-inch digital instrument cluster and a 10.1-inch touchscreen infotainment system. You’ll also get wireless Apple CarPlay, Android Auto, Bluetooth phone-as-key functionality, and automatic LED headlights. Keyless entry, start, and NFC digital key compatibility add to the convenience, while single-zone air conditioning and four built-in speakers round out the cabin experience.GET FOX BUSINESS ON THE GO BY CLICKING HEREIf you upgrade to the long-range version, you’ll notice a few more touches that make daily driving feel smoother. It features a powered driver’s seat, wireless charging for your phone, and a steering wheel that adjusts for both height and reach. Even small conveniences, like a one-touch power window with pinch protection, make it feel like a more premium vehicle.In terms of size, the Atto 1 measures just under 156 inches long and about 68 inches wide. That makes it slightly larger than the Mitsubishi Mirage but still smaller than a Toyota Yaris. Unlike either of those gas-powered models, the Atto 1 is fully electric and built with clean transportation in mind. Exterior of Atto 1 (BYD)Why BYD’s Atto 1 EV launch is perfectly timed for global buyersThe Atto 1’s release comes as major automakers begin ramping up their own EV efforts in Asia. Toyota, which controls roughly 30 percent of the Indonesian car market, has already announced plans to begin producing electric vehicles in the country by the end of 2025. BYD’s decision to launch an affordable EV now reflects a different strategy, offering a real, driveable solution that doesn’t force buyers to wait years or spend a fortune.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?For people around the world, access to a private vehicle means independence. Many of those people also want to transition away from internal combustion engines, but cost remains a major barrier. That’s where the Atto 1 could make a global impact. It provides a realistic way for people to go electric without breaking their budget or sacrificing comfort. Interior of Atto 1  (BYD)What this means for youIf a car like the Atto 1 enters the U.S. market, it could change the game for everyday drivers. First time buyers, students, and city dwellers looking for a compact, clean, and connected ride might finally have an option that fits both their lifestyle and their wallet. The Atto 1 may not drive itself or hit 200 miles per hour, but it’s designed to handle real-world needs with style and reliability. Exterior of Atto 1  (BYD)Kurt’s key takeawaysElectric cars won’t truly change the world unless they become accessible. That means more than just flashy features or long ranges. It means building EVs that people can actually afford and use every day. BYD’s Atto 1 might not dominate the luxury market, but it hits a far more important target, putting electric vehicles within reach for more people, in more places, right now.CLICK HERE TO GET THE FOX NEWS APPIf you could buy a fully electric car with real tech and solid range for under $13,000, would you take the leap? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.  

$12K EV that could change everything Read More »

1 qr code scams rise as 73 of americans scan without checking scan qr code payment

QR code scams rise as 73% of Americans scan without checking

NEWYou can now listen to Fox News articles!
By now, many of us have used QR codes as a way to quickly access menus, check into places, and make payments. But now, these convenient and contactless methods have become an easy target for cybercriminals. There has been a recent surge in “quishing” attacks, which are a form of phishing that uses QR codes instead of traditional methods like emails, text messages, and phone calls.Quishing is proving effective, too, with millions of people unknowingly opening malicious websites. In fact, 73% of Americans admit to scanning QR codes without checking if the source is legitimate. As experts warn, this growing trend could put people’s personal information and money at risk.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.MULTIPLE US CANCER CENTERS HIT IN COORDINATED PHISHING BREACH Making a payment by scanning a QR code with a phone. (Kurt “CyberGuy” Knutsson)The rise of quishing is concerningNordVPN’s security researchers report that fake QR codes have tricked over 26 million people into visiting malicious websites. These codes hide in plain sight, too. In one case, they were stuck on top of payment portals, sending unsuspecting individuals to sites meant to steal their personal and financial data (e.g., passwords and credit card information). Some even installed malware on people’s phones.Even government agencies have taken notice. The FTC warned the public earlier this year that cybercriminals are now attaching harmful QR codes to packages and sending them to people. The New York City Department of Transportation issued warnings about fake QR codes appearing on parking meters of all places. Even Hawaii Electric chimed in, as they noticed scammers are using QR codes to steal payments.These tactics mirror the ATM skimmer scam, where criminals place keypads designed to log keystrokes over an ATM to steal card information. But with QR codes, this tampering is harder to spot and easier to implement. Scanning a QR code on a package with a phone. (Kurt “CyberGuy” Knutsson)QR codes are quickly becoming the biggest security riskThe original purpose of QR codes was to track auto parts, so making them secure wasn’t part of the plan. Their widespread use today has made them irresistible to scammers. Unlike traditional phishing methods, they make it easy for cybercriminals to hide their destination until scanned, removing an important layer of user scrutiny.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Hackers are leveraging this ambiguity to deploy Remote Access Trojans (RATs) and infiltrate personal devices, including military networks. More than 26% of malicious links now come via QR codes, according to KeepNet Labs, a cybersecurity company specializing in AI-driven phishing simulation and human risk management. Soon, quishing will outpace conventional phishing. Scanning a QR code on a package with a phone. (Kurt “CyberGuy” Knutsson)How to protect yourself from quishingIf you scan QR codes regularly, you might be panicking. But don’t be, since the same tricks for avoiding phishing scams can also work here.1) Verify the source before scanningPause and consider the origin of every QR code before you pull out your phone. Quishing thrives on people scanning codes found on public signage, restaurant tables, packages, or payment terminals without questioning their authenticity. Cybercriminals often cover genuine QR codes with malicious ones that redirect users to fake websites meant to steal personal and financial information. Always ask yourself: Do I trust this location or the person who provided this QR code? If in doubt, don’t scan.2) Use personal data removal servicesConsider using a reputable personal data removal service. These services routinely scan the web for your personal details (like addresses, phone numbers, and emails), removing them from public databases where cybercriminals might collect information to personalize their quishing lures.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.GET FOX BUSINESS ON THE GO BY CLICKING HERE3) Assess the physical QR codeInspect the QR code’s placement. Sophisticated scammers physically overlay fake QR codes on legitimate signs, especially on payment kiosks, parking meters, and package labels. If the QR code looks tampered with or is a sticker poorly placed over another code, avoid scanning it, as this is a common quishing tactic to redirect you to a malicious site. 4) Scrutinize the web link before proceedingAfter scanning any QR code, double-check the URL before clicking through. One of quishing’s dangers is that QR codes obscure their destination until scanned. If the web address looks suspicious, misspelled, unusually long, or filled with random characters, close the browser immediately. Never enter sensitive details like passwords or credit card information on a site you weren’t expecting to visit. 5) Use strong antivirus softwareInstall strong antivirus software across all your devices. Look for a solution that offers real-time protection, regularly updated threat databases, and built-in web protection. These tools can help detect malicious content hidden in QR codes and block dangerous websites that might automatically open after scanning. Since QR codes are increasingly used by cybercriminals to spread malware like Remote Access Trojans (RATs), having strong antivirus software in place is essential. To stay fully protected, make sure the software is set to update automatically and scan regularly.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices CyberGuy.com/LockUpYourTech.6) Enable two-factor authentication (2FA)Even if attackers capture your credentials via a fake QR code, two-factor authentication creates an extra barrier. Always activate 2FA on your accounts, especially for email, banking, and other sensitive services. It thwarts many of the most damaging results of phishing, including those initiated by QR code scans.7) Access websites directly instead of scanning QR codesWhenever possible, manually navigate to websites instead of using a QR code, especially for payments, reservations, or account access. Searching for an event, restaurant, or service online reduces the chance of being tricked by a malicious redirect or fraudulent site. 8) Update device operating systems and appsFrequently update your phone’s operating system and apps. Criminals often exploit software vulnerabilities, and manufacturers regularly issue security patches. Up-to-date devices are less susceptible to malware installed via malicious QR codes.9) Report suspicious activityIf you encounter what you believe to be a fraudulent QR code or fall victim to a quishing attempt, report it immediately to the organization involved and your local authorities or consumer protection agency. Your report helps others avoid similar attacks and keeps organizations alert to evolving scam tactics.By applying these steps, you make it significantly harder for cybercriminals to use QR codes as a gateway to your personal or financial information. In a world where 73% of Americans scan QR codes without checking the source, increased caution is your first and best line of defense against the quishing surge.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysQR codes are super convenient, but the risks they bring are becoming impossible to ignore. And you can count on scammers getting more creative as time goes on. That doesn’t mean you have to stop using QR codes altogether, it just means staying informed and cautious is a must, because QR codes aren’t going anywhere anytime soon.Will you avoid QR codes from now on, or will you be extra cautious moving forward? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.

QR code scams rise as 73% of Americans scan without checking Read More »

FBI Files: Directors, Agents and Personnel of the Central Intelligence Agency (CIA)

 Abramson, Harold Alexander – [20 Pages, 9.9 MB] – Harold Alexander Abramson (November 27, 1899 – September 1980) was an American physician (allergist and pediatrician) noted as an early advocate of therapeutic LSD. He played a significant role in CIA’s MKULTRA program to investigate the military applications of LSD.

Angleton, James Jesus – FBI Release #1 – [347 Pages, 83.4 MB] Angleton, James Jesus – FBI Release #2 (Final) – [97 Pages, 7MB] – James Jesus Angleton (December 9, 1917 – May 11, 1987) was chief of CIA Counterintelligence from 1954 to 1975. His official position within the organization was “Associate Deputy Director of Operations for Counterintelligence (ADDOCI)”. Angleton was significantly involved in the U.S. response to the purported KGB defectors Anatoliy Golitsyn and Yuri Nosenko. Angleton later became convinced the CIA harbored a high-ranking mole, and engaged in an intensive search. Whether this was a highly destructive witch hunt or appropriate caution vindicated by later moles remains a subject of intense historical debate.

 Bissell, Richard – FBI Release #1 – [36 Pages, 3MB] Bissell, Richard – FBI Release #2 – [9 Pages, 3.5MB] – Richard Mervin Bissell Jr. (September 18, 1909 – February 7, 1994) was a Central Intelligence Agency officer responsible for major projects such as the U-2 spy plane and the Bay of Pigs Invasion.

 Buckley, William Francis – William Francis Buckley (May 30, 1928 – June 3, 1985) was a United States Army officer and CIA station chief in Beirut from 1984 until 1985. His cover was as a Political Officer at the US Embassy.  He died on or around June 3, 1985—five months before the date claimed by his captors—while in the custody of Hezbollah. He is buried at Arlington National Cemetery and is commemorated with a star on the Memorial Wall at the Central Intelligence Agency (CIA) headquarters in Langley, Virginia.

Colby, William – FBI Release #1 – [128 Pages, 8.7MB] –Colby, William – FBI Release #2 – [134 Pages, 9.5MB] – William Egan Colby (1920-1996) was an American intelligence officer and diplomat who served as the Director of Central Intelligence (DCI) from 1973 to 1976 during a transformative period for the U.S. intelligence community. A World War II veteran and Office of Strategic Services (OSS) operative, Colby had a long, varied career in the Central Intelligence Agency (CIA), beginning in 1950. He was instrumental in controversial covert actions like the Phoenix Program during the Vietnam War, aimed at dismantling the Viet Cong’s infrastructure. As DCI, Colby faced a tumultuous time marked by increased scrutiny of CIA activities; he was a key figure during the Church Committee hearings of the 1970s, where he divulged classified information about the Agency’s questionable practices, leading to significant changes in oversight and control of American intelligence operations. His candid approach brought both commendation for transparency and criticism for revealing too much, the latter leading to his forced resignation in 1976.

 Conein, Lucien – [45 Pages, 8.3MB] – Lt. Col. Lucien Emile Conein (born 29 November 1919, Paris, France – died 3 June 1998, Bethesda, Maryland) was a noted U.S. Army officer and OSS/CIA operative. Among other exploits, he was instrumental in the November 1963 coup against Ngô Đình Diệm that resulted in Diệm’s assassination, having served as Henry Cabot Lodge, Jr.’s liaison officer with the coup plotters and delivering $42,000 of the known cash disbursements.  He later ran secret operations for the Drug Enforcement Administration (DEA). Although the FBI said that additional possible records could exist, they claim they could not find/locate them.

 Cameron, Donald Ewen – [21 Pages, 8.3MB] – Donald Ewen Cameron (24 December 1901 – 8 September 1967) — known as D. Ewen Cameron or Ewen Cameron — was a Scottish-born psychiatrist who served as President of the American Psychiatric Association (1952–1953), Canadian Psychiatric Association (1958-1959), American Psychopathological Association (1963), Society of Biological Psychiatry (1965) and World Psychiatric Association (1961-1966). In spite of his high professional reputation, he has been criticized for administering electroshock therapy and experimental drugs to patients without their informed consent. Some of this work took place in the context of the Project MKUltra mind control program.

Clarridge, Duane –  [17 Pages, 2.8MB] – Duane Ramsdell “Dewey” Clarridge (April 16, 1932 – April 9, 2016) was an American senior operations officer for the Central Intelligence Agency (CIA) and supervisor for more than 30 years. Clarridge was the chief of the Latin American division from 1981 to 1987 and a key figure in the Iran-Contra Affair.

George, Clair– FBI Release #1 –  [64 Pages, 9MB]George, Clair – FBI Release #2 –  [64 Pages, 2.2MB] – Clair Elroy George (August 3, 1930 – August 11, 2011) was a prominent American intelligence officer in the Central Intelligence Agency (CIA). Over his three-decade career, he became known for his expertise in espionage and counterintelligence, holding several key positions, including Deputy Director for Operations. George played a pivotal role during the Cold War, overseeing clandestine operations globally. His career was marked by controversy during the Iran-Contra affair, where he was indicted for perjury and obstruction of justice, though later pardoned by President George H.W. Bush. Clair George’s legacy remains a significant chapter in the history of U.S. intelligence operations.

 Gottlieb, Sidney – FBI Release #1 – [43 Pages, 15.4MB] – Sidney Gottlieb (born Joseph Scheider; August 3, 1918 – March 7, 1999) was an American chemist and spymaster best known for his involvement with the Central Intelligence Agency’s 1950s and ’60s assassination attempts and mind control program, known as Project MKUltra.

 Harvey, William King – [376 Pages, 172 MB] – William King “Bill” Harvey (September 13, 1915 – June 9, 1976) was a Central Intelligence Agency officer, best known for his role in Operation Mongoose. He was known as “America’s James Bond”, a tag given to him by Edward Lansdale.

 Helms, Richard – [342 Pages, 190 MB] Helms, Richard – Letter stating additional FBI Records were destroyed – [2 Pages, 0.4MB]Richard McGarrah Helms (March 30, 1913 – October 23, 2002) served as the Director of Central Intelligence (DCI) from June 1966 to February 1973. Helms began intelligence work with the Office of Strategic Services during World War II. Following the 1947 creation of the Central Intelligence Agency (CIA) he rose in its ranks during the Truman, Eisenhower, and Kennedy administrations. Helms then served as DCI under Johnson, then Nixon.

 Maheu, Robert – [1,151 Pages, 852MB] – (Note: This is a large file. It is recommended you right click and select “save as” instead of opening in a browser).Continue scrolling for more…

Robert Aime Maheu (October 30, 1917 – August 4, 2008) was an American businessman and lawyer, who worked for the FBI and CIA, and as the chief executive of Nevada operations for the industrialist Howard Hughes. Maheu said: “The CIA was my first steady client, giving me ‘cut-out’ assignments [those jobs in which the Agency could not officially be involved].”

Marchetti, Victor– [30 Pages, 2.2MB] – Victor Leo Marchetti, Jr. (December 23, 1929-October 19, 2018) was a special assistant to the Deputy Director of the Central Intelligence Agency who later became a prominent critic of the United States Intelligence Community and the Israel lobby in the United States.

 McCone, John – [746 Pages, 46.4MB] – John Alexander McCone (January 4, 1902 – February 14, 1991) was an American businessman and politician who served as Director of Central Intelligence during the height of the Cold War.  After the disaster of the Bay of Pigs Invasion, president John F. Kennedy forced the resignation of the CIA director Allen Dulles and some of his staff. McCone replaced Dulles on November 29, 1961.

Millis, John I. – [184 Pages, 103MB] – John I. Millis was a former case officer with the Central Intelligence Agency who also served as the top staff member of the House Intelligence Committee.

Montgomery, Hugh – [746 Pages, 46.4MB] – Hugh Montgomery (November 29, 1923 – April 6, 2017) was a United States diplomat and intelligence officer. He served for 63 years with the Central Intelligence Agency and has been called one of the CIA’s founding fathers.

 Paisley, John – [297 Pages, 183.3MB] – John Arthur Paisley (August 25, 1923 – September 24, 1978) was a former official of the Central Intelligence Agency.  Paisley served in the CIA from 1963 to 1974. During his career, he was heavily involved in Soviet operations. Paisley retired as deputy director in the Office of Strategic Research, the branch that monitored Soviet military movements and nuclear capabilities.

Shackley, Theodore “Ted” – [340 Pages, 96MB] – Theodore George “Ted” Shackley, Jr. (July 16, 1927 — December 9, 2002) was an American CIA officer involved in many important and controversial CIA operations during the 1960s and 1970s. He is one of the most decorated CIA officers. Due to his “light hair and mysterious ways”, Shackley was known to his colleagues as “the Blond Ghost”. Note: There are 1,092 (approximate) additional pages which will require $40 to get. Please CONTACT if you are interested in sponsoring the file.

Tofte, Hans – FBI Release #1 – [33 Pages, 3.4MB]Tofte, Hans – FBI Release #2 – [41 Pages, 5.4MB] – Hans V. Tofte (1911–1987) was a Danish-American intelligence officer who played a significant role in Allied and U.S. covert operations during and after World War II. Born in Copenhagen, he fled Nazi-occupied Europe and joined the British Special Operations Executive, training guerrilla fighters in Burma and China. He later served with the U.S. Office of Strategic Services (OSS) in Yugoslavia and Italy, where he supported resistance groups and earned the Legion of Merit. After the war, he joined the CIA and became known for bold paramilitary missions, including a 1951 operation that intercepted medical supplies bound for Chinese forces in Korea. Tofte was also involved in Cold War operations in Latin America, including the 1954 coup in Guatemala. His CIA career ended in 1966 amid controversy over classified documents found in his home. He retired with his pension and lived out his final years in New York, passing away in 1987.

White, George Hunter FBI Release #1 (to The Black Vault) – [53 Pages, 3.5MB]
 White, George Hunter FBI Release #1 (third party requester, archived here for reference) – [19 Pages, 12.9MB] White, George Hunter FBI Release #2 (third party requester, archived here for reference) – [31 Pages, 20.7MB] – George Hunter White was a CIA operative who had worked on the MKULTRA / Mind Control projects.  He was also heavily involved in the previous OSS “truth drug” experiments.
 

Wilson, Edwin Paul – [651 Pages, 304MB] – Edwin Paul Wilson (May 3, 1928 – September 10, 2012) was a former CIA and Office of Naval Intelligence officer who was convicted in 1983 of illegally selling weapons to Libya. It was later found that the United States Department of Justice and the CIA had covered up evidence in the case. Wilson’s convictions were overturned in 2003 and he was freed the following year.

FBI Files: Directors, Agents and Personnel of the Central Intelligence Agency (CIA) Read More »