memoment editorial

GettyImages 2214393807 1024x648 1

Judge: You can’t ban DEI grants without bothering to define DEI

Separately, Trump v. Casa blocked the use of a national injunction against illegal activity. So, while the government’s actions have been determined to be illegal, Young can only protect the people who were parties to this suit. Anyone who lost a grant but wasn’t a member of any of the parties involved, or based in any of the states that sued, remains on their own.
Those issues aside, the ruling largely focuses on whether the termination of grants violates the Administrative Procedures Act, which governs how the executive branch handles decision- and rule-making. Specifically, it requires that any decisions of this sort cannot be “arbitrary and capricious.” And, Young concludes that the government hasn’t cleared that bar.

Arbitrary and capricious
The grant cancellations, Young concludes, “Arise from the NIH’s newly minted war against undefined concepts of diversity, equity, and inclusion and gender identity, that has expanded to include vaccine hesitancy, COVID, influencing public opinion and climate change.” The “undefined” aspect plays a key part in his reasoning. Referring to DEI, he writes, “No one has ever defined it to this Court—and this Court has asked multiple times.” It’s not defined in Trump’s executive order that launched the “newly minted war,” and Young found that administrators within the NIH issued multiple documents that attempted to define it, not all of which were consistent with each other, and in some cases seemed to use circular reasoning.
He also noted that the officials who sent these memos had a tendency to resign shortly afterward, writing, “it is not lost on the Court that oftentimes people vote with their feet.”
As a result, the NIH staff had no solid guidance for determining whether a given grant violated the new anti-DEI policy, or how that might be weighed against the scientific merit of the grant. So, how were they to identify which grants needed to be terminated? The evidence revealed at trial indicates that they didn’t need to make those decisions; DOGE made them for the NIH. In one case, an NIH official approved a list of grants to terminate received from DOGE only two minutes after it showed up in his inbox.

Judge: You can’t ban DEI grants without bothering to define DEI Read More »

pia26579

Old Glory on the Red Planet

The United States flag adorns an aluminum plate mounted at the base of the mast, or “head,” of NASA’s Perseverance Mars rover. This image of the plate was taken on June 28, 2025 (the 1,548th day, or sol, of the mission), by the WATSON (Wide Angle Topographic Sensor for Operations and eNgineering) camera on the end of the rover’s robotic arm.
WATSON, part of an instrument called SHERLOC (Scanning Habitable Environments with Raman & Luminescence for Organics & Chemicals), was built by Malin Space Science Systems (MSSS) in San Diego and is operated jointly by MSSS and NASA’s Jet Propulsion Laboratory in Southern California. JPL, which is managed for the agency by Caltech, built and manages operations of the Perseverance rover.
Learn more about Perseverance’s latest science.

Old Glory on the Red Planet Read More »

1 atm jugging scam on the rise as thieves target victims

ATM jugging scam on the rise as thieves target victims

NEWYou can now listen to Fox News articles!
Have you heard of “jugging?” Police are raising alarms about this new crime trend targeting ATM users nationwide and locally. Jugging happens when criminals wait near banks or ATMs, watching people withdraw cash. Then, they follow their targets, hoping to rob them or break into their vehicles. This crime can catch anyone off guard. You might not even realize you’re being watched. That’s why staying alert is crucial whenever you use an ATM.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERPOLICE SOUND ALARM ON DANGEROUS ‘JUGGING’ ROBBERY TREND SWEEPING ACROSS AMERICA A customer using an ATM machine  (Kurt “CyberGuy” Knutsson)How jugging works: The criminal’s playbookJugging starts with suspects lurking near an ATM or bank. They watch for customers who withdraw money. Once a target is spotted, the suspects follow them, looking for an opportunity to strike. This could mean stealing cash directly, breaking into cars or worse. The key to jugging’s success is surprise and timing. Criminals rely on victims being distracted or unaware. Knowing this can help you avoid becoming their next target. ATM machine (Kurt “CyberGuy” Knutsson)Top safety tips to protect yourself from juggingPolice recommend several simple yet effective steps to stay safe:1. Stay aware of your surroundings: Always scan the area before and after using an ATM. If something seems suspicious, it probably is.2. Avoid distractions: Don’t use your cellphone or wear headphones while at the ATM. Stay alert to what’s happening around you.3. Be Discreet with your cash: Put your money away immediately after withdrawing it. Avoid counting cash in public.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Lock your vehicle doors: Once inside your car, lock the doors right away. Never leave cash visible inside your vehicle.5. Change your routine: Visit different ATMs or banks at varying times. Being unpredictable makes it harder for criminals to target you.6. Watch for anyone following you: If you notice a vehicle tailing you after an ATM visit, don’t drive home. Instead, head to the nearest police station or a busy public place. Call 911 if you feel threatened. A customer withdrawing cash from an ATM machine     (Kurt “CyberGuy” Knutsson)Why paying attention matters more than everJugging is on the rise across the country, and it’s not just happening in big cities anymore. Small towns and suburbs are seeing more cases, too. Criminals look for moments when people let their guard down, when they’re feeling safe or distracted. Staying alert and following a few simple safety tips can make a big difference and help keep you from becoming a target. Get Kurt’s best tech for personal protection: CyberGuy.com/PersonalProtectionKurt’s key takeawaysJugging is a clever and dangerous crime, but you don’t have to be a victim. Awareness and simple precautions can keep you safe. Next time you head to the ATM, ask yourself if you’re paying enough attention to your surroundings. Could a criminal be watching me right now? Your safety depends on your awareness. Stay alert, be unpredictable and protect yourself from jugging.CLICK HERE TO GET THE FOX NEWS APPHave you ever felt uneasy or noticed something suspicious while using an ATM, and how did you handle it?  Let us know by writing to us at Cyberguy.com/Contact. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

ATM jugging scam on the rise as thieves target victims Read More »

KOI 134 Beauty v3

Discovery Alert: Scientists Spot a Planetary Carousel

KOI-134 b and KOI-134 c 

A new investigation into old Kepler data has revealed that a planetary system once thought to house zero planets actually has two planets which orbit their star in a unique style, like an old-fashioned merry-go-round. 

The KOI-134 system contains two planets which orbit their star in a peculiar fashion on two different orbital planes, with one planet exhibiting significant variation in transit times. This is the first-discovered system of its kind. 

Over a decade ago, scientists used NASA’s Kepler Space Telescope to observe the KOI-134 system and thought that it might have a planet orbiting, but they deemed this planet candidate to be a false positive, because its transits (or passes in front of its star) were not lining up as expected. These transits were so abnormal that the planet was actually weeded out through an automated system as a false positive before it could be analyzed further. 

However, NASA’s commitment to openly sharing scientific data means that researchers can constantly revisit old observations to make new discoveries. In this new study, researchers re-analyzed this Kepler data on KOI-134 and confirmed that not only is the “false positive” actually a real planet, but the system has two planets and some really interesting orbital dynamics! 

First, the “false positive” planet, named KOI-134 b, was confirmed to be a warm Jupiter (or a warm planet of a similar size to Jupiter). Through this analysis, researchers uncovered that the reason this planet eluded confirmation previously is because it experiences what are called transit timing variations (TTVs), or small differences in a planet’s transit across its star that can make its transit “early” or “late” because the planet is being pushed or pulled by the gravity from another planet which was also revealed in this study. Researchers estimate that KOI-134 b transits across its star as much as 20 hours “late” or “early,” which is a significant variation. In fact, it was so significant that it’s the reason why the planet wasn’t confirmed in initial observations. 

As these TTVs are caused by the gravitational interaction with another planet, this discovery also revealed a planetary sibling: KOI-134 c. Through studying this system in simulations that include these TTVs, the team found that KOI-134 c is a planet slightly smaller than Saturn and closer to its star than KOI-134 b. 

KOI-134 c previously eluded observation because it orbits on a tilted orbital plane, a different plane from KOI-134 b, and this tilted orbit prevents the planet from transiting its star. The two orbital planes of these planets are about 15 degrees different from one another, also known as a mutual inclination of 15 degrees, which is significant. Due to the gravitational push and pull between these two planets, their orbital planes also tilt back and forth. 

Another interesting feature of this planetary system is something called resonance. These two planets have a 2 to 1 resonance, meaning within the same time that one planet completes one orbit, the other completes two orbits. In this case, KOI-134 b has an orbital period (the time it takes a planet to complete one orbit) of about 67 days, which is twice the orbital period of KOI-134 c, which orbits every 33-34 days. 

Between the separate orbital planes tilting back and forth, the TTVs, and the resonance, the two planets orbit their star in a pattern that resembles two wooden ponies bobbing up and down as they circle around on an old-fashioned merry go round. 

While this system started as a false positive with Kepler, this re-analysis of the data reveals a vibrant system with two planets. In fact, this is the first-ever discovered compact, multiplanetary system that isn’t flat, has such a significant TTV, and experiences orbital planes tilting back and forth. 

Also, most planetary systems do not have high mutual inclinations between close planet pairs. In addition to being a rarity, mutual inclinations like this are also not often measured because of challenges within the observation process. So, having measurements like this of a significant mutual inclination in a system, as well as measurements of resonance and TTVs, provides a clear picture of dynamics within a planetary system which we are not always able to see. 

A team of scientists led by Emma Nabbie of the University of Southern Queensland published a paper on June 27 on their discovery, “A high mutual inclination system around KOI-134 revealed by transit timing variations,” in the journal “Nature Astronomy.” The observations described in this paper and used in simulations in this paper were made by NASA’s Kepler Space Telescope and the paper included collaboration and contributions from institutions including the University of Geneva, University of La Laguna, Purple Mountain Observatory, the Harvard-Smithsonian Center for Astrophysics, the Georgia Institute of Technology, the University of Southern Queensland, and NASA’s retired Kepler Space Telescope.

Discovery Alert: Scientists Spot a Planetary Carousel Read More »

Big Beautiful Bill

Trump’s ‘Big Beautiful Bill’ Passes, Sets Aside $150 Billion for Defense

President Donald Trump’s “One Big Beautiful Bill“ will detonate a $150 billion payload into the heart of the U.S. military-industrial complex. This marks the most significant defense funding surge in recent history, surpassing even the Reagan-era buildup. The bill, passed narrowly in both chambers of Congress, is set to be signed into law on July 4th, symbolizing a new era of American military might. 
At the core of this financial windfall is the ambitious “Golden Dome“ missile defense system, allocated a brain-numbing $25 billion to initiate its development. Envisioned as a space-based shield against long-range and hypersonic missile threats, the Golden Dome aims to be a technological marvel, though its feasibility and final cost remain subjects of debate. Who knows, for $25 billion (and that’s just to start) the thing may be made out of real gold. 
Additional allocations include $29 billion for shipbuilding, $25 billion for munitions, $16 billion for military innovation and artificial intelligence, $15 billion for nuclear deterrence, and $12 billion for operations in the Indo-Pacific region. An $8.5 billion investment targets quality-of-life improvements for service members, addressing barracks maintenance, healthcare, and other essential services.

Trump’s ‘Big Beautiful Bill’ Passes, Sets Aside $150 Billion for Defense Read More »

Artist impression of Oumuamua pillars

ESA tracks rare interstellar comet

Space Safety

03/07/2025
2212 views
28 likes

Astronomers have confirmed the discovery of a rare celestial visitor: a comet from beyond our Solar System.Officially named 3I/ATLAS, this newly identified interstellar object is only the third of its kind ever observed, following the famous 1I/ʻOumuamua in 2017 and 2I/Borisov in 2019.

A visitor from beyond the void

The comet was first spotted on 1 July 2025 by the Asteroid Terrestrial-impact Last Alert System (ATLAS) telescope in Río Hurtado, Chile. Its unusual trajectory immediately raised suspicions that it originated from interstellar space. This was later confirmed by astronomers around the world, and the object was given its formal designation: 3I/ATLAS, indicating its status as the third known interstellar object.3I/ATLAS is approximately 670 million kilometres from the Sun and will make its closest approach in late October 2025, passing just inside the orbit of Mars. It is thought to be up to 20 kilometres wide and is travelling roughly 60 km/s relative to the Sun. It poses no danger to Earth, coming no closer than 240 million kilometres – over 1.5 times the distance between Earth and the Sun.

ESA tracks the interstellar interloper

ESA’s Planetary Defence Office responded promptly to the discovery. Automated detection systems alerted ESA’s astronomers, who are contributing to global efforts to track the comet’s path and to find evidence of its existence in older data – a process known as ‘precovery.’

ESA observes interstellar comet 3I/ATLAS

ESA astronomers are using telescopes in Hawaii, Chile, and Australia to monitor the comet’s progress. Some of these telescopes are owned by ESA, others are provided as part of longstanding partnerships.These efforts are part of ESA’s broader mission to detect, track, and characterise near-Earth objects – though 3I/ATLAS is not considered one, due to its distance from our planet.Scientists will now be interested in learning more about this interstellar visitor’s composition and behaviour. 

3I/ATLAS is an active comet. If it heats up sufficiently as it nears our star, it could begin to sublimate – a process in which frozen gases transform directly into vapor, carrying dust and ice particles into space to form a glowing coma and tail.However, by the time the comet reaches its closest point to Earth, it will be hidden behind the Sun. It is expected to reappear by early December, offering astronomers another window for study.

A remnant from a distant world

What makes interstellar objects like 3I/ATLAS so extraordinary is their absolutely foreign nature. While every planet, moon, asteroid, comet and lifeform that formed in our Solar System shares a common origin, a common heritage, interstellar visitors are true outsiders. They are remnants of other planetary systems, carrying with them clues about the formation of worlds far beyond our own.

It may be thousands of years until humans visit a planet in another solar system and interstellar comets offer the tantalising opportunity for us to touch something truly otherworldly.These icy wanderers offer a rare, tangible connection to the broader galaxy – to materials formed in environments entirely unlike our own. To visit one would be to connect humankind with the Universe on a far greater scale.

ESA mission will intercept the unknown

Comet Interceptor

To this end, ESA is preparing the Comet Interceptor mission. The spacecraft will be launched in 2029 into a parking orbit at the Sun–Earth Lagrange Point 2 (L2), lying in wait for a suitable target – a pristine comet from the distant Oort Cloud that surrounds our Solar System, or, unlikely but highly appealing, an interstellar object.While it is improbable that we will discover an interstellar object that is reachable for Comet Interceptor, as a first demonstration of a first rapid response mission that waits in space for its target, it will be a pathfinder for possible future missions to intercept these mysterious visitors.

Whether it’s 1I/‘Oumuamua, 2I/Borisov, 3I/ATLAS or the future target of an interceptor mission, each new interstellar visitor reminds us that we are part of a vast and dynamic galaxy – and that sometimes, the Universe comes to us.

Like
Thank you for liking
You have already liked this page, you can only like it once!

ESA tracks rare interstellar comet Read More »

Screenshot 2025 02 23 011421

U.S. Navy Begins AIM-260 JATM Procurement in FY2026 Budget

Carter Johnston

Carter Johnston a freshman at George Washington University’s Elliott School for International Affairs in the Class of 2028. He is based in Washington, D.C. and Chicago, Illinois. His interests include shipyard infrastructure in the United States, ongoing modernization efforts of the U.S. Navy and Marine Corps, and the politics that lead to their success domestically and globally.

U.S. Navy Begins AIM-260 JATM Procurement in FY2026 Budget Read More »

70702

Gen. Donahue on Deterring Russia in Europe

Gen. Christopher Todd Donahue, who leads U.S. Army Europe and Africa as well as Allied Land Command, joined Ryan for a discussion at WOTR HQ. For the first five minutes, they chat about his Army story, his time in the Ranger Regiment, before discussing how the Army Transformation Initiative is unfolding in Europe, from maneuver brigades, new technologies, command-and-control, drone and counter-drone operations, and more. Donahue previews how the U.S. Army has deliberately identified lessons from the war in Ukraine and how the Army fits into the joint fight. 

Gen. Donahue on Deterring Russia in Europe Read More »

1 major airlines secretly sold u.s. travelers data to homeland security

Airlines secretly sold US travelers’ data to Homeland Security

NEWYou can now listen to Fox News articles!
At this point, most Americans are aware that their personal information is often up for sale. But few would have expected their domestic flight records to be part of the trade. You might think that when you book a flight, the data stays between you, the airline and perhaps your travel agency, but a new report suggests otherwise. Internal documents reveal that major U.S. airlines have been funneling detailed passenger data to a little-known broker, which then sells that information directly to the Department of Homeland Security. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER16 BILLION PASSWORDS LEAKED IN MASSIVE DATA BREACH Airplane flying in the sky  (Kurt “CyberGuy” Knutsson)Which airlines shared data and how the travel intelligence program worksAt the center of the controversy is the Airlines Reporting Corporation (ARC), a company jointly owned by several of the largest U.S. airlines, including Delta, American Airlines and United. ARC’s core business includes managing ticket settlements between airlines and travel agencies. However, under a lesser-known initiative called the Travel Intelligence Program (TIP), ARC collects and monetizes vast amounts of data from domestic flight bookings. This includes names, complete itineraries and payment details.Internal government records and procurement documents reveal that Customs and Border Protection (CBP), part of the Department of Homeland Security, has purchased access to ARC’s TIP data to track individuals of interest across the U.S. While CBP maintains that this data supports criminal and administrative investigations, critics argue that the arrangement raises major privacy concerns. The data is shared without travelers’ knowledge or consent, and ARC reportedly requested that the agency keep its identity confidential unless legally required to disclose it.The documents confirm that CBP’s initial contract with ARC began in June 2024. It has already been extended and may continue through 2029. Although the initial amounts seem modest, around $11,000 with a recent $6,800 update, the implications are far-reaching. Passengers traveling on an airplane   (Kurt “CyberGuy” Knutsson)What DHS is collecting from your flight bookings and why it’s concerningARC’s Travel Intelligence Program goes far beyond basic passenger manifests. It includes over a billion records spanning both past and future travel, updated daily. The system can be queried by name, credit card or even travel agency. Importantly, it does not include data from tickets purchased directly through airline websites, focusing instead on bookings made via travel agencies, such as Expedia.GET FOX BUSINESS ON THE GO BY CLICKING HEREThe DHS has justified its use of TIP data in a public Privacy Impact Assessment, noting the program helps in active investigations. CBP echoed this, stating that data is only used when a case is already open. Still, this sets a dangerous precedent. It normalizes mass surveillance through third-party data purchases, undermining safeguards designed to limit unnecessary intrusion.This isn’t an isolated incident. Last month, Immigration and Customs Enforcement also acknowledged purchasing ARC data. Other federal agencies listed in procurement records include the Secret Service, SEC, DEA, TSA and even the Air Force. Travelers at an airport        (Kurt “CyberGuy” Knutsson)6 ways you can protect your privacy from data brokersIf you want to take back control of your personal information, here are six smart steps you can take right now to reduce your exposure to data brokers.1. Book flights directly on airline websites: Whenever you can, avoid using third-party travel sites like Expedia, Orbitz or travel agencies. These platforms are the main sources of the data collected by the Airlines Reporting Corporation (ARC) through its Travel Intelligence Program. When you book directly on an airline’s official website or mobile app, your data is far less likely to be shared with ARC or sold to government agencies. While it might be tempting to look for deals on aggregator sites, once you find a fare you like, try to book it directly through the airline.2. Use virtual or disposable credit cards: The ARC system allows queries by credit card number, which means your travel activity can be tracked even if your name is not directly searched. To protect yourself, consider using a virtual credit card or a disposable card number for flight bookings. These are often available through banking apps or fintech services like Revolut, Privacy.com or certain American Express accounts. Virtual cards are tied to your main account but generate a temporary number that can only be used once or at a specific merchant. This makes it much harder for brokers to link future bookings to you.3. Share the bare minimum when booking: Be cautious about the personal information you enter during the booking process. Unless it is legally required, avoid adding unnecessary details like your frequent flyer number, passport data for domestic flights or secondary phone numbers. You can also create a separate email address specifically for travel bookings to reduce the risk of cross-linking data with your other online accounts. When it comes to loyalty programs, consider opting out or using a separate identity if you are concerned about data being shared across companies.4. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete5. Use a privacy-focused browser and email service: Prevent tracking at the source by using privacy-first tools. Switch to browsers like Brave, Firefox or DuckDuckGo, which block ads and data collectors by default. Set up a separate, secure alias email address for booking travel using services. This limits how easily brokers can link your travel data to your online identity. See my review of the best secure and private email services by visiting Cyberguy.com/Mail6. Use an identity theft protection service: If your travel or payment data is ever leaked or abused, freezing your credit can help prevent identity theft. Identity theft companies can assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. They can also monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. One of the best parts of my No. 1 pick is that is it has identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft by visiting Cyberguy.com/IdentityTheft Kurt’s key takeawayThe ARC incident is yet another example of federal agencies bypassing traditional legal channels by buying sensitive data from private firms. Travelers are not just passengers, they are data points in a growing ecosystem where information is currency. The fact that this trade happened without informed consent and behind legal smokescreens should worry anyone who values privacy.CLICK HERE TO GET THE FOX NEWS APPWould you change how you book flights if it meant protecting your personal data? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Airlines secretly sold US travelers’ data to Homeland Security Read More »