memoment editorial

secret file cabinet

Navy Sub Meets Fast Underwater Object, Chupacabras Hit Cattle and Cars, Baseball Ghosts, Planet Y and More Mysterious News Briefly

A roundup of mysterious, paranormal and strange news stories from the past week.
If you’re looking for something else to add to the list of things that keep you up at night, the Earth’s magnetic field already has a weak spot known as the South Atlantic Anomaly (SAA) and a new study took measurements which show that it is increasing at an alarming rate – since 2014, the anomaly weak spot has expanded by an area nearly twice the size of Texas and is moving towards Africa; author Chris Finlay, Professor of Geomagnetism at the Technical University of Denmark, says: “There’s something special happening in this region that is causing the field to weaken in a more intense way”; the SAA already forces orbiting satellites, space missions and the International Space Station to avoid the area or fly higher due to higher-than-usual levels of ionizing radiation – this expansion will cause a bigger danger area for them; Finlay calls the anomaly a reverse flux patch and describes it in the study: “Normally we’d expect to see magnetic field lines coming out of the core in the southern hemisphere. But beneath the South Atlantic Anomaly, we see unexpected areas where the magnetic field, instead of coming out of the core, goes back into the core”. If only we had a flux capacitor to escape this reverse flux patch.
In a recent interview, Congressman Tim Burchett, a longtime proponent of UFO research and government disclosure, shared a report he received from an unnamed “very high-ranking member of the Navy “ about an alleged unidentified submerged object (USO) encounter by a U.S. submarine; Burchett said the official described is as “big as a football field” and traveling at an underwater speed of 200 miles an hour; according to the congressman, “The best we have is probably in the high 30s”; Burchett says he’s frustrated, as are other Congress members: “There’s several of us, Luna, myself and several others that are concerned about this issue and we want some answers” but they need “somebody in the White House that says enough is enough and just discloses it; in the meantime, Burchett says “There’s a movie coming out” with testimony that “They’ve got their beings, and there’s saucers or some craft or something” and people saying, “they were there and they identified these things, they diagnosed them, and they saw them. I saw the craft.” Burchett reaffirmed that the issue is bipartisan, but he has no idea if disclosure will happen. We need a new generation of Woodwards and Bernsteins to follow the money and the UFO.
Christopher Mellon, a former deputy assistant secretary of defense for intelligence and chairman of the board of the UAP Disclosure Fund, is another official going public with his quest for UFO disclosure – in an opinion piece in The San Francisco Chronicle, he points out that after the release of three Navy videos showing UFO encounters with Navy pilots (which Mellon helped release, the intelligence community ”reclassified almost everything concerning UAP, slowing disclosure to a trickle”; he reveals that under his direction, the UAP Disclosure Fund filed many requests under the Freedom of Information Act to obtain UAP records from the government, warning that “If necessary, we will litigate these requests in federal court”; he states the obvious consequences about the current lack of transparency: “Withholding information also fuels conspiracy theories and cynicism, undermining faith in our institutions. When Congress and the public struggle to pry even basic answers from the Pentagon, what message does that send to the American people?” Again, we don’t need all the president’s men – just a few dedicated people to keep the pressure on without being intimidated.

It’s not hard to find the right drawer with the secret stuff.

There is a reason why psychics have historically been looked down upon in so many societies and that reason raised its ugly head once more in Pennsylvania where the Montgomery County District Attorney charged two men with numerous felonies related to the theft of more than $600,000 from two victims using a fortune telling scheme where they claimed to be removing curses in exchange for payment under the name “Jenkintown Psychic Visions”; over the course of 11 months, one woman gave them fraudsters jewelry, cash, clothing, concert tickets and gift cards totaling almost $600,000 to “cleanse” the curse; sadly for legitimate psychics, the charges – Corrupt Organizations, Dealing in the Proceeds of Unlawful Activities, Theft by Unlawful Taking, Theft by Deception and Receiving Stolen Property – also included one still on the books for Fortune Telling; none of the payments were recovered. To those who can’t believe people would give up their money so freely to something that others think is an obvious losing proposition, have you ever been to Las Vegas?
Beware of Greeks bearing gifts and monster witnesses who say that the video they have shows something that could only be the Loch Ness Monster – as is the case with a recent video recorded by Nessie webcam watcher Eoin O’Faodhagain from the Visit Inverness Loch Ness webcam at Shoreland Lodges; it shows what O’Faodhagain describes as “a long thick neck” that is “thick as a man’s thigh” and appears to be swimming with it “over three to four feet out of the water” as it moves across the loch/screen; O’Faodhagain uses this logic to justify his diagnosis of the thing which is following in the wake of a boat: “When last viewed, it is high out of the water, as a high as a man, but you can see from the footage, it is neither man nor wildfowl, or seal or otter, what else could it be? Only Nessie, because I am at a loss trying to explain it as anything else. There is no bird that has a neck that thick and long, you can even see the shadow of it on the water, of how high and big in thickness it is. Seals do not swim with their necks up continuously for over a minute out of the water, and neither do otters”. Sounds logical, but the process of elimination hasn’t proven the existence of Nessie yet.
The answer to the mystery of what killed off the Neanderthals may finally have a modern answer thanks to a new study led by Alysson Muotri, a developmental biologist at the University of California, San Diego, which began by analyzing 51 fossilized hominid teeth, dated to between 100,000 and 1.8 million years old and found “clear signals of episodic lead exposure in 73 percent of the specimens (71 percent for hominins Australopithecus, Paranthropus, and Homo)”; the team then ran tests on lab-grown mini-brains that had one of two variants of a gene called NOVA1, which is found in modern humans as well as have, and one found in Neanderthals and other extinct species, and found that mini-brains with the Neanderthal gene variant suffered significant disruption to the activity of a gene called FOXP2, which is crucial for the development of speech and language, while the damage was less in modern humans and other species; Muotri says that “These results suggest that our NOVA1 variant may have offered protection against the harmful neurological effects of lead”. The Neanderthals are sending a message: get rid of the lead pipes and paint already!
There are two perceived bands of animal mutilation cases – one along the 37th parallel in the U.S. through Colorado, Nebraska and other states, and one through Argentina in South America; a rancher in Argentina has reported his second case in a month; the head of the Calderón family told local media he found one of his missing heifers dead on the 25 de Mayo Highway with a perfectly cut jaw and missing a tongue, an eye and its udder; recently, he found a dead horse that had a similar cut on the jaw and was also missing an eye and part of its rear around the genitals and anus; he ruled out a human killer because “It doesn’t make sense for one or more people to do all this and leave the animal lying there”; instead, he concluded that “From the news and documentaries we’ve seen, they say this could be due to two reasons: the chupacabra, which no one knows or has seen, or aliens”. There are many who believe the chupacabras are aliens, which could explain the killings – especially if aliens have a taste for quality Argentine and Midwest steaks.
Chupacabras can’t catch a break these days – besides livestock mutilations in North and South America, a man in Colorado blamed one for his single vehicle truck accident; according to the Lawrence Police Department report, the man said his 1 am crash happened when a “Chupacabra ran out in front of him”; the cryptid must have been bringing Colorado beer back to Puerto Rico because the report, along with medical records from the blood test, said that he failed a sobriety test and tested positive for intoxication, leading to a felony charge of operating a vehicle with a blood-alcohol content of 0.15 percent or greater. The Chupacabra was not charged and will most likely not show up for the trial.

Don’t mess with Chupacabras drunk or sober.

Brandon Biggs is a seer who claimed to have forecast the assignation attempt on President Trump has moved into the paranormal world with his latest prediction – he claims to have had a vision of an “alien” spaceship flying over the both the Vatican and Mayan temples in Mexico and says he saw “little bitty ships coming out of this mother ship that were balls of light” which will eventually “make everybody freak out because they’re going to see it moving across the ocean. It’s going to be something that’s going to be on TV.”; if this sounds familiar, many people viewing Bigg’s video making the predictions think he’s referring to the interstellar object 3I/ATLAS that NASA says is a comet but some scientists and Harvard professor Avi Loeb think could be an interstellar spaceship that may or may not be hostile to Earth and its inhabitants; Bigg’s prediction takes a religious turn when he says that “here is no such thing as aliens” and he believes these are “fallen angels” from a “demonic-looking light” in the sky. 3I/ATLAS is getting more warnings than a Category 5 hurricane – is it time to stock up on bottled water and toilet paper?
With the Milwaukee Brewers in the Major League Baseball National League Playoffs, talk has turned from home runs to hauntings as Los Angeles Dodgers player Teoscar Hernández announced that he will not stay at the Pfister Hotel at his wife’s request (she’s traveling with him) because she heard it is haunted; stories of the Pfister Hotel’s ghosts have been around for years – according to Hernández,  “My wife told me. The lights — some of the rooms — the lights go off and on. The doors, there are noises, footsteps. Things like, I dunno. I’m not the guy that I’m gonna be here saying, yeah, I’ve experienced that before. And I don’t think I’m gonna experience that”; Dodger star Mookie Betts believes – he’s been known to stay at an Airbnb to avoid encountering any ghosts at the Pfister Hotel “just in case” the stories are true; this has been going on for so long, many blame the Brewers for perpetrating it just to mess with the minds of opposing players. If the Brewers win the World Series, perhaps the management of the Pfister Hotel should get a cut of the winnings plus a ring.

If they thought the hotel was haunted – wait until they see the dugout.

Dr. Robin Corbet, a senior research scientist at the University of Maryland but based at Nasa’s Goddard Space Flight Center, published a paper proposing that the answer to the Fermi Paradox questioning why we haven’t seen any aliens despite the abundance of planets that could host them is simple – under the principle of “radical mundanity”, extraterrestrials living in the Milky Way galaxy are only slightly more advanced than we are and, having followed our path of exploring their own solar system with robotic probes, have decided space travel is boring and are staying home to deal with their own more mundane but still important problems; Corbet compares the slight difference in technology to “having an iPhone 42 rather than an iPhone 17” but “They don’t have faster-than-light, they don’t have machines based on dark energy or dark matter, or black holes. They’re not harnessing new laws of physics”; in other words, they’re just as mundane as we are. And they’re probably wondering why we haven’t visited them – and pondering their own ET-Fermi Paradox.
Move over Planet X and take Planet Nine with you because researchers at Princeton University have discovered a mysterious warp in the plane of the Kuiper Belt of giant icy objects that could be explained by another large planet pulling the objects beyond Neptune – a planet that is not X or Nine but a Planet Y; the researchers lay out their calculations in a new paper published in Monthly Notices of the Royal Astronomical Society: Letters and conclude with a note that “a hypothetical Planet Y as described in this work would likely be detectable by the upcoming Legacy Survey of Space and Time (LSST) on the Vera C. Rubin Observatory if it is currently located within the survey footprint. If such a body exists but is not discoverable by LSST due to its on-sky location (i.e., high ecliptic latitude), LSST will nevertheless elucidate the details of the Kuiper belt mean plane warp induced by the planet”. Pluto is still angry, disappointed and a little verklempt.
In his relatively short time on the job, Pope Leo XIV has weighed in on baseball, U.S politics and various religious doctrines and practices, but nothing stirred the masses (small ‘m’) like comments made public recently that Pope Leo made at the Vatican Observatory earlier this year; speaking to young astronomers about the telescope, he said: “Thanks to this remarkable instrument, we are able for the first time to peer deep into the atmosphere of planets in other solar systems, where life could develop. The new technology also makes it possible to trace the ancient light of distant galaxies, which tells us about the origins of our universe” and deepens “our knowledge of the cosmos, of which we are only a small but significant part”; many are wondering is Pope Leo has come out and endorsed a belief in life on other planets and might even be getting ready to make an announcement of aliens already being here. Or he’s just a kid like the rest of us who’s excited about seeing other planets through a telescope.
An archaeological survey of the large prehistoric canal systems in the central portion of Mexico’s Tehuacán Valley has uncovered what appears to be an effigy mound in the shape of a scorpion which, because of its location, may have been part of the civilization’s highly developed agricultural and irrigation infrastructure; researchers noticed that mound’s orientation has the scorpion’s tail stinger and left claw facing 65 degrees east-northeast, which is exactly where the sun rises during the summer solstice; during the winter solstice, the sunset also aligns with the scorpion’s tail in reverse when viewed from the left claw, making the mound a kind of solar calendar to mark the changing seasons something the paper on the discovery notes that this information was not just useful to ancient farmers, “It was essential to survival”; they suspect the mound was part of a local civic and ceremonial complex because they found ceramic jars, tripod grinding bowls, incense burners, and fragments of hollow figurines used in ritual activities; of particular note was the set of “killed” tripod bowls that were intentionally broken and discovered near the scorpion’s head – they contained a relatively modern offering of tobacco and chilies which indicates the mound had a spiritual significance to the culture long after its construction. What would we know about Mesoamerican civilizations if the jungles hadn’t hidden them from developers for so long?
Before it destroys humankind as we know it, artificial intelligence may help us understand what our dogs are trying to say to us – computer scientist Kenny Zhu of the University of Texas is working on a ‘Poogle’ translator to do just that; Zhu and his colleagues have collected the world’s largest video and audio catalog of canine vocalizations and are using AI to identity word-like patterns in dog barks, growls and other sounds that can be translated into sentences; he says, “The ultimate goal is to make a translator where you can talk freely with your pet. We can already do instantaneous communication between human languages” so maybe we can do it between species as well; Zhu started by trying to see if a language model could hear a difference between Shiba Inus in Japan and in the United States – it didn’t reveal any doggy dialect split; Zhu then compiled hundreds of hours of synced audio and video to train an AI model to separate canine vocalizations into discrete phonemes; so far, the team has transcribed about 50 hours of barks into syllables and identified some possible words like cat, cage and leash; they also identified how these words differ between dog breeds, how a dog’s linguistic capability appears to change as it ages – in one husky, as it grew older bark lasted longer and became more sophisticated; it’s not just dogs – Zhu is working on decoding cats and cow vocalizations. The cows are excited, but the cats couldn’t care less – do we really need AI to tell us that?

Navy Sub Meets Fast Underwater Object, Chupacabras Hit Cattle and Cars, Baseball Ghosts, Planet Y and More Mysterious News Briefly Read More »

salesforce building new york 1

Major companies, including Google and Dior, hit by massive Salesforce data breach

NEWYou can now listen to Fox News articles!
You might have noticed that in the past few months, many companies have disclosed data breaches, including Google, Dior and Allianz, and one name that appeared in most cases was Salesforce. Hackers did not breach company networks directly or exploit vulnerabilities in Salesforce’s core software. Instead, they targeted the tools and people around it by tricking employees into granting access, compromising third-party apps and abusing overly broad permissions.Once inside, they siphoned sensitive data from Salesforce environments on an unprecedented scale. Nearly a billion records were stolen across dozens of organizations, and now cybercriminals are extorting victims by threatening to publish the data unless hefty ransoms are paid. Let’s look at the recent Salesforce incidents in detail and why this is such a big deal.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERJEEP AND CHRYSLER PARENT STELLANTIS CONFIRMS DATA BREACH Hackers are weaponizing stolen Salesforce credentials to access company secrets. (REUTERS/Brendan McDermid)Why Salesforce is the perfect targetSalesforce is not just another cloud platform. It is the backbone of how thousands of companies manage relationships with their customers. The platform powers everything from sales pipelines and marketing campaigns to support tickets and partner communications. Banks use it to track client accounts, airlines rely on it to manage frequent flyer programs, and retailers store customer purchase histories and loyalty data inside it. In many organizations, Salesforce sits at the center of daily operations, acting as a single system that touches sensitive information across departments.That is why the scale of these breaches is so significant. A successful attack on a Salesforce instance becomes a window into a company’s customers, business strategy and internal processes. For cybercriminals, the potential payoff is enormous, and the recent incidents showed just how much damage they can cause without ever breaking into a company’s primary network.The breaches hit companies across sectors, from Adidas and Allianz to Qantas, Google and Pandora Jewelry. Attackers often use voice-phishing calls or realistic fake apps to manipulate Salesforce administrators into installing malicious software. This allowed them to steal OAuth tokens and query data directly from CRM systems, a technique linked to groups like ShinyHunters.Other attacks originated in compromised third-party integrations. One of the most damaging involved a chatbot tool called Drift, where stolen tokens gave attackers access to Salesforce instances at hundreds of companies.The fallout was enormous. Coca-Cola’s European division lost more than 23 million CRM records, while Farmers Insurance and Allianz Life reported breaches affecting over a million customers each. Even Google admitted that attackers accessed a Salesforce database used for advertising leads.TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED Major brands like Google, Dior and Allianz are among those caught in the data fallout. (Kurt “CyberGuy” Knutsson)Exploiting weak links in the ecosystemIt’s hard to break through firewalls or exploit technical vulnerabilities, but it’s much easier to manipulate people. Attackers have figured this out, and they are now focusing their efforts on human behavior and the less-protected edges of cloud ecosystems. Employees with administrative privileges were often tricked into authorizing malicious apps, while default permission settings allowed those apps to operate undetected.Once they obtained the data, the hackers did not simply try to sell it. They used it as leverage. Earlier this month, a loosely organized cybercrime group known by names such as Lapsus$, Scattered Spider and ShinyHunters launched a dedicated data leak site on the dark web, threatening to publish sensitive information unless victims paid a ransom.As reported, the site is designed to pressure companies into paying to prevent their stolen data from being made public. “Contact us to regain control of your data governance and prevent public disclosure,” reads one message on the site. “Do not be the next headline. All communications require strict verification and will be handled with discretion.”The leak site lists several alleged victims, including FedEx, Hulu (owned by Disney) and Toyota Motors. It is also unclear whether some of the organizations known to have been breached but not listed on the site have paid ransoms to keep their data from being released.FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS Cybercriminals are now extorting victims online, threatening to leak billions of stolen records. (Kurt “CyberGuy” Knutsson)Salesforce’s responseSalesforce told Cyberguy that it is “aware of recent extortion attempts by threat actors” and will not engage with, negotiate with, or pay any extortion demands. A company spokesperson provided the following statement:”We are aware of recent extortion attempts by threat actors, which we have investigated in partnership with external experts and authorities. Our findings indicate these attempts relate to past or unsubstantiated incidents, and we remain engaged with affected customers to provide support. At this time, there is no indication that the Salesforce platform has been compromised, nor is this activity related to any known vulnerability in our technology.”6 steps you can take to protect your dataYou might think a breach like this is a company problem, something for IT teams and cybersecurity experts to deal with. However, when attackers gain access to platforms like Salesforce, the data they are after is usually not the company’s. It is yours. Your contact details, purchase history, support tickets and even private conversations can end up in the wrong hands. And once that happens, the risks do not stay confined to one company. That is why it is worth taking a few proactive steps now, even if the company has not contacted you about an incident yet.1) Lock down your accounts nowIf you have interacted with any of the companies mentioned in the breach, or suspect your data might be part of it, change your passwords for those services immediately. Better yet, use a password manager to generate strong, unique passwords for every site. A good tool will also alert you if any of your credentials appear in future data leaks.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.2) Turn on two-factor authenticationEven if a password is stolen, two-factor authentication (2FA) adds a crucial extra layer of security. Enable it for your email, banking apps, cloud storage and any service that offers it. It is one of the simplest ways to block attackers from hijacking your accounts with stolen credentials. 3) Use a personal data removal serviceEven if your data was part of a breach, you can still limit how much of it is floating around online. Personal data removal services scan and delete your personal information from data broker websites that sell or share your details without consent. These brokers often trade in names, addresses, phone numbers and even purchase histories, the same type of data leaked in Salesforce-related breaches.By removing your records from these public databases, you make it far harder for scammers, identity thieves and marketers to find or misuse your information. Many services, like Incogni, handle the entire opt-out process automatically and keep monitoring to ensure your data stays removed.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.4) Spot and stop targeted phishing attacksAttackers who have CRM data often know more about you than a typical scammer. They might reference past purchases, support cases, or other personal details to make their messages sound legitimate. Treat unexpected emails, texts, or phone calls with suspicion, especially if they involve links or requests for payment.The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.5) Use identity monitoring toolsData breaches do not always result in immediate damage. Sometimes, criminals sit on stolen data for months before using it. These services can continuously monitor the dark web for your personal information and notify you if your data appears in new leaks. That gives you time to act before problems snowball.Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.6) Know your rightsIf you think your data was exposed, companies are legally obligated in most regions to inform you. Do not hesitate to contact them directly and ask for details on what was stolen and what steps they are taking to protect affected customers. The more pressure users apply, the more likely companies are to tighten security practices.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawayAttackers can expose your personal data even if you are careful. They gain access to corporate cloud environments and can see customer names, emails, purchase histories and other sensitive details. For users, this means it is crucial to stay vigilant. Criminal groups use this stolen information to launch targeted phishing attacks, open fake accounts, or impersonate you elsewhere. Some even cross-reference leaked Salesforce data with information from previous breaches to build disturbingly complete profiles of their victims.Should companies face stricter penalties when sensitive customer data is stolen? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved. 

Major companies, including Google and Dior, hit by massive Salesforce data breach Read More »

cropped siteicon 2 150x150 1

FBI Files: Civil Rights Era

Anderson, Marian – [ 122 Pages,  8.93MB ] – Marian Anderson (February 27, 1897 – April 8, 1993) was an African-American contralto and one of the most celebrated singers of the twentieth century. Music critic Alan Blyth said “Her voice was a rich, vibrant contralto of intrinsic beauty.” Most of her singing career was spent performing in concert and recital in major music venues and with famous orchestras throughout the United States and Europe between 1925 and 1965. Although offered roles with many important European opera companies, Anderson declined, as she had no training in acting. She preferred to perform in concert and recital only. She did, however, perform opera arias within her concerts and recitals. She made many recordings that reflected her broad performance repertoire of everything from concert literature to lieder to opera to traditional American songs and spirituals. Anderson became an important figure in the struggle for black artists to overcome racial prejudice in the United States during the mid-twentieth century.

Barrett, Richard – [ 242 Pages, 12.45 MB ] –  Richard Anthony Barrett (1934-2010) was a leader of several white supremacist groups. In 1987, following a rally in Cummings, Georgia, Barrett received a death threat that he reported to the FBI. This release consists of five different investigations conducted between 1967 and 2003 in which Barrett was either a subject of the case or was mentioned in another investigation

Black Guerilla Family – [ 456 Pages, 17.18 MB ] – The Black Guerrilla Family (also known as the Black Family or the Black Vanguard) is a prison and street gang founded in 1966 by George Jackson and W.L. Nolen while they were incarcerated at San Quentin State Prison in Marin County, California, north of San Francisco.

 Chavez, Cesar – [ File #1 | File #2 | File #3 | File #4 | File #5 | File #6 | File #7 | File #8 | File #9 | File #10 | File #11 | File #12 | File #13 | File #14 | File #15 | File #16 | File #17 ] – Cesar Chavez (born César Estrada Chávez, (March 31, 1927 – April 23, 1993) was an American farm worker, labor leader and civil rights activist, who, with Dolores Huerta, co-founded the National Farm Workers Association (later the United Farm Workers union, UFW).

 Dee, Ruby [1 Pages, 0.5MB] – Ruby Dee (October 27, 1922 – June 11, 2014) was an American actress, poet, playwright, screenwriter, journalist and civil rights activist. She is perhaps best known for originating the role of “Ruth Younger” in the stage and film versions of A Raisin in the Sun (1961). Her other notable film roles include The Jackie Robinson Story (1950), and Do the Right Thing (1989).
Unfortunately, the National Archives found hundreds of pages on Ruby Dee, but are charging me .80 cents per page. I am archiving this here so others know this file is available either at the NARA branch itself (reference this FOIA request and file number) or via payment. If you’d like to “sponsor” the retrieval of this document, please CONTACT me.

 DuBois, William E.B. – [ File #1 | File #2 | File #3 | File #4 | File #5 ] – William E.B. DuBois, former Director of Publications of the National Association for the Advancement of Colored People, was of interest to the FBI due to his affiliation with communist front groups.

Evers, Medgar – [ 236 Pages, 17.55 MB ] – Medgar Wiley Evers (July 2, 1925 – June 12, 1963) was an African-American civil rights activist from Mississippi involved in efforts to overturn segregation at the University of Mississippi. After returning from overseas military service in World War II and completing his secondary education, he became active in the civil rights movement. He became a field secretary for the NAACP.

Fard, Wallace – The FBI’s “Vault” Release – [ File # 1 | File # 2 | File # 3 | File # 4 | File # 5 | File # 6 | File # 7 ]Fard, Wallace – FBI Release #1 (Not on The Vault) [995 Pages, 75MB] – Miscellaneous information about Wallace D. Fard, who is said to be the original founder of the Black Muslim movement.

Farmer, James L. – [ 338 Pages, 18.58 MB ] – James Leonard Farmer, Jr. (January 12, 1920 – July 9, 1999) was a civil rights activist and leader in the American Civil Rights Movement. He was the initiator and organizer of the 1961 Freedom Ride, which eventually led to the desegregation of inter-state transportation in the United States. In 1942, Farmer co-founded the Committee of Racial Equality, which later became the Congress of Racial Equality (CORE), an organization that sought to bring an end to racial segregation in the United States through nonviolence. Farmer was the organization’s first leader, serving as the national chairman from 1942 to 1944. He was an honorary vice chairman in the Democratic Socialists of America.

 Freedom Riders – [ File #1 | File #2 | File #3 | File #4 | File #5 | File #6 | File #7 | File #8 | File #9 | File #10 | File #11 | File #12 | File #13 | File #14 | File #15 | File #16 | File #17 | File #18 | File #19 | File #20 | File #21 | File #22 ] [ 4,285 Total Pages] – Freedom Riders were civil rights activists who rode interstate buses into the segregated southern United States in 1961 and following years to challenge the non-enforcement of the United States Supreme Court decisions Irene Morgan v. Commonwealth of Virginia (1946) and Boynton v. Virginia (1960), which ruled that segregated public buses were unconstitutional. The Southern states had ignored the rulings and the federal government did nothing to enforce them. The first Freedom Ride left Washington, D.C., on May 4, 1961, and was scheduled to arrive in New Orleans on May 17.

Geiger, H. Jack – [24 Pages, 1.2MB] – Herman J. Geiger (November 11, 1925 – December 28, 2020), known as H. Jack Geiger, was an American physician and civil rights activist. He was a leader in the field of social medicine, the philosophy that doctors had a responsibility to treat the social as well as medical conditions that adversely affected patients’ health, famously (and controversially) writing prescriptions for food for impoverished patients suffering from malnutrition. Geiger came to embody the idea of the responsibility of a physician to do something about what is now known as the social determinants of health, believing that medicine could be an instrument of social change. He served patients’ medical needs as well as social and economic necessities, which he believed were in large part responsible for the health problems communities faced. He was one of the doctors to bring the community health center model to the United States, starting a network that serves 28 million low-income patients as of 2020.

Gregory, Richard “Dick” Claxton – [3,384 Pages, 339.4MB] – Richard Claxton Gregory (October 12, 1932 – August 19, 2017) was an African-American comedian, civil rights activist, social critic, writer, entrepreneur, conspiracy theorist, and occasional actor. During the turbulent 1960s, Gregory became a pioneer in stand-up comedy for his “no-holds-barred” sets, in which he mocked bigotry and racism. He performed primarily to black audiences at segregated clubs until 1961, when he became the first black comedian to successfully cross over to white audiences, appearing on television and putting out comedy record albums.  Gregory was at the forefront of political activism in the 1960s, when he protested the Vietnam War and racial injustice. He was arrested multiple times and went on many hunger strikes. He later became a speaker and author, primarily promoting spirituality.  Gregory died of heart failure at a Washington, D.C., hospital at age 84 in August 2017.

Hamer, Fannie Lou – [554 Pages, 28.68 MB] – Fannie Lou Hamer (1917-1977) was a voting rights activist and civil rights leader. In June 1963, she and several other voting rights activists were arrested at a Mississippi bus station. This release concerns the FBI’s investigation into possible civil rights violations relating to that arrest.

Hampton, Fred – [194 Pages, 8.01 MB] – Fred Hampton (August 30, 1948 – December 4, 1969) was an African-American activist and deputy chairman of the Illinois chapter of the Black Panther Party (BPP). He was killed while sleeping in his apartment during a raid by a tactical unit of the Cook County, Illinois State’s Attorney’s Office (SAO), in conjunction with the Chicago Police Department (CPD) and the Federal Bureau of Investigation (FBI). Hampton’s murder was chronicled in the 1971 documentary film The Murder of Fred Hampton, as well as an episode of the critically acclaimed documentary series Eyes on the Prize.

Hayden, Tom – FBI Vault Release – [608 Pages, 31MB]Hayden, Tom – FBI Release #1 – [181 Pages, 13MB]Hayden, Tom – FBI Release #2 – [273 Pages, 51.2MB] – Thomas Emmet Hayden (December 11, 1939 – October 23, 2016) was an American social and political activist, author, and politician. Hayden was best known for his role as an anti-war, civil rights, and intellectual activist in the 1960s, authoring the Port Huron Statement and standing trial in the Chicago Seven case. In later years, he ran for political office numerous times, winning seats in both the California Assembly and California Senate. At the end of his life he was the director of the Peace and Justice Resource Center in Los Angeles County. He was married to Jane Fonda for 17 years, and is the father of actor Troy Garity.

Hedgeman, Anna – [251 Pages, 52.4MB]Hedgeman, Anna – [11 Pages, 2MB] – Anna Arnold Hedgeman (1899-1990) was an influential African American civil rights advocate, educator, and public servant. She was a pioneering force in the fight for racial and gender equality, dedicating her life to social justice and community service. Hedgeman was the first African American woman to hold a mayoral cabinet position in New York City under Mayor Robert F. Wagner Jr., where she worked on issues of employment, housing, and education. She played a significant role in organizing the 1963 March on Washington, contributing to the historic event that brought attention to the Civil Rights Movement. Her work with organizations such as the National Urban League and the National Council of Churches, along with her efforts in education and politics, left an indelible mark on American society.

 Hudson, Winson– [189 Pages, 7.6MB] – Winson Hudson (1916–2004) was a dedicated civil rights activist from Mississippi whose lifelong commitment to justice helped transform voting rights in the American South. Born in Leake County, she became deeply involved in the movement through her work with the NAACP, where she served as president of the local chapter for more than 35 years. Hudson played a key role in registering Black voters despite facing threats, economic retaliation, and violence. She was also instrumental in desegregating schools in her community, courageously filing lawsuits that challenged entrenched racial barriers. Her memoir, Mississippi Harmony: Memoirs of a Freedom Fighter, co-written with Constance Curry, documents her tireless fight for equality and the personal sacrifices she endured to ensure future generations could live in a more just America.

Hooks, Benjamin – [223 Pages, 10.65 MB] – Benjamin Lawson Hooks (1925-2010) was a civil rights leader who served as the director of the National Association for the Advancement of Colored People (NAACP) for more than a decade. This release consists of a background investigation file with materials dated 1972-1980 and several investigative files concerning threats against Hooks or the NAACP between 1987 and 1990.

Jones, Claudia – [805 Pages, 42.85 MB] – Claudia Cumberbatch Jones (15 February 1915—24 December 1964) was a Trinidadian journalist, who became a political activist and black nationalist through Communism.

Kasper, John – FBI Release #1 –  [2,787 Pages, 206MB]Kasper, John – FBI Vault Releases #1-6 –  [2,780 Pages, 135MB] – John Kasper was an American far-right activist and bookseller known for his vehement opposition to the racial integration of schools following the Supreme Court’s landmark decision in Brown v. Board of Education. Born in 1929, Kasper gained national notoriety in the mid-1950s for his involvement in anti-integration protests, most notably in Clinton, Tennessee, where his incendiary speeches contributed to escalating racial tensions and violence. Despite several arrests and convictions for incitement to riot, Kasper remained a vocal proponent of segregation, often associating himself with the doctrine of “massive resistance” against federal desegregation mandates. A controversial figure throughout his life, Kasper also embraced and propagated the works of American poet Ezra Pound, whose economic and political views echoed his own nativist ideologies.

King, Coretta Scott – [ 976 Pages, 19.76MB ] – Coretta Scott King (April 27, 1927 – January 30, 2006) was an American author, activist, and civil rights leader. The widow of Martin Luther King, Jr., Coretta Scott King helped lead the African-American Civil Rights Movement in the 1960s. Mrs. King played a prominent role in the years after her husband’s 1968 assassination when she took on the leadership of the struggle for racial equality herself and became active in the Women’s Movement and the LGBT rights movement.

 King, Rodney – [ 725 Pages, 53 MB ] – Rodney Glen King (1965-2012) was the victim of an abusive arrest by Los Angeles police officers on March 3, 1991. Two officers involved in the arrest were found guilty of depriving King of his civil rights. This 725-page release of material from the FBI’s color of law investigation consists almost exclusively of news clippings related to the case.

 King, Jr., Martin Luther [226 Pages, 4MB] – Martin Luther King Jr. (born Michael King Jr., January 15, 1929 – April 4, 1968) was an American Baptist minister and activist who was a leader in the Civil Rights Movement. He is best known for his role in the advancement of civil rights using nonviolent civil disobedience based on his Christian beliefs.

Ku Klux Klan – [676 Pages, 22.57MB]Ku Klux Klan – (Russ Kick Collection) – [133 Pages, 22.4MB] – The first Ku Klux Klan flourished in the Southern United States in the late 1860s, then died out by the early 1870s. Members adopted white costumes: robes, masks, and conical hats, designed to be outlandish and terrifying, and to hide their identities. The second KKK flourished nationwide in the early and mid-1920s, and adopted the same costumes and code words as the first Klan, while introducing cross burnings. The third KKK emerged after World War II and was associated with opposing the Civil Rights Movement and progress among minorities. The second and third incarnations of the Ku Klux Klan made frequent reference to the USA’s “Anglo-Saxon” blood, harking back to 19th-century nativism and claiming descent from the original 18th-century British colonial revolutionaries.

Lee, George Washington – [20 Pages, 13.7MB] – George Washington Lee (December 25, 1903 – May 7, 1955) was an African-American civil rights leader, minister, and entrepreneur. He was a vice president of the Regional Council of Negro Leadership and head of the Belzoni, Mississippi, branch of the National Association for the Advancement of Colored People. He was assassinated in 1955 for organizing African Americans to try to register to vote. Since 1890 they had been effectively disenfranchised in Mississippi due to a new state constitution; other states across the South passed similar acts and constitutions, excluding millions of people from the political system and establishing one-party states.

 Lingo, Albert J. – [90 Pages, 29.88 MB] – Colonel Albert J. Lingo, also known as Al Lingo (January 22, 1910 – August 19, 1969) was a career Alabama Highway Patrolman who served as Director of the Alabama Department of Public Safety from 1963 to 1965, including the turbulent early 1960s years marked by marches and demonstrations that characterized the civil rights movement in the U.S. South. Lingo’s service under Alabama governor George Wallace with regard to the Selma to Montgomery marches has been characterized in a negative light, though Lingo himself disputed that characterization, stating that he was following orders as required by his oath of office. He resigned as director effective October 1, 1965, and later ran for election to be sheriff of Jefferson County, Alabama; he died at age 59 on August 17, 1969. (Source: Ernie Lazar)

Liuzzo, Viola – [ 1,535 Pages, 76.47 MB ] – Viola Fauver Gregg Liuzzo (April 11, 1925 – March 25, 1965) was a Unitarian Universalist civil rights activist from Michigan, who was murdered by Ku Klux Klan members after the 1965 Selma to Montgomery marches in Alabama. One of the Klansmen in the car from which the shots were fired was a Federal Bureau of Investigation (FBI) informant. Liuzzo’s name is one of those inscribed on a civil rights memorial in the state capital. She died at the age of 39.

Lowery, Joseph Echols – Cross References – [80 Pages, 41MB] – Joseph Echols Lowery (October 6, 1921 – March 27, 2020) was an American minister in the United Methodist Church and leader in the civil rights movement. He founded the Southern Christian Leadership Conference with Martin Luther King Jr. and others, serving as its vice president, later chairman of the board, and from 1977 to 1997 its president. Lowery participated in most of the major activities of the civil rights movement in the 1950s and 1960s, and continued his civil rights work into the 21st century. He was called the “Dean of the Civil Rights Movement.”

  Malcolm X – [ Part 01 | Part 02 | Part 03 ] – Malcom X was the Minister of the Nation of Islam up to March 1964. He left the Nation of Islam and formed the Muslim Mosque, Inc. and the Organization of Afro-American Unity. Malcom X was assassinated in 1965 while delivering a speech in New York City. Norman Butler, Thomas Johnson and Talmage Hayer were convicted of Malcom X’s murder and all three were sentenced to life in prison. The FBI investigated Malcom X to verify communist influence.

Mississippi Burning (MIBURN) – [1,049 Pages, 55.13 MB] – Three American civil rights’ workers, James Earl Chaney, Andrew Goodman, and Michael “Mickey” Schwerner, were shot at close range on the night of June 21–22, 1964 by members of the Mississippi White Knights of the Ku Klux Klan, the Neshoba County’s Sheriff Office and the Philadelphia Police Department located in Philadelphia, Mississippi. The three had been working on the “Freedom Summer” campaign, attempting to register African Americans to vote. Their murders sparked national outrage and a massive federal investigation. The Federal Bureau of Investigation referred to this investigation as Mississippi Burning (MIBURN), and eventually found the bodies 44 days later in an earthen dam near the murder site. After the state government refused to prosecute, the federal government initially charged 18 individuals but was only able to secure convictions for seven of them, who received relatively minor sentences for their actions. However, outrage over their deaths assisted in the passing of the Civil Rights Act of 1964 and the Voting Rights Act of 1965.

Moore’s Ford Lynching – [3,787 Pages, 235MB] – The Moore’s Ford Lynchings, also known as the 1946 Georgia lynching, refers to the July 25, 1946, murders of four young African Americans by a mob of White men. Tradition says that the murders were committed on Moore’s Ford Bridge in Walton and Oconee counties between Monroe and Watkinsville, but the four victims, two married couples, were shot and killed on a nearby dirt road. The case attracted national attention and catalyzed large protests in Washington, DC and New York City. President Harry Truman created the President’s Committee on Civil Rights and his administration introduced anti-lynching legislation in Congress, but could not get it past the Southern Democratic bloc. The FBI investigated for four months in 1946, the first time it had been ordered to investigate a civil rights case, but it was unable to discover sufficient evidence to bring any charges. In the 1990s publicity about the cold case led to a new investigation. The state of Georgia and the FBI finally closed their cases in December 2017, again unable to prosecute any suspect. The lynching victims — George W. and Mae Murray Dorsey, and Roger and Dorothy Malcom — have been commemorated by a community memorial service in 1998, a state historical marker placed in 1999 at the site of the attack (Georgia’s first official recognition of a lynching), and an annual re-enactment held since 2005. According to the 2015 report by the Equal Justice Initiative on lynchings in the Southern United States, Georgia has the second-highest number of documented lynchings.

NAACP (Summary) – [732 Pages, 26.06 MB] – The National Association for the Advancement of Colored People (NAACP) is an African-American civil rights organization in the United States, formed in 1909. Its mission is “to ensure the political, educational, social, and economic equality of rights of all persons and to eliminate racial hatred and racial discrimination”. Its name, retained in accordance with tradition, uses the once common term colored people. The NAACP bestows the annual Image Awards for achievement in the arts and entertainment, and the annual Spingarn Medals for outstanding positive achievement of any kind, on deserving black Americans. It has its headquarters in Baltimore, Maryland.

Nation of Islam – [ 321 Pages, 14.26 MB ] – The Nation of Islam (NOI) is a syncretic new religious movement founded in Detroit, Michigan by Wallace D. Fard Muhammad in July 1930. The Nation of Islam’s stated goals are to improve the spiritual, mental, social, and economic condition of African Americans in the United States and all of humanity. Its critics accuse it of being black supremacist[2] and antisemitic. The Southern Poverty Law Center states NOI’s “theology of innate black superiority over whites and the deeply racist, anti-Semitic and anti-gay rhetoric of its leaders have earned the NOI a prominent position in the ranks of organized hate.”

  National Council of Churches – [ File #1 51.71MB | File #1A 37.24MB | File #2 17.90MB | File #3 16.69MB | File #4 16.87MB | File #5 28.59MB | File #6 26.53MB | File #7 18.98MB | File #8 32.84MB | File #9 24.15MB | File #10 30.77MB | File #11 23.28MB | File #12 30.71MB | File #13 15.52MB | File #14 26.67MB | File #15 23.94MB | File #16 30.00MB | File #17 16.40MB | File #18 25.32MB | File #19 26.51MB | File #20 21.98MB | File #21 31.37MB | File #22 26.55MB | File #23 17.92MB | File #24 20.96MB | File #25 18.95MB | File #26 16.76MB | File #27 20.66MB | File #28 15.41MB | File #29 20.38MB  | File #30 16.50MB ] – [ 6,530 Total Pages ] – The National Council of the Churches of Christ in the USA, usually identified as the National Council of Churches (NCC), is an ecumenical partnership of 37 Christian faith groups in the United States. Its member denominations, churches, conventions, and archdioceses include Mainline Protestant, Orthodox, African American, Evangelical, and historic peace churches. Together, they encompass more than 100,000 local congregations and 45 million adherents. It began as the Federal Council of Churches in 1908, and expanded through merger with several other ecumenical organizations to become the National Council of Churches in 1950. The NCC’s influence peaked in the 1950s, deriving its strength from a commitment to ecumenism, while the NCC’s strident antiwar position against the Vietnam War in the 1960s alienated the laity leading to a decline in influence thereafter. (Source: Ernie Lazar)

 Parker, Mack Charles – [ 377 Pages, 20.58 MB ] – Mack Charles Parker (1936 – April 24, 1959) was an African-American victim of lynching in the United States. He was accused of ramping a pregnant white woman in northern Pearl River County, Mississippi. Three days before he was to stand trial, he was kidnapped from his jail cell in the Pearl River County Courthouse by a mob, beaten and shot. His body was found in the Pearl River, 20 miles west of Poplarville, 10 days later. Despite evidence compiled by the Federal Bureau of Investigation, and indictment by a federal grand jury, the men who killed him were released.

 Perez, Leander – [ 285 Pages, 19.49 MB ] – Leander Henry Perez, Sr. (July 16, 1891 – March 19, 1969), was the Democratic political boss of Plaquemines and St. Bernard parishes in southeastern Louisiana during the middle third of the 20th century. Officially, he served as a district judge, later as district attorney, and as president of the Plaquemines Parish Commission Council. He was known for his staunch support of segregation.

  Randolph, A. Phillip – [ File #1 7.06MB | File #2 17.38MB ] [ 265 Total Pages ] – Asa Philip Randolph (April 15, 1889 – May 16, 1979) was a leader in the African-American civil-rights movement, the American labor movement and socialist political parties. He organized and led the Brotherhood of Sleeping Car Porters, the first predominantly black labor union. In the early civil-rights movement, Randolph led the March on Washington Movement, which convinced President Franklin D. Roosevelt to issue Executive Order 8802 in 1941, banning discrimination in the defense industries during World War II. After the war Randolph pressured President Harry S. Truman to issue Executive Order 9981 in 1948, ending segregation in the armed services. (Source: Ernie Lazar)

 Robeson, Paul – FBI Release #1 – [ File #1 84.04MB | File #2 102.10MB | File #3 60.84MB ] – [ 2,840 Total Pages ] – Paul Leroy Robeson (April 9, 1898 – January 23, 1976) was an African-American singer and actor who became involved with the Civil Rights Movement. At university, he was an outstanding American football player, then had an international career in singing, as well as acting in theater and cinema. He became politically involved in response to the Spanish Civil War, Fascism, and social injustices. His advocacy of anti-imperialism, affiliation with Communism, and his criticism of the US government caused him to be blacklisted during McCarthyism. Ill health forced him into retirement from his career. He remained an advocate of the unpopular political stances he took until his death.

 Robinson, Amelia Boynton  – [38 Pages, 10MB] – Amelia Isadora Platts Boynton Robinson (August 18, 1911 – August 26, 2015) was an American activist who was a leader of the American Civil Rights Movement in Selma, Alabama and a key figure in the 1965 Selma to Montgomery marches. In 1984, she became founding Vice-President of the Schiller Institute affiliated with Lyndon LaRouche. She was awarded the Martin Luther King, Jr., Freedom Medal in 1990.  In 2014, actress Lorraine Toussaint played Robinson in the Ava DuVernay film Selma.

 Rustin, Bayard – [434 Pages, 25.46MB] – Bayard Rustin (1912-1987) was a civil rights activist and counselor to Dr. Martin Luther King, Jr. Mr. Rustin was investigated for his ties to the Communist Party of the USA. These files are primarily dated during the 1960s.

Savio, Mario – [ File #1 12.86MB | File #2 10.94MB | File #3 2.05MB | File #4 20.42MB | File #5 0.5MB | File #6 16.53MB | File #7 7.66MB | File #8 15.35MB | File #9 20.15MB ] – [ 1,409 Total Pages ] – Mario Savio (1942-1996) was a political and human rights activist from the University of California at Berkeley who became the voice of the Free Speech Movement. He was investigated by the FBI from July 1964 until January 1975, following his arrest in March 1964 at a civil rights demonstration in San Francisco.

 Shabazz, Betty – [ 400 Pages, 16.94 MB ] – Betty Shabazz (1934-1997) born Betty Sanders, aka “Betty X”, was a civil rights advocate and the wife of Malcolm X. The files in this release range from 1958 to 1970.

 Till, Emmett – [ 291 Pages, 9.53 MB ] – Emmett Till Emmett Louis Till (1945-1955) was murdered while visiting relatives in LeFlore, Mississippi. In 1955, two suspects were tried for the murder, but acquitted. In May 2004, the FBI reopened the investigation to determine if other individuals were involved. This release consists of the FBI’s 2006 “Prosecutive Report” on the matter and includes a type-copy of the transcript of the first trial as an appendix.

 Ture, Kwame – FBI 2021 Release – [6,710 Pages, 404MB]Ture, Kwama– FBI Release Old “Vault” Release (Appears to be many more pages later removed from the FBI’s “Vault” website – [456 Pages, 20.12MB]Ture, Kwama – FBI “Vault” Release – [246 Pages, 64.6MB]– Kwame Ture (born Stokely Standiford Churchill Carmichael; June 29, 1941 – November 15, 1998) was a prominent organizer in the civil rights movement in the United States and the global Pan-African movement. Born in Trinidad, he grew up in the United States from the age of 11 and became an activist while attending the Bronx High School of Science. He was a key leader in the development of the Black Power movement, first while leading the Student Nonviolent Coordinating Committee (SNCC), then as the “Honorary Prime Minister” of the Black Panther Party (BPP), and last as a leader of the All-African People’s Revolutionary Party (A-APRP).

 White Supremecist Groups – [ 78 Pages, 10.94MB ] – White supremacy is the belief of, and/or promotion of the belief, that white people are superior to people of other racial backgrounds and that therefore whites should politically, economically and socially dominate non-whites. The term is also used to describe a political ideology that perpetuates and maintains the social, political, historical and/or industrial dominance of whites. Different forms of white supremacy have different conceptions of who is considered white, and different white supremacist identify various groups as their primary enemy.

  Wilkins, Roy – [ 1,035 Pages, 48.05 MB ] –  Roy Wilkins (August 30, 1901 – September 8, 1981) was a prominent civil rights activist in the United States from the 1930s to the 1970s. Wilkins’ most notable role was in his leadership of the National Association for the Advancement of Colored People (NAACP). (Source: Ernie Lazar)

 Williams, Franklin Hall – FBI Release [170 Pages, 92.7MB ] Williams, Franklin Hall – National Archives and Records Administration (NARA) Release #1 [5 Pages, 0.9MB ]Franklin H. Williams (1917–1990) was a lawyer and civil rights leader in the United States. As an assistant to Thurgood Marshall he represented the National Association for the Advancement of Colored People before courts in criminal cases throughout the South. In 1950 he was appointed director of the NAACP’s western region where for 9 years he directed drives involving open housing, school desegregation and civil rights.

 Wright, Nathan – Russ Kick Collection Release – [180 Pages, 27.2MB] Wright, Nathan – FBI Release #1 – [82 Pages, 5.25MB] Wright, Nathan – FBI Release #2 – Currently being scanned Wright, Nathan – FBI Release #3 – [223 Pages, 12MB]- Dr. Nathan Wright was both an Episcopal minister and a scholar. A prominent advocate of black power, Wright shared the ideology of Stokely Carmichael and H. Rap Brown, leaders of the Student Nonviolent Coordinating Committee. He was both a participant and chronicler of the first Freedom Ride. At the National Conference on Black Power in Newark in 1967, Wright served as chairman of this pivotal meeting where the tactics of the civil rights movement changed from the demand for individual rights toward demands for group rights.After his ordination in 1950, Nathan Wright fulfilled his parish ministry in a variety of capacities. He held diocesan and national positions which included six years’ service as an Associate in the Office of Stewardship. From 1964 to 1969, Wright served as executive director of the Department of Urban Work in the Diocese of Newark. A lifelong Republican and an avid supporter of Presidents Nixon and Reagan, he was highly educated, earning six degrees, among them a doctorate of education from Harvard and a master’s degree from Episcopal Theological School.

 Wright, Richard – [ 180 Pages, 9.34 MB ] – Richard Nathaniel Wright (September 4, 1908 – November 28, 1960) was an African-American author of sometimes controversial novels, short stories, poems, and non-fiction. Much of his literature concerns racial themes, especially those involving the plight of African Americans during the late 19th to mid-20th centuries. His work helped change race relations in the United States in the mid-20th century.

FBI Files: Civil Rights Era Read More »

JFKSearch

Russian Dossier on JFK Assassination Released to Public After Hand Delivery to Rep. Anna Paulina Luna

A 386-page dossier reportedly compiled by the Russian government detailing its findings on the assassination of President John F. Kennedy has been delivered to the United States and made public for the first time. The documents, written primarily in Russian, were hand-delivered by the Russian Ambassador to the United States to Representative Anna Paulina Luna (R-FL), who announced the release and public posting of the material this week.
According to Luna, her office received the physical dossier directly from the Russian Embassy in Washington, D.C. “This is of massive historical significance,” she wrote on X. She noted that Congress had previously attempted to obtain the same material in the 1990s but was denied. Luna stated that a “team of experts” is now working to translate and authenticate the files, which have not been edited or redacted and “appear in their original form as delivered.”
The documents have been published in full by veteran journalist and author Jefferson Morley on his Substack platform, JFK Facts. Morley was entrusted with ensuring that the public could access the dossier without restrictions.Continue scrolling for more…

Jefferson Morley
Morley is an American journalist and historian who has spent decades researching U.S. intelligence and the Kennedy assassination. He worked for The Washington Post for 15 years, served as national editorial director for the Center for Independent Media, and currently serves as vice president of the Mary Ferrell Foundation. His writing has appeared in The New Republic, Salon, and The Intercept.
Luna emphasized that the report “has not been edited, redacted, or tampered with” since its delivery and said that “while experts are actively authenticating the legitimacy of these documents, at this time they are believed to be authentic.” The dossier’s early English-language sections indicate a focus on Lee Harvey Oswald’s time in the Soviet Union and possible intelligence connections, but the full scope of the Russian findings remains unclear pending complete translation.
###
Document Archive
Download the Russian dossier, in full, unedited (The Black Vault’s Mirror #1 [Recommended]):  Russian_Jfk_Dossier_10152025.pdf [386 Pages, 67.7MB]
Download the Russian dossier, in full, unedited (The Black Vault’s Mirror #2):  Russian_Jfk_Dossier_10152025.pdf [386 Pages, 67.7MB]
Download the Russian dossier, in full, unedited (Mirror #3 [JFK Facts]):  Russian_Jfk_Dossier_10152025.pdf [386 Pages, 67.7MB]

See Also

Explore the JFK Assassination Records
The Black Vault hosts a dedicated, free search engine for the 2025 JFK file releases and prior records—indexinghundreds of thousands of pages from multiple agencies.

Full-text search across OCR’d documents
Metadata display (title, agency, date, RIF, classification)
Multi-select filters with “Select All” toggles
Preview snippets with highlighted search terms
Open PDFs in PDF.js with query highlights
Color-coded classification indicators

Open the JFK Files Search Engine
No account required. Free public access.
Follow The Black Vault on Social Media:

Russian Dossier on JFK Assassination Released to Public After Hand Delivery to Rep. Anna Paulina Luna Read More »

1 apples new preview app transforms iphone editing

Apple adds game-changing iPhone document feature that users waited years to see

NEWYou can now listen to Fox News articles!
Apple has officially launched iOS 26, and with it comes a fresh look and one standout new feature: the Preview app. If you’ve updated your iPhone and noticed a new icon that looks like it belongs on a Mac, you’re not imagining things. Preview has finally arrived on iOS, and it’s more useful than you might think. Many iPhone users have long wanted an easier way to edit, annotate and scan documents without relying on third-party tools. Now, Apple’s built-in Preview app fills that gap, combining features from the Files app, Markup tools and the camera’s document scanner into one streamlined experience.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.What Apple’s Preview app can doJust like the version on Mac, the Preview app on iPhone lets you handle basic photo edits and PDF changes with ease. You can:Open and view PDFs or images directly from your Files app.Annotate, draw and highlight content using the familiar markup tools.Add text boxes or signatures to forms.Crop, resize, or rotate photos.Scan documents straight from your camera. The new Preview app on iPhone makes scanning and signing documents feel effortless. (Kurt “CyberGuy” Knutsson)When you open the app, you’ll see simple options like New Document or Scan Document. Tap the small Files section at the bottom to browse your phone’s stored content. The interface feels like Apple’s previous screenshot editor, so it’s instantly familiar. You can tap the three-dot menu for advanced tools like background removal, which saves you from downloading extra editing apps. If you open a PDF, Preview automatically detects fillable text boxes and lets you add your signature, perfect for signing forms or agreements on the go.10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE With built-in markup tools, you can highlight, draw or add your signature in seconds. (Kurt “CyberGuy” Knutsson)How to scan a document using the Preview appPreview’s built-in scanning tool is one of its best upgrades. It’s fast, accurate and ideal for receipts, contracts, or notes you want to store securely. If you’re already using Notes or Files to scan documents, you’ll find Preview much faster. It centralizes everything, no switching between multiple apps. Here’s how to do it:Open the Preview app.Tap Scan Documents from the home screen or the plus (+) icon if you’re already viewing another file.Point your iPhone camera at the page you want to scan and hold it steady.Preview will automatically detect the edges and capture the image.After Preview captures the document, it shows a thumbnail.If the edges aren’t right or the lighting is poor, tap Retake.If you’re satisfied, tap the Blue Check mark in the upper right of the screen. This creates a digital document.How to save or export your documentAfter scanning your pages, you can easily save, rename, or share your document directly from the Preview app using these steps.Save to FilesTap the Share button (a square with an arrow) and choose Save to Files. Select where you’d like to store it, such as iCloud Drive > Documents or On My iPhone > Scans, then tap Save.The scan is saved as a PDF file you can access anytime.Rename the documentTap the title at the top of the screen, type a new name such as Receipt-Oct2025.pdf, and tap Done.Share the documentFrom the same Share menu, you can send the PDF by AirDrop, Messages or Mail.Where to find saved scans laterGo to the Files appTap BrowseThen navigate to On My iPhoneClick PreviewTap Scanned (or whichever folder you selected). You can open, mark up, or share the PDF directly from there.HOW TO SAVE ANY FILE AS A PDF Quickly find your saved scans in the Files app under Preview, where you can open, edit or share them. (Kurt “CyberGuy” Knutsson)Similar tools for Android and WindowsIf you’re on Android or Windows, you can do many of the same things using tools built into those platforms.How to scan and edit documents on AndroidIf you’re using an Android phone running Android 6.0 or later, the Google Drive app includes a built-in document scanner powered by Google Play services. Starting in September 2025, Google began rolling out an upgraded scanning experience with sharper previews, smarter cropping and rotation, improved shadow removal and color filters that make your scans look more professional. The update also adds smoother page adjustments and a thumbnail carousel to easily reorder or delete pages before saving.Open the Google Drive app on your Android device and make sure it’s updated through the Google Play Store for the latest features.Tap the “+” or camera icon, then select Scan from the pop-up menu. Some phones may show a dedicated camera button for this.Hold your phone steady so the entire page is visible. Drive automatically detects the edges and captures the document.Use the built-in crop, rotate and color filter tools to fine-tune your scan. You can also remove shadows or retake a page if needed.Tap Add page to create a multi-page PDF. If your device supports the new AI-powered scanner, Drive may detect and capture pages automatically.Review your pages using the thumbnail carousel at the bottom to rearrange or delete any before saving.Tap Save, enter a file name, choose your Drive folder and select whether to save as a PDF or JPG.Open the saved file in Drive to annotate or highlight text using markup tools like drawing or underlining.Share or export the finished document by sending a Drive link, attaching it to an email, or downloading it to another app.EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES Use Google Drive’s upgraded scanner on Android to capture, crop and clean up documents in seconds. (Kurt “CyberGuy” Knutsson)How to annotate and sign PDFs on WindowsMicrosoft Edge includes a built-in PDF reader that supports inking, highlighting and adding comments or text notes. However, Edge is not a full PDF editor for rewriting text or rearranging pages. You can still draw or sign directly onto a PDF using the Draw/Pen tool, then save your edits. Some recent versions of Edge have limited annotation support, so features may vary. Because of those limitations, many Windows users rely on third-party PDF editors for complete editing control, such as adding text, rearranging pages, or performing OCR. The built-in Snipping Tool remains a quick way to capture and mark up screenshots or documents before saving or sharing. These steps work on both Windows 10 and Windows 11 using the Chromium-based Microsoft Edge browser.The exact toolbar layout may differ depending on your version.Open the Snipping Tool to capture a screenshot or document.Choose the capture type: region, freeform, full screen, or window.Save your capture as a PNG or JPG, or copy it to your clipboard for quick pasting.To edit a PDF instead, open the file directly in Microsoft Edge.Right-click the PDF file and select Open with → Microsoft Edge, or drag the file into the Edge window.Use the Pen / Draw tool to write, draw, or sign directly on the PDF.Highlight text by selecting it and choosing Highlight from the pop-up menu.Add notes or comments with Add comment/text note.Use the Draw tool again to sign your name, then save your edits.Click the Save or Save As icon (the diskette symbol) to store your changes.If your annotations don’t appear after saving, choose Print → Save as PDF to permanently embed them.Best alternative PDF tools for Windows usersIf Microsoft Edge doesn’t meet your editing needs, consider these free or paid alternatives that work across different devices:PDF24 Creator: A free, highly rated PDF editor designed for Windows. It lets you merge, compress, sign, and convert PDFs without watermarks.Xournal++: A popular open-source tool for Windows, macOS and Linux that lets you annotate PDFs with a pen or stylus.Foxit PDF Editor: A professional, cross-platform editor with full text editing, signing and OCR tools. It’s available for Windows, macOS, iPhone and Android through the Foxit PDF Editor Mobile app.These tools give you far more flexibility than Edge if you regularly edit, organize, or sign digital documents across devices.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysApple’s new Preview app in iOS 26 makes editing and scanning documents easier than ever. It brings together familiar tools from Files, Markup and the camera into one place, saving you time and steps. The experience feels seamless, especially if you often switch between your Mac and iPhone. For Android and Windows users, similar built-in tools already offer strong alternatives. Google Drive’s upgraded scan feature and Microsoft Edge’s PDF tools both make it simple to capture, annotate and share files. These options prove that whether you’re on iPhone, Android, or Windows, document management has never been more convenient. In the end, Preview’s arrival on iPhone marks another step toward a unified Apple ecosystem where productivity tools just work. If you’ve ever wished you could scan, sign, or edit a file in seconds, this update delivers.Do you think Apple’s new Preview app will replace your go-to document editor, or will you keep using third-party tools? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved. 

Apple adds game-changing iPhone document feature that users waited years to see Read More »

2025 10 16 06 13 35

Thousands of Historical Artifacts Cataloged in Released NY Parks Databases

(Note: Photo graphic above is for illustrative purposes, and not a representation of actual holdings of the State of New York)

Released records from the New York State Office of Parks, Recreation, and Historic Preservation (OPRHP) reveal detailed inventories of the state’s vast collection of historical and archaeological artifacts. Released under the New York Freedom of Information Law (FOIL), the files catalog thousands of items curated and stored across the state’s museum, park, and research facilities.
The release includes structured database files listing artifact categories, site origins, materials, estimated time periods, and associated state collections. Items span centuries of New York’s cultural history, ranging from prehistoric Native American tools and pottery fragments to 19th- and 20th-century industrial and household objects.Continue scrolling for more…

The Databases
The released spreadsheets appear to represent the internal cataloging systems used by the agency’s archaeologists and curators. Together, they include thousands of records drawn from state-supervised excavations and site surveys conducted over decades.
Each database provides metadata fields such as:

Site code or excavation ID
Provenience and stratigraphic context
Artifact type and description
Material composition (e.g., bone, stone, ceramic, metal)
Associated cultural period or phase
Current repository or storage facility

The Historic Collections file serves as a high-level reference table summarizing objects held across different regional collections under state management.
Highlights and Notable Entries
A review of the datasets reveals a remarkable breadth of material documenting New York’s long human history. Among the more notable entries are:

Projectile points and stone tools from early prehistoric contexts, some listed with associated radiocarbon date ranges.
Colonial-era artifacts, including clay pipes, glass fragments, and iron implements recovered from 17th- and 18th-century settlement sites along the Hudson River and Long Island.
Industrial artifacts tied to 19th-century canal and railroad projects, reflecting New York’s rapid technological expansion.
Domestic objects such as ceramics, buttons, and utensils cataloged from urban excavations, providing insights into everyday life in early New York City and Albany.

While the databases are technical in format, they collectively represent one of the most comprehensive looks at how the state manages, tracks, and preserves its archaeological heritage.
The full spreadsheets are available for download through The Black Vault’s document archive below.
###
Document Archive
Historic_Collections.xlsx (11MB)
tblArchFieldCat.xlsx (3.5MB)
tblArtifactInvFirst_Fields_Requested.xlsx (20MB)
tblArtifactInvFirst_Updated_10_20_2022.xlsx (40MB)
tblArtifactInvSecond_Fields_Requested.xlsx (21MB)
tblArtifactInvSecond_Updated_10_20_2022.xlsx (42MB)
Response Letter

Follow The Black Vault on Social Media:

Thousands of Historical Artifacts Cataloged in Released NY Parks Databases Read More »

view jupiter

Scalar Physics, Alien Messages, and Bottomless Holes: Bizarre but Thought-Provoking Conspiracies!

The conspiracy world is a strange place to step into. It is often a strange and potentially dangerous mix of obscured partial truths, bizarre claims that border on the preposterous, and muddied and distorted facts, statistics, and statements. Perhaps because of this, it is also a world where individuals or groups can hijack or even outright invent conspiracies for their own ends, a situation that potentially affects us all.
While we won’t debate the rights or wrongs of indulging in conspiracies here, other than to say the need to question everything, particularly where an authority is concerned, is very real, and that the simplistic statement that all conspiracies rise out of the lack of understanding on the part of the masses is as dangerous as some of more extreme and out of touch conspiracies themselves. With that in mind, we will explore several conspiracies here that, on the surface, appear bizarre and outlandish, but that, upon further investigation, have the potential to be more accurate than many people would like to think.
Perhaps a good place to start here would be with the alleged so-called Light Apparition Experiments, which not only feature apparent projects involving cold explosions, but also offer further testimony to the apparent credibility of remote viewing and just how far such projects went. Moreover, the alleged documents that gave birth to these conspiracies appear to correspond with documented events at the time.
Before we delve into these bizarre experiments, it is worth our time first turning our attention to the CIA’s remote viewing program, Project Stargate. This program began in the early 1970s, officially, at least, and involved various renowned remote viewers. Arguably the most well-known of these, and certainly one of the most accurate, was Ingo Swann. While we won’t go into them in detail here, Swann offered some remarkable details during his remote viewing sessions, including information about Jupiter during a mission to the gas giant, which was confirmed by scientists several years later. If we accept that Swann was truthful and accurate about what he discovered during his remote viewing mission to Jupiter, then we should perhaps also take his offerings of what he saw on the Lunar surface (huge domed buildings and non-human intelligent life forms) equally as seriously, at least potentially.  

Officially, the project was brought to a close in 1995; however, as we might imagine, there are many who believe these experiments have continued behind closed doors, and perhaps continue today. Whatever the truth, in the years that have followed, there have been many declassified documents that have offered peeks into the world of remote viewing, as well as multiple Freedom of Information requests that have done likewise. While many of these documents are thought-provoking and intriguing in their own right, some stand out more than the others, one that featured a very credible remote viewer seemingly “spying” on the Cold War nemesis of the West, the Soviet Union, and mysterious light apparition experiments. Although the document details these experiments and the consequences thereof, they don’t, unfortunately, detail the technology or methods used to achieve what appears to be the creation and control of huge bursts of energy that resulted in apparent temporal disturbances that seemed to alter time itself.
According to the documents in question, this particular remote viewing session took place on June 19th, 1984, with the remote viewer labeled as Source 01 (although many have suggested the viewer was Joe McMoneagle, one of the most renowned remote viewers on record). To begin with, Source 01 stated he was looking up from the ground and could see a “swirling mass of (what) looks like very low clouds”. After being asked to scan his surroundings, he stated that he was looking at some kind of building and that there were “some people off to one side”. He elaborated that the building was “in the form of a ‘T’” and that “it’s got twin domes on each end of the crossbar”. Moreover, he offered that he could see a large set of doors with an “inverted ‘V’ over them”. He further stated that he had the impression that he was “inside an energy field”. His instructors then told him to go inside one of the domed buildings.
Moments later, he began describing what he could see inside the building. He stated that he could see a table that appeared to have been pushed up against a wall, seemingly to make space in the middle of the room. More bizarrely, he stated he could see multiple colors all around him and that he could “sense flames of some kind”. He was then instructed to make his way to the other domed building. He did so, and reported that although this room was almost identical, he could also see something “like a mushroom shape” and “a pedestal of some kind” that had “very ornate gold handles on the base of something”.
Then, the session guide instructed Source 01 to “examine the 24-hour time window known as 9 April 1984”. He did as instructed, and his revelations take this account in a drastically strange and thought-provoking direction.
To begin with, Source 01 struggled to put across what he was witnessing, offering only that it had “something to do with time”. He then added that he had a “perception of a broadcast of energy that’s very finite, but it’s not, that’s very localized”, like an “energy ball”. Even stranger, he could see multiple people in the room, all of whom were concentrating on this “event”. Moreover, he sensed the overriding feeling among these people was one of uncertainty and even fear. He was then asked to concentrate on the “event” and describe exactly what he was seeing.
Source 01 did as instructed and responded that he believed he was witnessing something akin to a portal, elaborating that he looked “like a hole drilled through nothing”.  He further stated that this portal appeared like the “connected tissue of reality” that was “twisted around in a corkscrew-like fashion” that made a “very strange light effect”. He then clarified that this light was “not reflective light, it’s just light” with an “iridescent outline of some kind”. Then, the session turned even more bizarre.
He stated that it suddenly appeared “very much like something popped in our reality”, and that he could see a “hazy outline of light is like defining an area where there’s a whole different energy format”. He was asked to focus on this energy, but whenever he did so, he claimed to feel “a whole surge of different frequencies” that was “really strange, (and was) like thousands and thousands” of frequency waves. The session guide then asked where this energy came from, to which Source 01 responded that it was “from somewhere else, like, it just appears there”.
At this point, the session guide instructed Source 01 to concentrate on the people in the room who were viewing the event. He did as requested, noting first off, whether of consequence or not, that all of the people in the room had dark hair. Moreover, all of these individuals wore the same black and white uniform. Source 01 was then asked to select one of the individuals at random and focus his attention on them. He did so, and immediately sensed great fear within him, something he also stated he could feel from the group as a whole. Interestingly, he elaborated that although there was great fear among the group, so much so that they desperately wanted to flee, they also seemingly had a desire “to throw themselves down and worship this light!”
Source 01 was then asked if he could pick out an individual who appeared less affected than the majority of the people in the room. He scanned the room and picked out an individual whose emotion appeared much more in check than the rest. He then stated that this person believed that the “event” was “an effect from another location – like a broadcasting of a focal point”, before adding that this was “just a side effect to the real objective”, although he wasn’t clear what that objective was.
The session guide then directed Source 01 to examine the “mechanics” of the experiment in an effort to establish what was taking place. He did so, but because he had little understanding of what he was witnessing, he struggled to communicate this to the guide. He stated that he was watching some kind of “coming together of wave formats” that were “overlapping and colliding with each other”, which produced extremely high peaks and extreme lows. The session guide then asked about “the mechanics of what happens”, as well as the “machinery that makes this happen”. All Source 01 could offer in reply was that he could see “sets of coils” that appeared to be “protected by shields”. These coils, Source 01 continued, produced “extremely low frequencies”. Then, the session came to a close. There were, though, further sessions that took place on this event, which resulted in further remarkable revelations.
One of these sessions had actually taken place several weeks earlier, on May 30th, 1984, and involved a remote viewer referred to as Source 63. They claimed, for example, that they had witnessed some kind of “man-made explosion” while sensing a “muffled boom” and a “powerful light”, as well as “whining, ripping, and water sounds”. After this, Source 69 continued, they witnessed a “large, dome-shaped object (that) rose out of the water”. Moreover, they offered that these strange events were somehow connected to a “one-story fenced-in building” that had a “strange, secretive, quiet electric feeling” to it. Also of interest, Source 69 also claimed, just like Source 01, that all of the people present in the building wore black and white uniforms and had dark hair.
Yet another remote viewer, referred to as Source 02 in the documents, made their own startling observations during a session that took place on June 7th, 1984. With a focus on the date, April 9th, 1984, Source 02 reported seeing an “awesome explosion” which “produced a brilliant white flash containing colors and rainbows”. Moreover, this explosion “produced tremendous quantities of heat and measured in miles”. They continued that the explosion was “an energetic, electrostatic event producing static, humming, popping, and roaring sounds”, which is very similar to observations made by Source 01. Furthermore, the explosion “produced a column rising up” as well as “dirty, layered clouds”, with “shock waves, upheaval, and earth tremors” expanding out from this column.
With all of these remote viewing sessions made and the apparent revelations made in them, we might ask just what they were witnessing, and if we recall the date the remote viewers were asked to concentrate on – April 9th, 1984 – we might find clues as to at least part of the story.
On the date in question, around 200 miles off the coast of Japan, a freak and bizarre incident unfolded, one that is both documented and still without explanation, when residents on the Japanese coast saw a huge mushroom cloud rising above the horizon. Given the fact that the Cold War was still very much ongoing, not to mention Japan’s own tragic history at the end of the Second World War, many of those who saw this strange cloud rising high into the sky believed that some kind of nuclear weaponry had been deployed. This strange cloud remained for several hours, with multiple cargo planes and commercial airliners having to drastically alter their course to avoid it. One such plane was Flight 36 of Japan Airlines, whose captain, Charles McDade, began an emergency descent as well as changing course. He stated to flight controllers in Alaska that he could see something bizarre that “looks like a nuclear explosion, only there’s no fireball”.

As the years have gone on, many people have put forward suggestions to explain the bizarre mushroom cloud that April morning and afternoon, including that it was produced by known underwater volcanoes in the region. However, no data support any such volcanic activity on the day in question, or any time near it. Perhaps because of the lack of a solid explanation, not to mention an apparent disinterest in the events by the authorities, many people have contemplated whether this strange mushroom cloud was part of something much more ominous than the natural world. And following the revelations of the remote viewers in the CIA documents we have just explored, we might consider if this unexplained cloud was the result of some kind of secret Cold War experiment. In fact, some researchers have seemingly pieced together a fuller picture based on these documents and the known events of the date in question. Before we turn our attention to them, however, it is worth our time here looking at the basics of Scalar Physics, which can, in theory, result in “cold explosions” that can, again, in theory, create portals or wormholes.
Scalar physics revolves around a hypothetical type of longitudinal wave that differs from electromagnetic waves, named scalar waves. Moreover, these waves, in theory, according to some scientists, may have the ability to influence and interact with the matter of the universe, and even the fabric of time and reality, including the potential to create portals or gateways. If we return to some of the details given by Source 01 in the remote viewing experiments for a moment, we might recall that they stated that they were aware of some kind of rip in the fabric of reality. Just one theoretical consequence of the manipulation of scalar waves is something termed “cold explosions”, which, unlike traditional explosions that release a massive amount of destructive energy and heat, cold explosions unleash huge amounts of energy but without the heat, making it a non-widespread destructive explosion.
If we now return our attention to the events of April 9th, 1984, off the coast of Japan, as well as the strange scenes described by the remote viewers regarding that date, we might ask if some kind of Cold War experiment was taking place, perhaps behind the Iron Curtain somewhere in the Soviet Union, perhaps in the far east of the country, experiments that involved scalar waves, and if this was what the coastal residents of Japan were witnessing. Moreover, according to another CIA document, Star Wars Now! The Bohm-Aharonov Effect, Scalar Interferometry and Soviet Weaponization, dated April 24th, 1984, written by T.E. Bearden, this might not be that of a stretch of the imagination.
According to the document in question, on the morning of April 9th, 1984, at 5:14 am, a vast explosion occurred around 200 miles off the coast of Japan in a known weapons testing area of the Soviet Union. The result of this explosion was a huge mushroom cloud that rose out of the ocean to a height of around 60,000 feet in only two minutes, with a diameter of around 150 miles. It is worth noting that official records do show that a weapons test in this Soviet territory was scheduled for April 9th, 1984, although they were scheduled to take place at 9 am. Could it be possible that these tests were brought forward at the last minute? Or perhaps the time was purposely incorrect to create even more secrecy?
Of even more interest, this document also details five commercial airplanes and two military cargo planes that found themselves caught up in the mushroom cloud, particularly the two military planes that had been sent into the cloud intentionally to gather data. This data revealed that the cloud was made of solid particles of ice, and furthermore, the cloud was substantially colder than the atmosphere surrounding it.

The document determined that the explosion and the strange events surrounding it were “man-made” and were very likely the result of a Soviet scalar weapons test. Moreover, the reasons for this test were seemingly to achieve a cold explosion. According to Beasdon, if two scalar waves were crossed at a specific location, the result could very well be a cold explosion. Of even further interest, Beardon put forward that one consequence of this explosion would be the presence of rainbow-like lights. We might recall that this was another detail that was witnessed by the remote viewers.
It is also worth recalling the remote viewers’ descriptions of the building connected to these experiments, particularly the T-shape. If we look at a proposed device that would be required to weaponize scalar waves – a Large Scalar Interferometer Transmitter – one detail that stands out to us is that its dimensions are distinctly T-shaped. Could it be possible that the T-shape of the buildings was part of some kind of upscaling of such a device?
What should we make of all this? Could it be possible that the Soviet Union was experimenting with scalar waves back in 1984? And if there is any truth to this, what should we make of the possibility that the United States, and possibly other Western nations, are experimenting with such energy? And perhaps more than anything else, did this speculative experiment result in the bizarre mushroom cloud that appeared off the coast of Japan that April morning?
Perhaps another seemingly bizarre conspiracy we should pay a little more attention to is one revolving around the Georgia Guidestones, which author Paul Blake Smith makes a compelling argument for in his book President Eisenhower’s Close Encounters. It is a conspiracy that not only involves an apparent elite group operating outside of the government framework, but also potential contact with intelligence from elsewhere. Of course, if there was any truth in such assertions, then we would have to reexamine the nature and context of the Georgia Guidestones from a totally different perspective. Moreover, the speculative origins of this equally speculative conspiracy stretch back to the start of the Modern UFO era in the early 1950s.
Before we delve into this fascinating conspiracy, it is worth examining just how the Georgia Guidestones came into existence and why. In fact, there is no mystery as to when the stones appeared. On the morning of March 22nd, 1980, in Elbert County, Georgia, the stones had been unveiled to the public for the first time, and were credited to “Robert C. Christian”, who claimed to represent “a small group of loyal Americans”. In fact, Christian had not made a secret of creating the stones. Only nine months earlier, he had commissioned the monument, claiming in the public record that the group he represented had planned the structure over the course of two decades, a group that wished to remain completely anonymous. It is also interesting to note that when Christian first approached the Elbert Granite Finishing company for them to construct the stones, the president of the company, Joe Fendley, determined that he was not mentally stable, and because of this, he drastically overinflated the quote, thinking that Christian would be put off by the high costs. To his surprise, they were accepted without question.
Interestingly, there were ten guidelines in total etched into the Guide Stones, which some people have taken as a twist on the Ten Commandments from the Bible. Moreover, these guidelines are written in eight different languages: English, Spanish, Swahili, Hindi, Hebrew, Arabic, Chinese, and Russian, which were chosen, Christian claimed, as they represented the largest overall collection of humanity.
Ultimately, the Guidestones had been created, it was claimed, due to the belief of those behind them that nuclear war was imminent. The stones were to act as a guideline for potential survivors, or even a human civilization that might arise in the future. These guidelines were:

“Maintain humanity under 500,000,000 in perpetual balance with nature.
Guide reproduction wisely – improving fitness and diversity.
Unite humanity with a living new language.
Rule passion – faith – tradition – and all things with tempered reason.
Protect people and nations with fair laws and just courts.
Let all nations rule internally resolving external disputes in a world court.
Avoid petty laws and useless officials.
Balance personal rights with social duties.
Prize truth – beauty – love – seeking harmony with the infinite.
Be not a cancer on the Earth – Leave room for nature – Leave room for nature.”

Initially, while some people were skeptical of the message behind the Guidestones, most people were indifferent to them, and Christian eventually agreed to transfer the rights of the land they stood on to Elbert County, which, in turn, agreed to protect and preserve them. They would eventually erect a barbed wire fence around the stones to prevent cattle from approaching the stones and causing damage to them. However, the move seemingly lit a slow-burning conspiracy that swirled around the Georgia Guidestones and grew steadily as the 2000s unfolded. While there had been unsubstantiated rumors of Devil worship and Occult rituals secretly taking place at the monument for years, claims that the monument was connected to the “New World Order” began to grow, specifically, that they were a blueprint for their “depopulation” agenda, which many people insist is underway.
Whatever the truth, those conspiracies seemingly boiled over, and at 4 am on July 6th, 2022, a purposeful explosion completely destroyed the stones written in Swahili and Hindi, as well as significantly damaging the capstone. Not long after, the monument was dismantled by the authorities due to safety concerns. Meanwhile, investigators had highlighted a vehicle leaving the location shortly after the explosion on CCTV. However, no leads came from the back of this potentially suspicious vehicle. Moreover, no organization ever claimed responsibility for the act, something which we might expect they would, given the statement-like brashness of the move, leading some to question just who was behind the move, and why. Although there are plans to rebuild the monument, the remains of the original stones are still in the hands of the Elberton Granite Association.
Now here is where we turn our attention back to the research of Paul Blake Smith and his previously mentioned book, President Eisenhower’s Close Encounters. He detailed how it could be possible that the six men behind the Georgia Guidestones (sometimes dubbed the “Secret Six”) could be men who had close connections to President Eisenhower during his presidency. Moreover, if there was any truth to such claims, then these men had almost certainly been privy to what was discussed during Eisenhower’s alleged secret meeting with extraterrestrial representatives in 1954.

Smith goes on to highlight a group of six mystery Georgia police officers who, it appeared, had been recruited to act as some kind of secret security unit for President Eisenhower. What’s more, this unit had accompanied Eisenhower when he went to California in February 1954, when the alleged meeting with extraterrestrials took place. Smith, whose research is extensive and thorough, highlights a note in the following year in the official appointment logs. For the date, February 12th, 1955, the official logs state that at around 4 pm, “The President autographed a group picture taken February 19, 1954, showing members of the Georgia State Police who assisted the Secret Service in setting up the security on that occasion.” Of course, this is the date of the alleged meeting with alien representatives. As Smith asks, why would a photograph have been taken with this particular group unless they had been part of some truly momentous event? Moreover, the picture had been signed during what was, officially, a hunting vacation that the “secret six” security unit was also part of. Was this really a hunting vacation?
Smith then relays the research and revelations of Art Campbell. According to Campbell, during the hunting vacation in question, President Eisenhower was accompanied by the secret six unit on a “covert middle-of-the-night trip somewhere out west”. He detailed that at around 3 am on February 11th, 1955, Eisenhower and his security unit discreetly made their way to Spence Air Force Base. From there, they flew to Holloman Air Force Base in New Mexico. According to Campbell’s source, the plane touched down just before 9 am and immediately made its way to the furthest point of the runway, as far away as possible from the barracks. The most suspicious move of all, though, was the alleged order to radar controllers to switch off their equipment on the morning in question. Then, things turned even stranger.
Two shiny disc-shaped objects were seen hovering over the base, while a third identical object hovered a short distance away. Then, one of these discs landed at the base, a short distance away from the plane containing the President and his secret six-member security unit. Moments later, with many of the soldiers watching from the barracks, an opening appeared on the side of the object before a silver ramp extended from it. Moments after that, the steps were put in place at the side of the President’s plane. President Eisenhower then appeared at the top of these steps and made his way down them. He crossed the short distance between the plane and the disc-shaped object before walking up the ramp and into the disc. He remained inside for around 45 minutes before he appeared at the top of the ramp to make the return journey to his plane.
Was this secret security unit – the Secret Six – privy to briefings by the President before and after this alleged second meeting with extraterrestrial visitors? And did they preserve and then use whatever knowledge or information they learned to put onto the Georgia Guidestones just over two decades later? As bizarre as it might sound, there could be more truth in such assertions than many people would like to believe.
There is little doubt that one of the most bizarre conspiracies of the Internet era is that of Mel’s Hole, which, although we should treat it with extreme caution, is certainly very interesting. The tale of Mel’s Hole first surfaced in the late 1990s on the popular radio show Coast to Coast. Mel Waters contacted the show’s host, Art Bell, in February 1997 and informed him that he had discovered a well-like hole on his property, which was somewhere near Ellensburg in the state of Washington in the American northwest. Waters described the well as measuring around nine feet across, with a brick retaining wall that went around 15 feet down. He also admitted that, like the property’s previous owners, he regularly dumped trash and unwanted items in the well. In fact, it was because of this that he began to suspect there was something out of the ordinary about the well, as despite what he threw into it, he never once heard anything hit the bottom, as if the well itself was endless. He had spoken with his neighbors about the well, and all offered that no one had any idea who had constructed it or when. To the best of anyone’s knowledge, it had simply always been there.
Waters then went on to detail how he had carried out several experiments as a way of determining just how far down the well actually went. He first attached a weight to one of his fishing lines, which was 4,500 feet long, and then unreeled the line and lowered the weight into the well. However, when the line was fully unreeled, the weight had still not touched the bottom. After this, thinking there could be water at the bottom of the well, he attached Life Savers candy to the end of the line. If he was right and there was water there, it would dissolve the Life Savers upon contact. However, after unreeling the line and then reeling it back in, all of them were still fully intact. He began increasing the lengths of the line he was using, eventually using a line that was 80,000 feet long. He still, however, hadn’t reached the bottom.
He had also begun to notice other strange details about the well. His dogs, for example, refused to go anywhere near it, even when he tried to coax them with treats. After noticing this, he realized that no animals seemed to want to go near it, not even birds. It was at this point that Mel revisited with his neighbors, asking them if they had ever seen any animals near the well, or if their own pets had acted strangely near it. It was during these conversations that Mel learned of a particularly unsettling encounter.
One of the neighbors told Mel that when one of his dogs had died several years earlier, they had decided to dispose of the body by dropping it into the well. However, several days later, to his utter shock, he saw his dog walking through the woods near the property. To begin with, he tried to tell himself he was looking at a dog that simply looked like his own. However, when he noticed the very distinctive collar the dog was wearing, he was in no doubt that this was his dog. Despite this certainty, when he tried to call the dog, it completely ignored him, seemingly having no memory of him.
Mel also experienced further bizarre incidents while at the well, including sudden and intense interference with radio broadcasts. In fact, one afternoon, Mel tuned his radio to what he believed was a modern baseball game, only to eventually realize he was listening to a radio broadcast from 30 years earlier in 1967. It was not long after this strange experience that Mel made the decision to contact the radio show. There would, though, be immediate consequences.
The following day, after going about his normal daily routines, Mel returned to his property to find his access blocked by a heavily armed military unit. He was told that a plane had crashed onto his land, and this access to the area, including his property, was temporarily prohibited. Although Mel accepted the explanation, he couldn’t find any information on a plane crash in the area anywhere on the news or online. He returned to his property and asked for an explanation. However, rather than provide one, Mel later claimed that he was threatened with “false charges of drug possession” unless he complied with the orders to stay away from the area. Around a week later, according to what neighbors told Mel, a strange beam of light suddenly appeared, shining directly upwards, as if coming from the ground near the well.

Needless to say, Mel contacted Art Bell once more, who wasted little time in informing his audience of the developments surrounding Mel Waters’ claims. As we might imagine, there was a flurry of interest and suggestions as to what was taking place there. Some people suggested that the light beam was likely the opening of a portal, possibly connected to the bottomless well, while others pointed to how UFOs are witnessed in the area. Bell eventually dispatched a broadcast team to the property to take a look for themselves. They didn’t locate the well. They did, though, find evidence of a military presence in the area, including tire tracks from heavy-duty vehicles, and military-style boot prints on the ground.
Then, with no warning, Mel Waters seemingly disappeared. He failed to show up at the studio for a pre-arranged recording, which prompted the show’s producers to contact him. However, he failed to answer his phone on multiple occasions, and he didn’t respond to any messages. Then, just as mysteriously, three years later, he suddenly reappeared. And what’s more, he had yet another captivating and potentially ominous encounter to share.
Waters told Bell that shortly after his initial contact with him, a mysterious man approached him and offered him $3 million to lease his land. The man refused to name who would be leasing the land and insisted that Mel must sign a nondisclosure agreement preventing him from speaking to anyone about the arrangement. Of more concern, though, he would have to leave the United States and never return. Mel, figuring he had nothing at all to lose, accepted the deal and left America to start a new life in Australia. However, as time went by, he began to feel increasingly homesick, so much so that he decided to return, only temporarily, to the United States to spend some time with family and friends.
Indeed, Bell attested that Waters had contacted him upon his return to the United States, and an interview was arranged. Mel, however, didn’t show up at the studio once more. Mel now told Bell that on the day of the planned recording, he was visiting a family member. However, at some point during the journey, the bus he was traveling on was stopped by a patrol unit. Here is where Mel’s memory began to get hazy. The last thing he could recall was being ordered to board a different bus. Then, he seemingly blacked out. The next thing he knew, he was waking up in an alleyway in San Francisco, California. He eventually realized that 12 days had passed since his last memory of traveling on the bus to visit a member of his family. He discovered that both his wallet and his keys were missing, and he noticed a distinct puncture mark on his arm, suggesting that he had been injected with something. More bizarre and unsettling, he further claimed that several of his back teeth had been removed.
By the time he had returned to Washington, he was officially served papers informing him that his property and land had been seized due to “illegal construction”, something he claimed he was not responsible for. Even worse, all of the funds in his bank account were gone, with no explanation from his bank. He offered that his decision to return to the United States, even temporarily, had resulted in those he had made a deal with in making good on their threats if he were to return.
Around the same time as this was happening, Mel was contacted by representatives of a Native American tribe in Nevada. They had heard of his encounters on his property and invited him to their reservation, where, they claimed, a similar bottomless hole existed. Mel accepted the invite and traveled to Nevada to meet the tribe and inspect the anomaly on their land. Upon inspection, Mel determined that the hole was approximately the same diameter as the one on his land. However, unlike the ground surrounding the well on his property, he could feel intense heat coming from the hole, as well as from the ground itself around it.
The group decided to use ice to conduct experiments in an effort to learn more about this strange hole in the ground. Keeping a bucket of ice at the surface, they lowered another bucket of ice down the hole. When the ice on the surface had melted, they raised the bucket of ice from the well. However, not only had it not melted, it had changed into what seemed like large grains of sand or salt. The men attempted to set these strange cubes alight, expecting them to melt away immediately. Instead, however, they burned brightly for several minutes. After several more experiments with the ice, the group, rightly or wrongly, decided to lower a living creature down the hole. The results were unsettling, to say the least.

The men placed a sheep into a crate and began lowering it into the hole. The closer it got to the entrance, the more agitated it became, much like Mel’s dog. Unlike with the ice, however, after the sheep had been lowered into the hole, they heard a strange humming sound, as if something was taking place deep below the ground. Half an hour later, they raised the crate back to the surface, and while the sheep appeared unharmed with visible wounds, it was clear that it was dead.
They performed an autopsy on the sheep, and were shocked and perplexed to find that although the exterior of the animal was undamaged, its insides were completely cooked. Even more ominous, they discovered a large, tumor-like mass that now occupied almost all of the animal’s internal body cavity. Then, they noticed something move inside this mass. Cautiously, they cut into the mass, revealing a truly strange creature that looked seal-like but with an umbilical cord-like appendage that connected it to the sheep. However, more than anything else, the most disturbing detail of this bizarre creature was its human-like eyes. The group looked on, a mixture of awe and horror, as this monstrous-looking creature crawled out of the sheep’s dead body and onto the autopsy table. Mel eventually picked up the curious animal and carried it to the entrance of the hole. Eventually, the creature re-entered the hole and disappeared.
The strange events, though, were far from over.
According to Mel, shortly before his trip to Nevada, he had been diagnosed with terminal cancer and had been given only months to live. However, upon his return, after attending a routine appointment with his doctor in light of his recent diagnosis, they were astonished to discover that Mel was suddenly cancer-free, something Mel believed was down to his interaction with the creature, quite possibly his act of returning it to the hole.
Several months after this, Mel contacted Art Bell again. He claimed he had remained in communication with the people from the Nevada reservation, and he had learned of further remarkable developments. He claimed that one person on the reservation had used the transformed ice as a fuel source to heat his home. However, not long after, he began to experience an unquenchable thirst, as well as noticing that the atmosphere in his home appeared to be extremely dry. Perhaps strangest of all, though, whenever he would boil water, the steam would rise from the pan and head directly to the burner where the transformed ice was.
One particular evening, the man heard a loud crashing sound in his kitchen and discovered that the heater had somehow crashed through the floor of the cabin. However, as it was undamaged, the man placed a board over the hole and continued to use it, and the transformed ice, to heat his home. Several nights later, however, he returned home to find the entire cabin had seemingly collapsed in on itself. When the ruins were cleared several weeks later, the heater was discovered several feet down into the ground, as if it, or the ice inside it, was attempting to burrow deep under the ground.
Following these revelations, despite promising to remain in touch and appear on the show very soon, Mel Waters vanished once more, this time, it would seem, for good. Further attempts were made to contact him by telephone, but all calls went unanswered. A short time after this, the number was permanently disconnected.
To many people, the claims of Mel Waters, whoever he might be, are nothing but a hoax, and they very well could be right. However, there appeared to be no claims from Waters to benefit financially from his claims, and we should note that three years of silence is a long time to perpetuate a hoax. Moreover, he seemed to wish to protect his identity and didn’t appear to be seeking fame or celebrity.
There are also several other thought-provoking details to examine. In the late 1990s and early 2000s, for example, the equivalent of Google Earth was Terraserver. On Terraserver, the location where Mel Waters claimed the mysterious well was located was greyed out, with no explanation as to why. And we should further note that Terraserver wasn’t operational until six months after Mel first contacted the radio station, meaning that he couldn’t have used it for credibility or even known of this greying out at the time he made his claims.
We should also note, though, that his claims of the hole being 80,000 feet deep go against our modern understanding of science, which suggests that such a hole would simply collapse in on itself – essentially, it couldn’t exist. Unless, of course, either a scientific explanation resides outside of our understanding, or somewhere down this hole, science, as we know it, morphs into something not yet understood.
Whatever the truth, the account of Mel Waters continues to fascinate researchers and enthusiasts today, either through intrigue or spectacle. Of course, if there is any truth to the claims, as much as it would fascinate us as to just what these strange holes might be and where they might lead, it would be lengths the authorities, or perhaps a group even higher, would go to keep public knowledge of such matters largely under wraps.
Ultimately, while we should treat all of the conspiracies and claims we have explored here with a pinch of salt, like myths and urban legends, almost all conspiracies have some kernel of truth to them, even if that truth has been twisted dramatically. We know, for example, that remote viewing is very real and governments on both sides of the Iron Curtain experimented with it. We also know that both Cold War sides sought bigger and more technologically sound weapons to threaten to use against the other. We also know that there are people who believe in depopulation, and while most are sensible and are looking at a very long-term plan over such matters, others perhaps have a more radical and extreme view. And we know that governments around the world will put any location off-limits in the interests of “national security”. Indeed, if any of the conspiracies we have explored here today are true, even in part, and they are but three of many that exist, it would perhaps be a great concern to each and every one of us, as should just what else goes on that we are not aware of, at least not yet.

Scalar Physics, Alien Messages, and Bottomless Holes: Bizarre but Thought-Provoking Conspiracies! Read More »

fraunhofer ai road sensor test

Researchers create revolutionary AI fabric that predicts road damage before it happens

NEWYou can now listen to Fox News articles!
Road crews may soon get a major assist from artificial intelligence. Researchers at Germany’s Fraunhofer Institute have developed a fabric embedded with sensors and AI algorithms that can monitor road conditions from beneath the surface. This smart material could make costly, disruptive road repairs far more efficient and sustainable.Right now, most resurfacing decisions are based on visible damage. But cracks and wear in the layers below the asphalt often go undetected until it’s too late. That’s where Fraunhofer’s innovation comes in.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERHow AI road sensors work to prevent costly repairsThe system uses a fabric made from flax fibers interwoven with ultra-thin conductive wires. These wires detect minute changes in the asphalt base layer, signaling potential damage before it reaches the surface.THE ROAD TO PROSPERITY WILL BE PAVED BY AUTONOMOUS TRUCKING Fraunhofer researchers test AI sensors that detect road damage beneath the surface.  (Fraunhofer Institute)Once the fabric is laid under the road, it continuously collects data. A connected unit on the roadside stores and transmits this data to an AI system that analyzes it for early warning signs. As vehicles pass over the road, the system measures changes in resistance within the fabric. These changes reveal how the base layer is performing and whether cracks or strain are forming beneath the surface.Why AI road monitoring matters for future maintenanceTraditional road inspection methods rely on drilling or taking core samples, which are destructive, costly and only provide information for a small section of pavement. This AI-driven system eliminates the need for that kind of invasive testing.Instead of reacting to surface damage, transportation agencies could predict and prevent deterioration before it becomes expensive to fix. The approach could extend road life, cut down on traffic delays and help governments spend infrastructure funds more efficiently.ULTRA-THIN SOUND BLOCKER CUTS TRAFFIC NOISE DRAMATICALLY The smart flax-fiber fabric measures stress changes in asphalt to spot cracks early. (Fraunhofer Institute)How AI and sensor data predict road damage earlyThe real power comes from combining AI algorithms with continuous sensor feedback. Fraunhofer’s machine-learning software can forecast how damage will spread, helping engineers prioritize which roads need maintenance first. Data from the sensors is displayed on a web-based dashboard, offering a clear visual of road health for local agencies and planners.The project, called SenAD2, is currently being tested in an industrial zone in Germany. Early results suggest the system can identify internal damage without disrupting traffic or damaging the road itself.What this means for youSmarter road monitoring could lead to fewer potholes, smoother commutes and less taxpayer money wasted on inefficient repairs. If adopted widely, cities could plan maintenance years in advance, avoiding the cycle of patchwork fixes that often make driving a daily headache.For drivers, it means less time sitting in construction zones. For local governments, it means better roads built on data, not guesswork.WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027? San Francisco Department of Public Works worker Chris Solorzano uses a grading rake to smooth over asphalt as he repairs a pothole on March 24, 2023, in San Francisco. (Justin Sullivan/Getty Images)Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThis breakthrough shows how AI and materials science are merging to solve real-world infrastructure challenges. While the system won’t make roads indestructible, it can make maintaining them smarter, safer and more sustainable.CLICK HERE TO DOWNLOAD THE FOX NEWS APPWould you trust AI to decide when and where your city repaves the roads? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

Researchers create revolutionary AI fabric that predicts road damage before it happens Read More »

70702

Holding Ground: Ukraine, Russia, and the Politics of Persistence

Michael Kofman and Dara Massicot join Ryan to discuss the state of the front, how Ukraine and Russia are staying in the fight, the possible provision of Tomahawk Land Attack Missiles, contingencies expected and unexpected, the failures of Russian diplomacy, and what the most important developments of the year so far have been. 

Holding Ground: Ukraine, Russia, and the Politics of Persistence Read More »

1 Top 12 elderly fraud scams of 2024

Retirees lose millions to fake holiday charities as scammers exploit seasonal generosity

NEWYou can now listen to Fox News articles!
The holidays are supposed to be a season of generosity, family and giving back. For many retirees, October through December is the time to support causes close to their hearts, whether it’s helping veterans, feeding families or donating to disaster relief. But there’s a darker side to this generosity. Scammers know that retirees are among the most generous members of our communities, and they exploit that kindness to line their own pockets.Millions of dollars are stolen through fake “charities” that pop up just before the holidays. Their calls, letters and emails look legitimate, but the money never reaches those in need. Instead, it funds criminals who are ready to strike again.Here’s what every retiree (and their loved ones) should know about holiday charity scams and how to protect their money, identity and peace of mind.HOW RETIREES CAN STOP FAKE DEBT COLLECTOR SCAMSSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Scammers mimic real charities to pressure retirees into quick donations. (Kurt “CyberGuy” Knutsson)Why retirees are prime targets for fake charitiesRetirees often give more generously than other groups. Scammers know this, and they know how to tailor their pitch.Emotional appeals: Fraudsters will mention children, veterans or natural disaster victims to tug at heartstrings.Polite persistence: Retirees tend to answer calls and engage longer on the phone, which scammers see as an opportunity.Data exposure: Your name, age, phone number and even donation history can already be found online through data brokers. That means scammers don’t need to guess; they target you because they know you’ve donated before.When you combine generosity with publicly available data, scammers see retirees as the “perfect donors.”HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIAFake charity red flagsHow do you know if a charity request is real or just a scam dressed up for the holidays? Look for these warning signs:Pressure to act fast: If a caller insists you donate “right now” or tries to guilt you into giving before you hang up, it’s likely a scam. Real charities welcome donations anytime.No details about how money is used: Authentic charities can explain where funds go. Scammers use vague promises like “helping the needy” without specifics.Untraceable payment methods: Requests for gift cards, wire transfers or peer-to-peer app transfers (like Venmo or Zelle) are instant red flags.Lookalike names: Fraudsters often invent names that sound similar to well-known charities, like “Veterans Hope Relief” or “Children’s Aid International.”Caller ID tricks: Scammers can spoof numbers to make it look like they’re calling from a local area code or even a real charity office.How to safely check a charity before donatingHere’s how to protect yourself while still supporting the causes that matter to you:Research the charity’s name: Before donating, search it on sites like Charity Navigator or the Better Business Bureau’s Wise Giving Alliance at give.org/. If it doesn’t appear there, that’s a red flag.Ask for written information: Real organizations will happily mail or email details about their mission, budgets and how donations are used.Verify tax-exempt status: Use the IRS Tax-Exempt Organization Search at Irs.gov/charities-and-nonprofits to confirm the charity is legitimate.Check how much goes to the cause: Some charities are real but inefficient, spending more on salaries than programs. Make sure your donation actually helps.REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERSProtecting your payment detailsEven if the charity itself is real, you need to protect how you give:Use a credit card rather than a debit card because credit cards offer stronger fraud protection.Never give payment info over the phone if you didn’t initiate the call.Donate through the charity’s official website instead of clicking links in unsolicited emails.Keep records of your donations for tax purposes and to spot anything suspicious later. The elderly must stay vigilant as holiday charity scams target older donors.  (iStock)Why removing your data online reduces charity scam callsHere’s something most people don’t realize: many charity scams start with data brokers. These companies collect your personal details, such as age, phone number, donation history and even religious or political leanings, and sell them to anyone who asks. That means fraudsters can buy a ready-made list of “generous retirees who donate to veterans’ causes” and start calling immediately. The more information out there about you, the more personalized and convincing scam calls become. That’s why removing your data from broker sites is one of the most powerful defenses available to you.The easy way to do itManually contacting hundreds of data brokers is a never-ending task. Each one has its own forms, emails, and hoops to jump through, and many will re-add you months later. That’s where a data removal service comes in. They automatically reach out to data brokers on your behalf, demand the removal of your personal info and keep following up so it doesn’t creep back online.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS Protect your personal information by donating only through verified official websites. (Kurt “CyberGuy” Knutsson)Kurt’s key takeawaysThe holidays should be about joy, generosity and giving back, not about lining the pockets of fraudsters. By spotting the red flags of fake charities, double-checking where your money goes and removing your personal information from online databases, you can keep your donations safe and make sure they reach the people who truly need them. Remember: protecting your generosity is just as important as sharing it.Have you ever been contacted by a fake charity during the holidays? What tipped you off? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

Retirees lose millions to fake holiday charities as scammers exploit seasonal generosity Read More »