EXPERT OPINION — More than 200 U.S. officers have been hunted around the globe and targeted by an adversary using a mysterious weapon that causes permanent brain injury. It’s time to get serious about fighting back.

The Authors:

Paul Kolbe served for 25 years in the CIA’s Directorate of Operations. He is currently Director of the Intelligence Project at Harvard Kennedy School’s Belfer Center for Science and International Affairs.

Marc Polymeropoulos worked for the CIA for 26 years. He is author of “Clarity in Crisis: Leadership Lessons from the CIA.

John Sipher worked for the CIA’s clandestine service for 28 years. He is now a nonresident senior fellow at the Atlantic Council and a co-founder of Spycraft Entertainment.

Prior to 9/11, al Qaida declared war on the United States, bombed the USS Cole, and blew up U.S. embassies in Nairobi and Dar es Salam. Despite heavy casualties, America viewed successive al Qaida terrorist attacks as somehow unique, not representative of a larger threat or state of war. We went about our business and failed to take hard action against al Qaida despite clear warning. Our failure to respond forcefully led to 9/11 and the two decades of war that followed.

Fast forward to today.  Since 2016, more than 200 U.S. officials have reportedly suffered from a mysterious series of symptoms which have caused long-lasting, debilitating injuries. Suffering from searing headaches, vertigo, vision impairment, and nausea, many victims have been formally diagnosed with traumatic brain injuries (TBI) at the Walter Reed National Military Medical Center and other leading hospitals. Family members and young children have suffered as well. Some medical tests can now confirm the markers of brain injury, similar to those suffered by victims of concussive injuries in Iraq and Afghanistan.

These injuries began with a cluster of reports from Cuba in 2016 and have become commonly referred to as Havana Syndrome. Moscow, Vienna, Belgrade, and Hanoi are among more than a dozen cities where U.S. officials reportedly have been attacked and injured. In residences, on the street, in vehicles, and even at secure U.S. facilities, U.S. officers are being hunted. Stunningly, even a close aide to CIA Director Bill Burns was reportedly attacked on a trip to India just this past August.

The CIA, after a period of confusion, delay, and even denial at times, now appears to take these threats very seriously. CIA Director Burns and Deputy Director David Cohen have publicly stated that U.S. officials are being “attacked.” They have improved health care for CIA officers who are hurt. And an agency task force is hard at work trying to obtain additional intelligence on those responsible. We credit Director Burns for his solid leadership.

The cause of these injuries? The National Academy of Sciences has pointed to Directed Energy Weapons – devices which emit microwave pulses which can inflict pain and damage tissue. The United States, Russia, China, and others have all developed Directed Energy Weapons to destroy equipment, counter drones, and control crowds. This is not science fiction.

Directed energy weapons would account for the highly directional and locational nature of these incidents. When victims can “move off the x,” the signature sounds, sensations, and pain that goes with the attacks often stop, though damage has already occurred. The amount of exposure seems to affect the degree of injury. Other technologies could be at play and are being investigated, but microwaves appear to be the most likely vector. Russia has used them before, flooding the U.S. Embassy in Moscow with microwave radiation for decades.

Regardless of form, the weapons being used in these attacks are nothing less than weapons of terror, designed to cause injury to non-combatants. Who would use such a weapon to attack U.S. intelligence officers, diplomats, and military personnel, and to what conceivable end?


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


CIA Deputy Director Cohen stated at a recent intelligence summit, that the U.S. was closer to identifying the culprit, and Politico has reported that members of the Senate Intelligence Committee are increasingly convinced that Russia or another hostile adversary is behind the attack, although reportedly, no smoking gun has been found.

As former CIA operations officers with extensive experience dealing with both counterterrorism and counterintelligence issues, we have few doubts about who will be named as the culprit. For at least a decade, Russia has conducted itself as in a state of conflict with the West in general and the United States in particular. Russia has launched cyberattacks impacting critical infrastructure and supply chains, assassinated opponents with nuclear poisons and chemical weapons, gunned down people in the streets using criminal proxies, sabotaged a Czech ammunition depot, and mounted a violent coup attempt in Montenegro. It has also bombarded the U.S. embassy in Moscow with microwave radiation and used carcinogenic “spy dust” without regard to health effects. The attacks on U.S. officials would fit this pattern of behavior.

We recognize that it is important to let the intelligence community do its job and its findings must inform policy action. Congress and the administration must work together to formulate a range of possible responses and it is not too early to begin. As Senator Collins and others have stated, these attacks are “an act of war,” and as such, preparation for a future attribution call by the national security establishment is in order. So how could the U.S. respond?

Let’s start with what doesn’t work – sanctions. Sanctions feel good and satisfy an action imperative but they are feckless. Sanctions have not stopped Russia from killing dissidents, halted the Nordstream II pipeline, compelled a pull back from occupied territories, reduced support for tyrants, or hindered oil and gas production. Sanctions have simply forced Russia to develop more creative money laundering and sanction circumvention mechanisms.

So, what would work? For starters, we must understand that the Putin regime considers itself in a state of conflict with the U.S., short of war, but nonetheless deadly real. We are dealing with a state sponsor of terror which conducts operations across the globe to weaken the U.S. abroad, divide it from its allies, and sow discord at home. Our policy must be calibrated to win this conflict, without sparking a shooting war, but at risk of one.

Russia understands reciprocity and strength. When four Russian diplomats were kidnapped by extremists in Beirut in 1985, and one of them was killed, Russia reportedly responded by kidnapping and gruesomely killing a relative of the group’s leader. The surviving diplomats were released immediately. The story may be apocryphal, but it does illustrate the Russian approach. Tempting as it may be for America to retaliate tit for tat, we need not mirror Russia’s actions. Instead, we should play to our greater economic, diplomatic, and military advantages.

We offer five elements to frame a response: enlist U.S. allies, expand forward deterrence, limit the adversary’s reach, choke off money, and bring those accountable to justice.

NATO: With proof of the attacks on U.S. officials, we should activate NATO’s Article Five collective defense clause. The only other time this was enacted was after 9/11. As justification, in addition to the Havana Syndrome attacks, (which also caused Canadian casualties), we would include GRU and FSB assassination operations across Europe, deadly sabotage in the Czech Republic, a coup attempt in Montenegro, persistent cyberattacks, and a litany of other actions that can only be described as irregular warfare directed against NATO members.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Forward Presence: A crystal clear signal that we understand the nature of Russian hybrid warfare and are responding would be to enhance our deployed military presence in Poland, the Baltic States, and in the Black Sea region. These units would pose no offensive threat to Russia but would be a clear signal that the U.S. is prepared to counter any Russian shenanigans. We should also significantly ramp up our lethal aid and training to the Ukraine, where the nature of Russian aggression is well known. Weakness in Eastern Europe is an invitation to conflict.

Travel and Presence: We should drastically limit Russian business and tourist travel which is being used as cover for FSB and GRU operations. We would reduce Russian diplomatic presence in each capital to the bare minimum – handfuls not hundreds. American and European counterintelligence experts believe there are more Russian intelligence officers operating from embassies than during the Cold War. Limiting the size of Russia’s espionage infrastructure will complicate the planning and execution of all of its intelligence operations.

Finance: A key tool in counterterrorism operations is the ability to target sources of finance which constitute material support to terrorism. In this case, we would apply that principle to the Russian government, state enterprises, and individuals who provide cover, tools, and sources of funding to Russia’s campaign to undermine the West with violence, terror, and media manipulation. Russia’s dirty money has been used to undermine the west and poison our politics. We should limit the easy access of shady money to western banks.

Criminal Cases: We need bring war crime cases to the International Court of Justice (ICJ) in the Hague. Following a decade of conflict in the Balkans, the ICJ brought to justice 161 indicted Serbian, Croatian, and Bosnian war criminals. This was an astounding success – a manhunt which included American and European law enforcement and intelligence services. Just as in Nuremberg after World War II, these actions to hold war criminals accountable drew a line in the sand.

This is a start.  Successive Democratic and Republican administrations have pursued Russia policies which represent the triumph of hope over experience. We have treated the symptoms of malign Russian actions rather than the underlying pathology. It is now time to finally acknowledge that we are in a long-term hybrid conflict and forget the fantasy of changing Putin’s behavior. Only a new regime in the Kremlin would hold the hope of bringing about a change in actions. Eventually, the Putin regime will wither or collapse, but until it does, we and our allies must do a better job of defending ourselves.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post Havana and the Global Hunt for U.S. Officers appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

An Argentinian woman has become the second-ever HIV-infected person whose immune system helped defeat the virus without requiring additional medical treatment. She was first diagnosed with the AIDS-causing infection in 2013.

Scientists have dubbed the 30-year-old mother the “Esperanza patient,” after her hometown. The word ‘esperanza’ translates to ‘hope’ in English. Publishing their findings in the Annals of Internal Medicine journal on Monday, the researchers said the discovery boosts hope for a “sterilizing cure” for the estimated 38 million people with the life-long infection.

“I enjoy being healthy,” the Esperanza patient told NBC News over email. “I have a healthy family. I don’t have to medicate, and I live as though nothing has happened. This already is a privilege.”

The study found no intact remnants of the virus in the 1.5 billion blood and tissue cells the researchers analyzed – confirming the discovery first announced in March at an international meeting of HIV experts.

Read more

© Belova59 from Pixabay
‘Elite controllers’ can cure themselves of HIV without any medical treatment, bombshell research claims

No additional information about the woman has been made public, but she was described at the time as “athletic and beautiful” and revealed to have an HIV-negative boyfriend and newborn baby.

Only one other person, identified in August 2020 as 67-year-old Loreen Willenberg from San Francisco, has been confirmed to have overcome the virus without medical intervention. The two women have been labeled ‘elite controllers’, referring to a rare subset of HIV patients who show no signs of the infection despite not undergoing antiretroviral treatments.

Typically, an HIV-infected person requires constant drug therapy to prevent the virus from attaching to their immune cells’ DNA and replicating. But, in the eight years since she was diagnosed, the Esperanza patient only received medication for six months during pregnancy to ensure her baby would be healthy.

In all, there have been four patients cured of HIV, two of whom – the ‘Berlin patient’ Timothy Ray Brown and the ‘London patient’ Adam Castillejo – were also cancer patients who received risky bone marrow transplants from donors with HIV-resistant genes. However, the success of their procedures is yet to be replicated.

“This is really the miracle of the human immune system that did it,” Dr. Xu Yu, an immunologist at the Ragon Institute in Boston, who co-authored the study, told NBC.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

The city council in Austria’s second-largest city, Graz, has elected a new mayor. Communist Party member Elke Kahr has become the first Communist leader of a major city in the country.

The 60-year-old politician, who has been working in the municipal government for more than 15 years and previously served as vice mayor of Graz, was elected as the new city leader on Wednesday. A member of the Austrian Communist Party (KPÖ, Kommunistische Partei Österreichs) for almost 30 years, she won the election with 28 of 46 votes. Kahr succeeded the previous long-standing mayor Siegfried Nagl of the center-right, liberal-conservative People’s Party.

Read more

FILE PHOTO: A protester waves a EU flag outside the parliament building in Budapest, December 16, 2014
Brussels, we got a problem! 30 years after collapse of communism, Eastern Europe is losing its faith in Liberal Democracy

Who would have thought that the daughter of a locksmith, a Communist, would become mayor,” she said in her first speech following the vote.

Having acknowledged a number of issues to deal with in the city, especially during the Covid-19 pandemic, the new mayor highlighted a housing policy, pledging to put a stop to profit-driven construction in Ganz.

The Communists have also already formed a coalition with the Greens and the Social Democratic Party (SPÖ), and another precedent in European city governance was made – two women serving as mayor and deputy. Green leader Judith Schwentner was chosen as Graz’s vice mayor, with the new governing coalition saying they would support not only social, but also environmental changes, aiming to improve living standards especially for low-income groups. Providing a bicycle for every child in the city from the municipality is in their program.

However, not everyone in the local government is happy with the new Communist rule. A member of the right-wing Freedom Party of Austria (FPÖ), Alexis Pascuttini, described the choice as “unpleasant,” having accused the Graz Communists of empty catchphrases in their program and refusing to participate in what he described as “left-wing nonsense.” Kahr herself has been exposed to strong pressure to justify her party, being repeatedly asked about her position on “the crimes of communist parties around the world since 1917,” according to Austrian media.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

A gunman injured two civilians, one of them fatally, and two police officers before being shot dead by security forces near Jerusalem’s Western Wall on Sunday morning, Israeli police said.

The civilian victims were taken to Shaare Zedek Medical Center. One, who was in his 30s, succumbed to his injuries at the hospital. The other, a 46-year-old, is said to have suffered moderate injuries. Two police officers were hurt by shrapnel.

In a video clip shared on social media and purportedly filmed at the scene, multiple gunshots could be heard amid agitated shouting. Security officers could then be seen standing around what appears to be a dead body. Witnesses speculated it was that of a “terrorist.”

The gunman, whose identity was not immediately disclosed, was killed during the incident. Police said he had used a homemade submachine gun.

DETAILS TO FOLLOW

find more fun & mates at SoShow now !

A Roadmap for AI in the Intelligence Community

(Editor’s Note: This article was first published by our friends at Just Security and is the fourth in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.  This article considers a new IC approach to risk management.)

OPINION — I have written previously that the Intelligence Community (IC) must rapidly advance its artificial intelligence (AI) capabilities to keep pace with our nation’s adversaries and continue to provide policymakers with accurate, timely, and exquisite insights. The good news is that there is strong bipartisan support for doing so. The not-so-good news is that the IC is not well-postured to move quickly and take the risks required to continue to outpace China and other strategic competitors over the next decade.

In addition to the practical budget and acquisition hurdles facing the IC, there is a strong cultural resistance to taking risks when not absolutely necessary. This is understandable given the life-and-death nature of intelligence work and the U.S. government’s imperative to wisely execute national security funds and activities. However, some risks related to innovative and cutting-edge technologies like AI are in fact necessary, and the risk of inaction – the costs of not pursuing AI capabilities – is greater than the risk of action.

The Need for a Risk Framework

For each incredible new invention, there are hundreds of brilliant ideas that have failed. To entrepreneurs and innovators, “failure” is not a bad word. Rather, failed ideas are often critical steps in the learning process that ultimately lead to a successful product; without those prior failed attempts, that final product might never be created. As former President of India A.P.J. Abdul Kalam once said, “FAIL” should really stand for “First Attempt In Learning.”

The U.S. government, however, is not Silicon Valley; it does not consider failure a useful part of any process, especially when it comes to national security activities and taxpayer dollars. Indeed, no one in the U.S. government wants to incur additional costs or delay or lose taxpayer dollars. But there is rarely a distinction made within the government between big failures, which may have a lasting, devastating, and even life-threatening impact, and small failures, which may be mere stumbling blocks with acceptable levels of impact that result in helpful course corrections.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


As a subcommittee report of the House Permanent Select Committee on Intelligence (HPSCI) notes “[p]rogram failures are often met with harsh penalties and very public rebukes from Congress which often fails to appreciate that not all failures are the same. Especially with cutting-edge research in technologies … early failures are a near certainty …. In fact, failing fast and adapting quickly is a critical part of innovation.” There is a vital difference between an innovative project that fails and a failure to innovate. The former teaches us something we did not know before, while the latter is a national security risk.

Faced with congressional hearings, inspector general reports, performance evaluation downgrades, negative reputational effects, and even personal liability, IC officers are understandably risk-averse and prefer not to introduce any new risk. That is, of course, neither realistic nor the standard the IC meets today. The IC is constantly managing a multitude of operational risks – that its officers, sources, or methods will be exposed, that it will miss (or misinterpret) indications of an attack, or that it will otherwise fail to produce the intelligence policymakers need at the right time and place. Yet in the face of such serious risks, the IC proactively and aggressively pursues its mission. It recognizes that it must find effective ways to understand, mitigate, and make decisions around risk, and therefore it takes action to make sure potential ramifications are clear, appropriate, and accepted before any failure occurs. In short, the IC has long known that its operations cannot be paralyzed by a zero-risk tolerance that is neither desirable nor attainable. This recognition must also be applied to the ways in which the IC acquires, develops, and uses new technology.

This is particularly important in the context of AI. While AI has made amazing progress in recent years, the underlying technology, the algorithms and their application, are still evolving and the resulting capabilities, by design, will continue to learn and adapt. AI holds enormous promise to transform a variety of IC missions and tasks, but how and when these changes may occur is difficult to forecast and AI’s constant innovation will introduce uncertainty and mistakes. There will be unexpected breakthroughs, as well as failures in areas that initially seemed promising.

The IC must rethink its willingness to take risks in a field where change and failure is embraced as part of the key to future success. The IC must experiment and iterate its progress over time and shift from a culture that punishes even reasonable risk to one that embraces, mitigates, and owns it. This can only be done with a systematic, repeatable, and consistent approach to making risk-conscious decisions.

Today there is no cross-IC mechanism for thinking about risk, let alone for taking it. When considering new activities or approaches, each IC element manages risk through its own lens and mechanisms, if at all. Several individual IC elements have created internal risk assessment frameworks to help officers understand the risks of both action and inaction, and to navigate the decisions they are empowered to make depending upon the circumstances. These frameworks increase confidence that if an activity goes wrong, supervisors all the way up the chain will provide backing as long as the risk was reasonable, well-considered and understood, and the right leaders approved it. And while risk assessments are often not precise instruments of measurement – they reflect the quality of the data, the varied expertise of those conducting the assessments, and the subjective interpretation of the results – regularized and systematic risk assessments are nevertheless a key part of effective risk management and facilitate decision-making at all levels.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Creating these individual frameworks is commendable and leading-edge for government agencies, but more must be done holistically across the IC. Irregular and inconsistent risk assessments among IC elements will not provide the comfort and certainty needed to drive an IC-wide cultural shift to taking risk. At the same time, the unique nature of the IC, comprised of 18 different elements, each with similar and overlapping, but not identical, missions, roles, authorities, threats and vulnerabilities, does not lend itself to a one-size-fits-all approach.

For this reason, the IC needs a flexible but common strategic framework for considering risk that can apply across the community, with each element having the ability to tailor that framework to its own mission space. Such an approach is not unlike how the community is managed in many areas today – with overarching IC-wide policy that is locally interpreted and implemented to fit the specific needs of each IC element. When it comes to risk, creating an umbrella IC-wide framework will significantly improve the workforce’s ability to understand acceptable risks and tradeoffs, produce comprehensible and comparable risk determinations across the IC, and provide policymakers the ability to anticipate and mitigate failure and unintended escalation.

Critical Elements of a Risk Framework

A common IC AI risk framework should inform and help prioritize decisions from acquisition or development, to deployment, to performance in a consistent way across the IC. To start, the IC should create common AI risk management principles, like its existing principles of transparency and AI ethics, that include clear and consistent definitions, thresholds, and standards. These principles should drive a repeatable risk assessment process that each IC element can tailor to its individual needs, and should promote policy, governance, and technological approaches that are aligned to risk management.

The successful implementation of this risk framework requires a multi-disciplinary approach involving leaders from across the organization, experts from all relevant functional areas, and managers who can ensure vigilance in implementation. A whole-of-activity methodology that includes technologists, collectors, analysts, innovators, security officers, acquisition officers, lawyers and more, is critical to ensuring a full 360-degree understanding of the opportunities, issues, risks, and potential consequences associated with a particular action, and to enabling the best-informed decision.

Given the many players involved, each IC element must strengthen internal processes to manage the potential disconnects that can lead to unintended risks and to create a culture that instills in every officer a responsibility to proactively consider risk at each stage of the activity. Internal governance should include an interdisciplinary Risk Management Council (RMC) made up of senior leaders from across the organization. The RMC should establish clear and consistent thresholds for when a risk assessment is required, recommended, or not needed given that resource constraints likely will not allow all of the broad and diverse AI activities within organizations to be assessed. These thresholds should be consistent with the IC risk management principles so that as IC elements work together on projects across the community, officers have similar understandings and expectations.

The risk framework itself should provide a common taxonomy and process to:

  • Understand and identify potential failures, including the source, timeline, and range of effects.
  • Analyze failures and risks by identifying internal vulnerabilities or predisposing conditions that could increase the likelihood of adverse impact.
  • Evaluate the likelihood of failure, taking into consideration risks and vulnerabilities.
  • Assess the severity of the potential impact, to include potential harm to organizational operations, assets, individuals, other organizations, or the nation.
  • Consider whether the ultimate risk may be sufficiently mitigated or whether it should be transferred, avoided, or accepted.

AI-related risks may include, among other things, technology failure, biased data, adversarial attacks, supply chain compromises, human error, cost overruns, legal compliance challenges, or oversight issues.

An initial risk level is determined by considering the likelihood of a failure against the severity of the potential impact. For example, is there is a low, moderate, or high likelihood of supply chain compromise? Would such a compromise affect only one discrete system or are there system-wide implications? These calculations will result in an initial risk level. Then potential mitigation measures, such as additional policies, training, or security measures, are applied to lower the initial risk level to an adjusted risk level. For example, physically or logically segmenting an organization’s systems so that a compromise only touches one system would significantly decrease the risk level associated with that particular technology. The higher the likelihood of supply chain compromise, the lower the severity of its impact must be to offset the risk, and vice versa. Organizations should apply the Swiss Cheese Model of more than one preventative or mitigative action for a more effective layered defense. Organizations then must consider the adjusted risk level in relation to their tolerance for risk; how much risk (and potential consequence) is acceptable in pursuit of value? This requires defining the IC’s risk tolerance levels, within which IC elements may again define their own levels based upon their unique missions.

Understanding and considering the risk of action is an important step forward for the IC, but it is not the last step. Sometimes overlooked in risk assessment practices is the consideration of the risk of inaction. To fully evaluate potential options, decision-makers must consider whether the overall risk of doing something is outweighed by the risks of not doing it. If the IC does not pursue particular AI capabilities, what is the opportunity cost of that inaction? Any final determination about whether to take action must consider whether declining to act would cause greater risk of significant harm. While the answer will not always be yes, in the case of AI and emerging technology, it is a very realistic possibility.

And, finally, a risk framework only works if people know about it. Broad communication – about the existence of the framework, how to apply it, and expectations for doing so – is vital. We cannot hold people accountable for appropriately managing risk if we do not clearly and consistently communicate and help people use the structure and mechanisms for doing so.

Buy-in To Enhance Confidence

An IC-wide AI risk framework will help IC officers understand risks and determine when and how to take advantage of innovative emerging technologies like AI, increasing comfort with uncertainty and risk-taking in the pursuit of new capabilities. Such a risk framework will have even greater impact if it is accepted – explicitly or implicitly – by the IC’s congressional overseers. The final article in this series will delve more deeply into needed changes to further improve the crucial relationship between the IC and its congressional overseers. It will also provide a link to a full report that provides more detail on each aspect of the series, including a draft IC AI Risk Framework.

Although Congress is not formally bound by such a framework, given the significant accountability measures that often flow from these overseers, a meeting of the minds between the IC and its congressional overseers is critical. Indeed, these overseers should have awareness of and an informal ability to provide feedback into the framework as it is being developed. This level of transparency and partnership would lead to at least two important benefits: first, increased confidence in the framework by all; and second, better insight into IC decision-making for IC overseers.

Ultimately, such a mutual understanding would encourage exactly what the IC needs to truly take advantage of next-generation technology like AI: a culture of experimentation, innovation, and creativity that sees reasonable risk and failure as necessary steps to game-changing outcomes.

Read also AI and the IC: The Tangled Web of Budget and Acquisition

Read also Artificial Intelligence in the IC: Culture is Critical

Read also AI and the IC: The Challenges Ahead

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post A Roadmap for AI in the IC appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

A Canadian teenager has been arrested after allegedly stealing $36.5 million in cryptocurrency from a person in the US. The police claim it was the largest such heist involving one victim ever registered in North America.

Police in the city of Hamilton, Ontario, arrested the unidentified perpetrator on Wednesday, after over a year investigating what they have described as the biggest-ever cryptocurrency theft from a single person in either the US or Canada. Local police began a joint investigation with the Federal Bureau of Investigation and the US Secret Service Electronic Crimes Task Force in March 2020, when the theft was reported.

Read more

© AP Photo/Jiri Buller
Europol detains 10 hackers over $100 million cryptocurrency theft from celebrities

The Hamilton Police Service said it had made “multiple” seizures in excess of CA$7 million (US$5.5 million) during the arrest, which came after investigators noticed some of the stolen money had been used to buy an online username considered “rare” in the gaming community, according to a police statement.

The victim was apparently targeted by a cell phone hijack known as SIM swapping. This method involves manipulating cellular network employees to duplicate phone numbers in order to let the scammer intercept the two-factor authorization requests that allow them access to a victim’s account.

This method is considered especially potent because a lot of people use the same password for multiple sites, according to Detective Constable Kenneth Kirkpatrick, of the Hamilton Police’s cybercrimes unit. He added that cyber and cryptocurrency crimes were becoming increasingly common, but noted that the figures involved in this case were “very surprising.”

“It’s a large amount of money in anybody’s opinion,” Kirkpatrick said, adding that the case was currently in the Hamilton court system.

The police haven’t revealed the age or gender of the youth, the username they purchased, or whether they were acting alone.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

The annual migration of red crabs has brought traffic to a standstill on an Australian island. Apart from the epic journey, the species is also notorious for eating its own young.

Tens of millions of crustaceans are swarming Canberra-governed Christmas Island, which is almost a thousand miles northwest of the Australian mainland. Parks Australia, a government body in charge of wildlife conservation on the island, has deployed its staff to manage traffic, rake crabs off roads and provide advisories to local residents regarding road closures. Authorities are well-prepared to deal with the epic crab march as it repeats every year, usually in October and November. There are even special bridges and tunnels in place, built over and under busy roads so as to minimize the number of crabs crushed by cars. The sight of millions of these creatures making their perilous trek has become one of Christmas Island’s main tourist attractions.

The exact timing of the red crabs’ journey from forest to ocean is defined by rainfall and lunar phases. The march is led by male crabs, which are later joined by females. On reaching the ocean, they mate and spawn, with each female capable of producing as many as 100,000 eggs. However, most of the young crabs never make it back to the forest as they end up being eaten by fish and whale sharks for whom this is a veritable feast. To make matters worse, the crab larvae that do make it to the beach are often devoured by returning adult crabs of the very same species, hence one of their names – the cannibal crab.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Denmark’s air force showed off its brand-new electric-powered planes on Thursday, saying its test flights have so far proven that the cheaper-to-run, more eco-friendly technology has potential.

It had obtained the two Velis Electro jets from Slovenian manufacturer Pipistrel, becoming the first military in the world to operate this type of hardware.

“The aircraft are 100% emission-free, very quiet, and otherwise cheap to operate,” Lieutenant Colonel Casper Børge Nielsen of the Defense Ministry’s material and procurement agency said. Initial tests indicate “there may be perspectives in using electric aircraft when the technology becomes mature,” he added.

Denmark has leased the planes for two years, rather than buying it, to avoid the “risk of ending up with equipment that we can’t really use,” Børge Nielsen said. During the lease period, the Danish Air Force hopes to gain an insight into the benefits and disadvantages of the jets’ technology to decide how it can be applied in the future.

Read more

© CIAM / Facebook
Russia to debut world’s first electric plane at MAKS 2021 airshow

The pilots described flying the one-man light electric planes, which are powered by two lithium batteries, as “exciting,” saying they were “built well and fly well.” 

Last year, the United States military said it had been keeping an eye on the development of electric-powered planes, describing their ability to approach targets silently as “tremendous.” However, their battery capacity isn’t currently sufficient to meet the US Air Force’s needs.

Work on electric aircraft has been underway since the 1970s, but the battery issue has been a stumbling block in the way of wider adoption of the technology. Global military interest could change all that, stimulating research and investment.

The switch to electric power is likely to be a win-win across the board, as it will drastically reduce CO2 emissions and also make flying much cheaper for commercial carriers and their passengers.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The European Union’s top court has ruled that Hungary’s 2018 law aimed at criminalizing aiding illegal immigrants who are claiming asylum violates the “rights safeguarded” by the bloc’s legislature.

The Hungarian legislation, passed in 2018, sought to punish anyone “facilitating illegal immigration” with a year in prison, under a bill dubbed the “Stop Soros” law. Hungary’s government justified it at the time by arguing that migrants illegally entering the country threatened its national security. 

In the ruling, handed down on Tuesday, the European Court of Justice declared that “criminalizing such activities impinges on the exercise of the rights safeguarded by the EU legislature in respect of the assistance of applicants for international protection.”

The EU’s advocate general, Athanasios Rantos, had urged the court to make such a judgement back in February, claiming the introduction of the legislation meant that “Hungary has failed to fulfil its obligations under the [bloc’s] Procedures Directive.”

It became known as the Stop Soros law after billionaire philanthropist George Soros became a vocal opponent of the Hungarian government’s opposition to migration. The administration, in turn, accused Soros of orchestrating migration to Europe, with the Open Society Foundation, run by the philanthropist, closing its operation in the country in response. 

Read more

The towers of the European Court of Justice are seen in Luxembourg. © Reuters / Francois Lenoir
Top EU court says Poland broke rules with judge appointment system

Hungary, under the leadership of right-wing Prime Minister Viktor Orban, has repeatedly clashed with the EU in recent years over its strong stance on immigration and concerns from the bloc about threats to the rule of law in the country.

At the end of 2020, a dispute between Hungary and Poland and the EU risked derailing the bloc’s budget, as both member states were threatening to veto it over their view that the EU was attempting to interfere in their domestic affairs. Ultimately, the EU backed down, agreeing to a compromise with Budapest and Warsaw to ensure the budget secured the support of all 27 member states. 

Despite acknowledging the EU court’s ruling, Hungary’s government defended its right to challenge any foreign-funded non-government organizations that are attempting to “promote migration.”

“Hungary’s position on migration remains unchanged: Help should be taken where the problem is, instead of bringing the problem here,” Hungarian government spokesperson Zoltan Kovacs said, adding that the country will challenge outside entities “seeking to gain political influence and interference.”

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !