Category Archives: Categories

Green digital code raining down on a black background, forming a circular pattern resembling the Matrix movie style.

How To Guard Against a Malware Attack

In 2017, malware attacks affected over half of the adult population of the United States. Let’s be clear about what we mean by malware. Malware is an umbrella term. It stands for a variety of malicious software, including Trojans, spyware, worms, adware, ransomware, and viruses. While it’s true that all viruses are malware, not all malware are viruses. Unfortunately, many people and organizations operate under the assumption that virus detection software will protect their computer from malware. However, often that is not the case.

Some antivirus software may have rudimentary tools to remove malware. However, modern malware is sophisticated and these rudimentary tools typically do not detect or remove it. It can hide in the infected computer undetected and the hacker can attack at any time.

Among the worst of the malware attacks is identity theft. Unfortunately, this type of attack is increasing. For example, the 2017 Identity Fraud Study (Javelin Strategy & Research) indicates that hackers stole $16 billion from 15.4 million U.S. consumers in 2016, compared with $15.3 billion and 13.1 million victims in 2015. In 2017, attackers stole over half of the adult U.S. population’s (143 million) Social Security numbers. Experts estimate about one in three of the stolen Social Security numbers will result in an identity theft. Sadly, the occurrence rate of identity theft is about once every two seconds.

A Proactive Approach

Now let’s discuss what you personally can do to protect your identity. This is one area where an ounce of prevention is worth a pound of cure. Here are some precautions you can take:

  • Guard your social security number:
    • Don’t carry your social security card in your wallet or write your number on your checks
    • Only give out your SSN when absolutely necessary
  • Don’t respond to unsolicited requests for personal information (your name, birthdate, social security number, or bank account number) by phone, mail, or online
  • Don’t open any email whose sender is unfamiliar to you and, even then, don’t open any attachments unless absolutely necessary
  • Install malware protection software on your computer, not just antivirus software

This last point deserves some explanation. Antivirus programs may not protect you against malware. It has to do with their design. Their primary function is to protect your computer from computer viruses. Remember, while a virus is malware, not all malware are viruses. There are malware protection programs specifically designed to detect and remove malware. Here are two for your consideration:

  1. Anti-Malware Pro 2017. Security software that removes viruses, malware, spyware, adware and privacy traces. This is a fast and simple service relied upon by millions of satisfied users. Click here to check out Anti-Malware Pro 2017
  2. SpyRemover Pro. This is state of the art software that is both clean, modern and very effective in detecting and removing all kinds of viruses, spyware, malware, and adware. Click here to check out SpyRemover Pro 

Protection Against Electronic Pickpockets

It is not sufficient to protect your computer. Unfortunately, there are electronic pickpockets that can access to your sensitive cards, passport, and drivers license, while on your person. A classic pickpocket might use sleight of hand or a diversion to steal a wallet and other valuable. Today, though, an electronic pickpocket can steal your most important information by simply scanning you with a concealed RFID (i.e., Radio Frequency Identification) reader. You may be in a bus station, airport, or stadium parking lot. It does not matter. A powered RFID reader can scan and steel your unprotected information at distances of up to 300 hundred feet away, without a direct line-of-sight to the victim. In other words, you may never see the thief or know that your most sensitive information is being stolen. To protect against electronic pickpockets I suggest you check out SignalVault, which can protect you in seconds. All SignalVault products use RFID protection to keep scammers from getting electronic access to your sensitive cards, passport, and drivers license. Explore their slim debit and credit card protector, their protecting phone case, and their protecting passport organizer. Click here to check out SignalVault.

Take Action!

The widespread occurrence of identity theft is causing millions of people anguish. Unfortunately, restoring and repairing your credit report can take months to years. On average, it takes six months to recover from identity theft. This means identity theft victims have credit issues for months until they are able to restore their credit and lock out the hackers. While it’s true that homeowners and renters policies provide coverage for theft of money or credit cards, the amount of coverage is limited (usually $200 in cash and $50 on credit cards). Specific identity theft policies may provide greater coverage. However, this is analogous to closing the barn door after the horse has bolted.

I strongly suggest you take action and adopt the recommendations outlined above. They will go a long way to protecting your identity and valuable data.

 

This content uses referral links. Read our disclosure statement for more information.

A digital representation of a Bitcoin symbol surrounded by pixelated golden particles on a dark background.

The Coming Bitcoin Collapse

Many people have heard the term “bitcoin,” but have no idea of what it means. Is it a like a stock or a work of art? Should I invest in it? After all, many articles note that at bitcoin’s introduction in 2009 it sold for $0.08 and is currently valued over $17,000. In addition, many predict it will rise even more in the future, despite its recent one-day drop from over $19,000 to a little over $17,000.

What is bitcoin? It is a cryptocurrency designed as a medium of exchange that uses cryptography to control its creation and management. What is a cryptocurrency? It is a digital currency that uses encryption techniques to regulate its generation and use, independently of a central bank. In simple terms, it is a fiat currency, but without being backed by a government.

A fiat currency is money deem legal by a government, but in itself has no intrinsic value. For our purposes, we can define money as an object of perceived value that is acceptable as payment for goods, services, and debt.

Historically, many commodities, which have a clear intrinsic value, such as livestock and oil, have served as money. This use of commodities as money was a form of bartering. It required each recipient to have a “coincidence of wants” and agree on “value.” This system of barter still survives today on some parts of the globe. However, as civilization progressed, items widely deemed as “precious” began to serve as money, such as gold and silver, including coins made from gold and silver. Even today, gold and silver are widely valued and find use in monetary transactions.

The next step in the evolution of money occurred when national banks guaranteed to change “paper” money, known as “bank notes,” into gold at a promised rate. For example, on March 14, 1900, the United States adopted the “gold standard,” with the passage of the Gold Standard Act, which stated “…the dollar consisting of twenty-five and eight-tenths grains (1.67 g) of gold nine-tenths fine, as established by section thirty-five hundred and eleven of the Revised Statutes of the United States, shall be the standard unit of value, and all forms of money issued or coined by the United States shall be maintained at a parity of value with this standard…”

However, maintaining the gold standard during wars and depressions became extremely difficult for the United States, which led to its abandonment in 1971 by President Richard Nixon, via an executive order commonly termed the “Nixon Shock.” Once unhinged from the gold standard, the dollar became a “pure fiat currency,” which meant it had no intrinsic value. U.S. dollars became a legal tender by government order. The dollar then fell to its free-market exchange price versus gold, which as of this writing is over $1200 per ounce.

This abbreviated history of money and the example of the United States dollar demonstrates that a pure fiat currency is only as strong as the global trust in their currency. This is also true of bitcoin. Those people buying and trading it determine its value.

You may at first want to think of this like buying and selling stocks, whose value is determined by sales transactions. However, stocks represent ownership in a tangible asset, such as a company. Bitcoin does not represent value in anything tangible. This is true of all fiat currencies. However, the United States exchanges goods and services for U.S. dollars and accepts it to service debt. If you believe the United States will remain a strong and vibrant economy, then having faith in its currency is justifiable. Countries often base their international trade on U.S dollars. However, even the dollar’s value fluctuates in the world market, as perceptions of the U.S. economy’s strength fluctuate.

Bitcoin, on the other hand, has no country backing it. Much like trading in art, the increase in its value depends on “the bigger fool theory.” When someone invests in bitcoins, they are essentially betting that someone else in the future will pay more them, even though bitcoins have no intrinsic value. That someone is paying more for something whose only value is determined by whimsical perceptions, hence the name “bigger fool.”

In the case of art, even if its price drops, the art is a tangible object that provides a level of joy to the owner. In a sense, it enriches the human spirit. Bitcoin only enriches those that are able to sell it at a higher price than they paid for it.

Eventually, the market for bitcoins is going to vanish, as the bigger fool theory runs its course and businesses refuse to accept it as a currency. When that happens, investors will recognize the world’s pool of fools has dried up and bitcoins will not be worth the digital energy it takes to create and trade in them.

A close-up of a rope tied in a detailed knot next to a knife on a brown surface.

Will the United States Use Nanoweapons to Topple the Kim Regime?

Nanoweapons are the next and most deadly generation of military weapons the world has ever encountered. In fact, they promise to be even more deadly than nuclear weapons. A cloud of secrecy has kept most people from even knowing they exist. Given this fact, let’s define nanoweapons. Nanoweapons are any military technology that exploits the power of nanotechnology. This begs a question, What is nanotechnology? According to the United States National Nanotechnology Initiative’s website, nano.gov, “Nanotechnology is science, engineering, and technology conducted at the nanoscale, which is about 1 to 100 nanometers.” In simple terms, the diameter of a typical human hair equals about 100,000 nanometers. Therefore, the largest nanotechnology is over a thousand times smaller than the diameter of a human hair. This means nanotechnology is invisible to the naked eye or even under an optical microscope.

North Korea’s leader, Kim Jung um, has already accused the United States of attempting to assassinate him using nanoweapons. In a 1,800 report issued on May 5, 2017, the North Korean state news agency KCNA said a “terrorist group” conspired with the CIA and South Korea’s Intelligence Service (IS) to assassinate its leader Kim Jong un using a “biochemical substances including radioactive substance and nano poisonous substance.” This report marks the second time the United States finds itself accused of using nanoweapons. Pravda, Russia’s state-run newspaper ran this headline on June 6, 2016: “US nano weapon killed Venezuela’s Hugo Chavez, scientists say.” While both Russia and North Korea are widely known to issue fake news to support their political agendas, it is striking that they both mention the United States’ use of nanoweapons, specifically nano poisons.

 Is it true? It could be. The United States leads in the development of nanoweapons. Using nano poison to assassinate someone would be virtually untraceable. Unlike a conventional poison, it is nearly impossible to detect its use. What are nano poisons? A nano poison consists of toxic nanoparticles. Because of the size, less than a 100 nanometers in diameter, toxic nanoparticles are absorbed more readily than other known toxins. Nanoparticles are able to cross biological membranes and access cells, tissues, and organs that their larger counterparts cannot. Therefore, nano poisons are more deadly than their bulk counterparts are. Cancer-causing radioactive nanoparticles are particularly deadly and almost impossible to detect. Once a person ingests radioactive nanoparticles, they may die months or even years later, as was claimed regarding the death of Venezuela’s former president, Hugo Chavez.

Currently, the United States, China, and Russia are secretly spending billions of dollars to gain an asymmetrical advantage in nanoweapons. In 2000, the United States government launched the National Nanotechnology Initiative (NNI), a research and development initiative involving the nanotechnology-related activities of 25 Federal agencies with a range of research and regulatory roles and responsibilities. To date, the US has invested over $20 billion in NNI programs. NNI dedicates at least 20% of its budget to DOD programs. In addition, each branch of the US military has its own nanotechnology R&D facility. Nanoweapons are real. As I fully describe in my latest book, Nanoweapons: A Growing Threat to Humanity, the United States already secretly deploys them.

Nanoweapons are particularly attractive as military weapons since:

1. Unlike nuclear, chemical, and biological weapons, no international treaties limit the development and deployment of nanoweapons or their use in warfare

2. Nanoweapons, for example toxic nanoparticles, have the potential to be weapons of mass destruction

3. Developing nanoweapons is less costly than developing nuclear weapons

4. Detecting nanoweapons manufacturing facilities is difficult

5. Detecting the source of a nanoweapons attack is difficult

Ironically, the next big thing in military weapons will be small and almost invisible, nanoweapons. The United States is the world nanoweapons leader. Therefore, it’s logical that they would use this capability to defend the homeland. If we learn that Kim Jung un is dying from cancer, similar to Venezuela’s Hugo Chavez, it may be the result of a nanoweapons attack. Science fiction? No! Science Fact.

The iconic pyramids of Egypt stand majestically under a colorful sky at sunset in the desert.

Cosmic Rays Reveal Hidden Chamber in Great Pyramid of Giza

For millennia, grave robbers and archaeologists have been digging tunnels in search of a hidden room in Khufu’s Pyramid (a.k.a. The Great Pyramid of Giza). Until today, they were literally searching in the dark. Now, using cosmic-ray muon radiography, Kunihiro Morishima’s, et al., publication in Nature is providing a roadmap, potentially a treasure map, to a previously unknown chamber in Khufu’s Pyramid. In their article, they report “Discovery of a big void in Khufu’s Pyramid by observation of cosmic-ray muons discovery of a large void (with a cross section similar to the Grand Gallery and a length of 30 m minimum) above the Grand Gallery, which constitutes the first major inner structure found in the Great Pyramid since the 19th century.”

Cosmic ray-muons are subatomic particles, with an electrical charge equal to an electron, but with a mass around 200 times greater than an electron. Muons form in the upper layer of the Earth’s atmosphere, the by-products of cosmic rays (i.e., a highly energetic atomic nuclei) colliding with molecules in the upper atmosphere. Traveling near the speed of light, approximately10,000 muons reach every square meter of the earth’s surface a minute. Two factors make muons useful:

  1. Their ability to penetrate solids deeper than x-rays
  2. The difference in their speed in solids (i.e., slower) than air (i.e., faster)

Armed with this knowledge, Kunihiro Morishima, et al., used three different muon detection technologies and three independent analyses to confirm this hidden chamber, now named, “ScanPyramids Big Void.”

This marks the potential beginning of a new field in archeology, namely archeological cosmic-ray muon radiography. According to the Nature article, “While there is currently no information about the role of this void, these findings show how modern particle physics can shed new light on the world’s archaeological heritage.”

Using muons to generate three-dimensional images of volumes is not new. Developed in the 1950s, the technology is termed “muon tomography.” Current applications include detecting nuclear material in road transport vehicles and cargo containers for security reasons and non-invasive nuclear waste characterization for safety reasons. However, the Nature article marks the first archeological application.

Khufu’s Pyramid, built on the Giza Plateau (Egypt), dates back to the pharaoh Khufu (Cheops), who reigned from 2509 to 2483 BCE. It is one of the oldest and largest monuments on Earth. However, there is no consensus regarding how the ancient Egyptians constructed it.

Muons have a rich history in scientific discovery. The Rossi–Hall experiment in 1940 confirmed Einstein’s time dilation effect, as predicted in his theory of special relativity. In 1963, the Frisch-Smith experiment confirmed Rossi-Hall’s experiment and measured mean muon velocities between 0.995 c and 0.9954 c (where c is the speed of light in a vacuum). In 1977, Bailey et al. measured the lifetime of positive and negative muons using the CERN Muon storage ring (particle accelerator). This experiment confirmed both time dilation and the twin paradox. The twin paradox predicts, via Einstein’s special theory of relativity, that one twin in a rocket ship traveling near the speed of light will age slower than the other twin, who is standing stationary on the Earth.

Our friend the muon continues to help us push back the frontiers of science, from Einstein’s special theory of reality to a hidden chamber in Khufu’s Pyramid.

A woman holding a sign that says 'We are better than this!' at a protest or rally with a crowd in the background.

Politics In Science

Many of us would like to believe that science is the search for truth as it relates to the structure and behavior of the physical and natural world. However, that belief is only partially true.

Scientific research is often driven by government grants and contracts, whether you’re in a university or Fortune 500 company. While the research itself may follow the scientific method and lead to unbiased results, politics determines the fate of those results. For example, the carbon dioxide level is currently about 400 parts per million (ppm). For the last 650,000 to about 1950, the carbon dioxide level never cross the 300 ppm level. However, with the increased use of fossil fuel, such as coal and gasoline, the carbon dioxide level began climbing to its current level. The bad news, it is still climbing. At 500 ppm it is a health hazard to humans.

Well over 90% of the scientific community agrees that global warming is related to the increase in atmospheric carbon dioxide. Carbon dioxide is a “greenhouse” gas that traps heat. As a result, we are seeing the sea level rise and the Gulf of Mexico become a catcher’s mitt for the increased frequency of hurricanes. In addition to the human suffering caused by climate change, there is a financial impact. According to the US Government Accountability Office’s Website, their report “Information on Potential Economic Effects Could Help Guide Federal Efforts to Reduce Fiscal Exposure” projects climate change will cost the US Government “between $4 billion and $6 billion in annual coastal property damages from sea level rise and more frequent and intense storms,” between 2020 and 2039. However, the reality of climate change is being treated as a political issue. The Environmental Protection Agency (EPA), for example, kept three scientists from speaking at the October 23rd Narragansett Bay Estuary Program workshop on the 2017 State of Narragansett Bay and Its Watershed report.

The government has the ability to politicize science by directing research via:

  • University grants
  • Military industrial complex programs
  • Government laboratories/agencies programs
  • Censorship of government scientists

Obviously, science is no longer the pure search for truth regarding natural phenomena. Today’s science follows the government’s roadmap. Acting on results is a political decision, even when life and death are in the balance.

What does all this mean? Science is riddled with politics. Scientists working on government programs have two choices, follow the government roadmap or quit. Let me be clear. I am not talking about defense contract research, which for security reasons must be kept secret. I am talking about fundamental science, such as climate change research, which should proceed without censorship or political agendas.

Unfortunately, the EPA’s mission of “protecting human health and the environment” is now politicized to the point that they will censor government scientists and deny the reality of climate change. Although the World Health Organization estimates that “Between 2030 and 2050, climate change is expected to cause approximately 250 000 additional deaths per year, from malnutrition, malaria, diarrhoea and heat stress,” the EPA director, Scott Pruitt, told CNBC that “ “I think that measuring with precision human activity on the climate is something very challenging to do and there’s tremendous disagreement about the degree of impact, so no, I would not agree that it’s a primary contributor to the global warming that we see.” Pruitt is an attorney, not a scientist. However, he apparently feels comfortable challenging the mass of scientific evidence that contradicts his viewpoint.

Human endeavors tend to always be inherently political, including scientific research. However, politics in science should be confined to interpreting the results, not refuting results that have been widely established via the scientific method. For example, are these irrefutable facts or results open to interpretation:

  1. Greenhouse gasses, like carbon dioxide, trap heat.
  2. Carbon dioxide is increasing dramatically to the point that the amount of heat trapped is causing sea levels to rise and weather extremes, such as droughts and hurricanes.
  3. The increase in carbon dioxide is due to human activity, specifically burning fossil fuels like coal and gasoline.

The bulk of the scientific community would argue they are facts. Is it possible they are wrong? Yes, it is possible. However, government censorship and policies will not set the truth free. As Einstein stated, “ Truth is what stands the test of experience.” If we examine our current experience, we are seeing unprecedented carbon dioxide levels associated with unprecedented climate change. We need to embrace the facts and work on solutions. Governments can censor scientists or deny reality, but Mother Nature will have the final say.