Ebola in the US, CDC Hides the News with Embargo

Ebola has reached the US. Yesterday, the CDC announced that a man was being treated for the disease in Dallas, Texas. He is the first patient diagnosed with Ebola in the US since the outbreak began in western Africa earlier this year.

Ebola has reached the US. Yesterday, the CDC announced that a man was being treated for the disease in Dallas, Texas. He is the first patient diagnosed with Ebola in the US since the outbreak began in western Africa earlier this year. The patient had been visiting family in Liberia and began to show symptoms of Ebola several days after his return. After quarantining the patient, the CDC apparently also tried to hide the news with a media embargo.

640px-Ebola_virus_virion

The Dallas Morning News broke the embargo early Monday, ultimately forcing the CDC to confirm the case. A tweet from NBC’s Luke Russet suggests that the national news networks were complicit in keeping the news from the public until the local paper forced their hand. One must now wonder if secrecy is the best policy during a potential Ebola outbreak. You are now probably not the only one questioning what else the CDC might be hiding…

Starbucks’ Most Secret Location

There is a remarkable Starbucks whose official existence can neither be confirmed nor denied. At best, this Starbucks can only be described as being in a “government building.”

starbucks logo

There is a remarkable Starbucks whose official existence can neither be confirmed nor denied. At best, this Starbucks can only be described as being in a “government building.” Here the baristas require security clearance and the cups will never scrawled with an a real name. Such is life at the CIA’s most popular on-campus coffee shop.

The interior looks just like any other Starbucks in the world–light wood, dark accents, and soft folk music filling the space; however, the clientele and conversations are far from typical. Spys, analysts, and intelligence officers mix and mingle daily while getting their caffeine fix. It is rumored that the team to take out Osama Bin Laden recruited one of its key members over coffee at this Starbucks.

Read more here, and check out other cool Starbucks locations around the world.

5 Darkest Apple Secrets

Think evil…

Think evil.

Subscribe to Dark5 ► http://bit.ly/dark5

Presenting Apple’s 5 darkest secrets including stressed out factory workers exposed to dangerous iPhone chemicals at Foxconn, the real Steve Jobs, tax loopholes that allow Apple to hide billions, the mysterious origins of the Apple logo, and Apple’s secret worldwide police force out to hunt down leaks and missing prototypes.

Like Dark5 on Facebook ► http://bit.ly/Dark5FB
Follow Dark5 on Google+ ► http://bit.ly/Dark5GPlus

Dig Deeper:
Forced labor at Foxconn: http://nyti.ms/1uVZfpe
Worldwide Loyalty Team: http://bit.ly/1qOf7q2
Apple logo and Jean-Louis Gassée: http://bit.ly/1qOfmkJ
Steve Wozniak on Breakout, Atari and Steve Jobs: http://bit.ly/1xtUJ6c
Apple Tax Hearings: http://reut.rs/1oq3vtJ

Music: “Unfinished Background” by Hassan Khan

Intro: “The Machine Thinks”
by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
http://creativecommons.org/licenses/by/3.0/

Surprise Thom Yorke Album Released via BitTorrent

Awesome new music and dark glitchy video from Radiohead’s Thom Yorke through an innovative release via BitTorrent. Watch here.

Awesome new music and video from Radiohead’s Thom Yorke through an innovative release via BitTorrent:

As an experiment we are using a new version of BitTorrent to distribute a new Thom Yorke record.

The new Torrent files have a pay gate to access a bundle of files..

The files can be anything, but in this case is an ‘album’.

It’s an experiment to see if the mechanics of the system are something that the general public can get its head around …

If it works well it could be an effective way of handing some control of internet commerce back to people who are creating the work.

Enabling those people who make either music, video or any other kind of digital content to sell it themselves.

Bypassing the self elected gate-keepers.

If it works anyone can do this exactly as we have done.

The torrent mechanism does not require any server uploading or hosting costs or ‘cloud’ malarkey.

It’s a self-contained embeddable shop front…

The network not only carries the traffic, it also hosts the file. The file is in the network.

Oh yes and it’s called

Tomorrow’s Modern Boxes.

Thom Yorke & Nigel Godrich

Check out the album and dark glitchy video for the single A Brain In a Bottle below:

 

Supreme Leader Missing – Who Runs North Korea?

North Korean Supreme Leader, Kim Jong Un has been missing for nearly three weeks–including being conspicuously absent from the Supreme Peoples Assembly, North Korea’s rubber stamp legislature.

supreme leader missing

North Korean Supreme Leader, Kim Jong Un has been missing for nearly three weeks–including being conspicuously absent from the Supreme Peoples Assembly, North Korea’s rubber stamp legislature. The session typically features the Supreme Leader meeting all of North Korea’s highest ranking party and military officials, but this year he was represented by an empty chair. Conspiracy theories explaining Kim Jong Un’s absence have been running wild and range from the comically absurd to dangerous plots of intrigue.

Tabloids in Britain are suggesting that Kim could have become ill from eating too much imported cheese. The Daily Mirror claims that the dictator has developed an infatuation with Emmental cheese and may be suffering some complications associated with a dramatic weight gain. While no sources are provided, it may not be out of the realm of possibility considering the family’s odd affection for western luxuries at the expense of their impoverished citizens.

A more likely explanation comes from South Korean intelligence officials who speculate that a power struggle in the capital may be afoot. The first signs of military plots against the Supreme Leader emerged in 2013 when Kim Jong Un had his uncle executed to consolidate power and warn off other officials.

North Korea’s official state media is refusing to comment.

Investigators Declare Lake Monster Video Real

A 2012 video reportedly showing a mythical Icelandic worm monster has been declared real by an investigative panel tasked with judging its authenticity.

lake monster

A 2012 video reportedly showing a mythical Icelandic worm monster has been declared real by an investigative panel tasked with judging its authenticity. Lagarfljótsormurinn, which means “the worm of Lagarfljót,” has been the source of legend in the area since first appearing in written records in 1350. The panel voted 7-6 to award  a longstanding 500,000 Icelandic krona bounty (about $4,000) to anyone who could capture proof of the monster.

Two separate videos taken in February and March of 2014 appear to show the creature writhing in the icy water:

 

Watch: Cop Says He Caught Ghost on Video



While watching surveillance video at his Espanola, New Mexico police station, officer Karl Romero spotted a mysterious figure moving through a secured entryway.

ghost

While watching surveillance video at his Espanola, New Mexico police station, officer Karl Romero spotted a mysterious figure moving through a secured entryway. The blurry apparition moved unimpeded through locked chain-link cages and a closed gate. Police station detectives stated that there is no way in or out of the area without triggering an alarm.

Unexplained sounds and figures have been reported previously in the station. Officer Romero does not know for sure what he saw that night, but believes a supernatural source is not out of the question:
 

I do believe in ghosts — I don’t know (what exactly was on the video), but we’ve had some unsolved murders in the area,” Romero said.

See the full video at KOAT-TV.

Bash Security Hole Leaves Whole Net at Risk

Security experts are warning of a newly discovered vulnerability in the architecture that supports the entire internet. The Bash Bug poses a serious threat to network infrastructure and attacks through the hole could lead to an internet meltdown.

bash control

Security experts are warning of a newly discovered vulnerability in the architecture that supports the entire internet. The Bash Bug poses a serious threat to network infrastructure and attacks through the hole could lead to an internet meltdown.

Also known as a “Shellshock,” the flaw is in a commonly used piece of system software called Bash–created in 1989 and is found on a variety of Unix-based systems. Bash is a command shell, and finding and exploiting a security hole in Bash means hackers can send commands to computers or any piece of equipment running the system.

Mac and Andriod phone users should be particularly vigilant. The Bash Bug makes it easy for attackers to access and control those devices connecting through public WiFi networks. A perhaps bigger fear is that attackers could compromise routers and computer network equipment to consume bandwidth and slow the internet to a halt.

Attempts to patch the flaw have so far proven futile.

Earth’s Magnetic Field Weakening 10x Faster

Observations from the European Space Agency’s “SWARM” satellite array have revealed that the earth’s magnetic field is weakening at rate 10 times faster than previously believed and is now diminishing at 5% every 100 years.

magnetic earth

Observations from the European Space Agency’s “SWARM” satellite array have revealed that the Earth’s magnetic field is weakening at rate 10 times faster than previously believed and is now diminishing at 5% every 100 years. The dramatic change in the magnetic field’s strength is a potential indication of a pending pole reversal. Scientists predict that the shift could begin in as little as 2,000 years as the north pole moves in the direction of Siberia.

Magnetic pole reversals are suspected to have been the cause of previous mass extinctions on earth, but the evidence is inconclusive. The greater worry may be the increased exposure of technological infrastructure to solar radiation and coronal mass ejections. The Earth is already vulnerable to bursts of solar energy–having survived a potentially catastrophic near-miss in just 2012.

Via Scientific American.

Fake Industrial Control Left Online. See Who Hacked.



In an effort to investigate the sources of some of the most serious hacking attempts against industrial interests, cyber security expert Greg Martin from ThatStream set up a fake control computer and left it online to be hacked by criminals and world militaries.

hacked controls

Who is hacking who?

In an effort to investigate the sources of some of the most serious hacking attempts against industrial interests, cyber security expert Greg Martin from ThatStream set up a fake control computer and left it online to be hacked by criminals and world militaries. The decoy system was virtually positioned in countries around in the US, the UK, the Netherlands, Brazil, Japan, and Singapore and opened to probing for three months.

Despite the reputation of China and Russia being the hottest locations from which to launch industrial hacks, the United States placed first with over 6,000 hacking attempts. China and Russia followed as being the source of over 3,500 and 2,500 hacks, respectively.

 

“It’s not unlikely that some probes are from security companies and academia, but the dataset is large and diverse enough that it probably includes a large amount of military organizations, if not all of them (proxied or not),” Martin wrote in an e-mail.

Is it possible that the NSA is just trying to stay ahead of its Chinese and Russian counterparts? Read more about the decoy control experiment at Bloomberg.