"History will have to record that the greatest tragedy of this period of social transition was not the strident clamor of the bad people, but the appalling silence of the good people." -- Martin Luther King, Jr.

Bidgear ad




A few weeks ago, Ohio congressman and Judiciary Committee chairman Jim Jordan’s office released a letter to Noah Bishoff, the former director of the Financial Crimes Enforcement Network, or FinCEN, an arm of the Treasury Department. Jordan’s team was asking Bishoff for answers about why FinCEN had “distributed slides, prepared by a financial institution,” detailing how other private companies might use MCC transaction codes to “detect customers whose transactions may reflect ‘potential active shooters.’”

The slide suggested the “financial company” was sorting for terms like “Trump” and “MAGA,” and watching for purchases of small arms and sporting goods, or purchases in places like pawn shops or Cabela’s, to identify financial threats.

Jordan’s letter to Bishoff went on:

According to this analysis, FinCEN warned financial institutions of “extremism” indicators that include “transportation charges, such as bus tickets, rental cars, or plane tickets, for travel to areas with no apparent purpose,” or “the purchase of books (including religious texts) and subscriptions to other media containing extremist views.”

During the Twitter Files, we searched for snapshots of the company’s denylist algorithms, i.e. whatever rules the platform was using to deamplify or remove users. We knew they had them, because they were alluded to often in documents (a report on the denylist is_Russian, which included Jill Stein and Julian Assange, was one example).

However, we never found anything like the snapshot Jordan’s team just published:

Image removed.

The highlighted portion shows how algorithmic analysis works in financial surveillance.

  • First compile a list of naughty behaviors, in the form of MCC codes for guns, sporting goods, and pawn shops.
  • Then, create rules: $2,500 worth of transactions in the forbidden codes, or a number showing that more than 50% of the customer’s transactions are the wrong kind, might trigger a response.

The Committee wasn’t able to specify what the responses were in this instance, but from previous experience covering anti-money-laundering (AML) techniques at banks like HSBC, a good guess would be generation of something like Suspicious Activity Reports, which can lead to a customer being debanked.

Claire's Observations:  So that is how this works; absolutely unflipping believable, but completely true!!!!!

Posted on:

Over the weekend, the University of Warwick concluded its Warwick Economics Summit. On the second day, 3 February, the World Health Organisation (“WHO”) Dictator-General, Tedros Adhanom Ghebreyesus, joined the Summit via Zoom to push the Pandemic Treaty.

“It’s urgent [ ] that all of us learn the painful lessons the [covid] pandemic told us and make the changes that must be made to keep all of us safer. It’s for that reason that in December 2022 WHO’s member states met in Geneva and agreed to develop an international agreement on pandemic preparedness and response,” he said.

Tedros the Terrorist’s speech was an appalling attempt to manipulate young minds and use them to fight his battles, Tedros called on students to raise their voices “to counter the lies that are undermining the [pandemic] agreement on social media.”

Posted on:

Australia has become the latest country to delve head-first into the first goal of The Great Reset, which is to digitise its citizens.

When digitised identities get matched with central bank digital currencies, it’s game over for freedom of thought, movement, etc. All human behaviour will be monitored, assessed and scored 24/7.

Posted on:

Hysteria reigned supreme as recent global mainstream media headlines blamed last year's drought in the Amazon basin on human-caused climate change. But the actual data show little rainfall change in 300 years.

Posted on:

For the third time the Australian Senate voted down an inquiry into the nation’s high excess mortality today. Every Covid death mattered, but suddenly the politicians don't want to know what's killing thousands of people.

Posted on:

Arctic sea ice continues its stonking recovery with January's extent the 24th highest in a 45-year record. Time for the Net Zero blob to stop all the fudges, omissions and outright deceptions.

Posted on:

Wind and solar energy cannot lift humanity into prosperity.

But as an impressive fleet of private jets has recently migrated from the COP 28 Summit in Dubai to the World Economic Forum in Davos, carrying the hoi polloi of the world from one elitist summit to another, this delusion was the dominant sentiment.

In this three-part analysis, what can accurately be described as a collective, perhaps willful delusion will be exposed in excruciating detail.

It will be dry and tedious reading. And perhaps that’s why journalists, activists, bureaucrats, and politicians have accepted the delusion.

So buckle up. Here’s the other side of the story.

Part One quantified by how much global energy production will need to increase if humanity is to have any hope of achieving universal energy security, much less energy abundance.

Part Two will calculate the infeasible degree to which wind and solar energy production will have to increase in order to hit that minimum target while still fulfilling the goals of COP 28.

Part Three will conclude by examining non-fossil fuel alternatives to wind and solar and, in so doing, demonstrate why global energy security is impossible to achieve without increasing, not decreasing, reliance on coal, oil, and gas

Posted on:

A German data recovery specialist has confirmed what many Reg readers will have suspected: USB memory sticks are getting less reliable. The cause, as you might have guessed, is inferior memory chips, while the move to storing multiple bits per flash cell also plays a part.

CBL Data Recovery posted that the quality of newer memory components in microSD and USB sticks is declining, and it reported that USB sticks where the NAND manufacturer's logo had been removed from the chip are increasingly turning up in its data recovery laboratory.

It suspects that flash chips from manufacturers such as SK hynix, Sandisk or Samsung that fail quality control checks are being resold into the market, but marked as components with lower memory capacities.

Posted on:


Rank-and-file Border Patrol agents have slammed the Senate's $118B Senate funding bill that would guarantee 1.5 million illegal migrants entry to the United States, while sending the majority of funds to Ukraine ($60B+) and Israel ($14.1B), the Daily Caller reports.

Four rank-and-file Border Patrol agents told the DCNF that the “catch and release” of illegal immigrants will continue if the bill is implemented, because it allows for the release of family units and single adults that show a credible fear of persecution should they return home.

The Emergency National Security Supplemental Appropriations Act, 2024 would add more personnel to the Department of Homeland Security (DHS), along with more beds for ICE facilities, the expulsion of certain illegal migrants, and enhancing fentanyl interdiction. But let's not get it twisted - as less than 20% of the bill would actually go towards the border

Posted on:

The maintainers of shim have released version 15.8 to address six security flaws, including a critical bug that could pave the way for remote code execution under specific circumstances.

Tracked as CVE-2023-40547 (CVSS score: 9.8), the vulnerability could be exploited to achieve a Secure Boot bypass. Bill Demirkapi of the Microsoft Security Response Center (MSRC) has been credited with discovering and reporting the bug.

Major Linux distributions that use shim such as Debian, Red Hat, SUSE, and Ubuntu have all released advisories for the security flaw.

Posted on:

Cisco, Fortinet, and VMware have released security fixes for multiple security vulnerabilities, including critical weaknesses that could be exploited to perform arbitrary actions on affected devices.

The first set from Cisco consists of three flaws – CVE-2024-20252 and CVE-2024-20254 (CVSS score: 9.6) and CVE-2024-20255 (CVSS score: 8.2) – impacting Cisco Expressway Series that could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks.

All the issues, which were found during internal security testing, stem from insufficient CSRF protections for the web-based management interface that could permit an attacker to perform arbitrary actions with the privilege level of the affected user.

Posted on:

A threat group named 'ResumeLooters' has stolen the personal data of over two million job seekers after compromising 65 legitimate job listing and retail sites using SQL injection and cross-site scripting (XSS) attacks.

The attackers mainly focus on the APAC region, targeting sites in Australia, Taiwan, China, Thailand, India, and Vietnam to steal job seeker's names, email addresses, phone numbers, employment history, education, and other relevant information.

According to Group-IB, which has been following the threat group since its beginning, in November 2023, ResumeLooters attempted to sell the stolen data through Telegram channels.

Posted on:

A widely reported story that 3 million electric toothbrushes were hacked with malware to conduct distributed denial of service (DDoS) attacks is likely a hypothetical scenario instead of an actual attack.

Posted on:

The Danish data protection authority (Datatilsynet) has issued an injunction regarding student data being funneled to Google through the use of Chromebooks and Google Workspace services in the country's schools.

The matter was brought to the agency's attention roughly four years ago by a concerned parent and activist, Jesper Graugaard, who protested how student data is sent to Google without any consideration about the potential for misuse or the impact it could have on those persons in the future.

The agency has now decided that the current methods of transferring personal data to Google do not have a legal basis for all disclosed purposes. 

Posted on:

A new password-stealing malware named Ov3r_Stealer is spreading through fake job advertisements on Facebook, aiming to steal account credentials and cryptocurrency.

The fake job ads are for management positions and lead users to a Discord URL where a PowerShell script downloads the malware payload from a GitHub repository.

Analysts at Trustwave who discovered the malware campaign note that although none of its tactics are novel, it remains a severe threat to many potential victims, given Facebook's popularity as a social media platform.

Posted on:

According to Russian media translation of his words, Medvedev said this is part of efforts to prop up Ukraine—"a dying country that is foreign to taxpayers"—while ignoring problems at home. "Therefore, every day the leaders of these countries broadcast: We need to prepare for war with Russia and continue to help Ukraine," he wrote.

That's when he said that people in the West have to be told the blunt truth. Medvedev underscored that the Russian response to attack by NATO would without doubt be "asymmetrical". He explained:

   "Since our military capabilities are incomparable, we will simply have no choice. The response will be asymmetrical. To protect the territorial integrity of our country, ballistic and cruise missiles with special warheads will be used... This will be the proverbial Apocalypse. The end of everything."

Posted on:

Japan’s damaged Fukushima nuclear plant has been discharging batches of treated radioactive wastewater into the Pacific Ocean for six months. A new report, however, has brought to light a newly discovered leak that caused tons of contaminated water to seep into the ground.

Local media Kyodo News reports that on Wednesday morning - at the Fukushima Dai-ichi Nuclear power plant - workers found water leaking from an exhaust port on the outer wall of a high-temperature incinerator building.

According to the plant operator, TEPCO, the contaminated water treatment equipment connected to the exhaust vent inside the building was being cleaned, and water containing radioactive materials leaked out.

TEPCO estimates that 5.5 tons of water, with over 22 billion becquerels of radioactive material, leaked into the soil outside the building. 

Posted on:

An airplane passenger received a shock 30,000 feet in the air when he noticed silver electrical tape stuck to the wing of the plane.

David Parker was flying from Manchester to Goa on a Boeing 787 when he spotted the unusual feature out the window.

The stunned holidaymaker then noticed the 'gaffer tape', which was plastered all over the wing, start to peel off as the journey went on.

Posted on:

The space tourism company says that an alignment pin had 'unintentionally detached' from the mothership, VMS Eve, during the first flight of the year.

This pin helps ensure that the space plane, VMS Unity, stays aligned with VMS Eve as it is carried to the edge of space. 

Posted on:

Researchers simulated war scenarios using five AI programs including ChatGPT and Meta's AI program and found all models chose violence and nuclear attacks.

The team tested three different war scenarios, invasions, cyberattacks and calls for peace, to see how the technology would react - and each chose to attack over neutralizing the situation.

The study comes as the US military is working with ChatGPT's maker OpenAI to incorporate the tech into its arsenal. 

Posted on:

The futuristic EV's aerodynamic wheel covers are causing wear on the tires, which could lead to surprise punctures and 'blow outs,' endangering lives on the road.

Even a brand new Cybertruck after 'a couple thousand miles' appears to show tire damage from these poorly designed hubcaps, according to the CEO of a third-party Tesla parts manufacturer who discovered the issue.

Posted on: