Glowing Auras and ‘Black Money’: The Pentagon’s Mysterious U.F.O. Program – The New York Times

In the $600 billion annual Defense Department budgets, the $22 million spent on the Advanced Aerospace Threat Identification Program was almost impossible to find.

Which was how the Pentagon wanted it.

or years, the program investigated reports of unidentified flying objects, according to Defense Department officials, interviews with program participants and records obtained by The New York Times. It was run by a military intelligence official, Luis Elizondo, on the fifth floor of the Pentagon’s C Ring, deep within the building’s maze.

The Defense Department has never before acknowledged the existence of the program, which it says it shut down in 2012. But its backers say that, while the Pentagon ended funding for the effort at that time, the program remains in existence. For the past five years, they say, officials with the program have continued to investigate episodes brought to them by service members, while also carrying out their other Defense Department duties.

Source: Glowing Auras and ‘Black Money’: The Pentagon’s Mysterious U.F.O. Program – The New York Times

There I Was: The X-Files Edition | Fighter Sweep

On the morning of 14 November 2004, Dave and his WSO launched into the clear blue Southern California sky about a hundred miles southwest of San Diego. Their Call Sign was FASTEAGLE 01. His wingman and WSO launched just after them in FASTEAGLE 02. They climbed overhead the ship and rendezvoused in normal fashion before setting off to their assigned work area in the open ocean south of USS Nimitz. Normal day, normal ops for the pre-deployment work up cycle they were in the middle of.

The Nimitz Carrier Strike Group had been on station for a few weeks already, working to integrate the operations of the carrier with her various support ships, including the Ticonderoga Class Guided Missile Cruiser, USS Princeton. As far as Dave was concerned, it was a standard day in a normal work up cycle. Another step in the long journey in preparing the ships of the Strike Group and the planes of the Air Wing to work harmoniously for their upcoming combat deployment.

What Dave didn’t know was for the past several days, Princeton had been picking up some bizarre returns on their Death Star-worthy SPY-1 radar. On several occasions beginning 10 November, the Fire Control Officer and the extremely experienced Fire Control Senior Chief had detected multiple returns descending from far above the radar’s scan volume–somewhere higher than 80,000 ft. The targets, dubbed Anomalous Aerial Vehicles (AAVs), would drop from above 80K to hover roughly 50 feet off the water in a matter of seconds.

Source: There I Was: The X-Files Edition | Fighter Sweep

“Suspicious” event routes traffic for big-name sites through Russia | Ars Technica

Russia briefly hijacked key Internet sites Wednesday through manipulation of BGP, the Internet’s routing tables. In a war, you can bet that the Internet will be one of the first targets. Is Russia testing its plans?

Traffic sent to and from Google, Facebook, Apple, and Microsoft was briefly routed through a previously unknown Russian Internet provider Wednesday under circumstances researchers said was suspicious and intentional.

The unexplained incident involving the Internet’s Border Gateway Protocol is the latest to raise troubling questions about the trust and reliability of communications sent over the global network. BGP routes large-scale amounts of traffic among Internet backbones, ISPs, and other large networks. But despite the sensitivity and amount of data it controls, BGP’s security is often based on trust and word of mouth. Wednesday’s event comes eight months after large chunks of network traffic belonging to MasterCard, Visa, and more than two dozen other financial services were briefly routed through a Russian government-controlled telecom, also under suspicious circumstances.

Source: “Suspicious” event routes traffic for big-name sites through Russia | Ars Technica

Japan coastguard rescuing more North Korean ‘ghost ships’ as sanctions, food shortages drive fishermen into farther waters | South China Morning Post

A severe shortage of food and foreign currency amid harsh international sanctions are contributing to rising numbers of North Korean “ghost ship” fishing vessels washing up in Japanese waters, analysts said.

Dozens of North Korean fishing vessels wash up on Japan’s coast ever year, but last month Japanese coastguards registered 28 cases, the highest monthly number since records began in 2014.

Meanwhile, there have been multiple cases of “ghost ships” found packed full of bodies, with 18 corpses recovered so far this year. During the same period, there has been a record number of North Korean fishermen rescued alive – 42 this year compared to zero in 2016.

Japanese authorities say it is often hard to determine exactly how they died as the boats often drift for months before washing up in Japan.

“Fishermen are desperate to meet annual catch goals, which are elevated to higher levels every year,” said Toshimitsu Shigemura, professor emeritus of Waseda University and North Korea expert.

Source: Japan coastguard rescuing more North Korean ‘ghost ships’ as sanctions, food shortages drive fishermen into farther waters | South China Morning Post

Denver cops warn of phone scam brewing at local bars – The Denver Post

This is a very convincing scam and there’s no reason it couldn’t happen here in Raleigh. Keep up with your phone and do NOT call it and give your unlock code to whomever answers it!

Denver bar patrons are being warned of a popular new scam aimed at collecting financial information from stolen or lost smartphones.

Since May, there have been 37 cases of scammers posing as helpful bar owners who get access to stolen smartphones and then drain financial accounts from the phone’s apps, say Denver Police.

The scam begins when crooks steal smartphones from unsuspecting bar customers. They then wait for the phone’s owner to call the phone the next morning in hopes of getting it back. The crook, who often identifies himself as a helpful bar employee, asks the phone’s owner for their pass code to verify ownership.

The phone’s owner, thinking the crook is only trying to make sure the phone is returned to the rightful owner, gives the crooks the pass code. The scammer now changes all the owner’s passwords and then moves money via the apps the owner uses to reimburse his friends.

“Now, not only is her phone truly gone, but so is her money,” say police.

Source: Denver cops warn of phone scam brewing at local bars – The Denver Post

Millions Are Hounded for Debt They Don’t Owe. One Victim Fought Back, With a Vengeance – Bloomberg


I’ve often talked about tracking down these debt collectors but this guy got to the kingpin. Gives me hope!

On the morning a debt collector threatened to rape his wife, Andrew Therrien was working from home, in a house with green shutters on a cul-de-sac in a small Rhode Island town. Tall and stocky, with a buzz cut and a square, friendly face, Therrien was a salesman for a promotions company. He’d always had an easy rapport with people over the phone, and on that day, in February 2015, he was calling food vendors to talk about grocery store giveaways.

Therrien was interrupted midpitch by a call from his wife. She’d gotten a voicemail from an authoritative-sounding man saying Therrien was in some kind of trouble. “I need to verify an address to present you with your formal claim,” the man had said. “Andrew Therrien, you are officially notified.”

A few minutes later, Therrien’s phone buzzed. It was the same guy. He gave his name as Charles Cartwright and said Therrien owed $700 on a payday loan. But Therrien knew he didn’t owe anyone anything. Suspecting a scam, he told Cartwright just what he thought of his scare tactics.Cartwright hung up, then called back, mad. He said he wanted to meet face-to-face to teach Therrien a lesson.

“Come on by, asshole,” Therrien says he replied.

“I will,” Cartwright said, “and I hope your wife is at home.”

That’s when he made the rape threat.

Therrien got so angry he couldn’t think clearly. He wasn’t going to just let someone menace and disrespect his wife like that. He had to know who this Cartwright guy was, and his employer, too. Therrien wanted to make them pay.

Source: Millions Are Hounded for Debt They Don’t Owe. One Victim Fought Back, With a Vengeance – Bloomberg

Skimmer was on Raleigh ATM at State Farmers Market for nearly 3 months | WNCN

When first reading this story, I got the state farmers market confused with the state fairgrounds. I know I’ve used the state fairgrounds ATM this year but I know I’ve not used the farmers market ATM this year.

Raleigh Police arrested a man for credit card theft after investigators say he installed the credit card skimmer in the Farmers Market ATM. Police say he installed it on July 2 and a service technician found it and it was removed on September 24.

Source: Skimmer was on Raleigh ATM at State Farmers Market for nearly 3 months | WNCN

Google collects Android users’ locations even when location services are disabled — Quartz

Many people realize that smartphones track their locations. But what if you actively turn off location services, haven’t used any apps, and haven’t even inserted a carrier SIM card?

Even if you take all of those precautions, phones running Android software gather data about your location and send it back to Google when they’re connected to the internet, a Quartz investigation has revealed.

Since the beginning of 2017, Android phones have been collecting the addresses of nearby cellular towers—even when location services are disabled—and sending that data back to Google. The result is that Google, the unit of Alphabet behind Android, has access to data about individuals’ locations and their movements that go far beyond a reasonable consumer expectation of privacy.

Source: Google collects Android users’ locations even when location services are disabled — Quartz

Facebook’s ‘People You May Know’ feature can be really creepy. How does it work? – Recode

When Facebook’s Android app apparently accessed my camera without my permission I banned it from my phone. This story might drive me from Facebook altogether.

This upcoming year will see me drastically curtail my Facebook usage. There are so many other things I can be doing than scrolling through cat photos, and also I am not convinced the information I share is always going to be used to my benefit.

Facebook has a pretty clear and straightforward company mission: Connect everybody in the world.

One of the ways it carries out that mission is by recommending new friends for you every time you open the app or website — essentially, the company identifies other people on Facebook that it thinks you already know, and nudges you to connect with them inside Facebook’s walls.

The problem with this feature is that it can be really creepy.

Facebook previously employed user locations to recommend friends, but says it has stopped doing that; Fusion recently wrote about a psychiatrist who claims her mental health patients were being prompted to connect with one another on the service. Not good.

When my colleague Jason Del Rey and I recently experienced a number of oddly timed recommendations, we started to get curious ourselves. How does Facebook generate these eerily coincidental recommendations?

Source: Facebook’s ‘People You May Know’ feature can be really creepy. How does it work? – Recode

How Facebook Figures Out Everyone You’ve Ever Met

In real life, in the natural course of conversation, it is not uncommon to talk about a person you may know. You meet someone and say, “I’m from Sarasota,” and they say, “Oh, I have a grandparent in Sarasota,” and they tell you where they live and their name, and you may or may not recognize them.

You might assume Facebook’s friend recommendations would work the same way: You tell the social network who you are, and it tells you who you might know in the online world. But Facebook’s machinery operates on a scale far beyond normal human interactions. And the results of its People You May Know algorithm are anything but obvious. In the months I’ve been writing about PYMK, as Facebook calls it, I’ve heard more than a hundred bewildering anecdotes:

  • A man who years ago donated sperm to a couple, secretly, so they could have a child—only to have Facebook recommend the child as a person he should know. He still knows the couple but is not friends with them on Facebook.
  • A social worker whose client called her by her nickname on their second visit, because she’d shown up in his People You May Know, despite their not having exchanged contact information.
  • A woman whose father left her family when she was six years old—and saw his then-mistress suggested to her as a Facebook friend 40 years later.
  • An attorney who wrote: “I deleted Facebook after it recommended as PYMK a man who was defense counsel on one of my cases. We had only communicated through my work email, which is not connected to my Facebook, which convinced me Facebook was scanning my work email.”

Connections like these seem inexplicable if you assume Facebook only knows what you’ve told it about yourself. They’re less mysterious if you know about the other file Facebook keeps on you—one that you can’t see or control.

Source: How Facebook Figures Out Everyone You’ve Ever Met