Comments

not important September 19, 2025 5:26 PM

Chipmaker Nvidia to invest $5bn in rival Intel
https://www.bbc.com/news/articles/c4gjd1mnjpyo

=Nvidia, the leading manufacturer of artificial intelligence chips, said it will buy a $5bn stake in Intel – a lifeline for its struggling rival on the heels of a separate investment from the US government.

The deal, announced on Thursday, will involve a partnership between the two American companies to make personal computer and data centre chips, as demand for AI continues to surge and companies seek to power massive data centres.

It will make Nvidia one of of Intel’s biggest shareholders, with a roughly 4% stake in the troubled semiconductor company.

Intel’s stock surged more than 25% on news of the deal, which could boost the once-dominant chipmaker. Shares in Nvidia rose roughly 3%.

Nvidia is motivated to invest in Intel in order to diversify some production away from other competitors – notably, Taiwan’s TSMC, said Gil Luria, head of technology research at D.A. Davidson. The chip giant is “now in the mode of investing in other companies in the AI ecosystem in order to keep the momentum for the emerging technology,” Mr Luria said.=

Idiot September 19, 2025 5:32 PM

Can one of those academic type smart people prove and write paper on this plz so i can say i was right though

“While Google Scholar contains research on social media echo chambers contributing to polarization and radicalization, no studies directly link echo chambers to protesters being run over. Research shows echo chambers reinforce like-minded opinions, increase susceptibility to radicalization and extremist violence by amplifying extremist narratives, and may lead to physical confrontations. However, a direct causal link to specific violent acts like protesters being run over has not been established in the academic literature found. ”

Im pretty sure that all these things can be linked to active warfare and all but im lazy and also get no benefit from proving it so

Clive Robinson September 20, 2025 3:11 AM

@ not important, ALL,

QR codes have less security than URLs

With regards the “Quick Response”(QR) codes they are simply a “Display / Printing technology” “for easy of machines” not humans. Because they were designed in times before security was even considered necessary in “Display technology”.

So two things apply,

1, There is NO security implicit in their design.
2, They are deliberately designed NOT to be read by humans[1].

Whilst the first also applies to URLs the second does not, in fact the opposite.

These two fundemental QR Code design issues combined actually mean,

3, QR Codes are implicitly LESS secure than human readable URLs and always will be.

If people go back on this web site they will find I was well aware of this,

“‘Human can not read’ security issue”

Decades ago.

As I’d run head first into it with “Transaction Authorisation Codes”(TACs not TANs) back before the start of this century[2] when most people had not even seen a QR Code in use.

As is normal with any new technology, QR Codes failings with regards,

“Surveillance on and security of the user.”

Whilst clear to one or two, will not be seen by the majority of humans. However they majority will see “Convenience” and it’s that which drives technology take up (not novelty or ‘keeping up with the Jetsons’).

Then after a short while of increasing use of a new technology, somebody with nefarious intent will abuse it for their personal gain at the expense or harm of others.

And once more “widely known” the increase in the abuse of a new technology generally grows at a rate greater than the that of the new technology growth increases[3].

But the real problem with QR Codes like any “Domain conversion code” is it is the equivalent of a “Transducer” that carries information objects from one physical measurement domain to another. The fundamental laws of nature say that any such process must be “inefficient”. Thus information will escape as a “side channel”. From the “redundancy” needed to carry information it logically follows that such a side channel carries information both overtly and covertly.

Consider QR Codes as not “Black and white” but “All shades of grey” unlike human eyes where the nerves have a logarithmic response, the sensors in an electronic device like a video camera tend to be designed for linear sensitivity in a given range.

The human will see the QR Code as just a pattern of “dark and light squares”. The camera however will see each small square as a value of grey. As these values can be reliably determined by the use of differential coding and forward error correction then considerably more data can be hidden in a QR Code than most would even have realised. That is each square acts not as a single bit, but the equivalent of four or five bits. Such is the fun of “covert channels”.

[1] This “can not be read by humans” was actually seen as a “security benefit” by some… This was because it was argued it would reduce “stock loss” because only authorised people with very expensive readers would be able to know what was in the shipping container / box / bag.

[2] Back last century as part of “On Line Banking” I was looking to “Authenticate the transaction” not rely on the totally insecure “authenticate the communications channel” that was easily defeated by,

2.1, “Man In The Middle”(MITM) attacks.
2.2, “Covert Side Channel”(CSC) attacks.

So I needed a reliable way to knock both issues out of the “Authenticate the transaction but make it easy for human use, to “ensure that”,

“Humans were IN the authentication loop/chain, not forced out.”

So I was looking for in effect the opposite of a QR Code, that is I wanted a,

“Difficult to read by machine, easy to read by human authentication code”

And QR Codes and similar were clearly not the solution to the “Transaction Authentication loop” issue and never will be.

[3] One of the tricks for “Lies, Damn Lies, and Statistics” misuse is to use “growth rate”. By the same notion of “The Law of small numbers”, it makes a small early change look more severe than it really is. Lets say you have a technology the number of users is increasing by 10,000 in a time period on a base of 1,000,000 users. That’s a growth of 1%. Now think about those being exploited it goes up by 2 in the same time period on a base of 4 users. That’s a growth of 50%, so it might be tempting to say “attacks are growing at 50 times that of new user take up”… Sounds like an unmanageable disaster when it’s not.

This is such an issue, that it’s actually warned about repeatedly to people involved with measurement on which predictions will be made. As a result you can find write ups on it in places you might not expect,

https://fastercapital.com/content/Law-of-Small-Numbers–The-Misleading-Tale-of-Small-Samples–Understanding-the-Law-of-Small-Numbers.html

But as we are increasingly finding out even published research papers do contain it…

lurker September 20, 2025 6:25 AM

@Clive Robinson, not important

“Humans were IN the authentication loop/chain, not forced out.”

Which is why I have a QRcode reader on my phone which displays to me the text contained in the code, url, whatever, and waits for me to choose the option to paste it somewhere, send by email or BT, or pass it directly to a relevant app.

But, as usual, I’m not the target market, and I know too many close relatives who would have their browser, banking app, whatever, just read the code directly and blindly go down the gurgler …

Clive Robinson September 20, 2025 8:22 AM

@ lurker, ALL,

With regards,

“Which is why I have a QRcode reader on my phone which displays to me the text contained in the code…”

Yes but what is it displaying and where did it get it from?

This is something I had to go through with one of the bods over at the UK Cambridge Labs quite a few years ago.

They had come up with an alternative to the QR Code using a diamond shaped grid of coloured four coloured dots.

As I’ve done above, I explained to them about the covert side channel of in this case slightly off coloured dots not grey scale.

I pointed out the fact it could hold several times the actual intended data, in fact enough for malware and or one or more sets of bogus data. Because the covert side channel was fully independent of the primary data channel.

And that there was little they could do security wise unless they could control the entire security eco-system. Which they could do for the devices they were planning to sell, but not for the PC etc other hardware they would provide software for. Which these days would include Smart Devices and Mobile Phones.

Thus you have a QR Code that reads and behaves normally via any reader that “IS NOT”,

“Backdoored via use of the side channel”

And can behave abnormally via a reader / application that “IS”,

“Backdoored via use of the side channel”.

With mobile phone Apps you can not tell as due to Alphabet and Apple “business practice” that at best pretends,

“They give you security via their walled garden”

Where as they actually rip off customers and developers and exert malign influence and control, as an

“Iron fist in glove of their ‘shut in markets'”.

And all hope of real security is effectively removed, and as we now know with “client side scanning” built in,

“Back dooring for the man ensured.”

Thus it really needs to be

“The human built in”

Not some “instrumented proxie” which can be subverted etc.

I kind of “hate my job here” where I indicate fundamental flaws in consumer / commercial security devices that can not be solved by the user.

Think back to how unpopular my early comments were about “Secure Message Apps” not being secure on a users system because by use of IO Driver shims etc an attacker could just bypass the security and go through the OS (now 100% backdoored by Apple and Alphabet at their OS levels with client side scanning, Brave and other browsers doing it with AI in the software, and Microsoft doing it with AI Phone Home everywhere).

Or my even earlier “don’t use JavaScript” that earn’t much ire, but in time became standard.

I’m telling,

@ALL,

“QR Codes can not be secured in convenient usage, the only way is via inconvenient use by the human being properly in the loop.”

That is the loop has to go through “air gapping” via the human to get past the necessary full segregation. With the problem that modern consumer / commercial hardware is not designed for segregation and reliable gapping (think mesh networking built into the OS for C19 “contact tracing” and similar for supposed luggage tags).

To do this you need as a minimum two or more entirely separate devices one of which is entirely segregated as you have to,

“Get the security end point cleanly beyond the reach of the communications end point.”

And worse for most people you have to type the required information across the gap your self… Which is not at all “convenient”.

Clive Robinson September 21, 2025 10:33 AM

@ Bruce, ALL,

DEA bug in credit card…

https://www.independent.co.uk/news/world/americas/dea-surveillance-hidden-cameras-federal-law-enforcement-b2828606.html

Not sure how factual it is when it says,

“DEA – which has recently diverted agents from their usual drug-fighting mandate to assist Immigration and Customs Enforcement in carrying out President Donald Trump’s mass deportation efforts – is outfitting agents, presumably undercover, with audio-video recorders camouflaged to look like everyday credit cards.”

Whilst I can understand the shift of DEA agents from a task they have little hope of succeeding at. Moving them instead to a “Moronic Presidential pet project” that is guaranteed to fail strikes me as a considerable waste of, if not actual misuse of Federal Tax Payer Resources.

But that argument aside it’s the “audio-video recorders” disguised to look like Standard Credit cards, that has me being “curious”.

Apparently a “Request for tender” has already been put out,

“Covert audio/video devices must match the form factor of a United States credit card and other common form factors of that size and be able to accept a printed overlay that is detailed enough to be able to pass a close visual inspection,” states a summary of the September 12 purchase order. “The card must be able to be disguised by printing of specific art-work directly on to the card. Physical Dimensions can be no more than 85 x 54 x 1.5 mm, 34 x 2 x 0.05 inches Weight < 5 g.”"

The problem is not the RF and control circuitry, that can already be done and similar slim devices are available commercially. However what is an issue is,

1, The Optics
2, The power source.

Whilst it is possible using Fresnel techniques to make a very thin lense. The use of a lense depends on it’s optical area, and the related focal depth…

Even though batteries now look like they have “amazing capacity” the reality is the power density is not good so the volume has to be high…

This is due to the construction method, which results in the fact the volume also has to be fairly thick. That is they are generally made almost like electrolytic capacitors thus are in effect “rolled up”.

Any way, there is the old engineering motto in the US of,

“People in management will promise anything if the money is right, sometimes they might even be able to get a deliver together…”

Something the likes of Microsoft has done for nearly all of it’s existence with software eventually long after due dates…

However with hardware “practical reality” is based around the Laws of Nature, and they are not so easy to coerce.

Clive Robinson September 21, 2025 11:29 AM

@ ALL,

Back when SaaS became a thing (and eventually a basic of the cloud) I and others warned it was a trap.

And that you should keep proper control of your data.

Many people said the usual “you’r paranoid” or similar and for a while it went quiet enough to lull people into a false sense of security.

Now of course some are screaming over “Cloud Services” of various forms hitting them with fees that are preposterous, and because the people did not “keep proper control” of their data, they are trapped.

Some now say SaaS = “Screwed as a Service” or worse.

Just the latest story,

https://skyfall.dev/posts/slack

The point is,

“There is no free ride or free lunch unless you are very fleet of foot.”

And few ever are.

And that’s all before you take a very careful look at just who actually owns your data in all sorts of ways… Because the chances are it’s not you, now or ever again.

Clive Robinson September 21, 2025 7:11 PM

@ ALL,

Will the Financial crisis AI will create destroy the US?

I’ve mentioned before a couple of things,

1, The Financial Crisis happened because everybody did the same thing…
2, The money now supposedly invested in AI is actually larger than the US economy.

And I keep mentioning Current AI LLM and ML Systems are a bust. The reality is they don’t scale and will not become of use in any useful way that will cover the water bill let alone the energy bill…

However they are all that is providing churn in the otherwise moribund US economy.

I am not the only one to point out such things as I’ve mentioned before.

Oh and that nonsense with Oracle a few days back, talk about hype beyond the bubble… Folks get an envelope and do a few calculations on the back… Seriously the maths can not balance, unless hyperinflation on a scale never seen before happens.

But others have different perspectives on this disaster to come,

https://futurism.com/ai-economy-industry-hype

Titled,

“If the AI Industry Fails, It Could Take the Rest of Us Down With It”

Is kind of trying to say the same thing in a more gentle way by looking at just the “AI infrastructure” aspect,

“Don’t let AI critics tell you it’s good for nothing: the amount of money being spent on AI infrastructure is so enormous that it’s literally propping up the US economy.

The drawback, of course, is that if the AI industry fails, it could drag the rest of the economy down with it.”

So that’s “The opener”, and it’s followed by some information you can verify to substantiate part of it,

“Though Meta, Amazon, Microsoft, Google, and Tesla are expected to have spent some $560 billion on AI development by the beginning of next year, their collective revenue from AI comes in at a paltry $35 billion. In the first half of 2025, the Atlantic notes, business spending on AI added more to GDP growth in the United States than all consumer spending combined.

So 16 times the spend over income and no way to close the gap. Then there is also the issue of “No Product” that delivers on the promises and barely works even in the simplest cases in a reliable or cost effective way.

Does this look like a wise or even safe investment to be involved with. No of course not it’s worse than the “Burn Rate” nonsense that caused the hype bubble that led to the “Dot Com bubble burst”.

Which set the US up so that it’s been said the only thing that kept the US Economy going was,

“The economic churn caused by the drugs trade money laundering.”

Perhaps people should get ahead of the inevitable and diversify into “useful metals” or something people have to pay for or die (What in 1943 did Maslow put as the base foundation of his human “hierarchy of needs”, air, water, food…).

I’m not sure if this will play out quickly or if it will be the US only hit as hard as the figures indicate…

But it has been pointed out in the past the way as a nation to buy yourself out of economic collapse is “To start a major if not global war”… Not that history really supports this.

Clive Robinson September 22, 2025 3:27 AM

As a footnote to the US AI issue I posted above. This should tell people more about the underlying failings of the US economy and the plan to “paper it over”,

https://www.cnbc.com/2025/09/21/south-koreas-president-lee-trump-investment-financial-crisis.html

Put simply it’s “protectionism” in the Mobster sense. That is kidnapping and demanding money with menaces.

Expect to see more of this,

“Your money or these peoples lives”

Style highway robbery. It can not end well because fairly quickly investors will realise it’s going on and cut their losses and run, or they will “spin it down”. Because paying “Dane Geld” never ever works out in even the short term.

Think back to what you should have been taught about “essential freedom” and “security” rather than what was political spin.

Most Americans have recited Benjamin Franklin’s words to the point they are learnt almost by heart,

“Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.”

But few know what they were actually about and the dirty political behaviour that was the cause.

The Penn family were holding to ransom through the Colonial Governor they had put in place the people of Pennsylvania who were being attacked by French backed Indian’s.

Money was needed by the “Pennsylvania Assembly” to mount a defence, they were trying to get the Penn family to pay their share. But through their appointed Colonial Governor the Penn family kept blocking paying their dues… Which is behaviour we see rife in modern US Politics.

Thus Franklin’s words have been twisted from their original intent[1]. Which is fairly clear from other words in the same 1755 letter from the Assembly to the Governor.

When did this “twisting of words” out of context start?

Well not really untill 1944 and what some have called “The libertarians Bible” or “Testament of faith”. It had been in effect ignored till Margaret Thatcher started selective quoting and pushing it in peoples faces in the 1980’s…

What was this Holy Book,

Frederick Hyak’s

“Road To Serfdom”

Where Hyak uses Franklin’s words to conclude the fairly bogus, magnificence of the free market chapter (a pile of drivel that mires the book in a way that even time can not excuse).

The thing is Hyak’s words got equally selectively used out of context. And he distanced himself from the original work.

I suspect because he realised it was actually not centralism or socialism that was the actual underlying cause. But as others later said,

“Hayek failed to see that any concentration of power is a threat to freedom. The free market that he advocated enabled the concentration of power in the hands of a powerful elite.”

(From the 2016 paper of American economist John Komlos “Another Road to Serfdom”).

Thus we now see the same economic mess from the other direction.

There is good reason I describe myself as,

‘Both Socialist with a small “S” and Capitalist with a small “C”.’

They both have strengths and weaknesses and with a little thought it’s easy to see. But importantly you can not have one without the other… otherwise,

“Chaos ensures due to the abuse of power by self entitled authoritarian behaviours.”

Which is such a failing it’s said to be, “The human condition”.

[1] Read the first part of Benjamin Wittes’ Sept 2011 paper,

“Against a Crude Balance :
Platform Security and the Hostile Symbiosis Between Liberty and Security”

https://www.brookings.edu/wp-content/uploads/2016/06/0921_platform_security_wittes.pdf

Clive Robinson September 22, 2025 12:42 PM

@ ALL,

Is unknotting chaotic or not?

It’s a question that’s been puzzling mathematicians, physists and others for some time now (it has applicability in many knowledge domains).

The hope was it’s not chaotic. That is when you join the “free ends” the knot obviously forms a single loop, but it also has “twists and half hitches/crosses” that make the actual knot from the loop and the basic number of crosses remains. This basic number defines the knot type.

Now consider instead you join the free ends of two entirely separate knots to make a compound knot, what happens?

That is you get another single loop, but do you get more or less twists and half hitches in the resulting knot?

The expectation is the number of basic crosses is additive.

It’s not hard to see that “unknotting one knot actually creates another knot. It’s why the reef/square, granny, or thief knot unties to it’s self again endlessly. But the complexity of some knots can change. So obviously there is things we do not know…

Well a paper a little while ago unfortunately demonstrates things are rather definitely more complex than was hoped and the result is not what most wanted…

https://www.quantamagazine.org/a-simple-way-to-measure-knots-has-come-unraveled-20250922/

For those that think “so what” it has implications in complexity and information security.

Grima Squeakersen September 22, 2025 4:08 PM

@Clive Robinson re: “Difficult to read by machine, easy to read by human authentication code”

eBay has recently been using two types of authentication methods that I had not previously encountered. One requires sliding an irregular, non-rectangular “jigsaw piece to the appropriate missing section of a puzzle board. I’m not particularly impressed with that one as I think it might be trivial to solve it in code. The second presents the access seeker with a fairly low-res picture of an object, and asks him to select which of the objects in a presented array meets a stated criterion in relation, e.g., which objects would weigh the same or less. It seems to me that approach might be more promising, the weakness I do see is that the challenges are limited and repetitive. Do you regard either of those as meeting your objective to any significant extent?

Clive Robinson September 22, 2025 7:45 PM

@ Grima Squeakersen,

With regards your question of

“Do you regard either of those as meeting your objective to any significant extent?”

Neither, in fact I’m not sure any would pass these days.

Two reasons,

Firstly as you note,

“… the weakness I do see is that the challenges are limited and repetitive”

The simple fact is that we’ve got to the point with human2computer challenges, computers are such that they can do a dose of AI ML and fairly quickly they will outperform the humans after just seeing one or two solutions. You just can not have a sufficient level of variety with humans because there will always be a sufficient number of people that can not remember a 4 Digit PIN let alone do a new challenge…

Secondly is the issue of,

“Is the Turing test even valid?”

Mostly the challenges are a computer doing a negative Turing Test on an entity that alleges that it’s human.

Current AI LLMs can now after going through tens or hundreds of thousands of human responses can “Fake it well”. Enough that another computer can not discriminate.

Back at the turn of the century I failed miserably with capatchas as a way to reduce human cognitive load whilst increasing machine load such that a human did not have to type in a 25 or more totally random character without mistake… It turned out that back then in China you could get a human to solve a forwarded capatcha challenge for less than 30Cents… Since then computers can solve them for less than a couple of cents…

The result is that challenges are nowhere near upto the job these days. So we have to think of a new way to do things that favour humans not computers and I suspect we are now well beyond that tipping point.

lurker September 23, 2025 1:33 AM

@Grima Squeakersen
“One requires sliding an irregular, non-rectangular jigsaw piece

Not just eBay using that one. I find it sometimes doesn’t like me doing it with a finger on my trackpad – maybe it’s gotten worn …

Clive Robinson September 24, 2025 2:32 AM

@ goodjob, ALL,

With regards,

“Well this is worrysome.”

Actually not really.

People tend to conflate actually quite different types of attack and can get into “Chicken Little” mode because if it.

Attacks built on Software used as a “force multiplier” are a problem due to the “Army of one” issue that arises. What actually happens is,

“A weakness in the defenders systems allows any attacker entry into them.”

So even the Trumpian “400lb blob on a bed” can get into those systems. Thus the Trumpian blob can attack thousands if not millions of systems at no cost to themselves other than a little time and finger effort.

The “potential” attack you link to is actually hardware based and this makes it significantly different.

That is, it is the attacker that has to provide the “force multiplying” hardware at their own expense.

This puts it so far beyond a Trumpian Blob and nearly every other Cyber-Criminal because of up front cost.

Hidden in the article towards the bottom is the line that the equipment and SIM cards were worth “millions”. But did not mention the cost of acquiring “room space” in multiple locations and the needed physical security, power etc.

This takes a highly organised and very well funded operation over many months if not years to set up and put in place.

Whilst this is level III potential attack and not beyond large corporate and similar entities it is more likely to be “State Level”

Previous State Level operators known to have put in such systems are very very few. In fact from memory the only one to make it into the MSM or Trade Press is Russia when it invaded the Ukraine and used the Cellular network as a communications back up (and yes it was fairly quickly detected and intercepted for intelligence).

ResearcherZero September 24, 2025 3:05 AM

Directed energy weapons (DEWs) are an emergent technology which pose significant risks.

With governments remaining silent or repeatedly shutting down investigations, a new and extremely dangerous era of unregulated directed energy weapon use threatens everyone from the very head of government to even the average person on the street. Due to a lack of preparedness, regulation and constant denial, every nation is now under considerable threat. Hampered by a lack of transparency exacerbating the very significant lack of understanding amongst government officials, federal departments and the public domain.

Documents demonstrate that government repeatedly delayed and covered-up investigations, then often retaliated against whistleblowers and the patients affected by the attacks.

‘https://iview.abc.net.au/show/four-corners/series/2025/video/NC2503H034S00

Jeffrey Kruse was reportedly fired for mistreating patients and mishandling investigations.
https://www.washingtontimes.com/news/2025/sep/23/house-intelligence-leader-dia-chief-fired-handling-havana-syndrome/

Thermal injuries, ocular trauma, electromagnetic effects and cellular disruption

DEWs ~ Journal of Military, Veteran and Family Health
https://utppublishing.com/doi/full/10.3138/jmvfh-2023-0099

DEWs can also damage electronic and autonomous systems.
https://www.scientificamerican.com/article/the-artificial-intelligence-era-faces-a-threat-from-directed-energy-weapons/

Clive Robinson September 24, 2025 4:47 AM

@ ResearcherZero,

With regards,

“Directed energy weapons (DEWs) are an emergent technology which pose significant risks.”

The thing is DEWs are often misclassified as “Thermal Effect Weapons”(TEWs) which often they can be radically different from…

The reason is that thermal energy is the “ground state” after “radiation transport” down the EM and other spectrums. As such it’s easy to measure with as little as a bucket of water and a thermometer (ie a calorimeter).

The other type of EM energy damage that we know something about is that caused by ionising radiation.

In between ionising and thermal damage we know very little about it, because we don’t really know how to measure it. Due to lack of research in the open / academic communities.

It suffers from the old,

“We see nothing here so there can be nothing to research…”

“that might interfere with our profit and bonuses” issue.

Which is what the hole in the ozone layer was caused by, and why quite a few other “Monsanto” and similar disasters happened (and why GMO and Climate Science are hotly contested and research funding being attacked and withdrawn).

However we do know that thermal damage caused by lasers is not the best way to use them as weapons.

Because of two fairly obvious effects

1, Non target thermal absorption.
2, Target destructive self resonance.

When a laser hits a target some of the energy produces heat that causes the target to emit gas, dust and other matter. Which can only go back into the beam of the laser thus robbing it of energy before it actually reaches the target.

The result is that it takes considerably longer or more power to do sufficient damage to the target with a “continuous wave”(CW) laser than a pulsed laser where the emitted materials have time to move away.

Much to most peoples surprise energy gets not just stored but rises in effect in objects that are resonant. About the only time we are shown this is the shattering wine glass when it’s subjected to sound from a singers voice amplified through a sound system (see 1970’s TDK adverts).

As it’s the mechanical vibration that does the damage, the excitation can be any pulsed energy source that effectively couples to the object to create the vibration.

Thus a pulsed laser can and does produce mechanical vibrations in physical objects. And the energy will build at the objects resonant frequency to very high if not destructive levels.

Nature being what it is these effects are not the only two we know about that can cause physical and destructive effects in objects including people.

Thus the limit tables for nonionising EM radiation and other radiant energy are published by many “Standards Organisations” some of which for EM radiation can be found via,

https://www.emftesting.net/compare-rf-exposure-limits/

Following the tables back through the standards shows however that they are all equivalent to base thermal energy over an area rather than other effects…

ResearcherZero September 24, 2025 6:21 AM

@ALL

The treatment of American personnel is identical to how Australian personnel were treated by the response and investigation of the Australian government (following the initial response and immediate investigation by agencies which had taken the matters seriously).

It is worth reading the report from the Journal of Military, Veteran and Family Health.

Our governments have been collecting health related data on these incidents for more than three decades, which conveniently for government and far less convenient for the targeted, has been with publicly withheld. All of the above tests which are hinted at in the imagery of the above documentary have been conducted since the first incidents began taking place in the mid to late 1980’s within the Five Eyes allies, but even the medical professionals conducting the medical evaluations were stonewalled by government officials.

The same health privacy related excuses were given to Australian patients even after they consented to the release of their health information and disclosure of the incidents.

Many targeted in the attacks also identified Russian agents from Unit 29155 from photos.

The operator of the equipment was easily caught and identified on attempting the same actions in the same location, along with all of the equipment and vehicles used at the scene. The individual in question was already well known to Counter-Intelligence from other activities.

Although the CIA is now among the agencies which remain noncommittal and dismissive in the more recent reports, at the time of the earlier incidents, senior CIA officials traveled a very long distance overseas and arrived at the sight of the incidents shortly after. Those same officials did not dismiss the incidents and confirmed all of the details at the time.

Another seven members of Unit 29155 were later identified in 2014 stalking members of the US consulate in Frankfurt. It is not only the US government that continues to obfuscate.

‘https://theins.ru/en/politics/270425

“…Russia is using technology that remains at the fringes of the public’s understanding but has devastating effects on its targets. …These recent revelations also reveal a troubling undercurrent of denial and obfuscation within the U.S. government’s response.” (the same can be said of allied governments who remain exceptionally silent)

https://thedebrief.org/explosive-investigation-links-russias-shadowy-unit-29155-to-havana-syndrome-attacks-on-u-s-officials-worldwide/

not important September 24, 2025 6:44 PM

https://www.yahoo.com/news/articles/north-koreas-kim-oversees-drone-023325687.html

=North Korean leader Kim Jong Un oversaw a test of an attack drone and ordered greater
use of artificial intelligence (AI) in the technology, state media said Friday.

Drones are emerging as a “major military activity asset, raising it as a top-priority
and important task in modernizing the armed forces of the DPRK,” Kim reportedly said,
using the acronym for North Korea.

“The drones raise concerns because they offer low-cost, high-efficiency threats:
autonomous mission execution, improved accuracy and lethality, suitability for mass
production, and enhanced tactical flexibility,” he added.

AI could allow North Korean drones to “operate even if GPS or communications signals are jammed, relying on pre-trained algorithms”.=

ResearcherZero September 24, 2025 10:29 PM

@Clive Robinson

Many of the theories floating around online about the DEW used by the GRU are incorrect. The system the GRU deployed for testing 30 years ago was less refined and less powerful. The immediate and short-term effect is now much more pronounced, and the long-term health effects took significantly more exposure from the earlier model than what CIA officers and diplomatic staff are experiencing today.

It was far more obvious in the early days, as the GRU officer using the equipment parked the vehicle opposite the homes of the civilians he was testing the equipment on and pointed it at their homes. There were four homes in particular on one street next door to each.

I won’t describe the consequences for those living in those four households, but the government told the occupants the man parked opposite their homes was just testing the TV reception and not to worry. He parked there regularly for quite a few weeks.

Where as the public reporting starting in 2016 begins with a noise, the early incidents that took place in Australia all began with that same GRU officer pointing the transmitter directly at the target. There were no converging beams or any other complications, just simple line of sight for a total of around a 30 second burst. The consequences the CIA officers describe and the long-term health problems are the same as what occurred to the civilians who were exposed in Australia (around a dozen people were targeted).

Unlike the US personnel, the Australian civilians were not pulled out or given medical treatment. Though the police did try an intervene, they were quickly shutdown by the prosecutors office and government pressure to back off. Only intelligence/military affiliated personnel received medical assistance and a response from their agencies. The excuse given at the time from government was that they did not want to, “provoke an international incident.” This was the same excuse given when I requested authorization to put a bullet in the c–t, even after being fired upon.

Western governments, present ones included, are weak as p–s. Fragile and pathetic. They have had more than thirty years to grow a pair, come clean and put a response in place.

Given the component size reduction, integration and improved capacity, the technology will proliferate. It will terrify, immobilize, incapacitate, decommission and very cruelly kill.

ResearcherZero September 24, 2025 11:29 PM

@Clive

The Russian administration gave permission to neutralize the GRU officer and his junior officer. In fact they said they would be quite happy as it would solve a lot of problems. Those tow officers killed mothers, fathers and children. They shot the males and butchered the females with knives. The police, prosecutors and government here turned a blind eye.

They also stole quite a lot of top secret blueprints for submarine propulsion systems, missile systems and an utter crap load of sensitive and classified material. Our government would have to be a bunch of hopeless imbeciles to allow a pair of assassins run around for more than twenty years, bombing, stealing, killing, raping, robbing and committing crime.

It paints a clear and simple picture of timidity and an open door for malign activity. Test your strategy and experiment without consequence Down Under. We won’t say or do anything.

We did put all of the information in detailed overly-classified reports though. 😉

The information sighted in the AHI report from an “allied partner agency”, that could be ours. The information that the heads of the IC would not accept, but redacted all of it. The GRU attacked US intelligence officers and members of the diplomatic core (and their families) and yet the United States government did nothing – even when Americans were attacked on American soil – including smack out the front of the White House!

Like all new weapons, you have to sit your heads of state down in front of them and test.

Of course Russia invaded Crimea, hacked the DNC and federal departments, interfered in elections and launched a full-scale invasion, given yet another clear and simple picture of timidity and an open door for malign activity with no consequences for those responsible.

And speaking of the United States getting hacked again, UNC5221 exploited vulnerabilities in edge devices to plant backdoors for long-term espionage in tech and legal companies.

‘https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign

Turla (Center 16 of the FSB) and Gamaredon (Center 18) appear to be working together.

‘https://www.welivesecurity.com/en/eset-research/gamaredon-x-turla-collab/

lurker September 25, 2025 1:05 AM

If different airlines wish to share their checkin hardware and software, why should it need to be connected to the public internet?

Brussels Airport advised passengers to check in online before arriving at the airport.

Oh dear …

Cyber-attacks in the aviation sector have increased by 600% over the past year, according to a report by French aerospace company Thales.

and there’s more where that came from …

https://www.bbc.com/news/articles/c62ldxyj431o

Clive Robinson September 25, 2025 12:02 PM

@ Bruce, ALL,

As we all know expert systems did not work that well in Health Care even for triage.

As we also know Current AI LLM and ML systems” are not any better than expert systems and in around a third of cases they hallucinate. Oh and what is it 90 or 95% of LLM projects have so far being scrapped because they are not just not working, they are abismal and dangerous failures.

The rest we get told “from vibe coding” need to be scrapped or get expensive specialists in on contract to sort out the vibes that are unintelligible to even experts.

So honestly ask yourself who wants a Google run LLM diagnosing them for even a cut finger?

Yup me neither…

Now have a think what happens when you reduce actual front line humans in ER/A&E/Emergancy Resus and ITU/ICU?

Well there is a study that tells us in a fairly objective way,

https://www.nbcnews.com/news/us-news/death-rates-rose-hospital-ers-private-equity-firms-took-study-finds-rcna233211

“After hospitals were acquired by private equity firms, patient death rates in the emergency departments rose by 13% compared with similar hospitals, according to research published this week in Annals of Internal Medicine.”

And,

“After hospitals were acquired by private equity, the number of full-time employees fell by an average 11.6% compared with non-private equity facilities, the research found”

So now we have some data consider what will happen when more highly skilled frontline humans are removed and replaced with hallucinating LLM and ML systems?

Remember for having the self proclaimed best healthcare in the world, the US has some of the worst outcomes in maternity and life expectancy…

What do you honestly expect will happen when Private Equity pulls out Doctors and Nurses and replaces them with “Keyboard jockey” types who are not trained sufficiently to take “blood pressure, pulse, breathing rate, and other basic obs”?

KC September 25, 2025 4:48 PM

An expository skeptical of Diella, Albania’s AI minister

https://europeanwesternbalkans.com/2025/09/25/albanias-ai-minister-dilemma/

‘Appointed’ to oversee public tenders, Diella is being heralded by Albania’s prime minister as an impartial agent to rectify a notoriously corrupt public procurement process.

However, without independent audits and under a weak rule of law, it is feared this AI could further obscure decision-making and entrench power in a semi-authoritarian state.

I would agree that integrity is a process not a product. And it’s a process that does not live in a vacuum.

Clive Robinson September 25, 2025 6:40 PM

@ Bruce, ALL,

EU ChatControl anti-CSAM excuse surveilling all by Clint Side Scanning

As some know “idiot politicians” have been falsely using “think of the children” dog whistles to get legislation for “Mandatory Client Side Scanning” by all service providers.

Firstly think of the stupidity of this… Each service provider is “under threat” by the legislation. This means effectively every EU service provider is going to require you to put their client side scanning software on your phone / computer / Smart Device…

Which has the side effect that every electronic item in your house that internet connects and can be said to message is covered. That’s anything that “phones home” or gets updates etc, such as your TV, Radio, Games Console, robot vacuum, security device, fridge/freezer, microwave, cooker, AC/heating/hot-water appliance, exercise equipment, smart toilet and sex toy, toothbrush… Oh and all your other family members devices such as children’s toys, homework computers etc will have to be not just registered but have the service provider client side scanning on it…

Many IoT and Smart devices that message to the Internet currently in existence won’t be able to be “upgraded” with “Client Side Scanning” so,

“What are service providers to do?”

I suspect,

“They will do an Amazon and ‘brick it’ or similar.”

Rather than incur the legal risk of capricious and malevolent political authority (driven by “surveillance state” agencies intent on not just mass spying but significant revenue raising).

Anyway,

ChatControl wants to scan all your private messages :

The European Union wants to force tech companies to scan your private messages & images, even in your favorite encrypted apps.”

https://metalhearf.fr/posts/chatcontrol-wants-your-private-messages/

It comes across as a little scary to start, if you’ve not realised this particular piece of authoritarian nonsense is being pushed by idiots who clearly can not “do the job”.

The article goes on to point out several work-arounds some of which I’ve pointed out long ago on this blog. Such as to how you can pre-encrypt files etc and either send those or put them up on servers and just “message URLs” etc.

What it does not cover is how to,

1, Encrypt deniably.
2, Turn the ciphertext into what looks like plaintext to a client side scanning system.

In certain respects both are both trivial and impossibly hard depending on the availability of a covert side channel to establish shared secrets.

Any the article goes on to highlight the guilty etc and what EU Citizens and those who have dealings with the EU can do to protest and hopefully stop the nonsense.

Any way read the article it’s got some interesting stuff in it.

lurker September 25, 2025 11:11 PM

@Clive Robinson
re ChatControl

“Your device creates hash fingerprints of your content and compares them against databases of known illegal material.”

We’ve already discussed this, and IIRC nobody is game to try rotating, cropping, or changing the clour of a couple of pixels …

“AI algorithms analyze visual elements (like exposed skin)”

I discovered there are Unicode points for skintones for emoticons. Wait for more false positives.

I had to smile at your typo Clint Side Scanning with visions of Squint Eastwood[1] dredging thru message logs …

[1] ‘https://tvtropes.org/pmwiki/pmwiki.php/Main/ClintSquint

ResearcherZero September 26, 2025 12:55 AM

@Clive Robinson, ALL

Client Side Scanning does not work in the real world either. Child Care Centers, schools, sports clubs and other organizations are supposed to perform background checks, refer incidents for investigation and stand down known offenders where a credible complaint exists. Something which often fails occur and is often followed by a lack of prosecution as the prosecutors argue children are not credible witnesses, while ignoring all of the adults who were present and who instead could of been called to give evidence along with any physical, medical or recordings that were caught on camera at the time of the offense.

In many cases all the adults involved are happy to avoid the uncomfortable experience of taking responsibility, personally avoid advocating for action to be taken, or in the case of management and employees – avoid accountability and testifying during the legal process.

When those responsibilities are passed off to a machine – they can all sigh with relief.

Ahhhhh…

CVE-2025-20333 is a bug in Cisco ASA devices which allows for persistence across upgrades and CVE-2025-20352 is a bug in IOS (Cisco OS) which allows RCE as root. RayInitiator is the persistent GRUB bootkit which can survive reboots and upgrades, while Line Viper is a user-mode shellcode loader with its own set of modules which allow for commands and functions.

File under Secure Boot

‘https://cyberscoop.com/cisa-emergency-directive-cisco-zero-days/

The previous campaign also targeted ASA firewalls and used similar custom implants.
https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

The origin appears to be located in China, along with the use of a tool to bypass the GFW.
https://censys.com/blog/analysis-of-arcanedoor-threat-infrastructure-suggests-potential-ties-to-chinese-based-actor

This new ArcaneDoor campaign apparently began in May

‘https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/RayInitiator-LINE-VIPER/ncsc-mar-rayinitiator-line-viper.pdf

ResearcherZero September 26, 2025 12:58 AM

Flashing malicious kernels and bootloaders as valid firmware updates to the BMC SPI.

‘https://www.binarly.io/blog/broken-trust-fixed-supermicro-bmc-bug-gains-a-new-life-in-two-new-vulnerabilities

ResearcherZero September 26, 2025 1:18 AM

When will the Big Arm plugin module for Client Side Scanning and AI cameras which extends to break up fights, prevent physical assaults and catch bullets in mid-air flight become available? Is the Big Arm reliable in any weather and how much extra does it cost?

If the Big Arm attachment works as advertised and can prevent crimes I’ll eat my large hat.

Clive Robinson September 26, 2025 7:57 PM

@ ResearcherZero,

With regards,

“Child Care Centers, schools, sports clubs and other organizations are supposed to perform background checks, refer incidents for investigation and stand down known offenders where a credible complaint exists. Something which often fails occur and is often followed by a lack of prosecution…”

This near did not happen prosecution one did for once end with an 8 year prison sentence. But we are left with the big reason such things often don’t get to court,

“Some people just do these things and we may never find out why.”

Thus there is a credibility gap that can not be sold to people. Because most people expect things to make sense to them…

What many don’t often realise consciously is that court cases in front of juries are a form of dramatic theatre. Both the prosecution and defence have to “sell a story” to the jury about the defendant. And without a convincing or credible story it might not even be worth the time and cost of going to trial… And why many trials are on way lesser charges than the defendants actions might indicate.

But as you note this “happens all the time” action by authorities is also used as a way to manipulate justice politically etc.

In this particular case even though the prosecution had video of the persons behaviour, it very nearly did not go to trial because “selling it” was going to be an uphill issue (defendant young, cute, blond, etc as you can see from online photos and lots of issues with another recent trial).

As this Police Report hints at,

https://news.met.police.uk/news/nursery-worker-jailed-for-child-abuse-following-met-police-investigation-501504

I delayed mentioning this just finished case to you, because in the UK at the moment having a “foreign sounding name” is being used by others “as justification” to sort of behave in similar abusive ways or incite such behaviours in others…

Clive Robinson September 26, 2025 9:25 PM

@ ResearcherZero,

To answer your question of,

“When will the Big Arm plugin module for Client Side Scanning and AI cameras which extends to break up fights, prevent physical assaults and catch bullets in mid-air flight become available?”

Somebody wrote a catchy song about it… That then got used in a very well known TV Drama Series about a future that had it,

https://m.youtube.com/watch?v=4h8NmjpiY1M

lurker September 27, 2025 1:24 PM

@Clive
“Somebody wrote a catchy song about it… ”

BBC props dept still following the original Dr Who script, in spite of the futuristic cgi he flips an old school toggle switch on the panel.

ResearcherZero October 2, 2025 2:45 AM

@Clive Robinson

The experienced performer will ask for a judge-only hearing or slide an envelope to the prosecutor. Fortunately such disturbing cases are outside that tastes of most responsible adults and many are happy to never get involved, removing the need for any legal process.

This happened in a case where supposedly protected witnesses were not protected although the police knew that the offender had made repeated attempts to kidnap and kill them.

The police did know the victims were at risk of getting knocked off, but if they had of acted on the evidence they had, it likely would of revealed their previous failings to deal with the matter. That is a difficult position easily solved by letting the offender finish the job, as the police could do nothing prior to and after the murders or risk involvement.

There were no annoying mobile phones back then and reporters and police were bullet adverse. They probably still are as they reopened the case but have forgotten how to read.

Although police have a good idea where the body may be located, if they search for it the whole problem would reemerge as they would then have a crime to add to the evidence of who was responsible for the murder. There are other bodies and evidence but don’t tell anyone.
My wife and I made that mistake as children and were both shot in front of the police, who naturally took no action because they did not take any action the previous times, kicking off the whole scenario in which we were shot, along with the murder of several others.

Funnily enough it involved a lot of child abuse and a few murders committed by police officers. The matter was thoughroughly investigated but a large number of witnesses still remain alive. The official explanation is the investigation was “mishandled” and revealed that police took no further action after the investigation as it revealed very serious misconduct. Police then decided that any further action would reveal that misconduct and so they reopened the cold case and have since sat on it and conducted no interviews or review.

(Police did collect a lot of evidence and conduct interviews previously but the evidence was overwhelming and provided grounds to lay very serious charges which would of likely resulted in conviction. This would have created serious embarrassment for police as one of the offenders had since been promoted to Police Commissioner and the crimes predated his recruitment into the police force – and a well publicized murder after his recruitment.)

A catch 22 situation where repeatedly ignoring the problem made it worse.

This may be a little unfair for the victims, but I have heard children are resilient. I did hear that from the adults and police officers who preferred to avoid getting mixed up in ongoing matters caused by their previous failure to meet their responsibilities, but only a few people died and most of them were the victims of the crimes, hence solving the problem.

It reminds of a similar problem which was caused by negligently blowing up power lines.

The pumps that move water through the cooling systems of nuclear reactors and the sprinkler systems that keep fuel cool, need a steady and reliable source of power to continuously operate. Running the cooling systems of nuclear power plants using only diesel generators presents risks that fuel could eventually begin to overheat and subsequently meltdown.

Zaporizhzhia Nuclear Power Plan has diesel fuel reserves for 10 days. The main external supply of electricity has been cut off for more than a week. The backup power line for the plant was reportedly cut by Russian forces in May. Although the reactors are shutdown, cooling provided by diesel generators to prevent the fuel from overheating is still required. The International Atomic Energy Agency is talking with Russia and Ukraine to try and negotiate a solution to provide a reliable and ongoing supply of fuel to power cooling.

Maintaining optimal temperatures and pressures is essential for reactor safety but mistakes are know to happen. They are tricky beasts which require ongoing cooling for a long time.

‘https://apnews.com/article/ukraine-russia-war-nuclear-zaporizhzhia-a0273ea4558a7b26cf232edd620942cc

The international standards to secure nuclear facilities no longer work very well.
https://thebulletin.org/2025/10/from-zaporizhzhia-to-natanz-nuclear-piracy-is-equally-dangerous-and-illegal/

KC October 19, 2025 1:37 AM

If this doesn’t convert Linux fans, I just don’t know what will 🙂

https://blogs.windows.com/windowsexperience/2025/10/16/making-every-windows-11-pc-an-ai-pc/

Behold an AI PC that can respond to voice, see your screen to offer support, and take action on your behalf … built on the security of Windows 11 👻

Per Ars Technica the wide scope of these portended changes ‘makes knowing what these features do and how they safeguard security and privacy that much more important.’

‘Per usual, we don’t know exactly when any of these new features will roll out to the general public, and some may never be available outside of the Windows Insider program.’

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.