Written by Anagha H | Updated: September 20, 2020 12:29:02 pm

What pictures come to mind when you hear the words “Dark web“? Perhaps it immediately conjures up a hazy, elusive network of cyber criminals who market drugs, human parts, and the services of hitmen or sites hosting salacious, illicit pornography and abhorrent pay-per-view ‘Red Rooms’.

Would you ever imagine that the scary, nefarious dark web also hosts something as innocuous as JustChess- a site which does exactly what its name says, just allows you to play chess? Let’s peel this onion away layer by layer and try to understand exactly what the dark web entails.

What is the Dark Web?

First off, let’s clarify a common misconception- although the deep web is conflated with the dark web, they are two separate entities, neither of which are illegal in themselves. While the clear net (around 4% of the internet) is what we regularly browse, the Deep Web (90% of the internet) comprises web pages that cannot be accessed by a search engine, like drafts of emails, banking pages, medical records, legal documents and so on.

The Dark Web (covering the remaining 6%) is the seedy underbelly of the deep web which offers the grisly amenities stated at the beginning and other innocent resources, all un-indexed by search engines.

It can be explored using browsers like Freenet, I2P, and most famously, Tor, with VPNs and Tails OS for additional security. The Onion Router (Tor) was a project launched by the US Navy in order to enable secure communication between government officials and it was made public, for free, so that the deluge of users would ensure more anonymity. The distinguishing factor of dark websites from the surface web is the use of “.onion” in their domain names.

Services Offered

As the selling point of the dark web is virtual invisibility, it’s no surprise that it hosts an incredibly wide spectrum of activities but it was initially pegged as a safe space to voice dissent, especially by citizens of draconian countries with uncompromising internet laws. Seeing as China blocked most Tor sites using ‘The Great Firewall of China’, you can understand why this is crucial in many parts of the world.

the dark web, deep web, red rooms, onion router, silk road

Chat rooms dedicated to whistleblowers and for people to just talk without their governments breathing down their necks popped up; it wasn’t long before the media recognized this opportune trend and set up dark web versions of their publications from the likes of WikiLeaks and Radio Free Asia to ProPublica, The New York Times and BBC.

Sites like SecureDrop allow journalists to interact with whistleblowers (remember Edward Snowden?) which reputed companies such as Reuters and Forbes make use of. Even Facebook has a dark web alias!

Other communication services offered on the dark web include email providers (ProtonMail, SecMail), pirated media (The Pirate Bay), the assistance of hacker groups (Mazafaka, xDedic), and even puzzles like the popular Cicada 3301.

Moving onto the more sordid facilities proffered in this clandestine matrix: stolen social security and credit card numbers, free-for-life Netflix accounts, fake degrees, gambling sites, extremist message boards (The Daily Stormer), and The Hidden Wiki (a directory of all the onion sites). The number of commerce forums was booming in the 2010s, after the outspread success of Silk Road.

It was defunct after the arrest of its founder and many other markets rose to take its place (AlphaBay, Dreamer Market, TheRealDeal). However, these cyber-drug rackets aren’t as evasive as they’d like to believe; they were all busted over the years by the coordinated efforts of sleuths internationally (Operation Onymous, Operation Trance).

This is a massive relief, considering the items that were on sale- skimmers, designer knockoffs, iPhones, cyber-arms, human organs, controlled animal products, guns
and at the heart of it all, drugs.

Now to the truly gruesome, notorious side of the dark web which garnered its reputation as a hub for offenders. You’ve probably heard of the exaggerated urban myths- hurt core and torture videos, how you can hire hitmen, twisted games like Sad Satan, the disturbing Human Experiment, and Mystery Boxes. The list is endless. So are the number of scams out there.

The consensus is that Red Rooms are most likely fictional, Sad Satan a poor publicity stunt by the YouTuber who brought it up and the idea of hiring hitmen is plain ludicrous (Besa Mafia was a big, fat scam after all). But that doesn’t mean the dark web doesn’t house actual stomach-churning material.

Statistics show that pedophilic porn has the highest traffic on the dark web, right next to revenge porn and animal abuse videos. Terrorist websites use it for their operations. Its easy access to drugs created an addiction crisis in the UK, particularly due to the sale of fake Xanax termed ‘The Red Devil’, and ironically, despite being a haven for the privacy-conscious, its users are frequently targeted in scams (take the Ashley Madison or the monumental Equifax data breach for example).

Risks Involved

If the thought of the scarring information you might run into is not enough to keep you surfing on the shallow, clearer waters of the web, here are some more reasons as to why a dive into the deeper end is just not worth it. Bitcoins are the unofficial medium of exchange and like all cryptocurrencies, it’s vulnerable to frauds and high price volatility. Thus, trying to buy anything off the dark web makes you susceptible to cyberthreats.

Experts and novices alike still haven’t gotten a hang of navigating this dynamic landscape. Its search engines are frustratingly slow and of little help, presenting redundant results with 404 errors more often than not. Since they cannot index sites, you can easily click on links leading you to illegal forums by mistake.

If your plugins and scripts are left on, they can reveal your IP address; you will be unwittingly associated with the lewd and revolting sites you stumbled upon. This can turn you into a target for government surveillance or for hackers, who grab such chances to obtain your credentials and blackmail you with it. As meticulous as you may be to avoid it, it’s highly probable that visiting a seemingly harmless site will end up accidentally downloading malicious software in your device.

So there you have the facts, you can decide for yourself how dangerous the dark web really is. Just remember- curiosity killed the cat and satisfaction might have brought it back, but satisfaction won’t remove the black of your unintentional verboten activities from your record. Here’s to inadvertent crime.

Also read,

Popular video app TikTok announced on Saturday that it had signed Oracle as its U.S. technology provider and Walmart as a business partner, which US President Donald Trump called “fantastic.”

“We are pleased that the proposal by Tiktok, Oracle, and Walmart will address the security concerns of the US administration and resolve questions aboutTiktok’s future in the United States,” said AFP, a spokesman for Tiktok, which owns China’s Fight Dance.

TikTok back with Oracle as Tech Partner

Oracle will become “a trusted technology provider that will be responsible for hosting all U.S. user data and securing relevant computer systems to ensure that U.S. national security requirements are fully met,” the spokesman said. “We are also currently working on a business partnership with Walmart.”

He went on to say that the companies were “maintaining and expanding” Tiktok’s global headquarters in the United States and creating 25,000 new jobs.

Trump has previously praised the deal as “fantastic.”

“I have given this contract as my blessing,” he said. “If they do it, that’s fine. If they don’t, that’s fine too.”

tiktok trump
Trump – Announcement

Trump’s Allegation on Tiktok

Trump has been claiming for weeks that Tiktok has been collecting user data for Beijing, never providing evidence for his allegations.

In early August, he gave Bite Dance until September 20 to hand over Tiktok’s U.S. operations to an American company.

Also on Friday, the Trump administration ordered a ban on downloading the video-sharing app, as well as China-owned news site WeChat, escalating tensions with Beijing over technology.

Following Tiktok’s announcement, the United States delayed downloading the app until September 27.

Trump said “security will be 100 percent” and that companies will use separate cloud servers.

The president said the deal would lead to the creation of a new company headquartered in Texas, which has “no ties to China” but will still be called Dictok.

Trump also said that the companies involved would contribute $ 5 billion to the “education of American youth.” He had previously said that the federal government deserved the cut to recognize the deal.

TikTok’s spokesman only confirmed the creation of new jobs, and the company’s global headquarters will be in the United States.

Oracle confirmed its role in the deal, saying that Dictok’s decision “had greatly affected Zoom’s recent successes in moving most of its video conferencing capabilities to the Oracle public cloud.”

Walmart did not immediately respond to AFP’s request for comment.


WeChat, owned by Tencent, will lose operation in the United States from Sunday, following a Friday U.S. order against Chinese applications.

wechat tiktok trump
Wechat ban by President Trump

Following the announcement of the Tiktok-Oracle-Walmart agreement, Digtok users will be barred from installing updates from September 27, but they will have access to the service until November 12.

That deadline is likely to tie the deal with Walmart and Oracle to address Washington’s security concerns, protect data for popular use.

The brand of dictatorial short, humorous phone videos has become very popular, especially among young people, with over 100 million users in the United States alone.

As Trump faces a fierce re-election campaign, US officials have described the steps needed to protect him from Chinese intelligence through platforms.

But in response, China’s Ministry of Commerce on Saturday denounced the United States as “bullying”, saying it violated international trade rules and had no evidence of any security threat, shortly before launching a mechanism to allow foreign companies.

China accuses the US of 'bullying behavior'
Xi Jinping and Donald Trump

China’s long-awaited list of “unreliable companies” is seen as a weapon for Beijing to retaliate against the United States, which has used its own “list of companies” to expel Chinese telecommunications company Hawaii from the U.S. market, in addition to recent moves against TikTok and WeChat.

Trick critics say that while the dangers of dictatorship are not clear, the embargo raises concerns about the government’s ability to restrict free expression. The ban exacerbates the war with Beijing over technology, which, some analysts say, is a security concern.

Also Read, Paytm back on Google Play Store within hours – Reapproved after being blacklisted by Google after violating its policies!! [2020]

Written by Amarnath Siddaradi | Updated: September 13, 2020 08:11:02 pm

The India-China dis-pat

On-going tensions between India and China are going into the crucial phase. India and China are doing the Mirror deployment of their Army. Indian Army is also keeping a close on the Chinese aggression at LAC.

After the Indian Special Frontier Force dominated the heights of Pangong Tso lake. The PLA is not able to digest the fact that many tops are occupied by the Indian Army as of now.

On the events of 9th and 10th September, the troops PLA counted as 40 soldiers, tried to frighten the Indian Army. The Chinese PLA fired 10-12 shots in the air. Indian Army was ready for any kind of aggression. 

45 years of peace on LAC

The shots were fired after 45 years at LAC. In the past, the firing exchange took in the year 1975. 

The PLA soldiers postured in an aggressive manner near the stand-off area with the rods, spears, clubs, and pole weapons. It was clear that PLA was ready for another clash.

The Indian Army maintained high professionalism and the brigadier level meeting was held to solve this matter. Still, the tensions are at the same level, and not in a mood to meltdown.

The Chinese said that the disengagement must be over by winter, as the Chinese PLA doesn’t have the experience of High Altitude and low temperatures. The Indian Army is serving at Siachen is ready for the winter deployment at LAC with warm tents and winter clothing.

Also read,

Written by Amarnath Siddaradi | Updated: September 5, 2020 06:17:02 pm

India china standoff

As the ongoing aggression with the Chinese in Eastern Ladakh, The CDS General Bipin Rawat said that Military option on the table if talks fail.

Peace Agreements

In the past decades, India and China have signed 5 Bilateral Border Agreements in order to maintain peace and tranquillity along the Indo-China Border. The 5 Peace agreements were signed in the year 1993, 1996, 2005, 2012, and 2013.

After all these peaceful agreements, still there are events of Chinese Aggression on the Indo-China Border. The Military and Diplomatic level talks are being held to resolve these matters and maintain the status quo on the Indo-China Border.

military military times indian military china border tension

The Doklam Standoff

In June 2017, the Chinese extended their road construction to the Doklam Region in the tri-Junction of India, China, and Bhutan and tried the military standoff in the region. After the heavy deployment of the Indian Army in the Doklam region, the Chinese withdrew their troops and the matter was solved.

military military times indian military china border tension

The Eastern Ladakh situation

In early 2020, the Chinese PLA (People Liberation Army) entered the Indian Territory in the region of Gogra, Galwan, Depsang, and Pangong Tso Lake in the Eastern Ladakh. The Indian Army tried to stop this aggression and gave a tough answer to the Chinese PLA. The Galwan clash on June 15, Indian Army’s 16 Bihar gave a courageous answer to the Chinese PLA and outraged the Chinese Troops.

The Bilateral talks

Later the Galwan Clash, Bilateral talks were held between the two countries. Military and Diplomatic talks were done to resolve the situation. The Corps commander level meetings are being held regarding the Disengagement of the Chinese PLA in the Eastern Ladakh. The disengagement from Chinese was swift in the beginning but in later times the movement of PLA troops became slow. Even after the next corps commander level meetings, the matter is remaining unsolved.

The CDS statement

The meeting was held on the 22 August 2020 regarding Chinese Aggression. The Defence minister Rajnath Singh, NSA Ajit Doval, CDS General Bipin Rawat, and the three services chiefs discussed along with this matter. After the meeting, the CDS stated: “Military option on the table if talks fail”.

military military times indian military china border tension

Let’s have a look on India’s Military level Operational Preparedness

Indian Air Force made the Leh Airforce station very active. The Sukhoi 30 MKI, MiG 29 UPG, and Apache Attack Helicopters are being deployed along with the Eastern Ladakh. The Chinook Heavy Lift helicopters are intensely involved in Logistics operations in the region. The Daulat Beg oldie Airstrip is also being upgraded. The Additional troops of the Indian Army are deployed along the LAC. Even the troops are backed with the winter clothing to be deployed in the winter seasons. Surface to Air missiles Batteries are deployed along the Chinese border and the Army is also equipped with the Igla-s Short Air defense Missiles.

In recent times, the HAL LCH ( Light Combat Helicopter ) and ALH ( Advanced Light Helicopters) are also deployed in the operations at high Altitudes in the Leh region to examine the high potential of Helicopters. The Dassault Rafales are expected to add more power to the forces in the region.

If the table talks fail even after the Corps commander level meetings and diplomatic talks. India is ready with the Military option and is capable to do any operations against the Chinese.

Also read, Government blocks 118 mobile apps including PUBG Mobile, BAIDU which are prejudicial to the sovereignty and integrity of India

Apart from what was happening in Ladakh, more actions against the Chinese is that the Modi government has gone ahead and banned around 118 apps including PUBG Mobile following the series of Bans previously

PUBG and 117 other apps Banned

PUBG Mobile is the wildly popular mobile game from China, it has now been banned in India formally after there has been some suspense over whether PUBG Mobile will be banned in India after the country banned TikTok and several other apps.

Indian alternate to all these banned apps is the big focus and as far as Aaatma Nirbhar Bharat to reduce dependence on China as much as we can and these overall are gradually a stepping stone to ultimately putting China out of 5G trials in India and that will be one big signal India takes.

The attacks in Ladakh are even worse given the fact that India is effectively taking very strong countermeasures in Ladakh in the business field in the economic field and also diplomatically from China

India’s Cybercrime Coordination Center under the Home Office also sent a comprehensive recommendation to block these malicious apps, according to the statement. “Similarly, there have been similar bipartisan concerns, raised by various public representatives, both inside and outside the Indian Parliament. There has been a strong chorus in the public space to crack down on applications that harm India’s sovereignty and the privacy of our citizens, “

“Based on this data and upon receipt of recent credible input that the published information, requested permissions, built-in functionality, as well as the data collection practices of the above-mentioned applications, raise serious concerns that these applications collect and surreptitiously share data and jeopardize users’ personal data and information that may pose a serious threat to state security, “

Also read,

Written by Anagha H | Updated: August 21, 2020 11:02:02 am

5G Network: The sphere of technology is constantly evolving, expanding hungrily to coalesce with every corner of our world. So maybe we aren’t living the fantasies of every Sci-Fi author from the ’70s, so we don’t have commercially available flying cars (yet)! Everyone can tell that we have progressed leaps and bounds from the first hallmark invention (the great Wheel). We have in our vicinity an empire of technological devices.

What are you reading this on your smartphone, tablet, or laptop? Either which proves the point. Humankind is pushing the boundaries of automation’s capabilities and 5G Network is only another step in the building of Tech’s integrated palace, albeit a poignant one. It only seems fair that everyone should know what this revolutionary addition is all about!

How 5G Network works

To start off with, let’s look into what 5G Network is and what makes it different from 4G or 3G. 5G is the fifth generation global, wireless mobile network being designed and introduced to connect everything.

Yup, everything.

The possibilities range from intricately linked IoT appliances, like Tony Stark’s apartment, to mission-critical communications- think internet-connected cars, environmental sensors, etc- to über advanced smartphones.

The basis of this super-connectivity that 5G offers are based on its clever plan to use the bandwidths that are currently being unconsumed. There are broadly three categories of the aforementioned- low, mid, and high ranges, with the last being the most lucrative aspect. It uses a technology termed “millimeter wave” which enables a supremely accelerated speed (10 Gigabytes per second) allowing people to download a movie within seconds or stream 10 videos at once. Pretty cool, right? Isn’t it exciting to learn about this? Sorry to burst your
the bubble then, because this major feature of 5G Network has a major flaw that researchers are burning the midnight oil to resolve- it can’t be implemented just yet.

Also read, One Plus OxygenOS 11 Release confirmed: Android Fans could be Treated with these new Features Soon

The Hurdles

The issue with the hyped millimeter wave is that it cannot transmit its potent high frequencies over a large distance. It would probably cover your colony, at the very best. It is also susceptible to interruptions from things like cars, other humans, walls, and even rain. To compensate for this restrictive bandwidth, there would need to be miniature access points installed everywhere, instead of your nominal two or three cell towers in a block.

The race to overcome this hurdle has since the likes of the international drama starring the USA, grappling to come out on top of China and Huawei. The country has imposed several sanctions on Chinese products, citing security reasons and emphasizing the implications of letting China amass colossal amounts of data via 5G, while its own watchdog agency, the FCC, gutted 5G Network’s net neutrality policies to authorize more investments.

How to overcome the millimeter issue

Thus, 5G Network is presently focusing on its release in the low range bands (similar to existing 4G cellphones) and mid-range bands, which are a considerable improvement from the network our devices use today. It provides minimal latency lag (say goodbye to buffering!) and low web congestion, meaning high-speed availability of network connections- this is the phase of 5G being utilized in 38 countries as of now, including the USA, China, Japan, South Korea, and the UK, to name a few.

The future with 5G Network

On the plus side, the promise of this development is essentially the substratum of a future with seamless virtual and augmented reality experiences, empowering breakthroughs in the medical, manufacturing, and countless other industries.

On the flip side, the security concerns being raised over how easy it would be to hack into hardware devices such as IoT appliances and internet-connected cars is not trivial, especially if said gadgets contain confidential and private information, like medical reports. The cost of developing a 5G infrastructure is exorbitant right now and possibly the biggest downside is that most old gadgets are not compatible with 5G, you would have to buy a new smartphone to employ the use of 5G Network.

Maybe we’ll get a flying car on the market before 5G, in all its 10Gbps glory, gets out…!

Also read, TWS – The new affordable earphones! (2020 Edition) – [Budget segment]


OnePlus is a Chinese smartphone manufacturing company founded by Pete Lau and Carl Pei in Dec 2013. They have become one of the top Smartphone manufacturers since then with their own kind of appeal to the customers worldwide. Their main success formula has been the word-of-mouth technique which has made them one of a kind.

OnePlus Nord

This became the World’s first smartphone to launch through AR (Augmented Reality) and the company’s first budget range smartphone when it launched on July 21, 2020. It is also a huge hit considering the pre-book record and at the price range of Rs 25,000 there’s not a single smartphone with such an impressive camera lineup combined by the best OS – Oxygen OS – without bloatware and ads.

OnePlus Nord Lite

Take this with a pinch of salt, as the name specified above is solely based on the renders which were leaked a while ago and we, the Unbloggers need our readers to know what the device will be capable of with some of the expected specs!!

These are 2 separate devices as you can notice from the camera lineup and I’m eagerly waiting for them to launch this fall 😊

oneplus nord lite qualcomm 690
Speculated Renders by a well-known leakster

Specifications – Simplified

As you can see in the following attachment, the phone is said to be powered by Qualcomm’s SD 690, 6 GB RAM running Android 10, and named Oneplus BE2028. The Geekbench scores of the speculated device leaked online which was reported by Stufflistings’ Mukul Sharma are the only thing we get to know as of now.

Also read Galaxy Unpacked 2020 – Witness the new power – Watch the live stream on Aug 5,2020.

  • The Pentagon’s UFO department could now be forced to report to the public every six months.
  • Last month, the Senate Intelligence Committee called for more transparency from the secret unit.
  • Lawmakers said they “support the efforts” of the “Working Group on Unidentified Aerial Phenomena”
  • However, the measure confirmed that such a program still exists.
  • In 2017, the Pentagon admitted to funding a UFO program but said it ended in 2012.
  • Officials who worked for the program have confirmed that it continued.
  • They also say that he discovered objects “that we could not make ourselves” and “vehicles not manufactured outside the world that was not manufactured on this earth.

The UFO hunt

The once-secret Pentagon department that hunts and investigates UFOs have continued to function for the past decade despite previous claims that it had dissolved.

The Unidentified Aerial Phenomena Task Force has been hiding inside the Office of Naval Intelligence and is now being asked to reveal to the public at least some of its findings every six months, according to the New York Times.

Information about mysterious encounters with previously unidentified aerial objects has only been discussed in classified briefings, and Pentagon officials are not yet free to discuss the program, which deals with classified matters.

The new calls for greater transparency come when officials who previously worked with the unit revealed that some of the objects discovered in their investigations were items that humans “could not manufacture ourselves” and “vehicles not made on this earth.” Last month, US senators demanded to see the Pentagon’s UFO files as they lobbied to influence the secret Navy program.

The committee says it “supports the efforts of the Unidentified Aerial Phenomena Task Force” and appears to confirm that such a program still exists.

In 2017, the Pentagon acknowledged having funded a multi-million dollar secret program called the Advanced Aerospace Threat Identification Program to investigate UFO sightings, although defense chiefs claimed it had ended in 2012.

“It was determined that there were other, higher-priority issues that deserved funding and that the best thing for the Defense Department was to make a change,” a spokeswoman said at the time.

But the Pentagon had been less clear about whether the UFO program continued to hover somewhere in the vast universe of the United States’ defense establishment.

“The Department of Defense takes all threats and potential threats to our people, our assets and our mission seriously, and takes action whenever credible information is developed,” the spokeswoman said.

People who worked with the UFO program until 2017 and beyond have now confirmed to the New York Times that it continued to exist, but under a different name and a different office.

You no longer have to hide in the shadows“, Luis Elizondo, a former military intelligence official, and former program director told the New York Times.

However, the Senate’s focus on the program stems less from a concern for aliens, and more from the threat posed by real-world adversaries like China.

The Pentagon admitted in June that a nuclear detonation in space by Russia or China was one of the possible threats to the interests of the United States.

The United States is particularly concerned about China’s espionage capabilities, including the use of drones and other aerial technologies.

In early July, Florida Senator Marco Rubio, acting chairman of the Senate Select Intelligence Committee, told CBS that he was concerned about unidentified planes flying over US military bases.

I have affirmed that China or Russia may have taken “a technological leap” that “allows them to carry out this type of activity.”

‘Maybe there is a complete, somewhat boring explanation for it. But we have to find out, “he added.

The UFO program is responsible for “collecting and reporting on unknown airborne phenomena, any links with adverse foreign governments, and posing a threat to the military assets and installations of the United States.”

But the senators said the exchange of information had been “inconsistent” and detailed reports had been sought regarding the progress of the program and no incidents had been observed.

In some cases, an earthly explanation has been found, and even when there is not, experts say it does not make a supernatural explanation more likely.

UFO pentagon america unidentified aerial object

However, former Senate Majority Leader, Harry Reid, who lobbied for the initial construction of the UFO program, is convinced that otherworldly vehicles have crashed in the United States and have been recovered and investigated.

It is extremely important that information has been released on the discovery of recovered material materials or vessels.”

“We couldn’t do it ourselves,” added Eric W. Davis, an astrophysicist who previously worked as a consultant on the program, which included some articles.

Davis claims he informed a Defense Department agency in March about “freedom from vehicles outside the world”.

However, no evidence has been introduced, and some of the blame is attributed to the limitations in discussing classified material.

They have already moved this year to improve the level of information provided to the public from the UFO intelligence unit, a move that was well-received by Senator Reid.

Also read, Powerful quake shakes Alaska towns, creates a small tsunami – July 22

Three videos

In April of this year, the Pentagon released three videos taken by US Navy pilots, showing aerial objects faced with unexplained objects.

The grainy black-and-white images were leaked earlier and the Navy recognized that they were actual videos.

One video was shot in November 2004 and the other two in January 2015.

In one, the operator of a weapon sensor loses a lock on a fast-moving object that suddenly accelerates to the left after a second and is out of sight.

In another video that tracks an object above the clouds, a pilot wonders if it is a drone.

The Department of Defense said it was “to release the video to the public to clear up any misunderstandings such as whether the footage being aired is real or not, or that there is more in the video.”

The Pentagon statement said, “The aerial incidents seen in the video continue to be shown as” unknown “.

In 2004, retired US pilot David Fraver, who saw one of the ‘UFOs’ in 2004, said that the object he had seen had changed significantly.

As I got closer … it quickly moved south and disappeared in less than two seconds,” he told CNN in 2017. ‘It was very sudden like a ping pong ball bouncing off a wall. It would hit and go the other way.

Former Nevada Senator Harry Reid, whose state has a secret Area 51 Air Force facility, welcomed the release of the video. “I’m glad the Pentagon is finally releasing these images, but it’s only scratching the surface of the investigation and the available material,” he tweeted.

‘The United States should seriously and scientifically analyze this and any possible national security implications. The American people should be informed. ‘

Also read, Chandrayaan – 2 – When India had made its second big move towards the moon on this day (July 22)

Nick Cordero

Broadway star and Tony Award-nominated Mr.Nick Cordero passes away after a 95 day battle with the novel Coronavirus – COVID-19.

His wife Amanda Kloots posted to Instagram on Sunday night.

“God has another angel in heaven now,” Kloots posted on his official Instagram account Sunday night. “My dear husband passed away this morning. He was surrounded by his beloved family, singing and praying as he slowly left this land.”

Kloots regularly updated her social media accounts with news of her husband’s ups and downs while battling the virus and complications, including an amputated leg.

Nick Cordero entered the emergency room on March 30 and had a succession of health setbacks, including mini-strokes, blood clots, septic infections, a tracheostomy, and a temporary pacemaker implanted. He had been on a ventilator and unconscious and had his right leg amputated. A double lung transplant was being explored. Kloot also added that Nick has been battling for 95 days

In 2014, he was nominated for a Tony Award and a Drama Desk Award for his role in “Bullets Over Broadway,” a role that earned him a Theater World Award and an Outer Critics Circle Award.

Kloots sent her daily videos of her and her 1-year-old son, Elvis, so she could see them if she woke up, and urged friends and fans to join in daily singing. A GoFundMe page has raised over $600,000 for paying Cordero’s medical expenses. The”Waitress” cast members also helped to raise Funds

Also read, Medical apps are life-saving and 6 amazing reasons to prove that they are essential

Kloots had said it was difficult to know if Cordero would hear what had happened to him, but said he could respond to orders by looking up and down when alert.

Nick Cordero and Amanda Kloots met in the”Bullets over Broadway”. The two were married in 2017.

“I say, I say, ‘Go to dirty from this hospital, honey. I think so. I know you can,'” he told CBS This Morning “over the summer.” Let’s dance again. Go to hug your child again. “

The coronavirus has sickened other Broadway veterans, including the actors Laura Bell Bundy, Brian Stokes Mitchell, Gavin Creel, Danny Burstein, Aaron Tveit, and Tony Shalhoub as well as composer David Bryan. It has also claimed the life of Tony-winning playwright Terrence McNally.

BioWeapon : A Global Issue

Biological Weapon, this varies phrase has the potential to send chills down your spine. But what are they? How do they work? And are we actually at risk? In this Spotlight, we will review their history and potential future.

What is BioWeapon?

Bioweapon virus coronavirus
Photo by CDC on Unsplash

Sometimes referred to as “Germ Warfare”, BioWeapons involve the use of infectious agents that are biological in origin. This includes bacteria, viruses, or fungi. These agents are used to kill humans, animals, or plants as a part of the war effort.

Deadly and Cheap

When compared with the cost of a nuclear weapon, bioweapons are extremely cheap. It was estimated that 1 gram of toxin could kill 10 million people. A purified sort of Botulinum neurotoxin is approximately 3 million times more strenuous than Sarin, a chemical nerve agent. As a comparison, a SCUD missile filled with neurotoxin can affect a total area of 3800 sq. km, an area 17 times greater than could be affected with Sarin.

lethal biological warfare coronavirus
Photo by Skitterphoto from Pexels

In one analysis, the comparative cost of civilian casualties is 2000 US dollars per square kilometer with conventional weapons, 800 dollars with nuclear weapons, 600 dollars with nerve-gas weapons, and only 1 dollar with biological weapons. Not surprisingly, bioweapons have long ago referred to as the poor man’s plutonium bomb.

Covid-19 – Should I take the risk travel or not

Biological Warfare : The Early Days

Coronavirus disease is a disease produced by severe acute respiratory syndrome. Since 2019, the disease has spread globally. Is it possible that Covid-19 is truly a bioweapon? Many western analysts have declared Covid-19 a biological weapon developed by the communist regime in China. Whether Covid-19 is a biological weapon or not but history suggests that bioweapons were developed and employed in war’s, especially in the last century.

An early example takes us back over 2 and a half millennia. Assyrians had developed biological weapons and infected their enemy’s wells with Rye Ergot fungus, which contains chemicals associated with LSD. Drinking contaminated water produced a confused psychological state, hallucinations, and in some cases, death.

In 1300, Tartar warriors besieged the Crimean city of Kaffa. During the war, many Tartars died because of plague, and their lifeless, infected bodies were hurled over the town walls. Few analysts believe that this tactic was responsible for the spread of the Black Death plague in entire Europe. If so, the early use of bioweapon caused the eventual deaths of around 25 million Europeans.

In 1763, the British Army used smallpox as a bioweapon against Native Americans in the siege. To spread smallpox to the locals, they presented blankets from a smallpox hospital as gifts. Today, we know that this was a comparatively ineffective way to transmit smallpox, but the intent was there.

During WW II, many countries involved looked into bio attack with great interest. The Allies built facilities that were capable of producing Anthrax spores, Brucellosis, and Botulism toxins. Thankfully, the war ended before they were used.

Bioterrorism : Modern Concerns

Centre for Disease Control and Prevention defines bioterrorism as “Planned release of virus, bacteria or other germs which can kill people, livestock or crops”

Utilizing such weapons holds a particular appeal to terrorists, they have the potential to cause great harm, of course, but they’re also fairly cheap to produce in comparison with missiles or other more hi-tech equipment. Also, due to the long time that it takes for them to spread and take effect, there’s a lot of time for the perpetrator to flee away undetected.

Biological weapons will be difficult to control during a war since there’s a considerable risk that troops of each side are going to be affected. However, if any terrorist group is interested in attacking a far off target, bioterrorism carries much less risk to them. A number of biological weapons are:

  1. Anthrax

Scientists believe that the foremost bioweapon to be employed in bioterrorism attack is Bacillus Anthracis, a bacteria that causes Anthrax. It is widely found in nature, easily produced within the laboratory, and survives for a long time. Also, it is versatile and may be released in powders, sprays, water, or food.

Anthrax has been used before. In 2001, Anthrax spores were sent by the U.S. postal system. Among all 24 peoples who came in contact with Anthrax, died. And, the guilty were never caught.

  • Smallpox

Another agent of bioterrorism is smallpox, which unlike anthrax, can spread from one person to another. Smallpox is no longer a concern in the world because concerted vaccination efforts had stamped it out.

  • Plague

I have already mentioned the Tartar’s use of the plague, Yersinia Pestis, many years ago, but many believe that it may be employed in the trendy world, too. Yersinia Pestis is passed to humans through the bite of a flea that has consumed infected rodents.

  • Tularemia

Some consider Tularemia, an infection caused by a bacteria species, Francisella Tularensis bacterium, as a potential biological weapon. It causes fever, ulcerations, swelling of lymph glands, and sometimes, pneumonia.

A Worrying Future?

A gene-editing technology called CRISPR had rung alarm bells in the defense community; the technology allows researchers to edit genomes, thereby easily modifying DNA sequences to change gene function. If used properly, this tool has the potential to correct genetic defects. If falls in the wrong hands, it has the potential for evil.

Photo by Anna Shvets from Pexels

Bio warfare is using a non-human life to end human life. As living organisms may be unpredictable and incredibly resilient, biological weapons are difficult to regulate, potentially devastating on large scale. These weapons are prohibited around the world under numerous treaties. But, treaties and international laws are one thing and human ability to find innovative ideas for killing each other is another.