Posts

Current Project

Forever Young

The Truth Behind "Human-Derived" Stem Cell Infomercials You’re watching a late-night infomercial. The spokesperson leans in, their voice dropping to a serious, hushed tone as they mention the secret ingredient: "Harvested from human placenta tissue." It’s a moment that makes many viewers flinch. Is this a medical breakthrough, or is it a questionable business practice using human remains for profit? Let’s pull back the curtain on the industry that turns "medical waste" into high-end beauty elixirs. 1. Where Does the Tissue Actually Come From? When a company claims to use human placenta, umbilical cord, or amniotic tissue, they are usually operating within a legal framework of donated biological material . Here is the typical pipeline: The Source: Most of this tissue is collected after healthy, scheduled C-section births at hospitals. The Consent: Mothers sign donation forms allowing the hospital to send the placenta ...

The Software War - Joint Strike Fighter

Image
    Link-16 - GPS & The real "kill-switch" Specifically, Link-16 and GPS access are key for the proper functioning of Europe’s F-35s, as they connect these birds to the larger, interoperable NATO defense networks and allow for precision guidance and strike during combat. And don’t forget the importance of the key software, logistics support, and even the overall supply chain for maintaining Europe’s fleet of F-35s. It all runs from and through the United States. So long as relations are good between the various European members of NATO, this is not a problem. But let’s just look at the recent (and ongoing) contretemps between Washington and Copenhagen over the fate of Greenland. According to The Aviationist, a popular online industry publication, systems like ALIS and ODIN, which are part of the overarching logistical, maintenance, and mission data support functions for ensuring the F-35 operates effectively remain sourced from the United States. It wouldn’t take much...

How does the Russian REB «jam the Baltic?

Image
How does the Russian REB «jam the Baltic? original post In the Baltic region (not only Lithuania, Latvia and Estonia, but also Poland, Finland and Sweden), intensive intervention in the operation of satellite navigation systems (GNSS) was repeatedly recorded. Some incidents were so extensive that they became the object of attention of the International Civil Aviation Organization (ICAO) due to the risks to flight safety in the region. So far, the Baltic Sea is not a war zone, but it is definitely an arena where large-scale operations are planned and carried out. Increasingly, Russia is escalating tension. The aggressor country does not even hide this. Systematic interference in the operation of satellite navigation began immediately after the full-scale invasion of Ukraine in 2022. Moreover, the number and scale of incidents in 2024-2025 increased significantly. At least 350-400 recorded incidents are currently involved. How it happens Most obstacles are localized around Ka...

ANZAC Biscuits - 1926 Recipe

Image
  Anzac Day   is a national day of remembrance in  Australia ,  New Zealand  and  Tonga  that broadly commemorates all Australians and New Zealanders "who served and died in all wars, conflicts, and peacekeeping operations" and "the contribution and suffering of all those who have served".  Observed on 25 April each year, Anzac Day was originally devised to honour the members of the  Australian and New Zealand Army Corps  (ANZAC) who served in the  Gallipoli campaign , their first engagement in the  First World War  (1914–1918). The  Anzac biscuit  is a sweet biscuit, popular in Australia and New Zealand, made using rolled oats, flour, sugar, butter (or margarine), golden syrup, baking soda, boiling water and optionally desiccated coconut.  Anzac biscuits have long been associated with the Australian and New Zealand Army Corps (ANZAC) established in World War I. I...

The Silent Blockade: Financial Obstructionism and the 'De-Banking' of the Czech Defense Industry

Image
Here is the story that ignited my interest in the subject.  My workflow typical starts here, with a brief report that serves as a jumping off point for my own OSINT reporting.   Story The Mechanisms of Financial Warfare : 'De-Banking' of the Czech Defense Industry Executive Intelligence Assessment The Czech Republic currently occupies a paradoxical position within NATO. While the government in Prague, led by the Fiala administration and Minister of Defense Jana Černochová, has positioned itself as a vanguard of support for Ukraine—most notably through the "Czech Ammunition Initiative"—a contradictory reality exists within the domestic financial sector. The industrial base required to execute these strategic imperatives is being systematically asphyxiated by the country’s largest commercial banks. This investigation reveals a pattern of "de-banking"—the cancellation of accounts and refusal of financing—targeting Czech defense manufacturers and even the person...

New Infrastructure Discovery: Salt Typhoon (APT) - December 2025 Analysis

Image
New Infrastructure Discovery: Salt Typhoon  (APT) - December 2025 Analysis Recent telemetry and infrastructure tracking have identified a significant set of new network assets linked to the Chinese cyber-espionage actor known as Salt Typhoon (also tracked as FamousSparrow or GhostEmperor). This update provides a breakdown of recently observed domains, their operational timeframes, and the low-density IP addresses utilized for Command and Control (C2) or staging operations. Executive Summary Salt Typhoon continues to demonstrate a high level of operational security, frequently cycling through low-density IP addresses and utilizing domains that mimic legitimate business or technical services. The infrastructure identified in this report spans from late 2021 through mid-2025, suggesting long-term persistence and planning for various campaign phases. Infrastructure Breakdown Below is the detailed list of domains and associated network artifacts. Domain Observation Timeframe Related IP...

Tito : Complete In-Memory Toolkit & Methodology.

Image
The Stealthy Assassin: An In-Memory Rootkit Philosophy GITHUB REPO WITH ALL RELEVENT FILES A Historical Perspective on Fear and Stealth For those not well-versed in history, one of the most daring letters of all time was sent to Stalin from Josip Broz Tito, the leader of the former Yugoslavia. It read: "Stop sending people to kill me. We've already captured five of them, one of them with a bomb and another with a rifle. If you don't stop sending killers, I'll send one to Moscow, and I won't have to send a second." Knowing Stalin's reputation, few would dare make such a threat. Tito lived to the age of 87, and reports of assassination attempts ended after that letter. He was one of the few who scared Stalin enough to back off. When I considered the stealthy assassin this rootkit could be, only one name came to mind: Tito . The Shift to In-Memory Methodology For a while now, malware has been moving toward an in-memory-only methodology. It is obviously easie...