Altman told staffers in a memo that OpenAI’s tools should not be used for mass surveillance of Americans or to power weapons capable of firing without human oversight.
BREAKING: Nine More People Arrested After Superseding Indictment Returned in Don Lemon Minnesota Church Storming Case
A superseding indictment was returned on Friday in the Don Lemon Minnesota church siege case.
The superseding indictment is currently under seal, however, local media is reporting that at least nine more people were taken into federal custody and charged on Friday.
It is unclear who was arrested. The names have not been released.
Kare11 reported:
KARE 11 confirmed at least nine more people were arrested in connection with a St. Paul church protest last month that already saw the high-profile arrests of journalists Georgia Fort and Don Lemon, as well as attorney and activist Nekima Levy Armstrong.
KARE’s Lou Raguse said sources reported those arrested were taken to the federal courthouse in St. Paul, where they’re expected to make their first court appearances Friday afternoon.
As of 9:30 a.m., officials had not released any identifying information about those arrested.
Lemon, Fort, Armstrong, and several other activists were taken into custody by federal authorities and subsequently released in the days following the protest. At least five of them have now pleaded not guilty to federal civil rights charges.
At least nine people, including former CNN host Don Lemon were previously charged with 18 USC 241, Conspiracy to Deprive Rights and 18 USC 248, Violation of the FACE Act.
Read the indictment here.
The indictment said Don Lemon “oppressed, threatened, and intimidated the Church’s congregants and pastors by physically occupying most of the main aisle and rows of chairs near the front of the Church, engaging in menacing and threatening behavior…”
The indictment also alleges Don Lemon “physically obstructed” congregants as they “attempted to exit and/or move about within the Church.”
Last month, Don Lemon livestreamed as anti-ICE protestors stormed a church in St. Paul because the pastor supposedly worked for ICE.
“This is the beginning of what’s going to happen here,” Lemon said as anti-ICE protestors shouted down the pastor and harassed parishioners.
Don Lemon pleaded not guilty to the charges.
BREAKING…check back for updates.
The post BREAKING: Nine More People Arrested After Superseding Indictment Returned in Don Lemon Minnesota Church Storming Case appeared first on The Gateway Pundit.
Google dismantles 9M-device Android hijack network
Free apps are supposed to cost you nothing but storage space. But in this case, they may have cost millions of people control over their own internet connections.Google says it has disrupted what it believes was the world’s largest residential proxy network, one that secretly hijacked around 9 million Android devices, along with computers and smart home gadgets. Most people had no idea their devices were being used since the apps worked normally, and nothing looked broken.But behind the scenes, those devices were quietly routing traffic for strangers, including cybercriminals.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE According to Google’s Threat Intelligence Group, the network was tied to a company known as IPIDEA. Instead of spreading through obvious malware, it relied on hidden software development kits, or SDKs, that were embedded inside more than 600 apps. These apps ranged from simple utilities to VPN tools and other free downloads. When you installed one, the app performed its advertised function. But it also enrolled your device into a residential proxy network.That means your phone, computer or smart device could be used as a relay point for someone else’s internet traffic. That traffic might include scraping websites, launching automated login attempts or masking the identity of someone conducting shady online activity. From the outside, it looked like that activity came from your home IP address. You wouldn’t see it happening, and in many cases, you wouldn’t notice any major performance issues.Google says in a single seven-day period earlier this year, more than 550 separate threat groups were observed using IP addresses linked to this infrastructure. That includes cybercrime operations and state-linked actors. Residential proxy networks are attractive because they make malicious traffic look like normal consumer activity. Instead of coming from a suspicious data center, it appears to come from someone’s living room.Google says it took legal action in a U.S. federal court to seize domains used to control the infected devices and route proxy traffic. It also worked with companies like Cloudflare and other security firms to disrupt the network’s command-and-control systems. Google claims it also updated Play Protect, the built-in Android security system, so that certified devices would automatically detect and remove apps known to include the malicious SDKs.However, Google also warned that many of these apps were distributed outside the official Play Store. That matters because Play Protect can only scan and block threats tied to apps installed through Google Play. Third-party app stores, unofficial downloads and uncertified Android devices carry far greater risk.IPIDEA has claimed its service was meant for legitimate business use, such as web research and data collection. But Google’s research suggests the network was heavily abused by criminals. Even if some users knowingly installed bandwidth-sharing apps in exchange for rewards, many did not receive clear disclosure about how their devices were being used.Google’s investigation also found significant overlap between different proxy brands and SDK names. What looked like separate services were often tied to the same infrastructure. That makes it harder for consumers to know which apps are safe and which are quietly monetizing their connection.300,000 CHROME USERS HIT BY FAKE AI EXTENSIONS If millions of devices can be quietly turned into internet relay points, the big question is, how do you make sure yours isn’t one of them? These steps reduce the risk that your phone, TV box or smart device gets pulled into a proxy network without you realizing it.Only download apps from the Google Play Store or other trusted app marketplaces. Some apps hide small pieces of code that can secretly use your internet connection. These are often spread through third-party app stores or direct app files called “APKs,” which are Android app files installed manually instead of through the Play Store. When you sideload apps this way, you bypass Google’s built-in security checks. Sticking to official stores helps keep those hidden threats off your device.If an app promises rewards for sharing your unused internet bandwidth, that’s a major red flag. In many cases, that is exactly how residential proxy networks recruit devices. Even if it sounds legitimate, you are effectively renting out your IP address. That can expose you to abuse, blacklisting or deeper network vulnerabilities.Before installing any app, check what permissions it requests. A simple wallpaper app should not need full network control or background execution privileges. After installation, go into your phone’s settings and audit which apps have constant internet access, background activity rights or special device permissions.Today’s mobile security tools can detect suspicious app behavior, unusual internet activity and hidden background services. Strong antivirus software adds an extra layer of protection beyond what’s built into your device, especially if you’ve installed apps in the past that you’re unsure about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.Android security updates patch vulnerabilities that proxy operators may exploit. If you’re using an older phone, tablet or Android TV box that no longer receives updates, it may be time to upgrade. Unpatched devices are easier targets for hidden SDK abuse and botnet enrollment.If your device ever becomes part of a proxy network or is otherwise compromised, attackers often try to pivot into your accounts next. That’s why you should never reuse passwords. A password manager generates long, unique passwords for every account and stores them securely, so one breach does not unlock your email, banking or social media. Many password managers also include breach monitoring tools that alert you if your credentials appear in leaked databases, giving you a chance to act before real damage is done. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.Go through your installed apps and delete or uninstall anything you don’t recognize or haven’t used in months. The fewer apps running on your device, the fewer opportunities there are for hidden SDKs to operate. If you suspect your device has been compromised, consider a full reset and reinstall only essential apps from trusted sources.ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APPResidential proxy networks operate in a gray area that sounds harmless on paper but can quickly become a shield for cybercrime. In this case, millions of everyday devices were quietly enrolled into a system that attackers used to hide their tracks. Google’s takedown is a major move, but the broader market for residential proxies is still growing. That means you need to be cautious about what you install and what permissions you grant. Free apps are rarely truly free. Sometimes, the product being sold is you and your internet connection.Have you ever installed an app that promised rewards for sharing bandwidth, or used a free VPN without thinking twice about it? Let us know your thoughts by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter Copyright 2026 CyberGuy.com. All rights reserved.
Flashback: Clinton deposed in Epstein case nearly 29 years to the day after ‘blue dress’ scandal
Former President Bill Clinton is sitting Friday for a deposition over the Epstein scandal nearly 29 years to the date of an infamous encounter with an intern that sparked a famous public denial.On February 28, 1997 — 29 years from Saturday — Clinton allegedly had his “blue dress” encounter with then-intern Monica Lewinsky at the White House.The official report from independent counsel Kenneth Starr to Congress lists the date in its section laying out “Physical Evidence.””Physical conclusively establishes that the president and Ms. Lewinsky had a sexual relationship,” the referral from Starr to the House of Representatives reads.HILLARY CLINTON WANTS HER EPSTEIN TESTIMONY TO BE PUBLIC”After reaching an immunity and cooperation agreement with the Office of the Independent Counsel on July 28, 1998, Ms. Lewinsky turned over a navy blue dress that she said she had worn during a sexual encounter with the President on February 28, 1997.”Starr’s report went on to say that when Lewinsky next pulled the blue dress from her closet she “surmised that the stains” then appearing on it “were the president’s semen.”That discovery led Starr’s office to request a blood sample from Clinton, which he provided to a physician in the White House Map Room on August 3, 1998, in the presence of an FBI agent and one of Starr’s attorneys.Two subsequent tests concluded the president’s DNA was found on the dress and that “genetic markers” on the semen were characteristic of 1 out of 7.87 trillion Caucasian males.BILL AND HILLARY CLINTON FACED ‘SURPRISE’ FROM DEMOCRATS CALLING FOR EPSTEIN TESTIMONY, SAYS REP COMERWhen Clinton was deposed in the Paula Jones matter, he was asked whether he had sexual contact with Lewinsky, which he denied. The February 28 encounter, however, was later used by Starr to argue that Clinton had lied under oath.Clinton publicly denied the affair at the end of an unrelated January 26, 1998, press conference:”I want to say one thing to the American people: I’m going to say this again. I did not have sexual relations with that woman, Miss Lewinsky,” Clinton said.”I never told anybody to lie. Not a single time. Never. These allegations are false, and I need to go back to work for the American people.”Clinton was later impeached by the House, but the Senate voted against removing him from office.REPORTER’S NOTEBOOK: CLINTONS CALL FOR OPEN EPSTEIN FILES HEARING AFTER MONTHS OF DEFYING SUBPOENASA painting depicting Clinton wearing Lewinsky’s blue dress and sitting in a provocative pose was recorded on page EFTA00000862 of the Justice Department’s Epstein Files cache.The painting was originally reported in 2019 to have been photographed inside Epstein’s Manhattan townhouse. It was not commissioned by Clinton and is not a White House image. Clinton himself also denied knowledge of the unique work.Also on February 28 — this time in 1989 — federal authorities effectively shut down the financial firm that ultimately led to the Whitewater investigation. On February 28, 1989, federal authorities placed Madison Guaranty Savings & Loan, owned by Clinton ally Jim McDougal, into conservatorship. The entity became the genesis of Kenneth Starr’s Whitewater investigation, which later expanded to include the Lewinsky matter. While scrutinizing Bill and Hillary Clinton’s connection to the real estate dealings beginning in 1994 — for which they were both exonerated — Starr ultimately uncovered a presidential affair with an intern and the public deceit that followed.What resulted in Clinton’s 1998 impeachment began more than a decade earlier, as Starr examined real estate transactions in a resort community project called Whitewater Estates in the Ozarks that involved a company formed by the future first couple and their politically-connected friends Jim and Susan McDougal.The Clintons and McDougals wanted to sell lots for vacation homes, but in 1979, interest rates rose to nearly 20%, leaving potential buyers wary, according to the Encyclopedia of Arkansas.Jim McDougal eventually took control of a rural bank later renamed Madison Guaranty Savings & Loan.Starr ultimately investigated whether loans from Madison were improperly connected to Whitewater, and whether or what political influence benefitted McDougals financial dealings.The Clintons were both investigated but never charged in connection with the bank or Whitewater, but the McDougals were, along with Clinton’s gubernatorial successor, Gov. Jim Guy Tucker.The Clinton Foundation did not immediately respond to a request for comment.
‘My own employees … had downloaded software on my phone’: Kristi Noem claims Elon Musk helped expose spyware inside DHS
Though the Department of Homeland Security has achieved some success in deporting illegal aliens, it has always been met with resistance — both on the street and in the department itself.In an interview with podcaster Patrick Bet-David this week, DHS Secretary Kristi Noem revealed the depth of some of the problems her department has been facing and the people who have helped her fight the alleged corruption.’They helped me identify that some of my own employees in my department had downloaded software on my phone and my laptop to spy on me.'”You wouldn’t even believe what I’ve found since I’ve been in this department,” Secretary of Homeland Security Kristi Noem said on the “PBD Podcast” this week. “I just found the other day a whole room on this campus that was a secret SCIF — secure facility — that had files nobody knew existed. So we just happened to have an employee walk by a door and wonder what it was and started asking questions. We went in there. There was individuals working there that had secret files that nobody knew about on some of these most controversial topics.”RELATED: Democrat senator rages when Noem dares to enforce the law “Now I’ve got that turned over to attorneys, and we’re getting to the bottom of what exactly happened there.” Noem also claimed that her devices were compromised but that Elon Musk’s tech team helped expose the software that was compromising her privacy. “Elon and his team were extremely helpful to me. They helped me identify that some of my own employees in my department had downloaded software on my phone and my laptop to spy on me, to record our meetings. They had done that to several of the politicals.” “Unbelievable,” Bet-David said as she recounted the story. Noem stressed that they would still probably have that software installed had it not been for Musk and his team. As a result, she said, “One of the things I need to do and continue to do is partner with technology companies and experts to bring them in and help us.” “I always believed when people talked about the deep state before that it existed. I never would have dreamed that it was as bad as it is.” Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!
The Strongest Weapon To Use Against Iran
“I love nuclear weapons,” a friend of mine, a veteran of the Cold War, once remarked. “Point them in the direction of a country, and freedom spreads.”
The context was the deployment in 1983 by America of Pershing II intermediate-range missiles in West Germany. In retrospect, that decision, along with the rest of President Reagan’s military buildup, did hasten the eventual defeat of the Soviet Union in what was the greatest U.S. strategic achievement—and advance of freedom—since the victory in World War II.
If only defeating the Islamic Republic of Iran were so simple. A Cold War replay—overthrowing an evil regime without an American military attack, just with a show of force and covert backing for the Iranian equivalent of Solidarity in Poland—would be a great outcome. Peace through strength, and save the heavy weaponry for future possible use against other adversaries. The best use of the weapons is deploying large numbers of them close enough to the enemy that freedom breaks out in a way that appears spontaneous. The deployment detonates the oppressed people inside the hostile regime, who in the end are the best weapons that our side has. The Pershing II is trivia but people remember the crowds flowing across and knocking down the Berlin Wall.
Many Americans today are too young to recall firsthand the Cold War victory. They remember instead the disastrous and deadly withdrawal from Kabul after a bipartisan consensus emerged opposing the continued presence of American troops to keep the Taliban and the terror threat at bay. The Afghanistan experience has been almost Vietnam War-like in its ability to make America hesitate before turning to military force to achieve foreign policy goals. A difference between dealing with the Soviet Communists and the Islamist revolutionaries in Iran, alas, as the great historian of the Middle East Bernard Lewis warned, is that for the ayatollahs, mutual assured destruction is not a deterrent but an inducement.
President Trump, in his State of the Union address, said the Iranian regime had killed 32,000 protesters in the past two months, and that Iran has “developed missiles that can threaten Europe and our bases overseas.” On Jan. 2, 2026, Trump had posted to social media, “If Iran sho[o]ts and violently kills peaceful protesters, which is their custom, the United States of America will come to their rescue. We are locked and loaded and ready to go. Thank you for your attention to this matter!” The “rescue” promise preceded the mass slaughter, which is not much consolation to the families of the 32,000 killed mostly on Jan. 8 and 9.
If there’s another Cold War precedent that comes to mind it’s that of Hungary in 1956, when America and its allies looked on as Soviet troops crushed a student-led pro-democracy rebellion. Everyone got the message—until decades later, Reagan, Pope John Paul II, Natan Sharansky, Andrei Sakharov, and Lech Walesa and his allies like Lane Kirkland and Albert Shanker in the U.S. labor movement began to see what might be possible.
It’s something for Trump and his generals to keep in mind as the refueling tankers, aircraft carriers, and warplanes deploy around Iran. America has the world’s most powerful, expensive, and high-technology weaponry, and Israel—with the same intelligence operation that put pagers on the waistbands of Hezbollah’s leaders—has been working overtime helping to come up with target lists. But as Trump and his team weigh which weapons to use and when and how, it is worth remembering that the most potent weapon of them all is a person living in an unfree country who wants freedom.
Trump and some of his advisers show signs of understanding this. The CIA is posting guidance in Farsi inviting Iranians who want to help to get in touch. When Hugh Hewitt asked Trump on Jan. 8, 2026, if he had a message for the people of Iran, Trump said, “All I can say is you should, you should feel strongly about freedom. There’s nothing like freedom.” The Persian word for it is Azadi, and if things go right in Iran, that is the word that will be remembered.
The post The Strongest Weapon To Use Against Iran appeared first on .
Bitcoin’ rebound cancelled as U.S. stocks fall, gold surges, amid mounting macro risks
Between credit stress concerns, a hot PPI inflation reading, and tensions between U.S. and Iran, investors have plenty of reasons to stay away from risk assets.
Meet the Californians living in RVs to save cash during housing crisis — while others are exploited by ‘vanlords’
In California’s notoriously expensive Bay Area, living out of one’s vehicle has increasing appeal.
Gavin Newsom’s father went to war with shadowy Bohemian Grove over members’ X-rated antics
California Gov. Gavin Newsom’s father once ruled that the super-secretive men’s club Bohemian Grove couldn’t bar women from working there — preventing members from going au natural at the exclusive redwoods retreat. As a U.S. Appeals Court Judge, William Newsom an issued an opinion striking down a ban on hiring women at the 150-year-old club,…
Bad Bunny Returns To No. 1 On The American Albums Charts
Bad Bunny’s Debí Tirar Más Fotos returns to No. 1 on the Billboard 200 while holding atop the Top Latin Albums chart and Top Streaming Albums chart.