K2/Spice Overdoses, Sadly Very Common

It is sold at convenience stores and costs $20-$50 per 3 grams. It is legal and is undetectable in drug tests.

It has a few names other than laced marijuana, such as K2, Spice, Genie, Mojo or Zohai. Head shops sell it as for the most part it is not regulated in the United States but is banned in most of Europe.

One K2 sample tests negative for Fentanyl as New Haven ...

Synthetic cannabinoid users report some effects similar to those produced by marijuana:

elevated mood
relaxation
altered perception—awareness of surrounding objects and conditions
symptoms of psychosis—delusional or disordered thinking detached from reality

Psychotic effects include:

extreme anxiety
confusion
paranoia—extreme and unreasonable distrust of others
hallucinations—sensations and images that seem real though they are not

People who have used synthetic cannabinoids and have been taken to emergency rooms have shown severe effects including:

rapid heart rate
vomiting
violent behavior
suicidal thoughts

More here

"Poison in candy wrap" "Veneno en envoltura de caramelo ...

***

Chinese manufacturers are shipping thousands of pounds synthetic chemicals into the U.S. to make dangerous recreational drugs – and it’s all legal.

The Drug Enforcement Agency and U.S. lawmakers are struggling to keep up with the influx of new, completely untested, compounds that Chinese chemists offer up online.

Websites for Chinese manufacturers advertise of host of chemical substances that can be bought legally by American citizens and shipped to the U.S. 

The drugs go by street names like Spice, Bath Salts, Molly, Smiles and N-bomb. They are meant to mimic the effects of marijuana, cocaine, LSD and other banned substances. Many forms of these drugs were legal until only very recently. More here.

***

More than 70 people overdosed in or around a historic Connecticut park near the Yale University campus on Wednesday after receiving what authorities believe was synthetic marijuana laced with the powerful opioid fentanyl. Although there have been no deaths, at least two people suffered life-threatening symptoms, according to authorities.

Connecticut Public Radio‘s Diane Orson reports that at least one person has been arrested in connection with the case.

“After 8:00 [a.m. Wednesday], we ended up with 12 victims in a 40-minute period. That caused us to respond with a multi-casualty incident,” New Haven Fire Chief John Alston said. “It brought out Yale New Haven Hospital, New Haven Police Department, Fire Department, [American Medical Response]. We also have representatives with the DEA here.”

Rick Fontana, the director of emergency operations for New Haven, told Connecticut Public Radio’s Tucker Ives that 72 people were transported to local hospitals while four patients refused treatment on scene, for a total of 76 cases.

“Only a few required admittance to the hospital, and most were discharged or left before any treatment,” Fontana told Ives.

Most of the overdoses occurred on the New Haven Green, a downtown park adjacent to Yale.

“We literally had people running around the Green providing treatment,” Fontana said Wednesday, according to The Associated Press.

“Do not come down to the Green and purchase this K2,” New Haven Police Chief Anthony Campbell told WVIT-TV. “It is taking people out very quickly, people having respiratory failure. Don’t put your life in harm.”

The AP reports, “Paramedics and police officers remained at the park all day as more people fell ill. Some became unconscious and others vomited, authorities said. Emergency responders rushed to one victim as officials were giving a news conference nearby late Wednesday morning.”

Connecticut Public Radio reports:

“[Fire Chief] Alston says the substance appears to be some type of synthetic cannabis, but authorities are not sure. Some of the victims were unconscious and in respiratory distress.

At first, the drug [naloxone] — used to treat narcotic overdoses — appeared not to work. ‘Narcan was not effective here at the scene,’ said Alston. ‘However higher concentrations of it in the emergency room proved effective.’

He says one of the victims still had some of the drug, which has been sent off to a lab for testing.”

The Hartford Courant said authorities had determined that patients had smoked the synthetic cannabinoid K-2 laced with fentanyl.

Officer David Hartman was quoted by the newspaper as saying the patients were being treated for overdose-related respiratory illnesses.

WVIT reports that the man arrested “is believed connected to at least some of the overdoses” and “had drugs on him at the time of his arrest, [but] has yet to be charged in any of the overdose cases.”

Gov. Dannel Malloy said Wednesday that the state Department of Public Health and the Department of Mental Health and Addiction Services were assisting New Haven with the rash of overdoses.

“Today’s emergency is deeply troubling and illustrative of the very real and serious threat that illicit street drugs pose to health of individuals,” Malloy said, according to the Hartford Courant. “The substance behind these overdoses is highly dangerous and must be avoided.”

The AP notes, “New Haven first responders were called to a similar overdose outbreak on the Green on July 4, when more than a dozen people were sick from synthetic marijuana. The city also saw more than a dozen synthetic marijuana overdoses in late January. No deaths were reported in either outbreak.”

The latest incident in Connecticut comes as new preliminary estimates on 2017 overdose deaths were released by the Centers for Disease Control and Prevention.

The CDC said a record 72,000 Americans died last year because of drug overdose — about 10 percent higher than previous figures. It said major causes of the increase in deaths are the growing number of people using opioids and the increased potency of the drugs themselves.

Boy, 11, Hacks into Replica U.S. Vote Website in Minutes

(Reuters) – An 11-year-old boy managed to hack into a replica of Florida’s election results website in 10 minutes and change names and tallies during a hackers convention, organizers said, stoking concerns about security ahead of nationwide votes.

** 11-Year Old Emmett Brewer Hacks Into Replica US Vote ... photo

The boy was the quickest of 35 children, ages 6 to 17, who all eventually hacked into copies of the websites of six swing states during the three-day Def Con security convention over the weekend, the event said on Twitter on Tuesday.

The event was meant to test the strength of U.S. election infrastructure and details of the vulnerabilities would be passed onto the states, it added.

The National Association of Secretaries of State – who are responsible for tallying votes – said it welcomed the convention’s efforts. But it said the actual systems used by states would have additional protections.

“It would be extremely difficult to replicate these systems since many states utilize unique networks and custom-built databases with new and updated security protocols,” the association said.

The hacking demonstration came as concerns swirl about election system vulnerabilities before mid-term state and federal elections.

U.S President Donald Trump’s national security team warned two weeks ago that Russia had launched “pervasive” efforts to interfere in the November polls.

Participants at the convention changed party names and added as many as 12 billion votes to candidates, the event said.

“Candidate names were changed to ‘Bob Da Builder’ and ‘Richard Nixon’s head’,” the convention tweeted.

The convention linked to what it said was the Twitter account of the winning boy – named there as Emmett Brewer from Austin, Texas.

A screenshot posted on the account showed he had managed to change the name of the winning candidate on the replica Florida website to his own and gave himself billions of votes.

The convention’s “Voting Village” also aimed to expose security issues in other systems such as digital poll books and memory-card readers.

***

Mark Earley, the elections supervisor in Leon County who is a cybersecurity liaison between state and local officials, questioned how outsiders could obtain the security protocols used by Florida if they weren’t already behind the system’s firewalls. He said that all this “hacking noise” and “misinformation plays into the hands of the folks who are trying to undermine democracy.”

Jeff Kosseff, a lawyer and assistant professor at the United States Naval Academy Cyber Studies Department, said states are struggling with election security threats. He said they should work with outsiders in order to see if there are flaws in their systems.

“All states should look at this as a wake-up call,” Kosseff said. “What were the shortcomings identified and how they can fix it. I don’t think it should be an adversarial.”

C’mon, Why this Continued Problem with Catholic Priests?

List of ‘misconduct’ over the last 7 decades.

HARRISBURG — The Office of Attorney General issued the following statement in response to a news conference today by the Diocese of Harrisburg.

“It is long past due for the Diocese of Harrisburg to make public the names of predator priests within the Catholic Church,” said Joe Grace, spokesman for Attorney General Shapiro. “Their proclamations today only come after intense public pressure and in the face of the imminent release of the Grand Jury report exposing decades of child abuse and cover up.”

“Per last week’s Supreme Court Order, this month the Office of Attorney General will publish an honest and comprehensive accounting of widespread sexual abuse by more than 300 priests in six Pennsylvania dioceses.”

“To this point, the Diocese of Harrisburg has been adverse to transparency and has not been cooperative. A now public opinion by the judge supervising the Grand Jury last year made it clear they sought to end the investigation entirely.”

“The true test of the Diocese’s commitment to victims of abuse and reforms within the Church will be their actions following the release of the report. Attorney General Shapiro has consistently called for the elimination of the criminal statute of limitations and reforms to the civil statute to give all victims the opportunity to obtain justice in a court of law.”

HARRISBURG, Pa. (Reuters) – Decades of child sexual abuse by Roman Catholic priests in Pennsylvania will come under public scrutiny for the first time on Tuesday with the release of a long-delayed report on a grand jury investigation led by the state’s attorney general.

Hundreds of pages long, the report will reveal the findings of one of the most expansive probes into clerical sexual abuse since an expose of widespread abuse and systematic efforts to cover it up rocked the Archdiocese of Boston nearly two decades ago.

The Pennsylvania report will cover 70 years of abuse of children by 300 Roman Catholic priests and how the church sought to cover up the accusations. It follows a nearly two-year-long investigation by Pennsylvania Attorney General Josh Shapiro.

Some of those accused have tried to stop the release of the report, saying it would unfairly damage their reputations, but prosecutors, abuse advocates and news organizations pushed for its release. Last month, the Pennsylvania Supreme Court allowed the report to go ahead, but with at least some names redacted.

It ordered the report be released by 2 p.m. EDT (1800 GMT) on Tuesday.

In anticipation of the release, Harrisburg’s bishop earlier this month released the names of more than 70 clergy members and seminarians accused of sexually abusing children since the 1940s. The names of the diocese bishops who supervised them, he promised, would be removed from diocesan buildings and “any position of honor” throughout central Pennsylvania.

But at the time, Shapiro said in a statement that the Diocese of Harrisburg had failed to cooperate and “sought to end the investigation entirely.”

Since the Boston abuse scandal first erupted in the 1990s, fresh accusations involving American clerics have sporadically surfaced, further tarnishing the church’s public image.

Theodore McCarrick, a former archbishop of Washington, resigned in disgrace as a cardinal last month after accusations that he abused a 16-year-old boy decades ago resurfaced.

In recent months, Pope Francis has accepted a flurry of resignations as church sex abuse scandals have erupted from Chile to Argentina.

The dioceses included in the Pennsylvania report, initiated in 2016 under then-Attorney General Kathleen Kane, are Harrisburg, Pittsburgh, Allentown, Scranton, Erie and Greensburg.

The state’s two other dioceses were the subjects of past grand jury investigations – the Philadelphia Archdiocese in 2005 and the Diocese of Altoona-Johnstown in 2016.

Google Wont Stop Following You, Regardless of Settings

Even when you opt out. Even when you change the settings. Even without your knowledge. Next question that needs an answer…who is Google selling the data to?

Google is tracking your every move, apparently | Metro News photo

SAN FRANCISCO (AP) — Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to.

An Associated Press investigation found that many Google services on Android devices and iPhones store your location data even if you’ve used a privacy setting that says it will prevent Google from doing so.

Computer-science researchers at Princeton confirmed these findings at the AP’s request.

For the most part, Google is upfront about asking permission to use your location information. An app like Google Maps will remind you to allow access to location if you use it for navigating. If you agree to let it record your location over time, Google Maps will display that history for you in a “timeline” that maps out your daily movements.

** In case you missed Tucker Carlson’s segment on Google:

 

Storing your minute-by-minute travels carries privacy risks. So Google will let you “pause” a setting called Location History.

Google says that prevents the company from remembering where you’ve been. Its support page states: “You can turn off Location History at any time. With Location History off, the places you go are no longer stored.”

But this isn’t true. Even with Location History paused, some Google apps automatically store time-stamped location data without asking.

For example, Google stores a snapshot of where you are when you merely open its Maps app. Automatic daily weather updates on Android phones note your location. So can searches that have nothing to do with location.

The privacy issue affects some two billion users of devices that run Google’s Android operating software and hundreds of millions of worldwide iPhone users who rely on Google for maps or search.

Storing location data in violation of a user’s preferences is wrong, said Jonathan Mayer, a Princeton computer scientist and former chief technologist for the Federal Communications Commission’s enforcement bureau. A researcher from Mayer’s lab confirmed the AP’s findings on multiple Android devices; the AP conducted its own tests on several iPhones and found the same behavior.

“If you’re going to allow users to turn off something called ‘Location History,’ then all the places where you maintain location history should be turned off,” Mayer said.

Google says it is being perfectly clear.

“There are a number of different ways that Google may use location to improve people’s experience, including: Location History, Web and App Activity, and through device-level Location Services,” Google said in a statement to the AP. “We provide clear descriptions of these tools, and robust controls so people can turn them on or off, and delete their histories at any time.”

To stop Google from saving these location markers, the company says, users can turn off another setting, though it doesn’t specifically reference location information. Called “Web and App Activity,” that setting stores a variety of information from Google apps and websites to your Google account.

When paused, it will prevent activity on any device from being saved to your account. But leaving “Web & App Activity” on and turning “Location History” off only prevents Google from adding your movements to the “timeline,” its visualization of your daily travels. It does not stop Google’s collection of other location markers.

You can see these stored location markers on a page in your Google account at myactivity.google.com. It’s possible, though laborious, to delete them.

To demonstrate how powerful these other markers can be, the AP created a visual map of the movements of Princeton postdoctoral researcher Gunes Acar, who carried an Android phone with Location history off and shared a record of his Google account.

The map includes Acar’s train commute on two trips to New York and visits to the High Line park, Chelsea Market, Hell’s Kitchen, Central Park and Harlem.

Huge tech companies are under increasing scrutiny over their data practices, following a series of privacy scandals at Facebook and new data-privacy rules recently adopted by the European Union.

Critics say Google’s insistence on tracking its users’ locations stems from its drive to boost advertising revenue.

“They build advertising information out of data,” said Peter Lenz, the senior geospatial analyst at Dstillery, a rival advertising technology company. “More data for them presumably means more profit.”

The AP learned of the issue from K. Shankari, a graduate researcher at UC Berkeley who studies the commuting patterns of volunteers in order to help urban planners. She noticed that her Android phone prompted her to rate a shopping trip to Kohl’s, even though she had turned Location History off.

“I am not opposed to background location tracking in principle,” she said. “It just really bothers me that it is not explicitly stated.”

Google offers a more accurate description of how Location History works in a popup when you pause the setting on your Google account webpage . It notes that “some location data may be saved as part of your activity on other Google services, like Search and Maps.”

There’s another obscure notice if you turn off and re-activate the “Web & App Activity” setting. It notes that the setting “saves the things you do on Google sites, apps, and services … and associated information, like location.”

The warnings offered when you turn Location History off via Android and iPhone device settings are more difficult to interpret.

Since 2014, Google has let advertisers track the effectiveness of online ads at driving foot traffic , a feature that Google has said relies on user location histories.

Trouble Ahead After DPRK’s FM Visit to Tehran

So, it appears there is more to the teaming up between Tehran and Pyongyang.

The Iranian President Rouhani told the North Korean Foreign Minister in a recent confab to NOT trust the United States.

Meanwhile, SecState, Mike Pompeo issued a proposal to North Korea calling for a timeline Pompeo that would mandate North Korea hand over 60 to 70 percent of its nuclear warheads to a third party within six to eight months, according to the report.

North Korea has reportedly rejected a formal timeline for its denuclearization proposed by Secretary of State Mike Pompeo.

Vox reported Wednesday that Pyongyang has rejected the timeline several times over the past two months amid continued negotiations over North Korea’s nuclear program.

The timeline Pompeo proposed would mandate North Korea hand over 60 to 70 percent of its nuclear warheads to a third party within six to eight months, according to the report.

However, it is unclear how many warheads North Korean leader Kim Jong Un has, making it difficult to verify that Pyongyang has actually turned over an agreed-upon percentage.

Trump administration officials in recent weeks have expressed frustration with North Korea’s efforts to denuclearize despite President Trump hailing his June summit with Kim in Singapore as a success.

“The ultimate timeline for denuclearization will be set by Chairman Kim, at least in part,” Pompeo told Channel NewsAsia in an interview last week.

“The decision is his. He made a commitment, and we’re very hopeful that over the coming weeks and months we can make substantial progress towards that and put the North Korean people on a trajectory towards a brighter future very quickly.”

White House national security adviser John Bolton told Fox News on Tuesday that “North Korea that has not taken the steps we feel are necessary to denuclearize.”

Iran fires attack on Trump as it tells North Korea: ‘US ... photo

Then we have yet another emerging hacking warning from CERT.

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have identified a Trojan malware variant—referred to as KEYMARBLE—used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.

US-CERT encourages users and administrators to review Malware Analysis Report (MAR) MAR-10135536-17 and the US-CERT page on HIDDEN COBRA – North Korean Malicious Cyber Activity for more information.

Not to leave out Iran’s cyber attack warnings.

Iranian hackers have laid the groundwork to carry out extensive cyber attacks against private U.S. and European companies, U.S. officials warn, according to NBC News. Although experts don’t believe any such attack is imminent, the preparations could enable denial-of-service attacks on infrastructure including electric grids and water plants, plus health care and technology companies across the U.S., Europe, and Middle East, say U.S. officials at the 2018 Aspen Security Forum.

A spokesperson for the Iranian mission to the United Nations, Alireza Miryousefi, told NBC News that the U.S. is more aggressive in terms of cyber attacks, and Iran’s moves are merely defensive.

***

As sanctions reimposed in response to its nuclear program begin to bite, Iran seems poised to follow the trail North Korea blazed in cyberspace: state-directed hacking that aims at direct theft to redress economic pain. Accenture researchers have been tracking ransomware strains, many of them requiring payment in Bitcoin or other cryptocurrencies, and they’ve concluded that they represent an incipient Iranian campaign against targets of opportunity that offer the prospect of quick financial gain. Tehran’s state-directed hackers have a reputation as being relatively less sophisticated than those run by Russia and China (and indeed those run by major Western powers, the Five Eyes and their closest friends) but they also have a reputation as determined fast-learners.

CCN: As the US gets ready to impose sanctions on Iran, hackers in that country are working on ransomware to secure bitcoin, according to cybersecurity experts interviewed by The Wall Street Journal.

Accenture PLC’s cybersecurity intelligence group has followed five Iranian built ransomware variations in the last two years. The hackers are hoping to secure payments in cryptocurrencies, according to Jim Guinn, who oversees the industrial cybersecurity business at Accenture.

Several clues link the ransomware to Iran. Samples include messages in Farsi that are connected to Iran based computers.

A recent Accenture report noted the ransomware could be driven by Iranian government supported parties, criminals, or both.

Scourge Continues

Ransomware has plagued both businesses and governments for years, having disabled payment systems at the San Francisco Municipal Transportation Agency, U.K hospitals and cargo shipments. Government supported hackers in some instances have obtained cryptocurrency payments from victims.

One variant of ransomware that iDefense discovered has been linked to Iran’s government, according to CrowdStrike Inc., another cybersecurity firm. The software, called Tyrant, was developed to discourage Iranian citizens from downloading software designed to discourage government snooping, CrowdStrike noted.

Palo Alto Networks Inc. and Symantec Corp. issued reports last month that described a pair of data stealing operations connected to Iran.

Crypto Mining Linked To Iran

Crypto mining software, which robs computers of their processing power to mine cryptocurrencies, has also been linked to Iran.

Accenture cited crypto mining software installed on Middle Eastern customer networks equipped with digital clues to Iran.

Crypto mining software has created problems in gas and oil facilities in the Middle East, Guinn said. He estimated millions of dollars of compute cycles have been stolen in the last year.

Iran Denies Culpability

Iran has claimed it has not been involved in cyber attacks, and that it has been a hacking victim.

A cyber attack called Stuxnet initiated by the U.S. and Israel about a decade ago disabled uranium-enrichment centrifuges for Iran’s nuclear program. Iran has since focused on enhancing its own cyber capabilities, according to government officials and security researchers.

Keith Alexander, chief executive of IronNet Cybersecurity Inc. and former director of the U.S. Cyber Command and the National Security Agency said crypto mining and theft is a way for cash-strapped countries to make fast profits.

Guinn said hackers have also stolen intellectual property.