| 0 comments ]

US Launched Kamikaze Drones Against Iran, Reflecting Lessons Learned From Ukraine

In the first 72 hours of Operation Epic Fury, U.S. forces conducted more than 1,700 strikes across Iran on high-value IRGC military assets and leadership. These strikes relied heavily on air-delivered munitions, including bombs, air-launched rockets, and missiles deployed from stealth fighter jets, stealth bombers, fourth-generation fighter jets and bombers, as well as guided-missile destroyers.

Notably, U.S. Central Command indicated the operation also marked the first combat use by the U.S. military of one-way kamikaze drones, a newly added capability likely shaped by lessons drawn from four years of high-intensity warfare in Eastern Europe.

"For the first time in history, it is using one-way attack drones in combat during Operation Epic Fury. These low-cost drones, modeled after Iran's Shahed drones, are now delivering American-made retribution," U.S. CENTCOM wrote on X.

OISNT account on X OSINTdefender published footage of what appears to be one of the Low-Cost Unmanned Combat Attack System (LUCAS) US drones used in the operation that crash landed.

OSINTdefender noted, "Locals in Iraq appear to have recovered a crashed and almost entirely intact Low-Cost Unmanned Combat Attack System (LUCAS), an American copy of the Iranian Shahed-136 Attack Drone, which is confirmed to have been used recently by Task Force Scorpion Strike during U.S. attacks on Iran as part of Operation Epic Fury."

Strike Map

Related:

Whether in Iran or Eastern Europe, the rapid proliferation of low-cost kamikaze drones has permanently altered the battlefield. Four years of war in Ukraine have made it clear to military planners and weapons manufacturers worldwide that these inexpensive, mass-produced drones are no longer optional, but are increasingly pivotal in changing the economics of war.

Tyler Durden Tue, 03/03/2026 - 14:45
https://ift.tt/Rpt4qeZ
from ZeroHedge News https://ift.tt/Rpt4qeZ
via IFTTT

US Launched Kamikaze Drones Against Iran, Reflecting Lessons Learned From Ukraine SocialTwist Tell-a-Friend
| 0 comments ]

Only The 38th Largest Oil Spike Since 1990

Today’s CoTD from DB's Jim Reid shows the daily price of oil back to 1990. When he published the report, oil (+8.4%) was tracking to be the 38th biggest daily gain over this 36-year period. The graph annotates the clusters where we have seen larger moves.

So even though it’s a big move, to get into the top 20, 10 and 5 it would need to be up +9.6%, +13.6% and +13.9% respectively.

There were huge moves around the GFC and Covid-19 turmoil, whilst the Gulf War in 1990-91 also saw several double-digit gains.

Incidentally, since Jim published his chart of the day, oil has sold off more, and at last check it was up just 5.7% on the day, erasing its kneejerk spike by more than half.

Going forward, Reid says that much will depend on the Strait of Hormuz.

It seems it’s not officially closed but passage through it would be hazardous at the moment with self-imposed restrictions from virtually all that normally travel through it.

Tyler Durden Mon, 03/02/2026 - 14:20
https://ift.tt/O4zENS2
from ZeroHedge News https://ift.tt/O4zENS2
via IFTTT

Only The 38th Largest Oil Spike Since 1990 SocialTwist Tell-a-Friend
| 0 comments ]

Beyond Phishing: The New 'Deepfake' And QR Code Credit Card Scams Of 2026

Authored by Adam H. Douglas via The Epoch Times (emphasis ours),

The newest credit card scam warning signs look different from old-school phishing emails. In 2026, face-tampered QR codes (“quishing”) in public places are a growing trend. Or an urgent phone call from what sounds exactly like your bank, but is actually an AI-generated voice clone.

Man holds credit card upside down for shutterstock pic

Some important scam warning signs are:

  • QR codes placed on stickers or layered over original signs
  • Payment links that redirect you to unfamiliar web addresses
  • Calls demanding immediate action to “prevent account suspension”
  • Requests for one-time passcodes or full card numbers over the phone
  • Pressure to act before you can independently verify the request

One of the best pieces of advice is: If something feels urgent, slow down and verify through official channels. You may think you’re too tech-savvy to fall for a scam. That confidence is exactly what modern fraud tactics target.

Traditional phishing emails, full of easy-to-spot spelling errors, are giving way to more sophisticated threats. Today’s scams rely on artificial intelligence, realistic voice cloning, and everyday tools like QR codes that often feel legitimate, personal, and time-sensitive.

Here’s what you need to know to avoid the newest credit card scams.

The Rise of ‘Quishing’: QR Code Credit Card Scams

QR codes spread rapidly during the pandemic. Today, they’re commonly found in restaurants, parking meters, and even utility bills. Scammers, not surprisingly, have caught on.

“Quishing” refers to phishing done through QR codes. Instead of clicking a suspicious link in an email, you scan a code in the real world.

Common Quishing Scenarios

  • A parking meter with a QR code sticker placed over the original code
  • A restaurant table tent that redirects to a fake payment portal
  • A public event sign offering “fast checkout” through a QR link
  • A mailed flyer with a QR code for “account verification”

Once scanned, you may land on a cloned website that looks nearly identical to your bank or payment processor.

Credit Card Scam Warning Signs With QR Codes

Look for:

  • Stickers placed on top of printed codes
  • Codes that appear misaligned, bubbled, or recently added
  • Web addresses that don’t match the official company domain
  • Requests for full card numbers, CVV codes, or Social Security numbers
  • Payment pages that lack a secure “https” connection

Important: If you’re asked to enter sensitive financial data after scanning a public code, pause. When possible, manually type the official website into your browser instead.

AI Voice Clones: When Your ‘Bank’ Calls You

Voice cloning is a rapidly improving technology, with scammers now able to replicate a bank representative’s tone, accent, and cadence. Some can even mimic someone you know personally.

You might receive a call saying: “We’ve detected suspicious charges on your credit card. To prevent account suspension, we need to verify your information immediately.”

The caller ID may even show your bank’s name because scammers can spoof phone numbers.

Red Flags of a Deepfake Bank Call

  • Urgent threats of account closure or frozen funds
  • Requests for your full card number or online banking password
  • Pressure to share a one-time passcode sent to your phone
  • Instructions to move money “temporarily” for security reasons
  • Refusal to let you hang up and call back independently

Legitimate banks will not ask for your password or full card number over the phone. If you receive a suspicious call, hang up and dial the number printed on the back of your card.

Urgency Is the Common Thread

Whether it’s a QR code or a voice clone, modern scams rely on emotion.

Scammers use:

  • Fear (“Your account will be closed.”)
  • Scarcity (“This must be resolved in 10 minutes.”)
  • Authority (“I’m calling from the fraud department.”)
  • Familiarity (“We spoke last week about your card.”)

The goal is to bypass your rational thinking.

The most important defense? Slow down. Fraud loses power when you verify.

What to Do If You Suspect Credit Card Fraud

If you think you scanned a malicious QR code or spoke with a scammer, act quickly:

  • Call the number on the back of your card.
  • Lock or freeze the card through your banking app.
  • Review recent transactions for unauthorized charges.
  • Dispute any suspicious charges immediately.
  • Change your online banking password.
  • Place a fraud alert via one of the three major credit bureaus.
  • Monitor your credit reports for new accounts.

Under the Fair Credit Billing Act (or FCBA), your liability for unauthorized credit card charges is limited, especially if you report them promptly. Many issuers offer zero liability policies, but timing matters.

A Modern Prevention Checklist

To protect yourself from evolving scams:

  • Enable real-time transaction alerts.
  • Use your bank’s official app instead of scanning public codes.
  • Avoid entering card details after scanning QR codes in public.
  • Never share one-time passcodes with callers.
  • Let unknown calls go to voicemail.
  • Keep your phone and banking apps updated.

Technology improves, but so does all types of deepfake fraud. Staying informed is your advantage.

Frequently Asked Questions: Credit Card Scam Warning Signs

How Can I Tell If a Phone Call From My Bank Is Fake?

A legitimate bank won’t ask for your full password, personal identification number (PIN), or one-time passcodes over the phone. If a caller pressures you to act immediately, threatens account suspension, or refuses to let you hang up and call back, treat it as suspicious. Caller ID can be spoofed, so don’t rely on the displayed number. The safest approach is to hang up and dial the number printed on the back of your credit card. Your bank will confirm if the call was real.

Are QR Codes Safe to Scan for Payments?

QR codes themselves are not inherently unsafe, but public codes can be replaced or tampered with. Scammers may place stickers over legitimate codes or redirect you to cloned websites designed to steal card details. Before entering payment information, confirm that the web address matches the official company domain and uses a secure connection. When possible, navigate directly to the company’s website or use its official mobile app instead of scanning a public code.

What Should I Do If I Gave My Credit Card Number to a Scammer?

Immediately call your card issuer using the number on the back of your card. Ask to freeze or cancel the card and request a replacement. Review recent transactions and dispute any unauthorized charges. Change your online banking passwords and enable transaction alerts. Consider placing a fraud alert with a credit bureau to monitor for identity theft. Acting quickly limits financial damage and protects your credit score from long-term harm.

Can Scammers Really Clone a Bank Employee’s Voice?

Yes. AI voice-cloning technology can replicate speech patterns using short audio samples. Combined with caller ID spoofing, scammers can create convincing impersonations of bank representatives or even people you know. However, cloned voices cannot bypass secure verification steps without your participation. Never share passwords, PINs, or one-time passcodes. If in doubt, hang up and call your bank directly to confirm whether the request is legitimate.

Modern scams no longer look sloppy. They look polished, personal, and urgent. Your best defense isn’t technical expertise. It’s skepticism, verification, and a refusal to rush.

The Epoch Times copyright © 2026. The views and opinions expressed are those of the authors. They are meant for general informational purposes only and should not be construed or interpreted as a recommendation or solicitation. The Epoch Times does not provide investment, tax, legal, financial planning, estate planning, or any other personal finance advice. The Epoch Times holds no liability for the accuracy or timeliness of the information provided.

Tyler Durden Sun, 03/01/2026 - 17:50
https://ift.tt/JH8GF9L
from ZeroHedge News https://ift.tt/JH8GF9L
via IFTTT

Beyond Phishing: The New 'Deepfake' And QR Code Credit Card Scams Of 2026 SocialTwist Tell-a-Friend
| 0 comments ]

DOJ Charges 30 More People For Minnesota Church Invasion

Via Headline USA,

Attorney General Pam Bondi announced charges Friday against 30 more people who are accused of civil rights violations in a January protest inside a Minnesota church where a pastor works for Immigration and Customs Enforcement.

Bondi said on social media that 25 people were in custody and more arrests would follow.

The new indictment comes a month after independent journalists Don Lemon and Georgia Fort and prominent local activist Nekima Levy Armstrong were charged for their alleged roles in the protest at Cities Church in St. Paul, Minnesota.

“YOU CANNOT ATTACK A HOUSE OF WORSHIP. If you do so, you cannot hide from us — we will find you, arrest you, and prosecute you,” Bondi wrote in the post.

“This Department of Justice STANDS for Christians and all Americans of faith.”

In total, 39 people now face charges of conspiracy against religious freedom and interfering with the right of religious freedom.

The new defendants will have an initial court appearance and a magistrate judge will set conditions for their likely release. Lemon and Fort said they were at the church as journalists covering news. Levy Armstrong was the subject of a doctored photo posted by the White House showing her crying during her arrest. The three have pleaded not guilty.

Protesters descended on Cities Church on Jan. 18 after learning that one of the church’s pastors also serves as an ICE official. The protest drew swift condemnation from Trump administration officials and conservative leaders for disrupting a Sunday service.

The indictment says the “agitators” entered the church in a “coordinated takeover-style attack” and engaged in acts of intimidation and obstruction.

“Young children were left to wonder, as one child put it, if their parents were going to die,” the indictment says.

A lawyer for the church praised the Justice Department for charging more people.

“The First Amendment does not give anyone — regardless of profession, prominence, or politics — license to storm a church and intimidate, threaten, and terrorize families and children worshipping inside,” Doug Wardlow said in a statement.

The revised indictment adds new allegations when compared to the original filed in January.

It says two people “conducted reconnaissance” outside the church a day before the protest and recorded their visit on video, with one saying, “My thoughts are to be able to close up this whole alleyway right here.”

The court filing quotes one protester as chanting in the church, “This ain’t God’s house. This is the house of the devil.”

Separately, a woman who was at the church service has filed a lawsuit against some people who were charged, alleging emotional trauma and an inability to exercise her religion that day.

The protest came at a tense time in Minnesota, where the Trump administration sent thousands of federal officers for Operation Metro Surge after a series of public fraud cases where the majority of defendants had Somali roots. Officers frequently deployed tear gas for crowd control in neighborhood clashes with residents, often detaining them along with immigrants.

On Jan. 7, a federal officer fatally shot Renee Good, 37, in Minneapolis. In another fatal shooting a week after the church protest, a federal officer killed 37-year-old nurse Alex Pretti.

Nationwide demonstrations erupted in response, followed by a change in Operation Metro Surge’s leadership and the eventual wind-down of the immigration enforcement operation. Roughly 400 ICE officers and Homeland Security agents were expected to remain in Minneapolis by early March, down from roughly 3,000 at the peak, according to a court filing.

Since then, the Twin Cities have grappled with the impact to communities and the local economy. The city of Minneapolis said it suffered an impact of $203.1 million due to the operation, with tens of thousands of residents in need of urgent relief assistance.

Tyler Durden Sun, 03/01/2026 - 16:20
https://ift.tt/hrx2EnB
from ZeroHedge News https://ift.tt/hrx2EnB
via IFTTT

DOJ Charges 30 More People For Minnesota Church Invasion SocialTwist Tell-a-Friend
| 0 comments ]

"Tone Down My Opinions": Police Visit Maryland Man Over Facebook Rage Posts About Soaring Power Bill

A Baltimore County, Maryland resident in a Facebook group called "BGE Victims," which has 22,000 Marylanders venting about the power bill crisis, revealed earlier this week that a Baltimore County Police detective "paid [him] a visit" over posts in the online group that allegedly threatened "the parasites of BGE and the grid owners/operators."

Baltimore resident Vin Shrader - or at least that's his online name  - said, "A detective from the Balto. Co. P.D. just paid me a visit about some of my post claiming I've been threatening the parasites of bge and the grid owners / operators," adding, "He strongly suggested that I tone down my opinons."

Shrader continued, "BULLSHIT, Now I can expect the swat team to come and get me for using my 1st admenment rights. It's now obvious the parasite democratic policticans along with bge are going to have local law enforcement do their bidding to shut us / me up. BULLSHIT, not going to happen. I have to be a martor, so be it. There's only one way I'm going down."

The Maryland power bill crisis first came to our attention in August 2024, when years of poor power-grid management by Democrats (mostly due to backfiring 'green' policies) in the state collided with surging electricity demand from AI data centers (read here).

Fast forward to today: the power bill crisis in the one-party rule state of Democratic Party kings and queens, headed by leftist Gov. Wes Moore, who has presidential ambitions, is getting hammered in the polling numbers (new data from Annapolis-based Gonzales Research & Media) as struggling Marylanders are financially crushed by mounting power-bill debt and venting their frustration in the group of 22,000.

All along, it was inevitable that the power bill crisis in the Mid-Atlantic would become a "major political issue" and that it was only a matter of time before the people revolted against local politicians who've been wearing green blinders for a decade, if not longer.

We don't want to be the bearer of bad news for residents in the region, but the epic grid mismanagement by Democrats, now colliding with the era of data centers, almost certainly means this crisis is not going away anytime soon and will likely become one of the most pressing issues in Mid-Atlantic states like Maryland.

FYI to the 22,000 members of the group: It seems as if "Big Brother" is watching...

Tyler Durden Sat, 02/28/2026 - 19:00
https://ift.tt/Zug4LHb
from ZeroHedge News https://ift.tt/Zug4LHb
via IFTTT

"Tone Down My Opinions": Police Visit Maryland Man Over Facebook Rage Posts About Soaring Power Bill SocialTwist Tell-a-Friend