Top US states where you’re most likely to strike gold
A new report is revealing the best states where Americans can most likely find gold in the ground.
SD Bullion, a U.S.-based bullion dealer, analyzed data from the U.S. Geological Survey’s Mineral Resources Program.
The dealing company looked at locations nationwide where gold ore has been found or produced as a commodity.
ROSH HASHANAH PROMPTS MUSEUM OF THE BIBLE TO DISPLAY OLDEST JEWISH BOOK IN THE WORLD
Chase Turner, CEO of SD Bullion, said in a press release that the findings show where the likelihood of finding gold is notably higher.
“These regions, known for their favorable geological conditions and historical mining success, stand out as prime locations for gold exploration. The data offers valuable insights into the distribution of gold deposits, highlighting key areas for amateur prospectors and professionals,” said Turner.
Just 32 states were found to have gold ore present or were currently producing gold.
For more Lifestyle articles, visit foxnews.com/lifestyle
Below, see the top five best states to strike gold, according to SD Bullion.
Best states to visit if you’re searching for gold
1. California
The Golden State appears to stay true to its name with 10,373 locations where gold has been found or is being produced. SD Bullion recorded 66.59 gold locations per 1,000 square miles.
In California, there is a three-day event at Marshall Gold Discovery State Historic Park in October called “Coloma Gold Rush Live” which allows visitors to explore a re-creation of an 1850 tent town and visit a mining camp, according to a brochure released by El Dorado and Visitor Guide.
CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER
2. Washington
The smallest place in terms of land area found in the states most likely to have gold, SD Bullion found 2,271 locations where gold has been found or is being produced. Washington recorded 34.17 gold locations per 1,000 square miles.
3. Oregon
There are 31.41 gold locations per 1,000 square miles with 3,015 locations where gold has been found or is currently being produced, recorded across its 95,988 square miles, according to SD Bullion.
4. Nevada
Known for its mining industry, Nevada has 30.91 gold locations per 1,000 square miles with 3,393 locations where gold has been found or is currently being produced.
The Fort Churchill State Historic Park in Lyon County, Nevada, hosts “Gold Fever” programs, allowing travelers to pan for their own gold and learn about the mining history of the area, according to carsonnow.org, a local newspaper based in Carson City, Nevada.
5. Idaho
Idaho rounds up the top five, recording 28.44 gold locations per 1,000 square miles. With 2,350 locations where gold has been found or is currently being produced within an area of 82,643 square miles, according to SD Bullion.
“The state’s mountainous terrain has historically been rich in minerals, attracting prospectors for centuries,” said the report.
Arizona, Colorado, Montana, Alaska and Utah rounded out the list of 10 states where visitors can find gold.
“Data was first collected from the US Geological Survey’s Mineral Resources Data System. The data was then filtered to exclude non-US locations and US territories such as the US Virgin Islands and Puerto Rico,” said the survey’s methodology.
CLICK HERE TO GET THE FOX NEWS APP
“The data was further filtered only to include locations where gold ore was reported or where gold is produced as a commodity. Then, the number of gold occurrences, prospect, and producer locations was totaled for each state, giving the total number of gold-containing locations.”
“Finally, this number of locations was compared to the state’s land area to get the total number of gold locations per 1000 square miles, upon which the final ranking is based.”
Fox News Digital reached out to SD Bullion for comment.
Popular tourists destinations in Oklahoma include Bricktown and the National Cowboy and Western Heritage Museum
If you’re traveling to Oklahoma, there is so much the Sooner State has to offer.
Oklahoma is home to several historical stops, including the somber Oklahoma City National Memorial & Museum, which honors those who were killed and survivors of the horrific bombing of the Alfred P. Murrah Federal Building in April 1995.
In addition to the many museums throughout Oklahoma, the state also includes Bricktown, a bustling entertainment district in Oklahoma City full of shops and dining opportunities that visitors and locals love.
A TRAVEL GUIDE TO OREGON: 7 WONDERS OF THE BEAVER STATE FULL OF BREATHTAKING SCENERY
Read more about these destinations and more to consider for a trip to Oklahoma below.
- National Cowboy and Western Heritage Museum
- Oklahoma City National Memorial & Museum
- Bricktown
- Myriad Botanical Gardens
- Beavers Bend State Park
1. National Cowboy and Western Heritage Museum
The National Cowboy and Western Heritage Museum is located in Oklahoma City.
The museum was founded in 1955, according to its website, and is “America’s premier institution of Western History, art and culture,” per the source.
While at the National Cowboy and Western Heritage Museum, you’ll be immersed in the Old West with artifacts, art and educational exhibits.
2. Oklahoma City National Memorial & Museum
Visiting the Oklahoma City National Memorial & Museum will be a somber experience.
It will allow guests to pay tribute to the fallen and learn more about the tragic event in American history.
On April 19, 1995, a homemade bomb inside a rental truck exploded near the north entrance of the Alfred P. Murrah Federal Building in downtown Oklahoma City, according to the Oklahoma Historical Society.
The bombing claimed the lives of 168 people and injured around 850 people, per the source.
The attack was a domestic one, carried out by Timothy McVeigh and Terry Nichols, who were military veterans of the Gulf War, according to the Oklahoma Historical Society.
Today, visitors can go to the Oklahoma City National Memorial & Museum to honor those who lost their lives and also learn more about the tragic events of the day.
CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER
“We come here to remember those who were killed, those who survived and those changed forever. May all who leave here know the impact of violence,” the memorial and museum says on its website.
3. Bricktown
The entertainment district of Bricktown in Oklahoma City is the perfect spot to spend a night out.
There are tons of restaurants, bars and shops in Bricktown for visitors to check out.
Plus, you can get a scenic view of the spot by taking a cruise along the canal in a water taxi.
There are also plenty of hotels to book in Bricktown if you want to stay at the center of the action during your travels.
4. Myriad Botanical Gardens
If you’re looking for relaxation on your vacation, consider visiting the Myriad Botanical Gardens.
For more Lifestyle articles, visit www.foxnews.com/lifestyle
The Myriad Botanical Gardens are in downtown Oklahoma City.
The 15-acre botanical gardens not only provide a tranquil experience for adults, they’re also a great destination for families.
There are lots of events that go on throughout the year for kids as well as a vintage carousal to take a ride on during your trip.
5. Beavers Bend State Park
Beavers Bend State Park is a popular tourist destination in Oklahoma.
There is so much to do and see at Beavers Bend State Park, including hiking, fishing, horseback riding, kayaking and more.
If you wish to stay at Beavers Bend State Park, there is a campground featuring campsites for tent camping as well as for RVs. Additionally, there are cabins at the campground if you prefer.
CLICK HERE TO GET THE FOX NEWS APP
There’s also a lodge at Beavers Bend State Park where you can choose to stay if you don’t wish to camp during your travels.
Think twice before using public computers: Here’s why
Ever found yourself in a pinch, needing to check your email or print a document while you’re out and about? Maybe you’re traveling and need to send a quick message, or perhaps you’re at a coffee shop and want to catch up on work. Public computers in libraries, hotel lobbies or internet cafes might seem like a lifesaver in these moments. But hold up. Before you start typing away, let’s discuss why you should think twice before using these shared machines.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
The sneaky dangers of public computers
1) Malware mayhem
Here’s a situation you may be confronted with. You’re checking your social media on a library, cafe or hotel lobby computer, but little do you know, there’s a digital gremlin lurking in the background. Yep, malware on public computers. These nasty programs can snatch your passwords, personal messages and even financial details faster than you can say “identity theft.”
2) Privacy? What privacy?
Using a public computer is like having a conversation in a crowded room: everyone can potentially hear (or see) what you’re up to. Browsers on these machines might be set up to remember everything you do. Your search history, saved passwords and that embarrassing social media video you watched? All are potentially up for grabs by the next user.
11 THINGS TO ADD TO YOUR PRIVACY CHECKLIST ONLINE ASAP
3) Session hijacking
Imagine logging into your email and then grabbing a coffee while still logged in. In that brief moment, a tech-savvy criminal could hijack your active session, gaining full access to your account without needing your password. They could send emails as you, access your contacts or worse, all while you’re blissfully unaware.
4) Shoulder surfing
Public computers are often in busy areas where anyone can glance at your screen. A seemingly innocent bystander could be memorizing your passwords, credit card details or other sensitive information as you type. This low-tech but effective method of information theft is surprisingly common.
5) USB port peril
Those convenient USB ports on public computers? They might be secretly housing “USB killers,” which are devices that can fry your external drive or smartphone when plugged in. Or worse, they could be set up to automatically copy data from any device connected to them.
6) Fake login pages
Cybercriminals sometimes set up convincing fake login pages on public computers. You think you’re logging into your account, but you’re actually handing your credentials directly to a hacker. These phishing attempts can be incredibly sophisticated and hard to spot.
7) Screen capture software
Some public computers may have screen capture software installed, taking periodic screenshots of user activity. This means even if you’re careful about what you type, sensitive information displayed on the screen could still be captured and stored.
8) Compromised hardware
It’s not just the software you need to worry about. Hardware keyloggers – small devices that record every keystroke – can be physically attached to public computers without being easily noticeable. These devices can capture everything you type, from passwords to private messages.
By understanding these hidden risks, you can better protect yourself when using public computers. Remember, when it comes to shared machines, it’s always better to err on the side of caution.
6 PRIVACY AND SECURITY MYTHS TO CLEAR UP ONCE AND FOR ALL
Best practices on a public computer
Alright, sometimes you just gotta use a public computer. I get it. But let’s make sure you’re not leaving digital breadcrumbs for the bad guys to follow:
- Go incognito: Always use private browsing mode. It’s like wearing an invisibility cloak for your internet activities.
- Log out, log out, log out: Triple-check that you’ve signed out of all accounts before you walk away.
- Avoid sensitive stuff: Please, oh please don’t check your bank account or shop online using public computers. Save that for your secure home setup.
- USB caution: Thinking of plugging in your USB drive? Think again. It’s an easy way to catch a digital virus.
- Clear your tracks: Delete your browsing history, cache and any downloaded files. Leave no trace.
6 THINGS TO DO RIGHT NOW TO BOOST YOUR SECURITY AND PRIVACY BEFORE IT’S TOO LATE
How to clear your tracks after using a public computer
Here’s how to cover your digital footprints on different browsers when using a public computer. Be sure to do this before you log out:
Chrome:
- Launch the Google Chrome browser on your computer.
- Click the three dots in the top right corner of the browser window.
- Tap History
- Scroll down and click on Delete browsing data.
- In the dialog that appears, select All time from the time range drop-down.
- Check all boxes for the types of data you want to clear, such as Browsing history
- Click on Delete data to complete the process
Firefox:
- Click the menu button (three lines) in the top right
- Choose Settings
- Tap Privacy & Security
- Under Cookies and Site Data, click Clear Data (Select History, Cookies and site data and temporary cached files and pages)
Safari:
- Click Safari in the top menu
- Select Clear History
- Choose all history from the drop-down menu
- Click Clear History
Edge:
- Click the three dots in the top right
- Go to Settings
- Tap Privacy, Search, and Services
- Under Delete browsing data, click Choose what to clear
- Select all options and click Clear now
What if I use my own device on public Wi-Fi?
Using your own device is definitely safer than a public computer, but hold your horses: Public Wi-Fi can still be a digital minefield. Here’s how to stay safe when you’re surfing on public networks:
1) Use a VPN: Using a VPN helps protect you against being tracked and helps you identify your potential location on the websites you visit. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.
2) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
3) Avoid sensitive transactions: Still not the best place for online banking or shopping. Save that for your secure home network.
4) Keep your software updated: Those pesky update notifications? They often include important security patches. So be sure to update your software on all your devices regularly.
5) Use two-factor authentication: 2FA is like having a second lock on your digital door.
By implementing these precautions, you can greatly minimize the risks linked to using public Wi-Fi. Always opt for your personal device with the right security measures instead of a public computer when accessing open networks. If you choose to use your own device – an option I highly recommend – consider avoiding public Wi-Fi altogether in such environments. Instead, you can utilize your iPhone or Android as a mobile hot spot for a more secure connection.
Perks at public libraries
While navigating the potential pitfalls of public computers can feel daunting, your local library offers a wealth of free digital resources that can enhance your online experience without the associated risks. From borrowing e-books and audiobooks with apps like Libby and Hoopla to accessing free movies and career advice through Kanopy and LinkedIn Learning, libraries are treasure troves of valuable services. Are you curious about the tech goodies your library offers? Check out our article on free perks from the library. You might be pleasantly surprised by what’s available.
Kurt’s key takeaways
We’ve covered a lot of ground here, from the sneaky dangers lurking on public computers to the do’s and don’ts of using public Wi-Fi. The bottom line? Be cautious, be smart and always prioritize your digital safety. Remember, while public computers and Wi-Fi can be lifesavers in a pinch, they’re not without risks. If you absolutely must use them, follow our tips to minimize your exposure. But whenever possible, stick to your own devices and secure networks.
Have you ever faced any security issues while using public computers or Wi-Fi? If so, how did you handle the situation? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
RYAN & WOLF: We’re moderate capitalists and our presidential pick is simple
NEWYou can now listen to Fox News articles!
The nation just heard competing economic speeches from Vice President Kamala Harris and former President Donald Trump, both with a focus on manufacturing. This is not a surprise as we believe that whoever has the better plan for the rebuilding and revitalizing of industrial America will win the election.
Of course, we are big supporters of the Harris-Walz campaign, but we write this as two clear-eyed moderates and capitalists who know the stakes in this election. And, we believe Harris has a significantly more persuasive and credible argument to make to the American people.
Why is that? Because the Biden-Harris administration’s bold, and mostly bipartisan legislative victories, have stemmed the tide of 40 years of deindustrialization. Their administration has added nearly 800,000 manufacturing jobs and is rebuilding America’s rotting infrastructure with over $1 trillion of investment in the modernization of our roads, bridges, broadband and ports. There is no better investment of America’s hard-earned tax dollars than public infrastructure.
FORMER REPUBLICAN US SENATOR ENDORSES KAMALA HARRIS, SAYS ELECTION OFFERS ‘STARK CHOICE’
We both publicly applauded and supported the Biden-Harris bipartisan Infrastructure Investment and Jobs Act as well as the CHIPS and Science Act, and view them as two of the most consequential legislative accomplishments in our lifetime.
These acts have overwhelming broad-based support from unions, small and large business, Republicans, Democrats and independents (and co-author and former Rep. Ryan voted for both). And this is quite a contrast to Trump’s failures. He talked about infrastructure week continually throughout his term but never even put up a bill (and still talking about it now).
Not only does a rebuilding America plan resonate strongly with the American people, but the American Society of Civil Engineers also gave America’s infrastructure a grade of D+ in 2017 when Trump took office and a C- when he left, which was almost zero progress.
Currently, U.S. infrastructure investment spending is under 5% of GDP annually, which is at the low end versus other countries; with over a $1 trillion funding shortfall over the next five years with an ever-increasing deficit as we maintain, upgrade or modernize structures and systems. Infrastructure investment remains one of the best ways to bolster our economy!
A “Modeling the Impact of Public Infrastructure” study in 2023 found two major impacts on the GDP: short term (during construction phase) and long term (both directly and indirectly which can translate into consumer spending). These investments also have a huge multiplier effect because the new, high-paying jobs pay, on average, over 20% higher than the median income nationally.
So, while Trump has been doing the talking, Biden-Harris has been doing the walking. Since August 2024, approximately $564 billion has been deployed for 56,000 projects in 4,500 communities in all 50 states and territories. The initial investment is being deployed. Now it is time to double down.
The yin to infrastructure’s yang is manufacturing. In the first quarter of 2024, the White House published the Future Made in America fact sheet showing incredible momentum:
- The private sector has committed nearly $900 billion in investments in American manufacturing and power sectors.
- Construction of factories has doubled to a record high after falling under the Trump administration.
- Skills training with the proliferation of “workforce hubs” has begun.
During the Trump years, manufacturing got torched with a net loss of 75,000 manufacturing jobs versus hundreds of thousands of gains under Biden-Harris. It is worth noting that the Alliance for American Manufacturing (a non-partisan nonprofit) attributes Trump’s decline mainly to erratic trade policies that he enacted, not the pandemic.
The king of chaos’ policies were anti-business and anti-worker. And if you listened to the former president’s speech in Georgia, you will understand why. He randomly pitched onerous across-the-board tariffs and old world, protectionist-style ideas targeted primarily at an iconic American company, John Deere.
This led to the Wall Street Journal editorial board writing that, “A Deere in Trump’s Political Headlights” stating that “Mr. Trump thinks he can bully Deere as he did Carrier … Meantime, his threats help Democrats argue that Ms. Harris would be friendlier to business.”
Harris is friendlier to business. In her recent speech in Pittsburgh, she said one of her pillars for her “opportunity economy” was “leading the world in the industries of the future.” Her goal is to out compete China with smart, pragmatic public investments and policies, all while working with business to strengthen our economic, national and energy security.
These kinds of capital-intensive projects in artificial intelligence and clean energy take time to build, which is why we are seeing a construction employment boom. Manufacturing jobs are coming back, and because of these policies huge growth is on the way. Look at what’s already happening:
CLICK HERE FOR MORE FOX NEWS OPINION
- In Arizona, Taiwan Semiconductor Manufacturing Company Limited is building new leading-edge semiconductor manufacturing facilities.
- In Georgia, Qcells is expanding its solar panel and component manufacturing capacity; and Hyundai has broken ground on an EV and battery manufacturing facility.
- In North Carolina, Wolf Speed (no relation) is investing in a semiconductor materials plant; and CommScope and Corning are investing in building American-made fiber-optic cables.
- In Wisconsin, Microsoft is building a data center (on the same site that Trump was supposed to have the infamous Foxconn plant.
These successes are even winning over Republicans. Recently, a large group of House Republicans wrote a letter to Speaker Mike Johnson asking him not to repeal the IRA clean energy tax credits because they were creating jobs and factories in their districts. The administration needs to brag about this bipartisan support for their plan and build on it.
During the Trump years, manufacturing got torched with a net loss of 75,000 manufacturing jobs versus hundreds of thousands of gains under Biden-Harris. It is worth noting that the Alliance for American Manufacturing (a non-partisan nonprofit) attributes Trump’s decline mainly to erratic trade policies that he enacted, not the pandemic.
CLICK HERE TO GET THE FOX NEWS APP
As we look to the future, our recommendation to the next president would be to focus on a balanced, “all of the above” energy policy that includes natural gas, nuclear and renewables to help power this resurgence of manufacturing. And the creation of a National Infrastructure Financing Authority (NIFA) to promote continued public-private partnerships in transportation, energy, climate, AI and more.
Kamala Harris has the vision and experience to build on the initiatives that are already revitalizing industrial America. The choice is clear in this election. One candidate has a fresh vision for our future. And one has plans that are way more dangerous to our economic well-being than our failing infrastructure.
Robert Wolf joined Fox News Channel (FNC) and Fox Business Network (FBN) as a contributor in 2016. Prior to joining FNC/FBN, Wolf spent 18 years at UBS, a global financial services firm where he held several senior positions including Chairman and CEO of UBS Americas and President and Chief Operating Officer of the Investment Bank. He joined UBS in 1994 after spending 10 years at Salomon Brothers.
Vance vs. Walz: Think VP debates don’t matter? Just look at these 6 examples
NEWYou can now listen to Fox News articles!
Yes, the conventional wisdom is that vice presidential candidates rarely matter. But vice presidential debates have both produced memorable gaffes and moments – and sometimes actually changed the direction of the campaign. I’d argue that three of the six presidential elections in recent elections were transformed by the V.P. debate, and even if you go back to the ancient history of the last 50 years, they turned out to be important, even if not decisive. Let’s take a look at six memorable examples.
1976: Mondale vs. Dole on ‘Democrat Wars’: The first vice presidential debate of the modern era took place in 1976. Coming out of the divided Republican convention, President Gerald Ford had picked Kansas Senator Bob Dole, as a way of uniting the Conservative and Moderate wings of the GOP, following their divided convention. Dole faced Jimmy Carter’s vice presidential candidate, Senator Walter Mondale of Minnesota.
In that debate, Mondale responded to a line that Dole had been using in all his speeches – that the Democrats were the party in power when all the wars of the century had started – notably both World Wars, the Korean War, and the Vietnam War. In an obviously scripted moment, Mondale responded, “Senator Dole has richly earned his reputation as a hatchet man tonight, by implying, and stating, that World War II and the Korean War were Democratic wars. Does he really mean to suggest to the American people that there was a partisan difference over our involvement in the war to fight Nazi Germany?”
EXPERTS PREVIEW VANCE-WALZ DEBATE, SAY USUALLY ‘FORGETTABLE’ VP BOUT ‘MIGHT BE DIFFERENT’ THIS TIME
Unfair, absolutely – within the bounds of typical pollical sparring, of course. In a close election decided by less than 20,000 votes, it might have been decisive – and it certainly damaged Dole, preventing him from mounting an effective campaign for the nomination in 1980, even though he was able to recover and become the GOP standard-bearer in 1996.
1984: Bush vs. Ferraro—Bush Recovers for Reagan: President Ronald Reagan – then the oldest president in history – clearly performed poorly against former Vice President Walter Mondale during their first debate. On several occasions he seemed to have a “Senior Moment” – in one case taking almost 17 seconds to find a word. People started talking about whether he was exhibiting “cognitive decline.” Most folks knew Reagan was favored for reelection – especially after Mondale “promised” to raise taxes. In a clear move of desperation Mondale had named a little-known New York Congresswoman, Geraldine Ferraro, as his running mate.
A week after that dismal performance in the first presidential debate, Vice President George H.W. Bush faced off against Ferraro. While there were no real “viral moments” in the debate – the folks who were looking at the internal daily tracking polls of the campaigns say that that night marked a turning point – where Reagan had been slowly bleeding voter support, it immediately stopped and turned around – and barely a month later, Reagan wound up winning the largest popular vote margin in history.
1988: “You’re No Jack Kennedy.” Vice President George H. W. Bush, nominated to succeed Ronald Reagan (then the oldest man to serve as president), chose Indiana Senator Dan Quayle, in part, to represent a “new generation.” Quayle was 42 but he looked even younger. Shortly after the announcement that Quayle had been chosen as V.P. nominee a firestorm ignited over whether his service in the National Guard had been designed to avoid military service in Vietnam. While Quayle survived an attempt to drop him from the ticket, he was dogged by questions about his experience. He would point out, frequently, that he had served in the House and Senate as long as John F. Kennedy, when he was elected president.
JD VANCE DEBATE PREP STRATEGY INCLUDES TAPPING PROMINENT LAWMAKER TO PLAY WALZ
The Democratic V.P. nominee, Texas Senator Lloyd Bentsen, came prepared for the debate. When Quayle repeated his widely-expected – and true – statement “I’ve got just as much experience as John Kennedy,” the tall Bentsen, with his slow, deliberate Texas drawl, said, “Senator, I served with Jack Kennedy, I knew Jack Kennedy, Jack Kennedy was a friend of mine. Senator, you are no Jack Kennedy.”
In televised debated, practiced off-the-cuff ad lib barbs are the most effective ad lib barbs. Especially when the Democratic half of the audience erupts in cheers, and makes the target look like the punch landed.
While Bush-Quayle went on to win – and one could argue that the debate didn’t really matter, Quayle’s political future – even though he did serve as vice president – was sorely damaged.
More recently, the V.P. debates were decisive in three of the six presidential elections since 2000.
2000: Cheney vs. Lieberman-the Policy wonk wins: George W. Bush chose former Secretary of Defense Dick Cheney as his running mate in large part to compensate for his lack of experience in foreign affairs, and his limited experience in office (he’d served in elective office for half as long as even Dan Quayle. Soon after being named, it seemed Cheney was going to be a drag on the ticket. He had to change his residence from Texas back to Wyoming. It turned out he had barely voted in any election since leaving public office.
He walked into the debate with the Gallup poll showing Bush roughly 10 points behind Al Gore. The two candidates (Lieberman and Cheney) were seated and engaged in an apparently friendly debate. Cheney parried attacks on his record and how many millions he’d made in private life but demonstrated a facile ability to discuss all elements of public policy. The instant polls were clear. Forty-two percent of viewers thought Cheney won while only 24% thought Lieberman had. Soon afterwards, the Gallup poll found the race had turned upside down. Bush was now ahead of Gore by 8 points. One doesn’t need to think that all of that shift was due to the debate, to believe it made a difference.
wal
2012: The Interrupter Beats the Policy Wonk- VP Joe Biden vs. Paul Ryan: The VP debate came roughly a week after the first presidential debate between Incumbent Barack Obama and challenger Mitt Romney. Romney had used that debate to make a clear argument against Obama’s first term. Romney was well-rehearsed and made cogent arguments, but worse for Obama, the Democratic nominee appeared totally unprepared.
Obama supporters were apoplectic at how badly he’d done. The polls told the same story. Obama went from a 4-point advantage, walking into the debate, to a 1 point deficit against Romney.
A week later came the V.P. debate. Biden deployed his more youthful ability to talk (it was 12 years ago). You can argue that all he did was scream over the sedate Ryan. But you can’t argue with the results. Democratic viewers were energized – and the polls showed it – moving the Obama-Biden ticket to a tie.
2016: Mike Pence Stays on Message…Tim Kaine Interrupts: The debate between the two men occurred a week after the first Donald Trump-Hillary Clinton debate, where Trump had been argumentative and seemingly ill-prepared – and after numerous news cycles focused on Trump getting into a fight with a former Miss Universe whom Trump had forced to lose weight. At the same time he was continuing his fight with a Gold Star family and a judge of Mexican heritage. Pence had a clear objective: focus on the probable policies of a Trump administration – rather than specific statements Trump had made — and make Trump acceptable to both evangelical voters as well as more moderate Republicans who had opposed Trump’s nomination.
Pence proved himself to be the eloquent former radio talk show host who had built a career out of conservative positions. His opponent, Sen. Tim Kaine tried to interrupt him over 70 times and appeared ill-at ease. By contrast a focus group watching the debate found “Pence looked the most presidential. He was calm, reassuring – I would want him in a crisis, not the other guy.”
While the debate didn’t arrest Trump’s fall in the polls, it presented the Trump-Pence ticket as a less risky choice. And that is how, precisely a month later, they were able to get voters who disliked both Clinton and Trump to vote for Trump – and help him win the election.
In the other three elections this century, the V.P. debate mattered very little (2004, 2008, and 2020).
CLICK HERE FOR MORE FOX NEWS OPINION
Tuesday night, Republican V.P. nominee JD Vance will debate against Democratic nominee, Minnesota Gov. Tim Walz. Vance made his name writing about his Appalachian heritage, being raised by a hard-charging, gun-owning grandmother (Mamaw), and talking about the part of America that had been forgotten by globalization and the “neoliberal” policies. His opponent, Walz, also hails from more rural and small-town Midwest – and made his name winning in a Republican Congressional district and going on to being elected – and pursuing progressive policies — as Minnesota Governor.
While they are similar in background – and both nominations are targeted at helping their ticket carry the industrial swing states of Pennsylvania, Michigan, and Wisconsin–their campaign personas are very different.
Vance is an articulate Yale Law School graduate – who has done well in most interviews, but who struggled to maintain personal favorability in most polling.
Walz does well off-the-cuff, and has created many viral moments, especially when he called Trump and Vance “weird.” At the same time, it’s less clear how well he can talk about specific policies – and do well on a specific argument about different approaches to governance.
CLICK HERE TO GET THE FOX NEWS APP
The big question on Tuesday night will be what is the public looking for? Will they opt for a 2016-Pence like figure who appears capable of translating Trump’s Make America Great Again movement into a set of achievable policies? Or do they want someone more in the mold of 2012 Joe Biden, who made his Republican opponent look like a policy wonk who didn’t have sufficient energy?
Just remember: JD Vance may look like a deliberate Yale-educated lawyer, but he knows how to wield the Appalachian aggression of his late Mawma. And, Tim Walz may personify the former assistant high school football coach, what folks in the upper Midwest refer to as “Minnesota Nice” – by which they mean the ability to knife their opponent, albeit politely.
San Francisco rolls out AI-powered cameras to combat crime
San Francisco is taking a bold step in its fight against crime by deploying three new mobile surveillance cameras. This initiative is part of a larger strategy to leverage advanced technology to enhance law enforcement efforts and improve public safety across the city. As urban areas grapple with rising crime rates and the complexities of modern policing, San Francisco is positioning itself at the forefront of innovation by integrating high-tech solutions into its crime prevention tactics.
City officials believe that these mobile surveillance units will not only help deter criminal activity but also provide valuable evidence for investigations and prosecutions. The decision to deploy these cameras comes amid ongoing discussions about public safety and community well-being, reflecting a commitment to utilizing every available resource to protect residents and visitors alike. By embracing this cutting-edge technology, San Francisco aims to create safer neighborhoods while addressing the concerns of its citizens regarding crime and security.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
High-tech surveillance features
The new mobile security units, manufactured by LiveView Technologies, are equipped with cutting-edge features designed to both capture and deter criminal activity. Each unit has three cameras mounted on a 22-foot mast, floodlights, strobes, speakers for broadcasting warnings, and AI (artificial intelligence) capabilities. The cameras can include thermal, optical and panoramic views. They also have a 32x zoom. These advanced systems can not only record criminal activity in real time but also issue warnings to potential offenders, creating a proactive approach to crime prevention.
Strategic deployment areas
Police Chief Bill Scott has announced that the initial deployment will focus on areas known for specific types of criminal activity. This includes the Mission District, which is targeted for open-air drug dealing and human trafficking concerns, and the UN Plaza area, which addresses drug-related issues. Various merchant corridors will also be included to combat burglaries.
THE FUTURE OF SECURITY JUST ROLLED IN, AND HER NAME IS ATHENA
Impact on public safety
Mayor London Breed emphasized the impact of new technology on public safety in San Francisco. Since adopting drones and license plate readers, the city has seen a significant 70% reduction in auto burglaries compared to the previous year. District Attorney Brooke Jenkins highlighted the potential of these mobile units to strengthen prosecution efforts, noting that the high-quality video evidence captured by these cameras could prove crucial in building stronger cases against offenders.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
IS THIS 4-WHEEL SECURITY ROBOT ABOUT TO REPLACE HUMAN SECURITY GUARDS?
Privacy concerns raised
While city officials tout the benefits of this new surveillance system, privacy advocates have raised concerns. The Electronic Frontier Foundation warns that San Francisco is rapidly becoming one of the most surveilled cities in the country. Matthew Guariglia, a senior policy analyst at EFF, cautioned against what he called a “kitchen sink” approach to public safety. He emphasized the need for clear guidelines on how these technologies will be used and what protections will be afforded to residents.
4 EFFECTIVE WAYS TO PROTECT YOUR MAIL FROM BRAZEN THIEVES
Kurt’s key takeaways
San Francisco’s deployment of mobile security cameras represents a significant escalation in the city’s use of technology for law enforcement. While proponents argue that these tools will enhance public safety and reduce crime, critics worry about potential privacy infringements and the impact on vulnerable populations. As this pilot program unfolds, it will be crucial for city officials to maintain transparency, address privacy concerns and continuously evaluate the effectiveness of these new surveillance measures. The balance between public safety and individual privacy rights will undoubtedly remain a heated topic in the coming months and years.
What are your thoughts on using advanced surveillance technology in urban environments like San Francisco? Do you believe it enhances public safety, or do you have concerns about privacy and the potential impact on vulnerable communities? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
As a female athlete, I do not consent to playing alongside men in sports
NEWYou can now listen to Fox News articles!
Another female college athlete has joined the lawsuit against the NCAA, alleging Title IX violations for allowing biological men to compete in women’s sports.
Brooke Slusser, the starting setter and co-captain of San Jose State University’s NCAA Division One women’s volleyball team, says in the lawsuit she was forced to compete and share a residence with fellow teammate Blaire Fleming. The kicker: Slusser never received advance notice that Fleming is a biological male.
Another unfortunate case of another woman in college sports who did not consent to living with and playing alongside a man.
SWISS COURT TAKES TRANS CHILD AWAY FROM PARENTS OVER THEIR OBJECTIONS TO PUBERTY BLOCKERS
Male athlete Blaire Fleming is leading SJSU’s women’s volleyball team to extraordinary success. As videos of his superior biological advantage over women surfaced online, NCAA President Charlie Baker sent a letter to the U.S. Senate implying there is nothing to see here. As a former NCAA volleyball player, this entire situation begs the question: Why is the NCAA recklessly disregarding women’s concerns?
In August, 23 U.S. senators wrote a letter to Baker urging the NCAA to prohibit male participation in women’s athletics. Several other elected officials, women’s organizations, and NCAA female athletes, myself included, have demanded the same.
Much of this fiery enthusiasm was sparked by the Lia Thomas controversy, when the NCAA awarded a 6’4″ male athlete a women’s National Championship trophy. They also allowed this male athlete into the women’s locker rooms to strip himself in front of female athletes who were changing into their swim gear.
But the problem of men invading women’s spaces didn’t stop, nor did it start, with Lia Thomas. The reality is that the NCAA, with its extraordinary power over college athletics, has tipped the scales in favor of male athletes in women’s sports.
Without any underlying research to justify it, the NCAA has compromised women’s sports to the detriment of female athletes around the world. Despite an outcry of public opposition, the NCAA has continued to invite men into women’s private spaces and competition.
The Fleming-led San Jose State University team is climbing to previously unreached success, recently beating a Big Ten volleyball team for the first time in two decades. As of September 23, the team is one of seven teams in D1 NCAA Volleyball, remaining 8-0 for the first time since 1990.
Fleming consistently leads the team in scoring and even racked a remarkable 25 kills in a singular match. Videos circulate Twitter/X of Fleming appearing to hit the ball in the face of one of his female opponents for a game-winning kill.
Fleming is not the only one. A similar instance of a trans-identifying man hitting a volleyball straight into Payton McNabb’s face left her partially paralyzed with likely permanent head and neck damages.
Despite the clearly dangerous nature of their policies, Baker and the NCAA continue to flee from any responsibility. In their response to the Senate, Baker notes “the NCAA policy seeks to align with other national governing bodies’ policies” and member schools must abide by their state’s regulations.
However, most of these schools will travel outside of state protection to compete in NCAA competition. Baker also says he would “welcome” a national policy on the topic, looking to Congress for national sport regulation, rather than within his own National Collegiate Athletic Association.
Shockingly, he took it so far as to acknowledge “schools may also choose to operate in a different way due to institutional values.” Not only is this statement something no one had heard before, it is also very misleading.
CLICK HERE FOR MORE FOX NEWS OPINION
There are no records of the NCAA notifying their member schools if their women’s teams will soon be competing against, or changing in the locker room with, a man. Few knew about Fleming’s true sex until Reduxx uncovered it this past April, nearly four years after his NCAA debut.
Southern Utah appears to have taken Baker up on the offer almost immediately. The team opted out of their game against Fleming just days after Baker’s letter became public.
Yes, San Francisco, Saint-Mary’s, Fresno State, Boise State, Colorado State, Wyoming, San Diego State, UNLV, New Mexico, Air Force, Utah State, Nevada, and New Mexico can still choose to protect their female athletes by forfeiting the competition.
And if a school is committed to the safety and fairness of their female athletes, they should opt out if they are aware of male athletes on opposing teams. But universities should not hold their breath expecting the NCAA to offer the respect of prior notification of male participation.
CLICK HERE TO GET THE FOX NEWS APP
Baker’s scheme simply doesn’t work, and he knows it. The reality is that a school would possibly forfeit earnings, records and even NCAA tournament appearances if they withdrew their female athletes from competing against a man. The entity is effectively forcing schools to knowingly place female athletes in harm’s way.
Women’s voices in college sports matter. We fought hard for – and deserve – the right to say no when we do not consent to playing alongside men. It’s time to hold the NCAA responsible for this reckless disregard for women’s safety and fair play in college sports.
Rosh Hashanah prompts Museum of the Bible to display oldest Jewish book in the world
The Museum of the Bible in the nation’s capital has opened a new exhibit showing visitors how different faiths come together ahead of Rosh Hashanah.
The exhibit, “Sacred Words: Revealing the Earliest Hebrew Book,” displays the oldest Jewish book in the world, the Afghan Liturgical Quire (ALQ).
The medieval manuscript consists of prayers, poems and drawings from the Hebrew Bible with pages of the oldest discovered Passover Haggadah.
Scholars determined the ALQ originates from the 700s, making it the oldest Hebrew book that’s intact.
“This sacred book holds a surprising connection to the Bamiyan Valley of Afghanistan, where Buddhism once flourished along the Silk Roads. When it finally came to light, Christians, Jews and Muslims worked together to save it, understand it and make it accessible to the world,” a Museum of the Bible press release says.
For more Lifestyle articles, visit foxnews.com/lifestyle
Carlos Campo, CEO of the museum, told Fox News Digital the book holds holy history in a way that no other object has.
“When you combine the cultural significance and the religious significance and then releasing it during the High Holy Days, it’s really a powerful testament to the commitment of the Jewish people. How they’ve survived over the years, (how) their faith has survived. And, really, the history encapsulated within this 25-page book,” Campo said.
The Museum of the Bible first opened in 2017 and recently greeted its 3 millionth guest.
CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER
Campo says the architecture and design of the building leaves visitors with a sense of wonder, and the museum reveres the bible.
“It’s not a church, but it is such an incredible architectural space. I think it’s one of the things that people are stunned by. They walk in the museum and they see the grand hall and it’s a 150-foot-long space that is more than a story high. And it immediately gives you the sense of wonder. And, to me, that’s what is the greatest thing about Scripture,” Campo said.
“It gives you a sense of wonder as it ties humanity to God. And I think that’s what we would want people to take away, this sort of wondrous reverence for this book that we call the Bible.”
CLICK HERE TO GET THE FOX NEWS APP
The Sacred Words exhibit is being presented to visitors now through Jan. 12, 2025.
Learn more at museumofthebible.org.
Android’s latest nightmare: millions of devices infected by sneaky malware
You’d think an app listed on the Play Store would be safe to download. That’s what Google wants you to believe, and it’s true to a large extent. But in this digital world, no service is foolproof.
Time and time again, there have been instances when widely downloaded apps on the Play Store were infected by malware. While Google continues to promise that the app market is safe, another incident has come to light.
Security researchers have discovered a new Trojan malware called Necro that not only infects apps downloaded through unofficial sources but also those on the Play Store, including one with more than 10 million downloads.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
How does Necro infect apps
The exact method by which both apps were initially compromised with the malware is still unclear. Researchers at Kaspersky’s Securelist believe a rogue software development kit (SDK) used for integrating advertising functionalities may be responsible for the breach. SDKs are essential tools developers use to add specific features to their apps, such as ad services, analytics or payment processing.
When an SDK is compromised, it can inadvertently introduce vulnerabilities into the applications that utilize it. In this case, the malware affecting the apps displayed ads in the background to generate fraudulent revenue for the attackers, installed apps and APKs without the user’s consent and used invisible WebViews to interact with paid services.
The Trojan in question, Necro, isn’t exactly new. It’s the same malware that infected a popular document scanner called CamScanner in 2019, which at that time had over 100 million downloads.
ANDROID BANKING TROJAN EVOLVES TO EVADE DETECTION AND STRIKE GLOBALLY
Which apps are affected?
Kaspersky researchers identified several apps affected by the Necro Trojan, including those available in Google Play. Their combined audience numbered more than 11 million Android devices.
The first affected app is the Wuta Camera, a photo editing and beautification tool. It has at least 10 million times. The Necro loader has been embedded in it starting from version 6.3.2.148. The latest version of the app, 6.3.6.148, which was available on Google Play, also had it. After the researchers reported the presence of malicious code to Google, the Trojan was removed from the app in version 6.3.7.138.
The second infected app was Max Browser. This browser, according to Google Play, has been installed more than a million times and, starting with version 1.2.0, also contained the Necro loader. Google took down the infected app from the Play Store after it was reported.
Kaspersky also found WhatsApp mods that had the Necro loader in unofficial sources. It also spotted the Spotify mod called “Spotify Plus,” which promises free access to ad-free premium services. Plus, the report mentions mods for popular games like Minecraft, Stumble Guys, Car Parking Multiplayer, and Melon Sandbox, all of which were infected with the Necro loader.
Mods, or modifications, are altered versions of original apps or games that often provide additional features or tweaks.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA
What is Google’s response to this?
Google is aware of the Necro malware and, as I mentioned above, it has already taken down the affected apps. A Google spokesperson provided us with the following statement:
“All of the malicious versions of the apps identified by this report were removed from Google Play prior to report publication. Android users are automatically protected against known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services. Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play.”
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
4 ways to protect yourself from Necro malware
1. Have strong antivirus software: Android has its own built-in malware protection called Play Protect, but the Necro Trojan proves it’s not enough. Historically, Play Protect hasn’t been 100% foolproof at removing all known malware from Android phones. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
2. Download apps from reliable sources: It’s important to download apps only from trusted sources like the Google Play Store. You might say I am contradicting myself, but Play Store is still safer than other options out there. It has strict checks to prevent malware and other harmful software. However, even with the security measures provided by Google Play, downloading apps from the store does not guarantee 100% protection against malware or harmful software. Avoid downloading apps from unknown websites or unofficial stores because they can pose a higher risk to your personal data and device. Never trust download links that you get through SMS.
3. Be cautious with app permissions: Always review the permissions requested by apps before installation. If an app requests access to features that seem unnecessary for its function, it could be a sign of malicious intent. Do not give any app accessibility permissions unless you really need to. Avoid granting permissions that could compromise your personal data.
4. Regularly update your device’s operating system and apps: Keeping your software up to date is crucial because updates often include security patches for newly discovered vulnerabilities that could be exploited by trojans.
ANDROID USERS AT RISK AS BANKING TROJAN TARGETS MORE APPS
Kurt’s key takeaways
The discovery of the Necro loader in apps like Wuta Camera, Max Browser and popular game mods shows just how serious security issues can be in the app world. With over 11 million Android devices affected, it’s crucial to be careful about where you download your apps. Unofficial sources can be a breeding ground for hidden threats, but the Play Store isn’t completely safe either. Google should look into what apps it allows on its platform. I haven’t seen as many malware issues affecting iPhone apps as there are on Android.
CLICK HERE TO GET THE FOX NEWS APP
Do you think Google does enough to protect users from malware on the Play Store? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Cruise ship surgery that slices giants for mega profits
Ever wonder how cruise lines keep up with the insatiable demand for bigger and better ships?
It turns out they have a trick up their sleeve that’s almost as impressive as building a new vessel from scratch.
Let’s dive into the fascinating world of cruise ship “jumboization.”
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
The cruise boom: More passengers, bigger ships
Cruise vacations have exploded in popularity over the past few decades. In 1990, about 3.7 million people took a cruise, but fast-forward to 2024, and we’re looking at a whopping 30 million cruisegoers. That’s a lot of buffet lines.
To keep up with this soaring demand, cruise lines have been building massive ships like Royal Caribbean’s Icon of the Seas. This floating city can carry nearly 10,000 people and boasts features like a waterpark, seven pools and 20 decks of entertainment. However, these mega-ships come with a hefty $2 billion price tag and take years to build.
Jumboization: The quick and (relatively) cheap solution
That’s where “jumboization,” a surgical procedure for ships almost as wild as it sounds, comes in. For about $80 million and just a couple of months out of service, cruise lines can literally slice an existing ship in half, add a new middle section, and weld it all back together. The result is a bigger ship with more cabins, more amenities, and more profit potential — all without the hassle of building an entirely new vessel or training an entirely new crew.
HOW TO PROTECT YOUR ONLINE PRIVACY AND SECURITY ON YOUR NEXT CRUISE VACATION
How to stretch a cruise ship
The process begins with engineers meticulously planning every detail of the new section to ensure that all systems will line up perfectly. The new section is constructed separately, often complete with interior fittings. Once ready, the existing ship is positioned on special lifting jacks known as “skid shoes.” Workers then cut the ship clean in half using lasers for precision.
After that, the two halves are separated to make room for the new section, which is slid into place. Skilled welders join the sections together with millimeter precision, ensuring that everything fits perfectly. Afterward, thousands of cables, pipes, and ducts are reconnected to restore functionality. Finally, every system undergoes thorough testing before the ship returns to service.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
HOW TO STAY CONNECTED NO MATTER WHERE YOU TRAVEL IN THE WORLD
The payoff: Why cruise lines love jumboization
This process isn’t just a cool engineering feat. It’s also a financial goldmine for cruise operators. The extra cabins added during jumboization can pay for the entire operation within just a few years. Additionally, it offers an opportunity to upgrade other features, such as pools and engines, or even add entirely new attractions.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
Kurt’s key takeaways
As demand for cruising continues to grow, we are likely to see more and more ships getting the jumboization treatment. This trend is a testament to human ingenuity. We can take something as massive and complex as a cruise ship and essentially “stretch” it like a piece of taffy. These “extended” vessels prove that sometimes the most impressive innovations aren’t about building something new but rather reimagining what we already have. So, next time you’re on a cruise, take a moment to appreciate the engineering innovation beneath your feet. It might be hiding a secret middle section.
What are your thoughts on the environmental impact of jumboization in the cruise industry, and do you think the benefits of expanding existing ships outweigh the potential ecological costs? Let us know by writing us at Cyberguy.com/Contact
CLICK HERE TO GET THE FOX NEWS APP
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.