Page 1,143«..1020..1,1421,1431,1441,145..1,1501,160..»

Cracking of encrypted phones in Europe leads to seizure of hundreds of tons of drugs – Fox News

Investigations triggered by the cracking of encrypted phones three years ago have so far led to more than 6,500 arrests worldwide and the seizure of hundreds of tons of drugs, French, Dutch and European Union prosecutors said Tuesday.

The announcement underscored the staggering scale of criminality mainly drugs and arms smuggling and money laundering that was uncovered as a result of police and prosecutors effectively listening in to criminals using encrypted EncroChat phones.

"It helped to prevent violent attacks, attempted murders, corruption and large-scale drug transports, as well as obtain large-scale information on organised crime," European Union police and judicial cooperation agencies Europol and Eurojust said in a statement.

GREECES CONSERVATIVES WIN LANDSLIDE VICTORY IN ELECTIONS

The French and Dutch investigation gained access to more than 115 million encrypted communications between some 60,000 criminals via servers in the northern French town of Roubaix, prosecutors said at a news conference in the nearby city of Lille.

As a result, 6,558 suspects have been arrested worldwide, including 197 "high-value targets." Seized drugs included 30.5 million pills, 114 tons of cocaine, 180 tons of cannabis and 3.6 tons of heroin. The investigations also led to nearly $809 million in cash being recovered and assets or bank accounts worth another $168 million frozen.

Eurojust members attend a press conference in Lille, France, on June 27, 2023. The announcement Tuesday underscores the staggering scale of criminality that was uncovered as a result of police and prosecutors effectively listening in to criminals using encrypted EncroChat phones. (AP Photo/Michel Spingler)

Police announced in 2020 they had cracked the encryption of EncroChat phones and effectively listened in on criminal gangs.

EncroChat sold phones for around $1,094 worldwide and offered subscriptions with global coverage for $1,641 per six months. The devices were marketed as offering complete anonymity and were said to be untraceable and easy to erase if a user was arrested.

French law enforcement authorities launched investigations into the company operating EncroChat in 2017. The probe led to a device being installed that was able to evade the phones' encryption and gain access to users' communications.

SERBIAN COURT RELEASES 3 POLICE OFFICERS FOLLOWING US, EU DEMANDS THAT THEY BE SET FREE

Authorities also have identified and detained some of the alleged leaders of the EncroChat provider, Carole Etienne, chief prosecutor at the judicial tribunal of Lille, told reporters.

"Three people were arrested on June 22 in Spain and handed over to France on the basis of European arrest warrants," she said. "Other individuals have been located outside the European Union and have not yet been charged."

EncroChat is not the only secret communications network used by criminals that have been infiltrated by law enforcement authorities.

CLICK HERE TO GET THE FOX NEWS APP

In March 2021, Belgian police arrested dozens of people and seized more than 18.7 tons of cocaine after cracking another encrypted chat system, called Sky ECC.

The FBI and other law enforcement agencies went a step further and created an encrypted service ANOM that was marketed to criminals in a global sting that led to the arrest of more than 800 suspects and seizure of more than 35.2 tons of drugs, including cocaine, cannabis, amphetamines and methamphetamines.

Continue reading here:
Cracking of encrypted phones in Europe leads to seizure of hundreds of tons of drugs - Fox News

Read More..

ExpressVPN vs IPVanish – The Independent

Lowest price: ExpressVPN pricing plans are more expensive than IPVanish. IPVanish costs 2.59/month for a two-year plan, and ExpressVPN costs 5.40/month for a one-year plan.

Free version: ExpressVPN and IPVanish do not offer any free versions. IPVanish claims that free VPN service providers generate revenue by collecting users data and selling it to third-party organisations.

Maximum number of connected devices: ExpressVPN offers only five simultaneous connections per plan, whereas IPVanish offers unlimited connections.

Number of servers: ExpressVPN offers more than 3,000 servers in 94 countries, whereas IPVanish offers more than 2,200 servers in more than 75 locations.

Server locations: IPVanish offers servers in Europe, North America, South America, Asia, Oceania and Africa. ExpressVPN offers servers in North and South America, Europe, Asia Pacific, Africa and the Middle East.

Encryption: Both VPN service providers use the most robust encryption protocols for their users safety and security. They both use Advanced Encryption Standard (AES) with 256-bit encryption. IPVanish also supports the WireGuard protocol, which utilises ChaCha20 encryption, while ExpressVPN uses its own Lightway protocol, uses WolfSSL.

VPN protocols: ExpressVPN and IPVanish use OpenVPN, Internet Key Exchange version 2 (IKEv2) and Internet Protocol Security (IPSec) protocols. WireGuard protocol is supported by IPVanish, but not ExpressVPN. However, ExpressVPN uses its proprietary Lightway protocol as an alternative to WireGuard. Lightway protocol uses WolfSSL, which is also verified by third-party organisations.

No-logs policy: Both parties have a strict no-logs policy, meaning they dont collect their users data. Activity logs, including browsing history, Internet Protocol (IP) addresses, Domain Name System (DNS) queries and personally identifiable information, are not collected by either VPN.

Audits: IPVanish has recently had its no-logs policy audited by Leviathan Security Group, while ExpressVPN has been audited by KPMG, one of the Big Four consulting firms.

Headquarters: The IPVanish headquarters are in the United States; ExpressVPNs headquarters are in the British Virgin Islands.

Go here to see the original:
ExpressVPN vs IPVanish - The Independent

Read More..

Here’s what Apple has to say on UK law opposed by WhatsApp, Signal – Times of India

"At

, we believe

is a fundamental human right," the company said in an announcement while talking about new privacy features on the App Store earlier this month. And rightly so. The iPhone maker has joined

and

in opposing the Uk's

that could give powers to the regulators to allow scanning of encrypted messaging platforms like iMessage, WhatsApp and Signal for child abuse material.

According to a report in BBC, Apple's stand comes as 80 organisations and tech experts have written to the UK's technology minister Chloe Smith to rethink the powers that the bill grants to the Office of Communications (or Ofcom).

"

is a critical capability that protects the privacy of journalists, human rights activists, and diplomats. It also helps everyday citizens defend themselves from surveillance, identity theft, fraud, and data breaches," Apple was quoted as saying.

End-to-end encryption restricts anyone - even the company offering the service - except the sender and recipient to read the message.

"The Online Safety Bill poses a serious threat to this protection, and could put UK citizens at greater risk," the company said, adding that the bill should be amended to protect encryption.

"Apple urges the government to amend the bill to protect strong end-to-end encryption for the benefit of all," the company noted.

The UK government's take

The UK government, the Police, and some high-profile child protection charities argue that the end-to-end encryption prevents the authorities "and the firms themselves" from identifying the sharing of child sexual abuse material.

"Tech companies have a moral duty to ensure they are not blinding themselves and law enforcement to the unprecedented levels of child sexual abuse on their platforms," the government has previously said.

Both WhatsApp and Signal have opposed the Bill in the past. A letter signed by Will Cathcart, head of WhatsApp at Meta; Meredith Whittaker, president at Signal; and representatives from Threema, Element, Wire and Session apps was shared on Twitter back in April.

In March, Cathcart said the company would rather be blocked in the UK than to weaken the privacy of encrypted messages under the Online Safety Bill, if asked by the government.

Signal chief has also threatened that it could stop providing services in the UK if the bill required it to scan messages.

See the article here:
Here's what Apple has to say on UK law opposed by WhatsApp, Signal - Times of India

Read More..

Spot Fake Extortion Attacks Without Wasting Time and Money – Security Intelligence

Ransomware attacks the scourge of businesses, schools, hospitals and other organizations follow a familiar pattern. Shady criminals contact an organization, telling them their company or customer data has been breached, encrypted and/or exfiltrated. Pay us money, or well publish your data.

In 2022, some 41% of victims paid, according to cyber-intelligence firm Coveware, rewarding the extortionists for their efforts. (Payment is declining every year, down from 76% in 2019.)

That knowledge no doubt inspired lazier, less-skillful scammers into action. In the wake of ransomware attacks comes a new threat, which is fake ransomware attacks. Its just like a real attack, except the attackers are bluffing they really dont have the goods or the access to carry out their threats.

The ransomware incident response company, Coveware, first identified the tactic in 2019. They call it Phantom Incident Extortion.

Experts say were currently undergoing a new wave of fake extortion attempts, and its likely to continue. Fake attacks have the advantage for scammers of being vastly faster and easier and therefore can be committed at a massive scale by scammers without skills. Because of the ease of this attack, cybersecurity experts expect it to exist indefinitely.

A group that calls itself Midnight falsely presents itself as an actual ransomware gang, such as Silent Ransom or Surtr, in order to extort money from American companies. They send emails to the victim organization, claiming to have stolen hundreds of gigabytes of data. The attackers demand payment in exchange for not publishing the data (which they dont actually have). In some cases, they threaten a catastrophic DDoS attack as well.

Midnight isnt alone. Its just currently the best-documented example of how Phantom Incident Extortion plays out.

Because hacking is the hard part, fake extortionists replace breaching, encrypting and exfiltrating with shameless bluffing, which can be augmented by slights of hand. Here are some of the tactics:

1. Show real data.

Malicious actors get their hands on some personal data through means other than breaching and exfiltration. For example, careless social media posters can overshare information about their relationship with a company, or threat actors can present publicly available data as stolen. That limited information can stand in for all customer data, which the attacker falsely claims to have stolen for the purpose of publishing if the victim doesnt pay.

2. Launch a DDoS attack.

DDoS attacks are easy to execute, and while its not easy to completely shut down an organization for long periods of time, a sudden rise in network traffic can accompany false claims that a network has been breached or is controlled by attackers. Or the threat of an easy DDoS attack may be added to increase the pressure to pay.

3. Use malware to simulate encryption.

Some fake extortionists are using old-fashioned phishing attacks to trick users into installing a malicious payload. One real-world example is that attackers offer free pornography, which can be viewed by clicking on a link to a fake porn website. Clicking on the link downloads four executables and a batch file that copies the executable to the Startup folder.

The malware finds all the data files it can and changes their names and extensions, then drops ransom notes saying that the victims have to pay or their files will never be unlocked.

The malware then attempts to delete all system drives except the C: drive.

The files arent actually encrypted. Only the filenames have been changed, and theyll work fine if the names are changed back.

The benefit of this con is that, instead of the hard work of breaching, encrypting and communicating with the victim, its an easy set-it-and-forget-it proposition where the bluff and demand are both fully automated.

This attack generally aims at individual Windows user systems but is, in a way, worse than an actual ransomware attack. While only the filenames are changed, theres no way to know the original file names. And when the attackers collect their ransom, they dont follow up and restore the original filenames. They just take the money and run.

4. Demand a low ransom.

One tactic common with fake ransomware attacks is an absurdly low ransom in some cases, mere hundreds of dollars (payable in Bitcoin).

The idea is that even if victims are pretty sure its a fake attack, the ransom amount is so low that theyll pay in the spirit of better safe than sorry.

The perpetrators business model is to make ransoms cheap but make up the difference in volume.

Understanding the growing scourge of fake extortion attempts means categorizing it not as a variant of ransomware but placing it into the buckets of malware, phishing and social engineering attacks. Ransomware is just the content of the con.

Continue Reading

The rest is here:
Spot Fake Extortion Attacks Without Wasting Time and Money - Security Intelligence

Read More..

GSI Technology Secures Lucrative Contract with Space … – Best Stocks

GSI Technology, Inc. has recently secured a lucrative contract with the Space Development Agency (SDA) worth around $1.25 million. This agreement entails the development of a cutting-edge Next-Generation Associative Processing Unit-2 (APU2) for Enhanced Space-Based Capabilities. The APU2 is specifically designed to tackle the complex task of processing large sets of data in space, a challenge faced by the U.S. Space Force (USSF). With its scalable format, compact size, and low power consumption, the APU2 is the perfect solution for edge applications where quick and accurate responses are essential. These remarkable capabilities will enable the USSF to swiftly detect, analyze, attribute, and forecast potential threats in space, ultimately strengthening the United States space dominance.

GSI Technology is renowned for its Gemini Associative Processing Unit (APU), which is tailored for AI and high-performance parallel computing (HPPC). The company is a leading provider of top-notch memory solutions for the networking, telecommunications, and military sectors. The APU revolutionizes the concept of computing by shifting from serial data processing to massive parallel data processing, computation, and search directly within the memory array. This innovative in-place associative computing technology eliminates the bottleneck at the input/output (I/O) between the processor and memory, resulting in a significant improvement in performance-to-power ratio compared to conventional methods that utilize CPU and GPGPU (General Purpose GPU) in conjunction with DRAM. The APU is exceptionally well-suited for various applications, including memory-bound sparse matrix-vector multiplication, convolutional neural networks, image detection, signal detection, speech recognition, recommender systems for e-commerce, and data mining tasks like prediction.

In recognition of its exceptional solution for search and next-generation high-performance computing, GSI Technology was awarded the prestigious $25,000 Grand Prize. Alongside this achievement, the company has announced strategic cost reduction initiatives aimed at reducing its operating expenses by approximately $7.0 million annually. These initiatives primarily involve salary reductions to streamline operations and enhance overall efficiency.

Current $6.40

Concensus $0.00

Low $0.00

Median $0.00

High $0.00

12:00 PM (UTC)Date:29 June, 2023

0 Twitter Sentiment

0 Stocktwits Sentiment

Analyst RatingsThere are no analysts data to display

GSIT Stock Performance on June 29, 2023

On June 29, 2023, GSIT stock, the stock of GSI Technology, opened at $6.47, slightly lower than the previous days closing price of $6.53. Throughout the day, the stock fluctuated between a low of $6.21 and a high of $6.55. The trading volume for the day was 371,562 shares, significantly lower than the average volume of 3,522,602 shares over the past three months. The market capitalization of GSIT stood at $162.7 million.

GSITs price-to-sales ratio is 1.42, suggesting that investors are willing to pay $1.42 for every dollar of the companys sales.

GSI Technology operates in the Electronic Technology sector, specifically in the Semiconductors industry. The companys corporate headquarters are located in Sunnyvale, California.

It is important to note that the stock performance on a single day does not provide a comprehensive analysis of the companys financial health or future prospects. Investors should consider a range of factors, including long-term trends, industry dynamics, and company-specific developments before making any investment decisions.

On June 29, 2023, GSI Technology Inc (GSIT) experienced a steady performance in its stock prices. According to data from CNN Money, the 12-month price forecasts provided by one analyst for GSIT had a median target of $8.00, with both the high and low estimates also at $8.00. This indicates a potential increase of 25.20% from the last recorded price of $6.39.

The consensus among the polled investment analysts, which remains unchanged since May, is to hold stock in GSI Technology Inc. This suggests that the analysts do not currently recommend buying or selling the stock, but rather maintaining the current position.

Overall, the stock performance of GSIT on June 29, 2023, was steady, with analysts predicting a potential increase in the stock price in the next 12 months. Investors should monitor future updates and financial reports to make informed decisions about their investment in GSI Technology Inc.

Visit link:

GSI Technology Secures Lucrative Contract with Space ... - Best Stocks

Read More..

10 Must-have Python Libraries for Data Science in 2023 – Analytics Insight

Weve developed a comprehensive list of the 10 Python Libraries for Data Science in 2023

PythoninData Sciencerefers to the languages significant library support for data science and analytics. Several Python libraries include a plethora of functions, tools, and techniques for data management and analysis. Each of these libraries specializes in a different area, with some dealing with image and textual data and others dealing with neural networks, data mining, data visualization, etc.

Here is a list of the 10 Python libraries for data science that you should check out in 2023:

1. TensorFlow:TensorFlow is a prominent open-source Python machine learning and deep learning library. It includes tools for developing and training neural networks, data preparation, model assessment, and deployment.TensorFlowis widely utilized in areas like computer vision, natural language processing, and robotics.

2. NumPy:NumPy is a robust Python numerical computing toolkit that includes a collection of tools for working with arrays and matrices. It has many applications in scientific computing, data analysis, and machine learning.NumPyis a crucial library for many other scientific Python libraries, enabling quick and efficient array operations.

3. SciPy: SciPy is a free software library for data-driven scientific and technical computing. It was initially launched in 2001 as a community library initiative. SciPy is an array-based Python library that is part of the NumPy stack, including SymPy, matplotlib, pandas, and other scientific computing libraries and tools.

4. Pandas:Pandas is a well-known Python data manipulation and analysis toolkit. It offers a versatile and user-friendly interface for working with structured data such as tables and time series. Pandas are frequently used in data science, finance, economics, and other industries where data analysis and manipulation are required.

5. Matplotlib:Matplotlib is a popular Python package that may create static, animated, and interactive visualizations. It includes various tools for constructing various sorts of plots, including line plots, scatter plots, bar plots, histograms, and more. Matplotlib is a programming library extensively used in data visualization, scientific computing, and machine learning.

6. Keras:Keras, like TensorFlow, is a popular library widely used for deep learning and neural network modules. Keras supports both the TensorFlow and Theano backends, making it a decent choice if you want to avoid getting too involved with TensorFlow.

7. SciKit-Learn:Scikit-learn is a well-known Python machine-learning package. It includes several tools for data preparation, model selection, model assessment, and predictive modeling. Scikit-learn is extensively used in data science, artificial intelligence, and other machine learning-related domains.

8. PyTorch:PyTorch is a Python open-source machine learning framework that includes tools for creating and training neural networks. It is frequently utilized in various applications such as computer vision, natural language processing, and robotics.

9. Scrapy:Scrapy is the well-known Python library for data science. Scrapy is one of the most popular, quick, open-source Python web crawling frameworks. It is often used to extract data from web pages using selectors based on XPath.

10. BeautifulSoup:BeautifulSoup is the next Python data science package. Another popular Python library for web crawling and data scraping. Users can scrape data from websites that lack a proper CSV or API, and BeautifulSoup can assist them in arranging it into the needed format.

See the article here:

10 Must-have Python Libraries for Data Science in 2023 - Analytics Insight

Read More..

Business Intelligence & Optimisation Lead (PTA Hybrid) – IT-Online

ENVIRONMENT:

DRIVE the strategic objective of the creation of a data strategy and data value as the next Business Intelligence & Optimisation Lead sought by a Health Tech Solutions company in Pretoria. You will establish best practices, systems and services for leading data intelligence across the company, with world-class tools and services. You will also drive a data-driven approach and decision making with the goal of driving customer success and company profitability. The ideal candidate is curious and understands the underlying causality on key issues, data, strategic objectives and projects, including customer and channel journeys; possess a BEng Degree Certification / Accreditation in Business Intelligence with 5+ years proven experience in a BI stack framework as a BI Developer or Data Scientist. You will also have proficiency in building business reports using Excel or BI tools (i.e Qlik Sense, BigQuery, Power BI, Tableau) & have a background in data warehouse design (e.g., Dimensional Modeling) and Data Mining.

DUTIES:

Team Management & Development (20%)

Data Intelligence Strategy (20%)

Data Intelligence Processes (30%)

Intelligence-driven Strategy & Advisory (10%)

Communication and Documentation (15%)

REQUIREMENTS:

Qualifications

Experience/Skills

Advantageous

ATTRIBUTES:

While we would really like to respond to every application, should you not be contacted for this position within 10 working days please consider your application unsuccessful.

COMMENTS:

When applying for jobs, ensure that you have the minimum job requirements. OnlySA Citizens will be considered for this role. If you are not in the mentioned location of any of the jobs, please note your relocation plans in all applications for jobs and correspondence. Apply here [URL Removed] e-mail a Word copy of your CV to [Email Address Removed] and mention the reference number of the job.

Desired Skills:

Learn more/Apply for this position

Related

Read the original post:

Business Intelligence & Optimisation Lead (PTA Hybrid) - IT-Online

Read More..

CryptoBlox Closes Acquisition of Crypto Mining Facility – Benzinga

Vancouver, B.C, June 29, 2023 (GLOBE NEWSWIRE) -- CryptoBlox Technologies Inc. (the "Company" or "CryptoBlox") (CSE:BLOX), is pleased to announce, further to its news release dated June 19, 2023 (the "Prior Release"), that it has completed its acquisition (the "Acquisition") of Red Water Acquisition Corp. ("Redwater"), a company specializing in crypto mining technology.

As discussed in the Prior Release, Redwater's air-cooled data centers and advanced heat recapture products have obtained development rights in Sturgeon County, Alberta, Canada, for its operations. This site will serve as the foundation for Redwater's state-of-the-art crypto mining facility, designed for efficiency and cost-effectiveness.

Enter your email and you'll also get Benzinga's ultimate morning update AND a free $30 gift card and more!

Both CryptoBlox and Redwater share a common commitment to sustainable and responsible practices in the crypto-mining industry. Through Redwater, CryptoBlox intends to invest in energy-efficient solutions and environmentally friendly mining practices, aligning with its vision of promoting a greener and more sustainable future for the blockchain ecosystem.

The completion of the Acquisition marks a significant milestone for CryptoBlox as it strengthens its position as a leading player in the crypto-mining industry. "Redwater's experience in crypto-mining aligns with our strategic vision of providing comprehensive blockchain solutions," commented CryptoBlox Interim CEO, Taryn Stemp. "Together, we plan to unlock new opportunities and deliver unparalleled value to our clients and partners."

As compensation for the Acquisition, the Company has issued a total of 118,280,800 common shares of the Company (the "Closing Consideration Shares") at a deemed price of $0.05 per Closing Consideration Share to the vendors of Redwater (the "Vendors"), and will issue another 101,719,200 common shares of the Company (the "Deferred Consideration Shares") at a deemed price of $0.05 per Deferred Consideration Share to the Vendors upon the completion of certain milestones being met by Redwater and the Vendors, for aggregate consideration of 220,000,000 common shares of the Company, having a deemed transaction value of $11,000,000.

On behalf of the Company,

Taryn Stemp,Chief Executive Officer

About CryptoBlox Technologies Inc.

CryptoBlox Technologies Inc. is a blockchain technology company with diversified portfolio of fintech blockchain services, blockchain battery technologies and applications, and crypto mining facilities under development. The Company's acquisition of Redwater marks a significant milestone in its plan to meet the fast-growing demand for cost-effective cryptocurrency infrastructure in North America. By integrating its mining facilities into power generation facilities in Alberta, and using state-of-the-art operations techniques, the Company will be positioned to achieve a high degree of financial optionality and long-term operational certainty that can deliver some of the cleanest and lowest-cost mining operations in the world.

For further information about the Company, please visit https://www.cryptoblox.ca or call 236-259- 0279.

Forward-Looking Statements

The information in this news release includes certain information and statements about management's view of future events, expectations, plans, and prospects that constitute forward-looking statements. These statements are based upon assumptions that are subject to risks and uncertainties. Forward- looking statements in this news release include, but are not limited to, statements respecting: the future plans and operations of the Company and Redwater; and the expected benefits to the Company and Redwater from the Acquisition. Although the Company believes that the expectations reflected in forward-looking statements are reasonable, it can give no assurances that the expectations of any forward-looking statement will prove to be correct. Except as required by law, the Company disclaims any intention and assumes no obligation to update or revise any forward-looking statements to reflect actual results, whether as a result of new information, future events, changes in assumptions, changes in factors affecting such forward-looking statements, or otherwise.

The CSE (operated by CNSX Markets Inc.) has neither approved nor disapproved of the contents of this press release.

2023 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

Original post:

CryptoBlox Closes Acquisition of Crypto Mining Facility - Benzinga

Read More..

Windfall Geotek Generates AI Exploration Targets for Exploits … – TheNewswire.ca

DOES NOT CONSTITUTE AN OFFER OF THE SECURITIES DESCRIBED HEREIN

Brossard, QC - TheNewswire - June 28, 2023 - Windfall Geotek Inc. (TSX-V:WIN) (OTC:WINKF) (FSE:L7C2) a leader in the use of Artificial Intelligence (AI) with advanced knowledge-extraction techniques since 2005 in the mining sector and is pleased to announce it has provided and completed its AI Mineral Exploration targeting services for Exploits Discovery (TSX-V:NFLD) for its Exploits South District Property Package consisting of the True Grit, Great Bend & Middle Ridge Properties located in Central Newfoundland.

Windfall Geotek generated 12 AI Targets over the project area covering 1,208.75 km2 utilizing 4,942 gold assays. The AI target analysis provides significant upside for new discoveries beyond the scope of known gold mineralization on the project.

Jeff Swinoga, President and CEO, comments, As we advance our new Horseshoe gold discovery and target development further to the north at our Gazeebow claims, we are pleased that this new technology was able to assist us with identifying numerous gold targets within our relatively unexplored southern claims. We were very impressed with Windfalls predictive AI technology and its ability to highlight the potential for significant upside for new discoveries beyond the scope of known gold mineralization on these properties.

Dinesh Kandanchatha, Interim CEO and Chairman, We are excited about the opportunity to continue our exploration activities in Newfoundland. Mr. Swinoga has been a strong partner as we continue to expand our data set and validate our models for gold.

Geological Context (https://exploitsdiscovery.com)

The Great Bend-Middle Ridge Project area (Figure 2) located in the Gander River Ultramafic Belt (GRUB) regional structure is thought to be very important in the mobilization and concentration of gold mineralization in the province of Newfoundland, Canada.

The Great Bend property is situated within the Dunnage Zone and encompasses (from west to east), the Newfoundland Geological Survey mapped Coy Pond Complex (CPC), Baie dEspoir Group (BDG), and the Davidsville Group. Lithological units are diverse across the property and consist of Cambrian to Ordovician ophiolitic ultramafics (CPC), Ordovician felsic to intermediate island-arc volcanics and siliciclastic sediments (BDG), as well as Davidsville Group Ordovician marine siliciclastic sediments. The southwest property margin contains the northeast edge of the Early Ordovician Partridgeberry Hills granite which truncates the ophiolite and siliciclastic packages.

The Middle Ridge property straddles a significant regional structure of the Dunnage Zone called the Gander River Ultramafic Belt, (GRUB), a regional scale trans-compressional thrust fault marked by a discontinuous belt of ophiolitic rock that forms the south easternmost boundary of the Exploits Subzone. The GRUB Line is believed to be a potential conduit for deep seated fluid flow and a pathway for the transportation of gold bearing fluids. This structure is spatially associated with significant gold deposition across the belt focused in secondary and tertiary structural splays from the GRUB Line, which is hosted in the Silurian siliciclastic sediments of the Exploits Subzone.

Windfall Geotek AI Gold Target List

Nr

Target ID

X (Center) Nad83 UTM21

Y (Center) Nad83 UTM21

Area (km2)

Perimt. (km)

NTS Sheet

Lithology (NFLD)

1

AI_Exploit_GB_MR_Au_01

598912

5362870

1.129

4.533

002D05

Plutonic ultramafic / Plutonic mafic (Coy Pond Complex)

2

AI_Exploit_GB_MR_Au_02

598246

5362260

0.114

1.371

002D05

Plutonic ultramafic / Plutonic mafic (Coy Pond Complex)

3

AI_Exploit_GB_MR_Au_03

598121

5361870

0.132

1.455

002D05

Plutonic ultramafic / Plutonic mafic (Coy Pond Complex)

4

AI_Exploit_GB_MR_Au_04

598133

5360910

0.434

2.790

002D05

Plutonic mafic (Coy Pond Complex)

5

AI_Exploit_GB_MR_Au_05

599620

5359430

0.473

2.773

002D05

Plutonic felsic (Partridgeberry Hills Granite) / Plutonic mafic (Coy Pond Complex)

6

AI_Exploit_GB_MR_Au_06

602085

5359150

0.145

1.523

002D05

Volcanic mafic marine (Coy Pond Complex)

7

AI_Exploit_GB_MR_Au_07

601318

5365620

0.215

1.873

002D05

Plutonic ultramafic (Coy Pond Complex)

8

AI_Exploit_GB_MR_Au_08

606342

5361360

0.367

2.463

002D05

Siliciclastic marine (Baie d'Espoir Group)

9

AI_Exploit_GB_MR_Au_09

608805

5368860

0.383

2.528

002D05

Siliciclastic marine (Baie d'Espoir Group)

10

AI_Exploit_GB_MR_Au_10

609007

5367950

0.415

2.579

002D05

Siliciclastic marine (Baie d'Espoir Group)

11

See the rest here:

Windfall Geotek Generates AI Exploration Targets for Exploits ... - TheNewswire.ca

Read More..

Newcrest’s Cadia gold mine responds to Environmental Protection Authority’s order to reduce dust – ABC News

The Environment Protection Authority says it wants to see proof that a New South Wales gold mine has reduced its dust pollution.

The NSW EPA says it has received a letter from Cadia Valley Operations' parent company, Newcrest Mining, outlining measures it has taken to lower dust emissions.

"They've laid out a series of operational changes they've made to their underground processes that, in their view, have substantially reduced the production of dust and created a situation where the mine should now be in compliance," EPA chief executive Tony Chappel said.

"They've also laid out a number of other steps underground in terms of better containing and managing any dust that is produced."

Mr Chappelsayshe is waiting for data from the mine, expected in the next few days, to verify its claims.

"We need to see the data validate the outcomes they've achieved," he said.

"We are expecting the first data set as part of the new monitoring regime that's been imposed later this week, and we'll be regularly monitoring to ensure that compliance.

"If they can achieve and maintain these results and do that consistently across the site, that is a quantum shift in the performance of the mine and that should bring it into compliance."

It comes after the EPA launched an investigation into Cadia Valley Operations (CVO) in May after it found an unacceptable volume of dust was being released from the mine'sair vent and nearby residents had heavy metals in their blood and rainwater tanks.

Mr Chappel said the mine has reported taking initial actions including changing their underground operations to be compliant.

"They have responded with significant changes but there is still more work to be done," Mr Chappel said.

The EPA says it has been told the mine has reduced dust production levels, installed additional dust spays and spray curtains; and reconfigured its dust extraction systems.

CVO has told the EPA it has also taken steps to increase sampling of dust emissions.

The EPA has appointed a panel of nine experts to advise on the next stage of its regulatory actions against the mine.

"Panel members will provide advice on sampling, testing and monitoring to understand the extent, impact and potential of pollutants making their way into the Cadia Valley community," Mr Chappel said.

The EPA's action was prompted by blood and water testing that was ordered by concerned local residents and returned elevated levels of lead, nickel and selenium.

Heavy metals were also found in people's rainwater tanks.

The EPA has continued to monitor and sample rainwater tanks at 50 properties near the mine.

The ABC has contacted CVO for a response.

Browse for your location and find more local ABC News and information

The rest is here:

Newcrest's Cadia gold mine responds to Environmental Protection Authority's order to reduce dust - ABC News

Read More..