9 things everyone should know about the drug Molly

(CNN) — The drug called Molly isn’t what most of its users think it is. If you Google “Molly,” many articles say the drug is “pure” MDMA, the active ingredient in Ecstasy.
Users often talk about the “purity” of taking Molly, as if it’s somehow better; after all, MDMA was originally developed as a medication to treat depression. But today’s Molly is most often not MDMA — in the last few years, the drug has become a toxic mixture of lab-created chemicals, according to the U.S. Drug Enforcement Administration.
Here are nine things everyone should know about this rapidly changing party drug:

1. What is Molly?

‘2C-P’ and ‘Molly’ involved in overdoses Drug deaths spur fear of bad batch Hot party drug has deadly consequences Patient: Ecstasy eased my PTSD
Someone who buys or takes Molly now is probably ingesting dangerous synthetic drugs that have not been tested and are produced in widely varying strengths. The DEA says only 13% of the Molly seized in New York state the last four years actually contained any MDMA, and even then it often was mixed with other drugs. The drugs frequently found in Molly are Methylone, MDPV, 4-MEC, 4-MMC, Pentedrone and MePP.

2. What does Molly do?

The lab-created chemicals mimic the effects of MDMA; most of them are central nervous system stimulants that cause euphoric highs. They can also cause a rapid heartbeat, high blood pressure, blood vessel constriction and sweating, and can prevent the body from regulating temperature. Some of the chemicals have been reported to cause intense, prolonged panic attacks, psychosis and seizures.
After they wear off, the chemicals can cause devastating depression. Several of these compounds have caused deaths.

3. Who is using Molly?

Molly is being marketed to young first-time drug abusers between the ages of 12 and 17, as well as traditional rave, electronic dance music fans who may think they’re getting MDMA. “Our kids are being used as guinea pigs by drug traffickers,” says Al Santos, associate deputy administrator for the DEA.

4. What does Molly look like?

Molly can take many different forms, although it’s most often found in a capsule or powder. The DEA has also seen Molly applied to blotting paper, like LSD, and in injectable form.

5. What makes Molly so dangerous?

Molly is dangerous because of the toxic mix of unknown chemicals; users have no idea what they’re taking or at what dose. Unlike MDMA and other illegal drugs that have known effects on the body, the formulas for these synthetic drugs keep changing, and they’re manufactured with no regard to how they affect the user.
“You’re playing Russian roulette if you take these compounds because we’re seeing significant batch-to-batch variances,” Santos says.
For example, officials have found completely different ingredients in drugs sold in the same packaging. Santos also says the amount of active ingredients can be dangerously different, because “the dosing for these sorts of drugs are in the micrograms. The room for error is tremendous, and we’ve seen a lot of deaths with some of these compounds.”
The DEA has developed its own reference materials for state and local law enforcement because they were encountering so many different drug compounds they’d never seen before. At the DEA testing lab, technicians are constantly trying to unravel the chemical makeup of newly discovered drug compounds that have been seized.
What you need to know about synthetic drugs

6. Where do the chemicals come from?

Almost all the chemicals in Molly and other synthetic drugs come from laboratories in China. Chinese chemists sell the drugs online, and middlemen in the United States and around the world cut it with other substances, and either place it in capsules or sell it as powder. Other kinds of synthetic drugs can be sprayed onto plant material and smoked, such as synthetic marijuana.
But it’s difficult for law enforcement to keep track of all the chemicals. The DEA says it’s seen about 200 individual chemical compounds since 2009 and 80 new compounds since 2012. As soon as a compound is discovered and banned, another one is created to take its place.
Interestingly enough, the formulas for these drugs were discovered by legitimate scientists working on new medications. The formulas couldn’t be used as medicine because of the stimulant or hallucinogenic effects they had users, but the “recipes” for the drugs still remain.
Clandestine chemists have used the scientific literature to create hundreds of new chemical compounds for the sole purpose of getting people high. There is no known legitimate purpose for any of these chemicals.
Music festival canceled after 2 deaths blamed on drugs

7. How widespread is the problem?

Huge. The fastest-emerging drug problem in the United States is the synthetic drug market, which now includes Molly. The chemicals in Molly have been found in nearly every state in the U.S.
And it’s a multibillion-dollar business. In two days, the DEA seized $95 million off drug traffickers during a crackdown. It is a growing problem in Australia, New Zealand and Europe as well.

8. What’s being done about it? Why can’t the government just make it illegal?

Congress passed the Synthetic Drug Abuse Prevention Act in July 2012, which controlled 26 compounds by name. But there are hundreds of compounds, and every time the government makes one illegal, chemists alter the formula slightly to make it a substance that is no longer controlled.
U.S. officials say they are discussing the issue with the Chinese government, but most of these chemicals are legal in China.
There’s something (potentially dangerous) about molly

9. How can I tell if someone is using or has used Molly?

The effects can vary widely, depending on the chemical, but while users are under the influence, they may exhibit the following symptoms: sweating, jaw clenching, violent or bizarre behavior and psychosis.
After the drug has worn off, a user may show signs of depression or may not be able to get out of bed for an extended period of time.

Posted in Uncategorized | Tagged , , | Leave a comment

Entrance of the iconic Raffles Dubai Hotel

Entrance of the iconic Raffles Dubai Hotel.

Posted in Uncategorized | Leave a comment

Alleged Scarlett Johansson hacker didn’t plan to profit, FBI says

Announcement of the arrest of Christopher Chaney, 35

Celebrities are accustomed to stalkers trying to get too close.

But the FBI on Wednesday accused a man of gleaning intimate details from the lives of several top actresses and singers — including nude photos — from 3,000 miles away.

Working from his home computer in Jacksonville, Fla., authorities say, Christopher Chaney, 35,allegedly hacked into the email accounts of such big names as Mila Kunis, Christina Aguilera and Scarlett Johansson.

And authorities say he did it the hard way. Mining details of the stars’ personal lives in celebrity magazine and websites as well as Twitter and Facebook posts, Chaney looked for potential passwords that would give him access to their accounts, the FBI said.

Document: Read the indictment

Once he cracked the password, officials charged, he hit a gold mine, gaining access to the stars’ address books as well as any photos and other files saved in their email accounts.

He used an email forwarding program that automatically sent a duplicate of any messages the stars received to his own account. So, even when the celebrities changed their passwords, he would know about it, officials said.

Chaney was arrested this week in Jacksonville on various hacking charges and faces up 121 years in prison if found guilty on all counts.

The arrest caps a yearlong FBI probe into celebrity hacking that has generated much interested in the Hollywood tabloid world. There were many theories about the identity of the hacker, with some speculating it was someone trying blackmail or embarrass the stars — or make money off the information.

But federal officials said Chaney appears to have acted alone and seemed to have no plans to contact the stars or sell his information.

FBI officials said the case underscores the changing nature of celebrity stalking in the computer age.

“The case brings us to a new word in expanding lexicon of cybercrime — ‘hackerrazzi,’ ” said Steven Martinez, assistant director in charge of the FBI’s Los Angeles field office. “We continue to receive complaints involving the targeting of high-profile figures.”

Find IT Security Pros or IT Security Companies at Managed.com

Website Vulnerability Scanner  website security

 


Posted in Uncategorized | Leave a comment

Facebook’s Timeline will be boon for hackers

Facebook’s new Timeline will make it even easier for criminals and others to mine the social network for personal information they can use to launch malicious attacks and steal passwords, a researcher said today.

Timeline, which Facebook unveiled yesterday at a developer conference and plans to roll out to users in a few weeks, summarizes important past events in a one-page display.

According to Facebook CEO Mark Zuckerberg, Timeline is “the story of your life,”

That has experts at U.K.-based Sophos concerned. Cybercriminals often unearth personal details from social networking sites to craft targeted attacks, noted Wisniewski, and Timeline will make their job simpler.

 

“Timeline makes it a heck of a lot easier [for attackers] to collect information on people,” said Chet Wisniewski, a Sophos security researcher. “It’s not that the data isn’t already there on Facebook, but it’s currently not in an easy-to-use format.”

“And Facebook encourages people to fill in the blanks [in the Timeline],” said Wisniewski, referring to the new tool’s prompting users to add details to sections that are blank.

Because people often use personal information to craft passwords or the security questions that some sites and services demand answered before passwords are changed, the more someone adds to Timeline, the more they put themselves at risk, said Wisniewski.

“Remember the hack of [former Alaska governor] Sarah Palin’s account?” asked Wisniewski. “That hacker found the answers to her security questions online.”

A former University of Tennessee student who bragged it took him just 45 minutes of research to reset Palin’s Yahoo Mail account password was convicted on multiple federal felony countslast year.

Hackers can also use what they find on Facebook and elsewhere to craft convincing emails that include malware or links to malicious sites, noted Wisniewski, even if the individual is not the target.

“It may be about the fact that you work for RSA [Security],” he said, referring to the emails sent to low-level employees at that firm earlier this year. Those emails, which included malware embedded in Excel spreadsheets , gave attackers a foothold on RSA’s network. The criminals then scoured RSA’s systems and stole confidential information about its popular SecurID authentication token technology.

Others, not strictly hackers, could use Timeline to quickly dig up dirt as well, said Wisniewski.

“Someone could use it to gather information to harass you, or someone at work competing for your job could use it,” he said.

“The more you put in there to make it complete — and we’ve been conditioned to finish forms — the easier it is for someone with ill intent to gather information about you,” said Wisniewski.

Although current Facebook privacy settings will apply to the Timeline — letting users decide who sees what — and the Timeline can be edited to remove an embarrassing past, Wisniewski was pessimistic about users’ decision making.

In an unscientific survey Sophos ran on its website today, nearly 50% agreed that the Facebook Timeline worried them, while about 17% said they liked the idea or would get used to it.

“Call us paranoid or prudent — we’re paid to worry about this — but for 99% of people, the danger doesn’t even cross their mind,” said Wisniewski. 

Wisniewski admitted that the poll probably doesn’t reflect most Facebook users’ opinions. “They’re doubly self-selected,” he acknowledged, “first for taking the survey and second because they’re concerned enough about security to go to our website.”

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer , or subscribe toGregg’s RSS feed . His e-mail address is gkeizer@ix.netcom.com .

 

Posted in Uncategorized | Leave a comment

Homeless hacker ‘Commander X’ pleads not guilty [VIDEO]

FILED UNDER: FeaturedLaw & orderMalwareVulnerability

Commander XThe FBI believes that the homeless man theyarrested on Thursday was “Commander X”, a member of the People’s Liberation Front (PLF) associated with Anonymous hacktivism.

47-year-old Christopher Doyon has entered a not guilty plea to charges of “conspiracy to cause intentional damage to a protected computer, causing intentional damage to a protected computer, and aiding and abetting”.

According to an indictment filed against Christopher Doyon and another man, Joshua John Covelli, the charges specifically relate to a denial-of-service attack against the servers of Santa Cruz County in December 2010, after the city put in place a law prohibiting camping inside the city.

Indictment against Christopher Doyon and Joshua John Covelli

The indictment gives Doyon the aliases “PLF”, “Commander Adama” (clearly a Battlestar Galactica fan) and “Commander X”. Covelli meanwhile is alleged to use the pseudonyms “Absolem” and “Toxic”. 26-year-old Covelli waspreviously named in connection with internet attacks on PayPal.

Someone calling themselves “Commander X” gave an interview to CBS News earlier this year, claiming responsibility for denial-of-service attacks by Anonymous.

 

According to a CBS News report, “Commander X” told their reporter that he had no fear about being caught:

"We're not going to turn ourselves in. They can come and get us is what I say. Bring it on. Until then, we run... We will remain free and at liberty and at large for as long as we can, and when the time comes that each and every one of us eventually will be brought to justice, we will hold our head high in any court of law and we will defend our actions."

Doyon is scheduled to appear on September 29th for a bail hearing.

Posted in Uncategorized | Leave a comment

Web 2.0 or a relabeling of the original intent?

Web 2.0 – Wikipedia, the free encyclopedia

Whether Web 2.0 is qualitatively different from prior web technologies has been challenged by World Wide Web inventor Tim Berners-Lee, who called the term a “piece of jargon”,[4] precisely because he intended the Web in his vision as “a collaborative medium, a place where we [could] all meet and read and write”. He called it the “Read/Write Web”.[5]

Posted in Uncategorized | Leave a comment

Netflix revises subscriber estimates

Netflix is crashing and burning in pre-trading as the company just released a statement to shareholders that cut forecasted subscribers by 1 million users. This comes after Netflix started rolling out new plans that effectively jacked prices up 60% for the most popular plan. As of this posts writing, Netflix is down 15% and falling, almost erasing the company’s stellar 19% growth over the last year.

The new estimate puts the company’s DVD-only subscriber count at 2.2 million, down from the previous projection of 3 million. Netflix’s streaming subscribers are now estimated lower as well, pegging in at 9.8 million rather than the old estimate of 10 million.

Netflix stated they expected losses after rolling out the new plans. But they clearly didn’t expect this type of backlash. However, as stated in the letter [PDF], while they highly regard its customer’s opinions, the company still feels they made the right decision separating the streaming and DVD business. This allows the now separate divisions to focus on their part of the business without dealing with the other as in global streaming services is no longer tied to domestic DVD business and so on.

Change is hard and Netflix’s stellar success from turning from start-up to superstar is commendable. But now that they at the top, if you will, the big kid on the playground, its history will be wrote with how it proceeds from here. No doubt a short term goal is to recover the recent lost subscribers while increasing its DVD and streaming offering. As a bored Netflix subscriber myself, content is king and, well, the streaming library isn’t getting any bigger.

Posted in Uncategorized | Leave a comment

Posterous rasises 5 Million

Um, oh hey guys, what’s up? Nothing much over on my side, except that I’d really like a Diet Coke. Also, I’m hearing that nascent photo sharing app née blogging platform Posterous is raising some money. So yeah that’s what’s up over here in my neck of TC HQ.

Chew on this if you’re in the mood for some actual tech news; the simple blogging service and Tumblr competitor has just raised $ 5 million in Series B according to multiple sources. Taking part in the round will be Redpoint Ventures, newcomer Jafco Ventures and existing angels.

On Monday Posterous revamped its entire product and focus around Posterous Spaces, which — in the same vein as Google Circles — allows users to pick and choose whom they share specific content with. Thus far the product has received mixed response from users.

I’m just going to assume that Posterous will be using the cash to increase its engineering team, because that’s what I usually write everyday in these things. This new funding comes in addition to another $ 5.14 million in seed, angel and Series A financing from Y Combinator, SV Angel, Lowercase Capital, Brian Pokorny and others, making the company’s total funding to date $ 10.14 million.

I think I just might go get that Diet Coke now.

Posted in Uncategorized | Leave a comment

 

Find Managed Hosting Pros or Managed Hosting Providers at Managed.com

 

zaypay

Mobile Interactive Group (MIG) this morning announced that it has acquired global mobile payments business Zaypay, a startup based in Amsterdam, The Netherlands. MIG says it will continue to operate Zaypay as a standalone business, but declined to disclose financial terms of the agreement, other than to reveal that it was an all-cash deal.

Zaypay enables third-party developers to process international micropayments through SMS, phone calls, in-app and other alternative payment methods. ZayPay was founded by Dutch entrepreneur Adriaan Mol (27) in 2006 and is currently operational in 44 countries.

 

 

 

  • ZAYPAY.COM
  • MOBILE INTERACTIVE GROUP
Company:
Zaypay.com
Website:
zaypay.com
Launch Date:
January 6, 2007

 

Zaypay offers gaming companies a unique portfolio of billing methods
including: premium sms, premium rate numbers and content
billing.

Using Zaypay avoids the complexity of dealing with different
mobile operators, technologies, and transaction management
methods. Merchants receive extensive financial and technical
data on their platform, leaving the hassle of processing,
checking and collecting to Zaypay.

With our innovative payment gateway, merchants can bill
customers worldwide directly on their mobile or fixed line
phone.

 

 

Learn more

 

Company:
Mobile Interactive Group
Website:
migcan.com

 

Mobile Interactive Group (MIG) is an integrated mobile and digital communications business. Comprising a unique combination of businesses, MIG specialist disciplines include mobile advertising, mobile marketing, mobile billing, mobile messaging, mobile technology and services provision, multi channel digital solutions, mobile internet publishing, experiential design and application development.

There are five companies within MIG, see products, and each has its own areas of expertise

 

Go to Managed.com Find IT Security Pros or IT Security Companies  

Posted in Uncategorized | Tagged , | Leave a comment

{EAV_BLOG_VER:9c0883957af3fde9}

Posted in Uncategorized | Leave a comment