n

BUZZTATLER

Kane Gamble, A Remarkable  Teenager Who Shook U.S. Intelligence

Share On:
Facebook
Twitter
LinkedIn

The world of cybersecurity is often associated with highly skilled professionals conducting complex operations. However, the story of Kane Gamble, a British teenager, serves as a fascinating and shocking exception. At just 15 years old, Gamble managed to disrupt U.S. intelligence agencies by orchestrating a campaign that was described as “cyber terrorism.” His efforts not only gained him access to highly sensitive information but also left a lasting impact on both his victims and the global cybersecurity landscape.

(Picture: Central News)

Through a series of audacious hacks, Gamble infiltrated the accounts of top U.S. officials, including those of the CIA, FBI, and the Department of Justice. Despite his young age, his ability to manipulate systems and access confidential information underscored the vulnerabilities within some of the world’s most secure institutions. This article delves into the background, motivations, and consequences of Kane Gamble’s unprecedented cyber campaign.

The Background of Kane Gamble’s Cyber Campaign

Kane Gamble’s journey into hacking began in his modest bedroom in Coalville, Leicestershire. Motivated by a combination of political beliefs and youthful rebellion, he set out to challenge the U.S. intelligence community. His anger over U.S. involvement in the Middle East and support for the Palestinian cause fueled his decision to launch a cyber campaign that targeted high-profile figures.

VICTORIA JONES/PA

Between June 2015 and February 2016, Gamble’s targets included John Brennan, the then-chief of the CIA, and Mark Giuliano, the deputy director of the FBI. Through social engineering techniques, he managed to gain access to sensitive documents related to military operations in Iraq and Afghanistan. Gamble’s success was not merely a result of technical expertise but also his audacious persistence and ability to manipulate human vulnerabilities.

Targets and Methods of the Hacks

Gamble’s primary targets included senior officials from the CIA, FBI, and the U.S. Department of Justice. He employed a technique known as “social engineering,” which involves manipulating people into divulging confidential information. By impersonating his victims, Gamble tricked call centers and help desks into granting him access to email and phone accounts. Once inside, he retrieved sensitive documents related to military and intelligence operations in Iraq and Afghanistan.

kaspersky

One of Gamble’s most audacious acts was using the home television of Jeh Johnson, the then-U.S. Secretary of Homeland Security, to display the message “I own you.” He also redirected phone calls made to James Clapper, the former U.S. Director of National Intelligence, to the Free Palestine Movement. These actions demonstrated not only technical prowess but also a desire to intimidate and humiliate his targets.

The Information Leaks and Public Impact

Kane Gamble’s hacking campaign had far-reaching consequences, primarily due to his decision to leak the sensitive information he accessed. Among his most notable actions was the release of details involving 20,000 FBI employees on public platforms, including WikiLeaks. The accompanying message, “This is for Palestine,” highlighted his politically motivated intentions. The leaked data went beyond personal information, extending to military operations and intelligence strategies, making it highly sensitive.

Fronteo

This public dissemination not only compromised the safety of numerous officials but also shook the public’s confidence in the cybersecurity protocols of U.S. intelligence agencies. Many agencies withdrew digital contributions from important networks, causing operational setbacks. The incident became a cautionary tale for government institutions regarding the risks of cyber infiltration and the importance of robust digital security measures.

The Psychological and Emotional Impact on Victims

Gamble’s cyber harassment inflicted lasting emotional and psychological damage on his victims. High-ranking officials, including John Brennan and his family, were subjected to invasive harassment. Disturbing incidents included Kane projecting the message “I own you” onto Jeh Johnson’s home television and leaving an eerie voicemail for his wife, saying, “Hi spooky, am I scaring you?” Such actions blurred the line between virtual threats and real-life intimidation.

Psychologs

Mark Giuliano, the FBI’s deputy director, faced a barrage of harassment, with his passwords reset and his family receiving persistent nuisance calls. As a result, police protection was necessary to safeguard his household. The victims described feeling “seriously violated,” and Judge Haddon-Cave emphasized the grave emotional toll of the campaign. 

Legal Proceedings and Sentencing

In October 2017, Kane Gamble pleaded guilty to eight charges of securing unauthorized access to computers and two charges of unauthorized modification of computer material. During the trial at the Old Bailey in London, the prosecutor highlighted the sophistication and persistence of Gamble’s attacks, as well as the damage caused to the law enforcement community.

Leicester Mercury/BPM MEDIA

The defense argued that Gamble, who was on the autistic spectrum, was “naive” and “childish.” His lawyer contended that he did not intend to harm individuals but rather sought to make a political statement. Despite these arguments, Mr. Justice Haddon-Cave described Gamble’s actions as an “extremely nasty campaign of politically motivated cyber terrorism.” In 2018, Gamble was sentenced to two years in a young offender institution.

The Role of Crackas With Attitude (CWA)

Kane Gamble played a pivotal role as a founding member of the notorious hacking group “Crackas With Attitude” (CWA). The group quickly gained notoriety for its bold cyber intrusions targeting high-ranking officials in the U.S. government, including intelligence agencies like the CIA and FBI. Their cyberattacks exposed critical vulnerabilities in the security infrastructure of government networks. CWA’s actions demonstrated how a small group of determined individuals could bypass sophisticated security systems and gain access to sensitive information.

Security Affairs

By leaking this information on public platforms, they caused widespread disruption and embarrassment for U.S. intelligence agencies. The group’s activities underscored the growing threat posed by unconventional cyber actors who do not fit the mold of traditional, state-sponsored hackers. CWA’s notoriety was a stark reminder to governments worldwide about the evolving nature of cyber threats and the necessity for constant vigilance in securing sensitive data.

Motivations Behind the Hacks

Kane Gamble’s hacking campaign was fueled by a complex mix of political ideology and youthful impulsivity. He was reportedly influenced by discussions in online chat rooms where participants frequently criticized U.S. foreign policies, particularly military actions in the Middle East. Deeply affected by these conversations, Gamble developed strong sympathies for the Palestinian cause. His defense lawyer described his intentions as “naive” and “immature,” arguing that he genuinely believed his cyber activities could influence U.S. policy decisions.

Esilo

Despite his lack of malice toward individuals, Gamble’s actions demonstrated a failure to comprehend the far-reaching consequences of his cyber intrusions. His case highlighted how online radicalization, even when not linked to violence, can motivate individuals to engage in disruptive activities. It served as a cautionary tale about the influence of digital communities on impressionable minds and the risks posed by politically motivated cyber campaigns.

The Impact on U.S. Intelligence and Law Enforcement

The cyber breaches orchestrated by Kane Gamble had significant repercussions for U.S. intelligence and law enforcement. Sensitive information leaked during the hacks led to agencies withdrawing their contributions from key intelligence-sharing portals, thereby diminishing their overall effectiveness. These breaches exposed vulnerabilities not only in cybersecurity systems but also in procedural safeguards. The case served as a stark wake-up call, underscoring the urgent need for stronger cybersecurity measures and better protection against social engineering tactics.

Dni.gov

In response, intelligence agencies had to reassess their security frameworks, placing greater emphasis on safeguarding sensitive data from unconventional threats. The fallout highlighted the necessity for a proactive approach to counter future cyber intrusions. Gamble’s campaign illustrated how a single individual, leveraging technical skills and manipulation, could disrupt some of the most secure institutions in the world, making it clear that cybersecurity must continually adapt to evolving threats.

The Ethical and Legal Implications

Kane Gamble’s case brought important ethical and legal issues surrounding hacking to the forefront. On one hand, some view hackers like Gamble as digital activists or “hacktivists” who challenge the status quo to raise awareness about political or social causes. On the other hand, many regard such individuals as criminals who violate privacy, compromise security, and cause widespread disruption.

Tetratech.com

Gamble’s actions blurred the line between political activism and cybercrime, raising questions about how society should perceive and penalize cyber intrusions driven by ideological motives. The case highlighted the need for clear and updated legal frameworks to address emerging cyber threats. While traditional criminal laws can be applied to hacking cases, they may not fully capture the complex motivations behind cyber campaigns. Addressing these ethical dilemmas requires a balanced approach that considers the intent, impact, and technological landscape in which these crimes occur.

The Role of Social Engineering in Cybersecurity

A significant factor behind Kane Gamble’s success in breaching U.S. intelligence networks was his use of social engineering tactics. Unlike traditional hacking, which focuses on technical vulnerabilities, social engineering involves manipulating individuals to gain unauthorized access to information or systems. Gamble skillfully exploited human psychology, convincing employees to reveal sensitive details or provide access credentials. This case served as a powerful reminder of the importance of human factors in cybersecurity.

neit.edu

Even the most advanced technical defenses can be rendered ineffective if employees are not trained to recognize and respond to social engineering attempts. Organizations must adopt comprehensive security protocols, including employee education and multi-factor authentication systems, to safeguard against these threats. The case highlighted the critical need for a holistic approach to cybersecurity that combines technological measures with vigilant, well-informed personnel.

The Response from Authorities

The arrest of Kane Gamble in February 2016 marked a significant victory for international cooperation in the fight against cybercrime. The FBI, in collaboration with British law enforcement, played a crucial role in tracking down and apprehending the teenager after his campaign against high-ranking U.S. intelligence officials. The case highlighted the complex challenges authorities face when dealing with young but highly skilled offenders involved in sophisticated cyber activities.

Photograph: Carolyn Kaster/AP

Despite his age, Gamble’s actions were taken seriously, reflecting the potential damage a single individual can inflict on global intelligence networks. The case also emphasized the need for international collaboration to address cross-border cyber threats. As cybercrimes become increasingly globalized, law enforcement agencies must continue to work together to develop more efficient strategies for identifying, investigating, and prosecuting those responsible for digital intrusions, regardless of their age or location.

The Rehabilitation and Future of Kane Gamble

At the time of his sentencing, Kane Gamble was 18 years old and preparing for his GCSE exams, a turning point in his young life. His defense argued for a suspended sentence, highlighting his potential to make positive contributions to society through a career in computer studies. The court acknowledged his technical skills, raising important questions about how to rehabilitate young offenders involved in cybercrimes.

The Sun

Should individuals like Gamble be punished harshly or guided toward productive paths that leverage their talents? The case underscored the role of education and mentorship in transforming potentially destructive skills into valuable assets for the digital age. Rehabilitation programs tailored to young cyber offenders can help channel their expertise into ethical and constructive endeavors. Gamble’s story serves as a reminder that with the right guidance, young individuals who stray into cybercrime can still achieve positive outcomes.

Lessons Learned and Cybersecurity Measures

The case of Kane Gamble provides critical lessons for individuals, organizations, and governments. It serves as a stark reminder of the vulnerabilities inherent in digital systems and the importance of robust cybersecurity measures. Employee training emerged as a key factor, as many of Gamble’s successes were due to social engineering tactics rather than technical exploits. Organizations must invest in educating their personnel on recognizing and responding to manipulation attempts.

 

Arkose labs

Additionally, the case highlighted the necessity of international cooperation in combating cyber threats, as the FBI’s collaboration with British authorities was instrumental in Gamble’s arrest. Governments and businesses must continue to develop stronger security protocols and remain vigilant against emerging threats. Ultimately, the incident underscores the need for a proactive, multi-faceted approach to cybersecurity that combines technological defenses, human awareness, and global partnerships.

Related Blogs
image_1
Scientists Have Built a Functional Synthetic Brain
image_1
Could Gravity Be a Glitch in The Universal Simulation?
image_1
Understanding the Singularity in AI and Technology
image_1
How Generative AI is Contributing to Climate Change
image_1
The Mystery of Captain Nemo's Nautilus - Fact and Fiction
image_1
Unlocking the Mysteries of Da Vinci's Coded Journals
image_1
First Looks at Pixar's Most Anticipated 2026 Releases
image_1
Pixar's Full 2026-2028 Slate - Every Upcoming Movie and Show Revealed
image_1
10 Animated Movies Coming In 2026 Fans Are Most Excited For
image_1
16 Famous Lesbian and Sapphic Couples Who Made Fans Believe in Love in 2025
image_1
The 20 Most Famous Gay Actors of All Time
image_1
What You Don't Know About the Planet Jupiter
image_1
Why the Mona Lisa is the World's Most Famous Painting The Mona Lisa stands as one of the greatest treasures in art history. Painted by Leonardo da Vinci in the early 1500s, this small portrait has captured the imagination of millions. Its enigmatic smile, subtle techniques, and dramatic story have made it the most recognized painting on Earth. Via History Valued at nearly one billion dollars today, it draws huge crowds at the Louvre Museum in Paris. But what makes this artwork so special? Why does it hold such fame? The answer lies in a mix of genius, history, mystery, and an unexpected theft that changed everything. The Bold Theft of 1911 On the morning of August 21, 1911, Paris was busy as usual. People rushed to work while three men quietly left the Louvre Museum. They had spent the night hidden inside. Under a blanket, they carried the Mona Lisa. Via ny times They walked to a nearby train station, caught the 8:45 train, and escaped. The world did not know right away that the most famous painting had been stolen. This daring crime shocked everyone and later played a big role in building the painting's global fame. Leonardo da Vinci - The Master Behind the Masterpiece Leonardo da Vinci painted the Mona Lisa starting around 1503. He was a true genius of the Renaissance period. Not only an artist, but he also excelled in many fields. He designed machines, studied science, built sculptures, planned buildings, and explored nature deeply. Via NBC News His interests ranged from human anatomy to birds in flight, from water flow to rock formations. Da Vinci's curiosity knew no limits. He left thousands of notebook pages filled with drawings and ideas. The Mona Lisa became his most enduring work, showing his skill at its peak. Identifying the Enigmatic Woman For centuries, people wondered who the woman in the portrait was. Early records pointed to Lisa Gherardini, wife of a wealthy Florence silk merchant named Francesco del Giocondo. An Italian writer in 1550 first named her clearly. Via Antica Torre di Via Tornabuoni 1 He said Francesco commissioned the painting to celebrate family events. This explanation fits the timeline well. Modern research has found old documents supporting this view. Family connections between da Vinci and the Giocondos strengthen the case. Origins of the Famous Names The painting has two main names. "Mona Lisa" comes from Italian words meaning "Madam Lisa." Over time, spellings changed from "Madonna" to "Monna" and then to "Mona" in English. The second name, "La Gioconda," links to her married surname. In Italian, "gioconda" means joyful or cheerful. This matches her subtle smile perfectly. In France, it became "La Joconde." These names reflect her identity and the light-hearted mood da Vinci captured. Via Art & Object Despite early records, doubts lingered for years. Some believed the woman was da Vinci's own mother. Others thought she came from noble Italian families. A popular modern idea claimed it was a self-portrait of da Vinci dressed as a woman. In the late 1980s, computer overlays tried to prove facial matches. However, such methods can make any two faces seem similar. Careful historical research has now settled the debate firmly in favor of Lisa del Giocondo. Strong Evidence from Modern Research A dedicated scholar spent 25 years examining old Florence archives. By 2004, he uncovered solid proof. Marriage records showed Lisa wed Francesco in 1495 at age 16. Family ties linked da Vinci's father closely to Francesco. The painting likely marked either a new home purchase in 1503 or the birth of their second son late in 1502. A sad note: Lisa had lost a baby girl in 1499. The thin veil on her hair may symbolize mourning for that loss. Via Britannica Both da Vinci and his subject were Italian, yet the painting lives in France. In 1516, French King Francis I invited the aging artist to his court. Da Vinci accepted and moved across the Alps. He brought unfinished works, including the Mona Lisa. He continued refining it for years. Da Vinci died in France in 1519. The king acquired the portrait for his royal collection. It stayed with the French rulers until the Revolution. Impact of the French Revolution During the late 1700s, France faced massive change. The 1789 revolution ended royal rule. Palaces opened to the public. In 1797, many royal artworks moved to the new Louvre Museum. The Mona Lisa joined this public display. It became part of France's national heritage, available for all to see. Via Paris Tickets The 1911 thief was Vincenzo Peruggia, an Italian museum worker. He felt strongly that Italian art belonged in Italy. With two helpers, he hid overnight in the Louvre. Morning arrived, and he simply walked out carrying the painting. Peruggia took it home to Italy, believing he was returning a national treasure. Unique Features of the Painting The Mona Lisa surprises with its modest size: only 77 centimeters tall and 53 centimeters wide. Da Vinci painted on poplar wood, a common Italian choice then. Unlike earlier full-figure portraits, this half-length close-up felt fresh and modern. It focused attention directly on the subject's face and expression. Via Through Eternity Tours The painting appears muted in browns and yellows. Protective varnish layers guard the wood from humidity damage. Natural aging has faded the original bright tones. Some recreations suggest it once glowed with stronger blues and greens in the background landscape. Da Vinci pioneered sfumato, a soft blending method. Colors merge without hard lines. The Italian valley background flows gently into the figure. Hair edges dissolve into distant hills. This creates depth and mystery throughout the composition. The smile remains the greatest puzzle. Via art journey Paris Stare directly at the mouth: it looks almost flat and serious. Shift gaze to the eyes or elsewhere: the smile grows warmer. Da Vinci used subtle shadows to achieve this shifting effect. He worked tirelessly to perfect these delicate curves. Deep Studies in Anatomy To capture facial movement, da Vinci studied human bodies closely. He spent nights in hospitals dissecting cadavers. He mapped tiny muscles around the lips and eyes. His notes describe how many muscles control human expressions compared to animals. He even examined horses for similar muscle patterns. Via All That’s Interesting Da Vinci explored optics and eye function. Central vision sees sharp details; side vision catches shadows better. He painted shadows so the smile strengthens in peripheral view. Direct focus flattens the mouth line, while corners lift softly when seen indirectly. The Puzzle of a Second Version Evidence suggests da Vinci worked on two similar portraits. A 1504 sketch by fellow artist Raphael shows columns missing from the Louvre version. In 1914, another painting surfaced near London. Called the Isleworth Mona Lisa, it appears larger with visible columns. The second version shows a younger-looking woman. Her head tilts forward slightly. The smile feels direct rather than mysterious. Via ABC News Background columns match Raphael's early drawing. Experts debate whether da Vinci painted both fully or left one for assistants to complete. Some believe the Isleworth version is an early experiment. Others argue da Vinci finished the face and hands, while workshop members added the rest. Scientific tests continue, but no final proof exists. The mystery adds another layer to the story. Aftermath of the Theft Peruggia hid the painting for two years. Growing impatient, he contacted a Florence art dealer. The dealer recognized the Louvre marks and alerted authorities. Police arrested Peruggia quickly. He served a short prison term. The Mona Lisa returned to Paris in early 1914. Crowds celebrated its recovery. Today, bulletproof glass shields it. Strict controls maintain exact temperature and humidity levels for preservation. Via Smithsonian Magazine Before 1911, the painting enjoyed respect among art experts but little public fame. Newspapers worldwide covered the theft for years. Suddenly, everyone knew the Mona Lisa. The crime turned a respected artwork into a global icon. Millions visit the Louvre yearly to glimpse the small portrait. Its combination of technical brilliance, historical drama, and unsolved questions keeps interest alive. The smile continues to fascinate new generations. A Legacy Beyond Art The Mona Lisa represents human curiosity and achievement. Da Vinci's endless search for perfection shines through every detail. From a quiet Renaissance studio to a crowded modern museum, its journey mirrors changes in society and culture. Via BBC No other painting matches this blend of skill, story, and surprise. Genius creation, royal ownership, revolutionary display, nationalist theft, and media explosion all built its status. The Mona Lisa proves that sometimes fame arrives through unexpected paths. Explore the Mystery of the Mona Lisa's Fame The Mona Lisa is the world's most famous painting because of a perfect blend of genius, mystery, and unexpected events. Leonardo da Vinci's brilliant techniques, like sfumato blending and clever shadow play, created an elusive smile that shifts with every look. His deep studies of anatomy and optics made the portrait feel alive and puzzling. Via LearningMole The painting's history adds drama: from a private Italian commission for Lisa del Giocondo, to French royal ownership, public display after the revolution, and a possible second version still debated today. But the real turning point was the 1911 theft by Vincenzo Peruggia. Before that, it was respected but not world-famous. The two-year global hunt and headlines turned it into a sensation. Now safely behind bulletproof glass in the Louvre, it attracts millions yearly. People come not just for beauty, but for the questions it raises: who was Lisa feeling? Why does her expression change? These mysteries keep it fresh after 500 years. In the end, da Vinci's small wooden panel became iconic through talent, timing, and drama. It proves great art can capture hearts forever, smiling quietly at everyone who stops to wonder.
image_1
Why Aligning AI with Human Values is Crucial
image_1
Artificial General Intelligence - Hype vs. Reality
image_1
The Rise of Generative AI - A New Era Begins
image_1
Key Events Predicted to Occur Before the 2045 Singularity
image_1
How Big is the Universe? The Mind-Bending Answer
image_1
North Korea Unveils a New "Nuclear-Powered" Submarine
image_1
The Top Reasons the U.S. Relies on Its Submarine Fleet
image_1
The Extreme Engineering of Nuclear-Powered Submarines
image_1
Oppenheimer - Hero, Villain, or Something More?
image_1
How Metamaterial "Wormholes" Could Transform MRI Scale
image_1
The Physics Behind Interstellar Travel Explained
image_1
The Top 10 Christmas Movies Ever Made
image_1
The Two Atomic Bombings That Changed History
image_1
Hiroshima and Nagasaki - The Bombs That Ended the War
image_1
The Surprise Attack That Brought America into WWII
image_1
What Happened at Hiroshima - The Atomic Bombing
image_1
A Timeline of the Hiroshima Atomic Bombing
img_0
The Signs of a Potential Second Israel-Iran War
image_1
Where Israel's Efforts Against Iran Fell Short
image_1
From Shadow War to Direct Conflict - Israel vs. Iran
image_1
Understanding Iran's Hostility Toward Israel and America
image_1
The Iran-Israel Standoff and the Nuclear Question
thumbnail - 2025-12-22T164538
The History of Christmas - Origins and Traditions
image_1
Finding Endurance - The Ship Lost for 106 Years
image_1
How Shackleton's Crew Survived the Antarctic
image_1
The Technical Failures of Boeing's Starliner Capsule
image_1
A Guide to Boeing's Starliner Capsule and Missions
image_1
How D.B. Cooper Pulled Off the Perfect Skyjacking
image_1
The Last Generation of a Drowning Nation
image_1
How Tuvalu is Using the Metaverse to Preserve Itself
image_1
How Climate Change is Drowning Tuvalu
image_1
The Existential Threat Facing the Nation of Tuvalu
image_1
Why Tuvalu Could Disappear Within 25 Years
image_1
10 Nostalgic TV Stars Who Embraced Their LGBTQ+ Identity
image_1
Understanding MLM and WLW Identities and Terms
image_1
Did Andrew Tate Say Men with Girlfriends Are Gay?
image_1
Who is Stranger Things Star Maya Hawke Dating?
image_1
Italy Returns Stolen Artifacts Predating the Indus Valley
image_1
The Great Pyramid of Giza and Its Secrets
image_1
How the Ancient Pyramids Were Really Built
image_1
Bigfoot, Nessie, and the Psychology of Cryptids
image_1
How Genetic Science Explained the Yeti Legend
image_1
John Allen Chau - The Failed Body Recovery Mission
image_1
Time Travel - A Scientific Breakdown of Its Potential
image_1
The Strange Story of Time Traveler Andrew Carlssin
image_1
Could a Time Traveler from the Year 2256 Be Real?
img_0
Surviving a Plane Crash and the Amazon Alone
image_1
The Girl Who Fell from the Sky and Lived
image_1
Juliane Koepcke - The Girl Who Fell from the Sky
image_1
Sudan's War and the Two Men Leading It
image_1
The Rival Generals Fueling Sudan's Conflict
image_1
The Sudan Emergency - A Guide to the Situation & Support
image_1
The Truth About the Power Struggle in Sudan
image_1
The Tech Protecting Japan from Natural Disasters
image_1
Earthquakes in Japan - Causes and Measurement
image_1
How Tsunamis Make Japan a High-Risk Nation
image_1
Lost Maya City Discovered After 3,000 Years in Guatemala
image_1
A Simple Guide to the Maya Calendar
image_1
The Rise and Fall of the Maya and Their Gods
image_1
Exploring the Mysteries of a Mayan City
image_1
The Origin of the First Humans Explained
image_1
Moon's Birth - From a Giant Impact to a New World
image_1
The Science of Planet Formation Explained
image_1
From a Dust Cloud to Planets - the Solar System's Origin
image_1
How Earth Formed - A 4.6-Billion-Year History
image_1
China's Five-Year Plans - A Tool for Global Influence
image_1
A Comprehensive Guide to China's History
image_1
The Policy Shifts That Made China an Economic Giant
image_1
The Rise of China as a World Superpower
img_0
How Flight 571 Survivors Endured 72 Days
img_0
The Miracle of the Andes - Survival of Flight 571
img_0
How Malaysia Airlines Flight 370 Vanished
img_0
The Unsolved Disappearance of Malaysia Airlines 370
img_0
The Engineering Story of the Burj Khalifa
img_0
Burj Khalifa - Key Facts and Must-Know Details
img_0
How the Burj Khalifa Redefined Skyscraper Limits
img_0
The September 11th Attacks - Key Facts and Timeline
img_0
The Sinking of the Costa Concordia Cruise Ship
img_0
A Jurassic World Experience Opens Soon in Thailand
img_0
De-Extinction Plan for 11-Foot-Tall Moa Birds
img_0
From Cities to Islands - Perfect Solo Trips
img_0
Billions of Years of Radiation Altered a Comet
img_0
Ozone Layer on Track to Heal Completely by 2066
img_0
Using LEDs to Destroy Tumors, Not Healthy Cells
img_0
This Supplement May Lower Aggression by 28%
img_0
New Study Challenges Fasting Beliefs
img_0
Solar Power Subsea Cable from Australia to Singapore