Headlines
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.
  • Propagandist journalists are seen as the true journalists by autocratic rulers and populist leaders worldwide, as they serve as the government's cheerleaders.
  • Globally, populist and nationalist leaders passed draconian laws to punish journalists under the guise of "fake news" or "not in the national interest."
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages and news.
  • Check Google Images for Authenticity. The Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • It is a horrible crime to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.

Tag: Cross Border Terrorism

April 3, 2021

IS Operatives in Syria

IS Operatives Behind More Than 40 Killings Since January in Syrian Camp TEASER: US-backed Syrian Democratic Forces, who used 5,000 personnel last week to crackdown on Islamic State (IS) sleeper cells in Syria’s al-Hol camp, say the Islamist group has killed 47 camp residents since January

December 18, 2020

Islamic State in 2020

A year after its territorial defeat in Iraq and Syria, the Islamic State (IS) managed to mount dozens of deadly attacks in 2020 around the world from the Middle East to Africa to Europe

November 24, 2020

The Nine Journalists of a Catholic ...

The Community Radio Forum “was able to provide logistical support to all journalists in order to reach the relatively safe areas of Namialo, Montepuez and Pemba”.
The last two journalists of the group arrived in safety on November 16 and “are already meeting their relatives in the district of Montepuez”

October 29, 2020

Indonesia Mum on Fate of Uyghur Pri...

Two experts told BenarNews last week – citing security sources whom they declined to identify – that the trio and one other Uyghur convict had been deported to China, where authorities are believed to have held close to 2 million Uyghurs and other Muslim minorities in internment camps, which the United States and several other nations have sharply criticized.

August 2, 2020

Khalid Sheikh Mohammed Case: The 9/...

The phenomenal case to be examine in relation to international and national norm is that of Islamist militant Khalid Sheikh Mohammed, al-Qaeda’s brainbox and architect of the September 11 attacks on the World Trade Center and the Pentagon in 2001.

July 26, 2020

The Controversial Return of Shamima...

On September 24, 2014, the United Nations Security Council, expressing grave concern about the increasing threat posed by foreign terrorist fighters and by individuals who are recruited by the so-called Islamic State (IS, also known as ISIL or ISIS); the Al-Nusrah Front; and other cells, unanimously adopted Resolution No. 2178 of 2014 condemning such groups and individuals. The Resolution was adopted under chapter VII of the UN Charter and is binding on the Member States

May 31, 2020

Burkina Faso Shaken by Jihadist Con...

A hundred people, made up of the clergy, catechists and their families, were evacuated to Dori and housed in the structures of the Cathedral. A number that is added to the displaced people of the past months from the two parishes previously closed

May 29, 2020

Policing the Next Enemy: From Cyber...

The availability of security device and software in the black market is a prerequisite for the perpetration of cybercrimes such as credit card theft, online scams or identity theft. Cybercriminals and terrorists have a great advantage to coordinate large scale attacks and crimes with the help of information and communication technologies with minimal effort such as generating funds from small value transactions in order to finance terrorist attacks (Webb & Tomalewicz, 2016). The speed and anonymity of cyber-attacks makes it distinctive among perpetrators (terrorists, criminals, and nation states). Jihadist tendencies usually require little finance, for example the United Nations evaluated London bombings in 2005 at around $14,000, while the French Finance Minister Michel Sapin evaluated that of the Paris attacks in November 2015 to approximately $32,000. Contrary to coordinated attacks of 9/11 which were reported to have cost between $400,000 and $500,000 according to the final report of the National Commission on Terrorist Attacks. There has been a large increase in the volume of cyber-attacks by organised criminal networks

March 27, 2020

Terrorists In India Are Using Onlin...

The NIA found that the youth chemicals like ammonium powder for making IEDs, batteries, clothing and other accessories were bought by him from Amazon using his online shopping account on the retailer’s platform. He disclosed to the NIA sleuths that he was acting on the directions of Pakistan based terrorist organization Jaish-e-Mohammad

February 6, 2020

Bangladeshi Militant Chief Escapes ...

Salahuddin Salehin is wanted for murder in Bangladesh and for a bomb blast at an Indian temple in 2018. He fled to India after escaping from a prison van in 2014 when militants mounted a daring daylight rescue that killed a police officer and wounded two others

Top

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies"> Cookie Policy </a> more information

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Close