Headlines
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.
  • Propagandist journalists are seen as the true journalists by autocratic rulers and populist leaders worldwide, as they serve as the government's cheerleaders.
  • Globally, populist and nationalist leaders passed draconian laws to punish journalists under the guise of "fake news" or "not in the national interest."
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages and news.
  • Check Google Images for Authenticity. The Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • It is a horrible crime to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.

Tag: Terror Watch

October 29, 2020

Indonesia Mum on Fate of Uyghur Pri...

Two experts told BenarNews last week – citing security sources whom they declined to identify – that the trio and one other Uyghur convict had been deported to China, where authorities are believed to have held close to 2 million Uyghurs and other Muslim minorities in internment camps, which the United States and several other nations have sharply criticized.

September 17, 2020

Release of Torture Videos Prompts D...

Amnesty International says it has obtained videos showing Mozambic’s security forces torturing and abusing militants. The advocacy group is calling for independent investigations, but the spokesperson for Mozambique’s Defense Ministry says the videos shouldn’t be taken seriously

August 30, 2020

Kidnapping and Hostage Taking in th...

Kidnapping and hostage-taking is a criminal strategy used by terrorist and religious extremism to inflict heavy psychological burden on family relations, and to expose challenges of human security by the state and its security machinery. The profile of those or individual abducted, generates an anxiety and fear to the community; how secured is the community?

August 2, 2020

Khalid Sheikh Mohammed Case: The 9/...

The phenomenal case to be examine in relation to international and national norm is that of Islamist militant Khalid Sheikh Mohammed, al-Qaeda’s brainbox and architect of the September 11 attacks on the World Trade Center and the Pentagon in 2001.

July 26, 2020

The Controversial Return of Shamima...

On September 24, 2014, the United Nations Security Council, expressing grave concern about the increasing threat posed by foreign terrorist fighters and by individuals who are recruited by the so-called Islamic State (IS, also known as ISIL or ISIS); the Al-Nusrah Front; and other cells, unanimously adopted Resolution No. 2178 of 2014 condemning such groups and individuals. The Resolution was adopted under chapter VII of the UN Charter and is binding on the Member States

May 29, 2020

Policing the Next Enemy: From Cyber...

The availability of security device and software in the black market is a prerequisite for the perpetration of cybercrimes such as credit card theft, online scams or identity theft. Cybercriminals and terrorists have a great advantage to coordinate large scale attacks and crimes with the help of information and communication technologies with minimal effort such as generating funds from small value transactions in order to finance terrorist attacks (Webb & Tomalewicz, 2016). The speed and anonymity of cyber-attacks makes it distinctive among perpetrators (terrorists, criminals, and nation states). Jihadist tendencies usually require little finance, for example the United Nations evaluated London bombings in 2005 at around $14,000, while the French Finance Minister Michel Sapin evaluated that of the Paris attacks in November 2015 to approximately $32,000. Contrary to coordinated attacks of 9/11 which were reported to have cost between $400,000 and $500,000 according to the final report of the National Commission on Terrorist Attacks. There has been a large increase in the volume of cyber-attacks by organised criminal networks

March 27, 2020

Terrorists In India Are Using Onlin...

The NIA found that the youth chemicals like ammonium powder for making IEDs, batteries, clothing and other accessories were bought by him from Amazon using his online shopping account on the retailer’s platform. He disclosed to the NIA sleuths that he was acting on the directions of Pakistan based terrorist organization Jaish-e-Mohammad

February 12, 2020

Kenya Vows Security After al-Shabab...

Kenya has stepped up security on the road that connects northeast Lamu County to the rest of Kenya after al-Shabab terrorists killed three people on a public bus in January. The attack is the second on public transportation near the border with Somalia in as many months

February 6, 2020

Bangladeshi Militant Chief Escapes ...

Salahuddin Salehin is wanted for murder in Bangladesh and for a bomb blast at an Indian temple in 2018. He fled to India after escaping from a prison van in 2014 when militants mounted a daring daylight rescue that killed a police officer and wounded two others

November 28, 2019

Northern Iraq Sees Surge of IS Viol...

Islamic State militants have increased their activity in some northern Iraqi provinces. Local residents say IS recently kidnapped and threatened to kill civilians in the area, forcing many to flee their homes

Top

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies"> Cookie Policy </a> more information

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Close