Headlines
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.
  • Propagandist journalists are seen as the true journalists by autocratic rulers and populist leaders worldwide, as they serve as the government's cheerleaders.
  • Globally, populist and nationalist leaders passed draconian laws to punish journalists under the guise of "fake news" or "not in the national interest."
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages and news.
  • Check Google Images for Authenticity. The Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • It is a horrible crime to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.

Category: Cross Border Terrorism

April 3, 2021

IS Operatives in Syria

IS Operatives Behind More Than 40 Killings Since January in Syrian Camp TEASER: US-backed Syrian Democratic Forces, who used 5,000 personnel last week to crackdown on Islamic State (IS) sleeper cells in Syria’s al-Hol camp, say the Islamist group has killed 47 camp residents since January

March 17, 2021

Nigerians Displaced by Boko Haram

Boko Haram militants have terrorized northeastern Nigeria for more than a decade, driving what the United Nations says are more than two million people from their homes

November 24, 2020

The Nine Journalists of a Catholic ...

The Community Radio Forum “was able to provide logistical support to all journalists in order to reach the relatively safe areas of Namialo, Montepuez and Pemba”.
The last two journalists of the group arrived in safety on November 16 and “are already meeting their relatives in the district of Montepuez”

August 30, 2020

Kidnapping and Hostage Taking in th...

Kidnapping and hostage-taking is a criminal strategy used by terrorist and religious extremism to inflict heavy psychological burden on family relations, and to expose challenges of human security by the state and its security machinery. The profile of those or individual abducted, generates an anxiety and fear to the community; how secured is the community?

May 31, 2020

Burkina Faso Shaken by Jihadist Con...

A hundred people, made up of the clergy, catechists and their families, were evacuated to Dori and housed in the structures of the Cathedral. A number that is added to the displaced people of the past months from the two parishes previously closed

May 5, 2020

Zimbabwe Dismisses Reports of Troop...

A communiqué released after the meeting acknowledged that instability in Mozambique was on the agenda. “The two Heads of State addressed the security situation in Cabo Delgado and parts of the Manica Provincesand Sofala where terrorists and armed groups carry out attacks, murders and destruction of public and private infrastructure and strongly condemned these acts, which seek to undermine efforts towards peace and development.”

March 27, 2020

Terrorists In India Are Using Onlin...

The NIA found that the youth chemicals like ammonium powder for making IEDs, batteries, clothing and other accessories were bought by him from Amazon using his online shopping account on the retailer’s platform. He disclosed to the NIA sleuths that he was acting on the directions of Pakistan based terrorist organization Jaish-e-Mohammad

February 6, 2020

Bangladeshi Militant Chief Escapes ...

Salahuddin Salehin is wanted for murder in Bangladesh and for a bomb blast at an Indian temple in 2018. He fled to India after escaping from a prison van in 2014 when militants mounted a daring daylight rescue that killed a police officer and wounded two others

June 6, 2019

Islamic State’s English-Speaking ...

IS supporters first started flocking to Telegram, an instant messaging service that promises speed and encryption for private communications, in 2015 as social media platforms like Twitter and Facebook began a crackdown aimed at Islamic State’s often violent and gory propaganda

April 20, 2019

‘Afghanistan Has Changed̵...

Talk of peace in Afghanistan is ramping up, with the United States and the Taliban negotiating and Kabul preparing to host hundreds of ethnic, religious, and tribal leaders to settle on a road map for ending nearly 18 years of war

Top

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies"> Cookie Policy </a> more information

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Close