Headlines
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages,pictures,Videos and news.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.
  • Check Google Images for AuthThe Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • It is a heinous crime and punishable offence to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.

Tag: Terrorist Organizations

May 1, 2021

Intelligence in the Age of Globalization...

The globalization era has changed the narrative of defense intelligence, with the emergence of a highly interconnected global economy, reshaping international alliances and the incorporation of new technologies. This interconnectivity offers new opportunities, and has also led to new security challenges, such as; regional instability, resulting from jihadist tendencies, migration, and resource capture, which requires new ‘grand strategy’

April 19, 2021

The Role of civil society and...

The socio-economic development of many African nations has been retarded because of the advent of terrorism. Several academic writings relating to global security menace have been published, with considerable narratives on activities of Al Shabaab in the horn of Africa

August 30, 2020

Kidnapping and Hostage Taking in the...

Kidnapping and hostage-taking is a criminal strategy used by terrorist and religious extremism to inflict heavy psychological burden on family relations, and to expose challenges of human security by the state and its security machinery. The profile of those or individual abducted, generates an anxiety and fear to the community; how secured is the community?

August 2, 2020

Khalid Sheikh Mohammed Case: The 9/11...

The phenomenal case to be examine in relation to international and national norm is that of Islamist militant Khalid Sheikh Mohammed, al-Qaeda’s brainbox and architect of the September 11 attacks on the World Trade Center and the Pentagon in 2001.

November 5, 2019

Indonesia Ready for Returning Islamic State...

Indonesian security officials had earlier said at least 100 Indonesian men, women and children were languishing in several Syrian camps

May 11, 2019

Why Does Facebook Fail to Fix...

In late 2016, CEO Mark Zuckerberg infamously dismissed as “pretty crazy” the idea that fake news on his service could have swayed the election. He later backtracked, and since then the company has reduced the amount of misinformation shared on its service, as measured by several independent studies

Top