Headlines
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.
  • Propagandist journalists are seen as the true journalists by autocratic rulers and populist leaders worldwide, as they serve as the government's cheerleaders.
  • Globally, populist and nationalist leaders passed draconian laws to punish journalists under the guise of "fake news" or "not in the national interest."
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages and news.
  • Check Google Images for Authenticity. The Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • It is a horrible crime to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.

More Details

Terrorists In India Are Using Online Methods To Purchase Chemicals For Making Bombs – Indian Security Authorities Believe So

By Debdutta Ghosh

The Phulwama, Kashmir, terrorist attack in which 40 security personnel were killed when a car laden with explosives was rammed into a convoy of security personnel in February 2019. 

More than a year later, sleuths of the National Investigation Agency (NIA) probing the attack, came to know that the materials that were used to make the car bomb for the attack were bought by terrorists from an online retailer – Amaozn.com. 

This was first instance that Indian security forces found that online shopping platforms were being used by terrorists in India to make such purchases to avoid suspicion as well as policing that would have been possible otherwise.   

The information was fist shared with the India investigators by Amazon, informing the NIA about a buyer who used the site to buy ingredients for the making improvised explosive device (IED). The NIA used the details of the customer provided by Amazon such as the details of the online account on Amazon and traced them back to a 19-year-old in Srinagar, India, and arrested the youth. 

The NIA found that the youth chemicals like ammonium powder for making IEDs, batteries, clothing and other accessories were bought by him from Amazon using his online shopping account on the retailer’s platform. He disclosed to the NIA sleuths that he was acting on the directions of Pakistan based terrorist organization Jaish-e-Mohammad. 

Following this, the sleuths investigating the terrorist attacks realised that terrorist organizations were brainwashing young people – some in their teens in Kashmir, and roping them in for making online purchases, including chemicals used for manufacturing explosives.

This is however not the first instance that online retailing service3s had been used by terrorists to purchase materials and components that were later used in terrorist attacks. This new tactic by terrorists had been witnessed earlier in the western countries. 

For example, Salman Abedi – the perpetrator behind the Ariana Grande concert attack in Manchester in 2017, was helped by his cousin who bought some of the chemicals from Amazon that Abedi used to build the bomb he later used in the attack. 

On the other hand, firearms and ammunition were brought form online platforms by Brenton Tarrant days before he attacked a mosque in New Zealand 

Similarly, a number of different online retailing platforms have been used earlier by terrorist organization ISIS for purchasing of drones for bombings. Such purchases were made in different countries and were then shipped to Syria. 

This trend therefore presents a new challenge for law enforcement agencies about detecting how terrorists use funds, and what for. Many however also see this as an opportunity as it can be a source of suspicion to be detected. However this mode of acquiring materials for terrorist attacks can become a part of the financial tradecraft of terrorists which shows how complex the process has potentially become. 

Further, when terrorists turn to the internet for purchasing could also reduce opportunities for members of the public to detect and report suspicious activity – which can be a very important tool for fighting terrorism. For example, a planned terrorist plot was foiled in the in the United Kingdom after an alert shopkeeper informed security agencies about a man making fertilizer purchases.

This trend however is very new for India and was used in one of the biggest terrorist attacks in the country. But sleuths and security agencies now need additional tactics, intelligence and skills to man online purchasing portals to prevent such activities in the future. 

Subscribe Our You Tube Channel

Fighting Fake News

Fighting Lies






Related Article

From Burkina Faso to Northern Benin,…

A recent report found that, as the country has become the new front line in the Sahel conflict, more ...
January 17, 2023

A New Attack on a Cillage…

The attack on December 30 on the village of Namande, in the district of Muidumbe, province of Cabo D ...
January 3, 2023

30 More Kidnapped Nigerian Students Freed:…

Gunmen in northwest Nigeria's Kebbi state have freed 30 students and a teacher after seven months of ...
January 10, 2022

Over a Dozen People Are Killed…

On Thursday, the Islamic State terror group attacked two Kurdish towns in northern Iraq, killing ove ...
December 4, 2021

Fear of Bandits Causes Low Attendance…

Following a two-month closure due to insecurity, Nigerian authorities have reopened schools in north ...
September 29, 2021

“Regional Efforts Are Needed to Stop…

The support of neighboring states in the fight against the terrorists of the ADF/MTM (Allied Democra ...
September 12, 2021

Other Article

News & Views

Timor-Leste Seeks Economic Lifeline as Oil…

Timor-Leste, also known as East Timor, has made significant strides since its tumultuous birth in 20 ...
May 1, 2024
Video Report

South Africa Prepares to End Lion…

From allowing captive-bred lion hunting to selling lion bones to East Asia for their alleged "medici ...
Pick of the Day

UN Secretary-General Meets with Working Group…

United Nations Secretary-General António Guterres meets with the Working Group on Discrimination ag ...
April 30, 2024
Video Report

On Both US Coasts,Pro Palestinian Encampment…

Despite college administrations' warnings, anti-Gaza war protests on campuses are still going strong ...
News & Views

Philippine Police Arrest 3 Suspects Over…

Police in the Philippines have arrested three men suspected in the killing of community radio broadc ...
News & Views

In Tibet, Parents Plead for Children…

It’s caterpillar fungus harvesting season in Tibet, and parents have staged protests urging Chines ...

[wp-rss-aggregator feeds="crime-more-world"]
Top

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies"> Cookie Policy </a> more information

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Close