Stephen E. Arnold: Facebook, WhatsApp, Enabling Crypto-Porn

Commerce, Corruption, IO Impotency
Stephen E. Arnold

Facebook: WhatsApp and In App Payment

I noted two developments which Facebook may roll out.

The first is the story in Newsweek “WhatsApp Child Porn Groups Exposed.” WhatsApp is an encrypted messaging service. As pressure on “old school” Dark Web sites continues to escalate, bad actors are looking for new, easy ways to communicate, share, and locate information that is of interest to them. Encryption, according to many investigators, allows bad actors to go dark. The authorities are, therefore, blind to potentially useful information. The write up suggests that Facebook is taking some action. The article said:

Facebook said working with police may be their best option to combat the material.

The second item concerns transacting, buying, and selling within WhatsApp. I noted “Facebook Explores Blockchain Tech For WhatsApp Money Transfers.” According to the write up:

Read full post.

Betty Boop: Two Drones Shut Down Key Airport — Over & Over…. UPDATE 2

Drones & UAVs, Government, Ineptitude, Law Enforcement, Military

now multiply by 100, choosing key Western cities…

Holiday chaos as drones shut London’s Gatwick Airport

Phi Beta Iota: The West assumes impunity from interruption and is not ready for asymetric rear area attacks. An electromagnetic pulse gun in a helicopter would have been able to fry these drones on the spot. In a worst case a machine gunner, shooting downwards.  No one wants to think about this stuff….too inconvenient.

Continue reading “Betty Boop: Two Drones Shut Down Key Airport — Over & Over…. UPDATE 2”

Stephen E. Arnold: Do It Yourself Neural Network

Advanced Cyber/IO
Stephen E. Arnold

DIY Neural Network Could Be First Step In Big Change

The once complex is beginning to become easy.

Data scientists make a lot of comparisons between the network of neurons in our brain and the way big data search operates. We tend to think that’s a pretty good comparison. So, when we discovered someone came up with a way to build a neural network from scratch, the armchair brain surgeon in us couldn’t resist. We learned more from a recent Toward Data Science piece, “How to Build Your Own Neural Network from Scratch in Python.”

According to the piece:

Read full post.

Stephen E. Arnold: Deep Fakes – AI Shows Its Hand in Creating the Matrix

Advanced Cyber/IO, IO Impotency
Stephen E. Arnold

Deep Fakes: Technology Is Usually Neutral

Ferreting out fake news has become an obsession for search and AI jockeys around the globe. However, those jobs are nothing compared to the wave of fake photos and videos that grow increasingly convincing as technology helps to iron out the wrinkles. That’s a scary prospect to more than a few experts, as we discovered in a recent MIT Technology Review article, “Deepfake Busting Apps Can Spot Even A Single Pixel Out of Place.”

According to the story:

Continue reading “Stephen E. Arnold: Deep Fakes – AI Shows Its Hand in Creating the Matrix”

Stephen E. Arnold: The Weaponization of Social Media — #GoogleGestapo

IO Deeds of War, IO Impotency
Stephen E. Arnold

Quote to Note: Experts from UK Take a Look at US Social Media

I read “Silicon Valley’s ‘Belated and Uncoordinated’ Efforts at Dealing with Russian Fake News Revealed.” The report was created by experts in the UK and leaded to the Washington Post.

Here’s a quote which suggests the principal finding:

“Social media have gone from being the natural infrastructure for sharing collective grievances and coordinating civic engagement to being a computational tool for social control, manipulated by canny political consultants and available to politicians in democracies and dictatorships alike,” the authors of the report wrote.

The idea is that technology is neutral until a person figures out how to use it as a weapon or to his or her advantage.

Continue reading “Stephen E. Arnold: The Weaponization of Social Media — #GoogleGestapo”

Martin Armstrong: The Use of False Flags to Increase Power

07 Other Atrocities, 09 Terrorism, 10 Transnational Crime, Corruption, Government, IO Deeds of War, Law Enforcement, Media, Military, Peace Intelligence

The Use of False Flags to Increase Power

Historically, Hitler used a very famous event that was the origin of the term “False flag” back in 1933 to reinforce his power. The German False flag used by Hitler was known as the Reichstag Fire. Hitler had a problem. He won less than 35% of the vote. The Reichstag Fire was an arson attack on the German parliament in Berlin on February 27th, 1933, one month after Adolf Hitler was sworn in as Chancellor of Germany. Hitler’s government claimed it was set by Communists because the 1918 German Revolution which installed the Weimar Republic and resulted in the hyperinflation was a Communist movement which even asked the Russian to take Germany.

Continue reading “Martin Armstrong: The Use of False Flags to Increase Power”

R. Evan Ellis: The Impact of China on the Latin American Security Environment

02 China, Communities of Practice, IO Deeds of Peace, Officers Call, Policies
Evan Ellis

The Impact of China on the Latin American Security Environment

To frame the nature of China’s impacts on the Latin America and Caribbean security environment, it is important to understand that the rise of the PRC is
simultaneously affecting the region in multiple interdependent ways, often indirect and unintentional. These include altering its economic structure,
changing the dynamics of the regional arms market, and contributing to transpacific organized crime, among other. Perhaps most importantly, however, it is also impacting the perceptions and calculations of political, military leaders and business elites in the region, non-state actors and others, and by affecting those perceptions, it is altering their actions and the dynamics of the countries in which they operate.

Continue reading “R. Evan Ellis: The Impact of China on the Latin American Security Environment”

noble gold