Category Archives: cyberterrorisme

About Captain Marvel story as a metaphor for cache peering failures

By Julie Debaveye Following capture by skrull Rogue, Captain Marvel has lost access to the emotional bonds linked to her memories due to the inability of her peers to restaure a back up. CAPTAIN MARVEL – Escaping Skrulls from Federico … Continue reading

Posted in AI, blended learning, cultural trafficking, cyberterrorisme, data access, data security, Digital culture, E-privacy, Game changing, Google, infosharing, intelligence artificielle, machine learning, manipulation, open society, privacy, protection des données | Tagged , | Comments Off on About Captain Marvel story as a metaphor for cache peering failures

Google the beast

At the time when authorities and media are denouncing Google’s silencing practices over their employees, it is necessary to remind that Google has no administrative authority so we don’t really need the employees’ knowledge to kill Google, the beast. Law … Continue reading

Posted in AI, algorithm bias, antitrust, armes psychotroniques, Corporatism, corruption, cultural trafficking, cybersécurité, cyberterrorisme, DARPA, dataveillance, Digital culture, Exploitation, finance capitalism, Google, intelligence artificielle, MK ultra, money laundering, narratives, power abuse, privacy, science and technology, tech fascism | Tagged , | Comments Off on Google the beast

Radiography of an AI

The antic Military Industrial Complex (MIC) has moved into the cloud and colonized every spaces of the beyond, from waters to skies, with wireless and waves technologies that they call “emergent” or “transformative”. Thus the AI industry is now almost … Continue reading

Posted in armes psychotroniques, cybersécurité, cyberterrorisme, DARPA, data sanitization, data security, Digital culture, escapism, everyday sexism, Film industry, finance capitalism, gender discrimination, Google, ICE, Immigration, intelligence artificielle, media collusion, media industry, MK ultra, money laundering, narratives, open borders, open society, Palantir, Power, power abuse, predictive crine, scientific education, social activism, soros, state surveillance, State violence, terror financing, US sovereignity, violence against women, war, woman CEO | Comments Off on Radiography of an AI

66

Usages des ondes de radio-fréquence sur des civils pour les pousser à des actes qu’ils ne souhaitent pas faire par les agences d’intelligence et les réseaux de cyber-sécurité.   A est une personnalité exceptionnelle qui affirme avoir été la proie … Continue reading

Posted in armes psychotroniques, corruption, cybersécurité, cyberterrorisme, DARPA, MK ultra, power abuse | Comments Off on 66

La régulation de l’industrie de la cybersécurité contre le cyberterrorisme

Il faut réguler l’industrie de la sécurité pour mettre un terme à la surveillance abusive des populations et des personnes et faire cesser les attaques contre les personnes. Ces pratiques enfreignent impunément la Convention Européenne des Droits de l’Homme au … Continue reading

Posted in Corporatism, corruption, cybersécurité, cyberterrorisme, data security, ethique des données en ligne, freedom of press, Google, infosec, infosharing, manipulation, Palantir, privacy, protection des données, science and technology, surveillance | Tagged | Comments Off on La régulation de l’industrie de la cybersécurité contre le cyberterrorisme