Everyone and their g-d d-mn uncle has access to my social security information, yet I can’t make one simple change to my account online! 🤬
Read More »Tag: data sharing
Growing “Cyber threats” prompt Philippine Army’s 1st 16th AF visit [Information Operations]
Growing Cyber threats prompt Philippine Army’s 1st 16th AF visit
JOINT BASE SAN ANTONIO-LACKLAND, Texas — Colonel Edward Rivera, 616th Operations Center, director of operations, welcomed Philippine Army Col. Windell Rebong, Command and Control Communications and Cyber Systems, deputy assistant chief, and five associates, here, July 18, for a subject-matter-expert exchange amid rising cyberattacks.
The exchange centered around maturing information warfare by strengthening interdependencies between several domains: electronic warfare, information operations and warfare, and cyber operations.
…
“This exchange was a warm, engaging and open discussion from both sides and included military, civilian, officer and enlisted of different ranks, all bringing forward their experiences in the form of vibrant discussions,” said Rebong. “It’s an honor and a privilege for a Philippine Army officer to visit a U.S. Air Force facility. [The 16th Air Force] has an expertise that all Philippine branches of service will benefit from.”
….
Sixteenth Air Force (Air Forces Cyber), headquartered at Joint Base San Antonio, Texas, focuses on information warfare in the modern age and ensures that our Air Force and Nation are fast, resilient, and fully integrated in competition, crisis, and conflict by incorporating Information Warfare at operational and tactical levels, capitalizing on the value of information by leading the charge for uniquely-21st century challenges in the highly dynamic, seamless, and global information domain.
Information operations, sometimes referred to as influence operations, entail disseminating false information to persuade people and gathering tactical intelligence on rivals to gain the upper hand. Traditional media and social media platforms are just two examples of the many tools and techniques that can be used to carry out information operations.
Related:
Read More »The Protecting Kids On Social Media Act Is A Terrible Alternative To KOSA
We have covered the Protecting Kids On Social Media Act a few times, when it was first introduced back in April, where we highlighted how it was both unconstitutional and the rationale behind it was not supported by any actual evidence, and then again just recently when Senator Chris Murphy (one of the bill’s co-sponsors) wrote a ridiculously confused op-ed for the NY Times, claiming it was necessary because kids these days get too many music recommendations and no longer could discover new music on their own.
The Protecting Kids On Social Media Act Is A Terrible Alternative To KOSA
Related:
What is Fog Reveal? Police use new app to track people without a warrant
New tool shows where and when people work and live, with whom they associate and what places they visit
What is Fog Reveal? Police use new app to track people without a warrant
A-hole Of The Year Nominee: The World Economic Forum For Wanting Less Facial Recognition Regulation
MassPrivateI | December 8, 2020
The World Economic Forum (WEF) gets my vote for A-hole Of The Year for publishing a report that advocates for less adversarial regulations to help spread facial recognition usage world-wide.
A-hole Of The Year Nominee: The World Economic Forum For Wanting Less Facial Recognition Regulation