As verification and open source investigation techniques and methodologies have developed over the last few years, so have the various tools and platforms used to access the information that makes this kind of work possible. In this article, we examine some of these tools, and the different uses they have in the verification and investigation [...]
A great reading-list from Skeptic North
Ten Books for Skeptics. Here: http://www.skepticnorth.com/2012/12/ten-books-for-skeptics/
Verification handbook – A definitive guide to verifying digital content for emergency coverage
Interesting stuff on how to verify digital content. Authored by leading journalists from the BBC, Storyful, ABC, Digital First Media and other verification experts, the Verification Handbook is a groundbreaking new resource for journalists and aid providers. It provides the tools, techniques and step-by-step guidelines for how to deal with user-generated content (UGC) during emergencies. You'll [...]
Reflexive control
Reflexive Control is a study on how to control the enemy by influencing its decision-making processes. These decision-making processes can be human-based or computer-based. The initiator of Reflexive Control typically operates by delivering specially prepared information to the decision-maker of the opponent to incline him to make a predetermined decision, beneficial to the initiator. "By definition, reflexive control [...]
Category: Information War
In this category we dive right in to the dark side. This category collects any of the things and methods that are used when someone steps out of the straight-forward, open and honest marketplace of ideas. Here we are interested in the use of covert military operations, deception, confusion, disinformation and other such means to [...]
Waterboarding ourselves a better world?
“We tortured some folks.” Barack Obama On third of December 2014 the Senate Select Committee on Intelligence declassified and released a 500-page portion of their massive report confirming the use of torture by the United States Central Intelligence Agency, CIA. The incidents reported in this document took place between 2001 and 2006. The “interrogation methods” [...]
About
I finally made an About page!
CRYPTO-GRAM newsletter by Bruce Schneier
If you are interested in security (computer and other), you should check out the CRYPTO-GRAM newsletter by Bruce Schneier. It is free, delivered to your inbox if you so wish and has a metric ton of well-sourced, well-written high-quality stuff every month. It debunks security-myths, takes a closer look on different approaches to security and [...]
How to know if a news source is fair and balanced?
The media bias In an earlier article titled "The Art of Bullshit" I attempted to list the most common methods of dishonest communication, often used by the propagandists to persuade the public. In that same piece I mentioned different biases such as one-sided selection of stories and the great Confirmation Bias from which no-one is completely [...]
Book: Confessions of an Economic Hit Man – John Perkins
"Economic hit men,” John Perkins writes, “are highly paid professionals who cheat countries around the globe out of trillions of dollars. Their tools include fraudulent financial reports, rigged elections, payoffs, extortion, sex, and murder." http://www.economichitman.com/pages/bookpages/thebook.html In the book "Confessions of an Economic Hit Man" John Perkins walks the reader through his career at the consulting [...]
