InfiniteEyes News

  • Home
  • InfiniteEyes News

InfiniteEyes News Information Arm of InfiniteEyes Collective. Journalists, cypherpunks, researchers, Bitcoin miners, o

———InfiniteEyesNews.substack.comThe US government has faced numerous cyberattacks in recent years, compromising national...
18/10/2024

———InfiniteEyesNews.substack.com

The US government has faced numerous cyberattacks in recent years, compromising national security and sensitive information. What are first attributed to entire nation states and advanced persistent threat actors have now been attributed to lone individuals that have compromised US critical infrastructure, military, and intelligence entities such as the FBI, US CENTCOM, SOCOM, STRATCOM, and contractors such as Lockheed Martin. Anonymous Sudan is a “hacktivist group” of two individuals believed to be based in Sudan, emerging in 2020. This week, US Department of Justice has indicted two Sudanese nationals for their alleged involvement in the notorious hacktivist group, Anonymous Sudan. The group is known for its devastating cyberattacks on hospitals, government facilities, and other critical infrastructure.
The group has claimed responsibility for breaching:
US Federal Emergency Management Agency (FEMA) systems, National Institutes of Health (NIH) databases , US Department of Agriculture (USDA) networks. The FBI, the State Department, Cedars-Sinai Medical Center in Los Angeles, and government websites for the state of Alabama also made the list.  Tech victims also included Microsoft Corp. and Riot Games Inc., along with network service providers. The attacks resulted in reported network outages affecting thousands of customers.
Anonymous Sudan’s DCAT tool (allegedly repurposed open-source tools), “Godzilla,” “Skynet,” and “InfraShutdown,” were also seized. The individuals implicated Ahmed Salah Yousif Omer, 22, and Alaa Salah Yusuuf Omer, 27, Sudanese nationals both charged with one count of conspiracy to damage protected computers. Ahmed Salah is also charged with three counts of damaging protected computers.
——/1

Western nations, through international institutions like the United Nations and the World Bank, have long sought to shap...
03/10/2024

Western nations, through international institutions like the United Nations and the World Bank, have long sought to shape Africa’s development trajectory. These organizations are key pillars of Western soft power, promoting governance reforms, sustainable development, and humanitarian aid. The West’s approach usually hinges on institutional capacity building, human rights promotion, and democratic norms. This has led to significant funding for health, education, and digital initiatives along with financial restructuring through IMF & the World Bank, using soft power when possible, and hard power when necessary.
UN (specifically UNECA- the United Nations Economic Commission for Africa) & the World Bank are essential entities to countries that would benefit greatly from a more transparent and decentralized digital infrastructure. Centralization has led to ideas like a “Good Digital ID Framework” (UNECA) and biometric surveillance targeting refugees and individuals in crisis. The geopolitical motive underlying these projects is the maintenance of a liberal international order. Africa, as a rising demographic and economic force, is increasingly vital to countering BRICS, and Chinese Belt & Road interests. By investing in digital infrastructure and governance reforms, the West hopes to create stable, democratic allies that are more integrated into global trade and less susceptible to Chinese & Russian influence. While lack of civil databases in some countries create ordeals for citizens looking for services, plans to implement them have been plagued by secret deals, shell companies, and diverted funds to certain VIPs. Meanwhile, the Chinese Communist Party has its own plans, using the lemons of multiple coups in multiple Western African nations for their own lemonade.
A $126 million deal with Huawei has given Uganda the capacity to deploy facial and number plate recognition technology, as well as AI capabilities. Sensitive personal data, required to register a SIM card or make a bank transaction, can be accessed at will by state actors with no due process.
——
View full sources from UNECA, Lighthouse Reports, Biometric Update, and more at infiniteeyesnews.substack.com

“THERE MAY BE MORE Chinese police stations operating in Canada”, the Public Safety Minister told a Canadian TV station o...
15/05/2023

“THERE MAY BE MORE Chinese police stations operating in Canada”, the Public Safety Minister told a Canadian TV station on Sunday, months after police said they were investigating whether two community centres in Montreal were being used to intimidate or harass Canadians of Chinese origin, per Toronto Sun. This vague response to one of the most pressing issues affecting Canadian and global democracy may be a prelude to the sort of answers that can be expected from Trudeau’s hand-picked special investigator, and one that only piques concern of the general public.

Two Montreal-area community groups under investigation for allegedly hosting secret Chinese government police stations say they continue to operate normally — contradicting claims by the public safety minister that all the clandestine stations in Canada have been shut down.

The two groups — Service a la Famille Chinoise du Grand Montreal, based in the city's Chinatown district, and Centre Sino-Quebec de la Rive-Sud, in the Montreal suburb of Brossard, Que. — say the RCMP has taken no action against them.

"We have not received any closure requests from the RCMP," they said Friday in a joint statement. "Our activities are proceeding normally." They added that they had lost funding following media coverage of the RCMP allegations, per CBC.

Public Safety Minister Marco Mendicino told a parliamentary committee last Thursday that "the RCMP have taken decisive action to shut down the so-called police stations."

//1

“THERE MAY BE MORE Chinese police stations operating in Canada”, the Public Safety Minister told a Canadian TV station o...
15/05/2023

“THERE MAY BE MORE Chinese police stations operating in Canada”, the Public Safety Minister told a Canadian TV station on Sunday, months after police said they were investigating whether two community centres in Montreal were being used to intimidate or harass Canadians of Chinese origin, per Toronto Sun. This vague response to one of the most pressing issues affecting Canadian and global democracy may be a prelude to the sort of answers that can be expected from Trudeau’s hand-picked special investigator, and one that only piques concern of the general public.

Two Montreal-area community groups under investigation for allegedly hosting secret Chinese government police stations say they continue to operate normally — contradicting claims by the public safety minister that all the clandestine stations in Canada have been shut down.

The two groups — Service a la Famille Chinoise du Grand Montreal, based in the city's Chinatown district, and Centre Sino-Quebec de la Rive-Sud, in the Montreal suburb of Brossard, Que. — say the RCMP has taken no action against them.

"We have not received any closure requests from the RCMP," they said Friday in a joint statement. "Our activities are proceeding normally." They added that they had lost funding following media coverage of the RCMP allegations, per CBC.

Public Safety Minister Marco Mendicino told a parliamentary committee last Thursday that "the RCMP have taken decisive action to shut down the so-called police stations."

// 1

INTERPOL.INT: Operation Identify Me is a public appeal to identify 22 women, believed to have been murdered in Belgium, ...
12/05/2023

INTERPOL.INT:

Operation Identify Me is a public appeal to identify 22 women, believed to have been murdered in Belgium, Germany and The Netherlands, but whose identity was never found. Most are cold cases; women who died 10, 20, 30 or even 40 years ago. 

Despite extensive police investigations, these women were never identified, and evidence suggests they could have come from other countries. Who they are, where they are from and why they were in these countries is unknown.

INTERPOL has published a Black Notice for each victim; these alerts are for police only so they are not public. But here we have shared details of each case, including facial reconstruction images and other potential identifiers, in the hope that someone might recognize them.

If you remember a friend, family member or colleague who suddenly disappeared, please take a look and contact the relevant national police team via the form on each page if you have any information about any of them.
INFINITEEYESNEWS.SUBSTACK.COM

1. Ransomware hackers are the true agents of digital chaos. They are skilled in the art of infiltrating computer systems...
08/05/2023

1. Ransomware hackers are the true agents of digital chaos. They are skilled in the art of infiltrating computer systems, encrypting all  files, and then demanding payment in exchange for the decryption key. These hackers have no regard for the damage they cause to innocent individuals and businesses, and they revel in the chaos they create under the guise of “harmless crime”.

Now,Costa Rican President Rodrigo Chaves said Conti ransomware group has infiltrated 27 government institutions, including municipalities and state-run utilities, expecting a $22m dollar ransomw, which led to a “declaration of war” of the Costa Rican president. This was the test-run for Conti taking on a new face.

Originally, they are the perfect embodiment of chaos, and would stop at nothing to get what they want. ALPHV/BlackCat, BlackBasta,Darkside, REvil, are some of the most infamous groups notorious for widespread ransomware attacks, but never politically motivated. Ransomware hackers would by nature work on a purely for-profit basis, by “principle” not touching health care or civil government entities. As recently as the beginnings of the COVID pandemic, ransomware began to take on a different face, escalating to targets such as these. The face of the digital mercenary. Some of the biggest groups, Conti, took on a “rebrand” as they reached a new level of profitability and effectiveness under “Royal” nomenclature, but there is reason to believe their rebranding had a more political aim.  

Royal is most recently credited for cyberattacks on Dallas, TX municipality systems. Melinda Urbina, a spokesperson for the FBI’s Dallas bureau, said the agency is aware of the attack and is in contact with city officials. She declined to provide additional details about the investigation.
InfiniteEyesNews.substack.com

Ransomware hackers are the true agents of digital chaos. They are skilled in the art of infiltrating computer systems, e...
08/05/2023

Ransomware hackers are the true agents of digital chaos. They are skilled in the art of infiltrating computer systems, encrypting all  files, and then demanding payment in exchange for the decryption key. These hackers have no regard for the damage they cause to innocent individuals and businesses, and they revel in the chaos they create under the guise of “harmless crime”.

Now,Costa Rican President Rodrigo Chaves said Conti ransomware group has infiltrated 27 government institutions, including municipalities and state-run utilities, expecting a $22m dollar ransomw, which led to a “declaration of war” of the Costa Rican president. This was the test-run for Conti taking on a new face.

Originally, they are the perfect embodiment of chaos, and would stop at nothing to get what they want. ALPHV/BlackCat, BlackBasta,Darkside, REvil, are some of the most infamous groups notorious for widespread ransomware attacks, but never politically motivated. Ransomware hackers would by nature work on a purely for-profit basis, by “principle” not touching health care or civil government entities. As recently as the beginnings of the COVID pandemic, ransomware began to take on a different face, escalating to targets such as these. The face of the digital mercenary. Some of the biggest groups, Conti, took on a “rebrand” as they reached a new level of profitability and effectiveness under “Royal” nomenclature, but there is reason to believe their rebranding had a more political aim.  

Royal is most recently credited for cyberattacks on Dallas, TX municipality systems. Melinda Urbina, a spokesperson for the FBI’s Dallas bureau, said the agency is aware of the attack and is in contact with city officials. She declined to provide additional details about the investigation.

/ The group “Anonymous Sudan” has no ties to the greater Anonymous collective. It’s   hashtags circulated among Russian ...
28/04/2023

/ The group “Anonymous Sudan” has no ties to the greater Anonymous collective. It’s hashtags circulated among Russian Telegram spheres where Russian-aligned hackers congregate, instead of Twitter mainly used by Anonymous for their information campaigns.

     Historically, Anonymous Sudan cites geopolitical events that it perceives as anti-Muslim as the catalyst for its DDoS attacks. Anonymous Sudan allegedly began targeting Danish entities on February 22, 2023, and continued doing so throughout March 2023. It started in January of 2023 targeting Ukrainian-aligned entities in Sweden under , claiming revenge over the burning of a Quran. There is also much tension surrounding Sweden joining NATO. Anonymous Sudan began targeting French entities in mid-March 2023 and has cited “the offensive caricature of the Prophet Muhammad [in France]” as the catalyst for its DDoS attacks.

NEWARAB.COM: The Hebrew-language Maariv daily newspaper also reported that various Israeli websites, including those of Mossad and the so-called National Insurance Institute, which is responsible for the social security of Israeli settlers, were knocked offline due to a widespread cyber attack by a hacker group calling itself Anonymous Sudan on Monday.

Sudanese hackers said they took down two Israeli port websites on Wednesday, according to media reports, amid talk of Israeli interference in the country.

Anonymous Sudan claimed to have attacked the websites for Haifa Port and the Israel Ports Developments and Assets Company (IPC), an organisation tasked with overseeing sea ports.

A report from Bloomberg breaking several hours ago said Federal Reserve Chairman Jerome Powell answered questions rangin...
28/04/2023

A report from Bloomberg breaking several hours ago said Federal Reserve Chairman Jerome Powell answered questions ranging from the outlook for inflation to the Russian central bank. They report that there were several clips lasting about 15 minutes.

Thinking he was on a call with Ukrainian President Volodomyr Zelenskyy, Russian pranksters Vovan and Lexus managed to successfully recreate his voice, finding the perfect target for a clip to go viral on Russian television.

Russian state television shared clips of Federal Reserve Chairman Jerome Powell talking with a pair of well-known pranksters known as Vovan and Lexus.

The pair have previously tricked Christine Lagarde in a similar stunt.

This brings the question of deepfakes to the forefront of the collective consciousness. According to ScienceDaily, AI can predict how you vote. AI can also recreate the voices of your loved ones, according to recent phone scams impersonating a child or loved one in distress claiming to be kidnapped and asking for ransom. Individuals could be targeted based on any criteria in attempt to influence their decision-making process. It would be hard not to turn down a conversation with Trump or Obama where even those in opposition to them would listen and get the opportunity for sympathy. Beyond politics, PR firms could imitate any famous individual like Scarlett Johansson or Samuel L. Jackson as “sales agents” for any product or movement. We are only talking about audio here, since this is the stage we are at. Scandals surrounding video augmentation are only starting to emerge, but we are sure to see more. This is a good reminder for ourselves and the data we give to the internet, while inspecting areas where social engineering attacks could affect us..

In the age of immense and ever-expanding data flows comes the ever-expanding need for security. If we don’t learn how to recognize and authenticate organic voices from digital voices soon, we may be in real trouble. Beyond voice authentication, it may be worth looking at contact flows with foreign leaders and our own as well as our own potential for being targeted for such attacks, we are in a New Cold War after all.

EXECUTIVEGOV.COM:“The Defense Advanced Research Projects Agency will hold a proposers day on May 11 in Arlington, Virgin...
27/04/2023

EXECUTIVEGOV.COM:

“The Defense Advanced Research Projects Agency will hold a proposers day on May 11 in Arlington, Virginia, to provide potential offerors information on a broad agency announcement for a program that seeks to develop network infrastructure that integrates the use of quantum communications on classical networks.

The Quantum Augmented Network program intends to create a hybrid quantum-classical communication network architecture to facilitate quantum enhancements to security, according to a special notice published Thursday.

“The QuANET program seeks to augment existing software infrastructure and network protocols with quantum properties to mitigate some of the attack vectors that are pervasive on classical (non-quantum) networks” and create a configurable network interface card that connects classical computing nodes to quantum links, the DARPA notice reads.

Through the event, DARPA will provide details on the program’s technical goals and challenges and discuss its interest in quantum communications, classical networking, sensing and metrology, among other areas.

Registration for the event will run through May 5.”

On the road to infinite outcomes come infinite narratives, narratives that suit the idea of an idealized outcome; That r...
23/04/2023

On the road to infinite outcomes come infinite narratives, narratives that suit the idea of an idealized outcome; That reality is a mystery and nothing is as it seems (fairly true). This allows for the malleability of reality to be shaped by multiple factors in order to reach the ideal audience: those with loose grips on reality perhaps through mental illness or superior intelligence (jury is still out in the distinction). You don’t need a loose grip on reality to know there is more to it - just a clear mind and the willingness to ask questions.

Let us view the questions “What is Cicada3301 and LHOHQ? What is discordianism? How do they align with ‘QAnon’? What does this mean for my base reality?

There are goblins in the clockwork of our reality.
Discordianism and Church of the Subgenius play a part. Read more at infiniteeyesnews.substack.com

In the age of silent retractions, post-edits, dubious agendas, and less-than-accurate information, there’s some new appr...
21/04/2023

In the age of silent retractions, post-edits, dubious agendas, and less-than-accurate information, there’s some new approaches to dispensing journalism. InfiniteEyes is now on OpenSea, just not purely for the purpose of sharing pictures of monkeys. We’ve outlined the ethics and principles to which we approach our information that can be used as reference. Although this will not be the final reporting protocol, this is the first precedent we are using in researching and dispensing information. Our ethics can be etched into the digital historical record. Eventually, since no articles have had edits, they will be minted on the blockchain. Using the event details on any item in our OpenSea account, or EtherScan, one can reference any edits made at any point in time. This is to bring assurance to the reader that everything that they are reading will remain as it is, and it will be the best quality of information we have to offer. We aim to never have a retraction, with a track record to prove it. The hope is for more independent journalists and eventually organizations to bring a new standard of integrity to their information, at least to contrast those that don’t.

Read the full description, and see our principles on OpenSea.
infiniteeyesnews.substack.com

As investigations into the offline website of Canada PM Justin Trudeau unravel (most likely denial-of-service), this see...
13/04/2023

As investigations into the offline website of Canada PM Justin Trudeau unravel (most likely denial-of-service), this seemed to have been the first line of attack, as reports from the energy sector began to emerge that their systems were also compromised.  

Pro-Russia hacker group NoName057 (16) claims to have taken down the Hydro-Quebec website on April 13, 2023 via their Telegram feed.

Hydro-Quebec confirmed to CTV News that the website was targeted by a "cyber attack" overnight Wednesday but could not say whether NoName057 (16) was behind it. The hackers were able to show they had the ability to increase valve pressure, disable alarms and trigger an emergency shutdown at an unidentified gas distribution station, the NYTimes reported.

The Communications Security Establishment, Canada’s cyber intelligence agency, said Monday it does not comment, “whether to confirm or deny, on allegedly leaked intelligence,” because of the risk of revealing tactics, techniques and procedures.

But it said it was concerned about “the opportunities for critical infrastructure disruption” on internet-connected technology in industrial processes.

"Our security quickly detected the attack therefore our critical systems were not impacted," said spokesperson Lynn St-Laurent.

St-Laurent said there were no "infiltrations" or "exfiltrations" of sensitive data or customer information.

Hackers love to share in revelry over the spoils of their conquest. Often compromisation of the system is enough. NoName shared multiple graphics impacting Canadian graphics company Matrox, the PM’s personal Laurentien Bank, and Husky Energy. Why Matrox was specifically targeted, and if NoName is state/G.R.U. affiliated requires further investigation.

As investigations into the offline website of Canada PM Justin Trudeau unravel (most likely denial-of-service), this see...
13/04/2023

As investigations into the offline website of Canada PM Justin Trudeau unravel (most likely denial-of-service), this seemed to have been the first line of attack, as reports from the energy sector began to emerge that their systems were also compromised.  

Pro-Russia hacker group NoName057 (16) claims to have taken down the Hydro-Quebec website on April 13, 2023 via their Telegram feed.

Hydro-Quebec confirmed to CTV News that the website was targeted by a "cyber attack" overnight Wednesday but could not say whether NoName057 (16) was behind it. The hackers were able to show they had the ability to increase valve pressure, disable alarms and trigger an emergency shutdown at an unidentified gas distribution station, the NYTimes reported.

The Communications Security Establishment, Canada’s cyber intelligence agency, said Monday it does not comment, “whether to confirm or deny, on allegedly leaked intelligence,” because of the risk of revealing tactics, techniques and procedures.

But it said it was concerned about “the opportunities for critical infrastructure disruption” on internet-connected technology in industrial processes.

"Our security quickly detected the attack therefore our critical systems were not impacted," said spokesperson Lynn St-Laurent.

St-Laurent said there were no "infiltrations" or "exfiltrations" of sensitive data or customer information.

Hackers love to share in revelry over the spoils of their conquest. Often compromisation of the system is enough. NoName shared multiple graphics impacting Canadian graphics company Matrox, the PM’s personal Laurentien Bank, and Husky Energy. Why Matrox was specifically targeted requires further investigation.

There remain multiple questions worth asking while the veracity and authenticity of recent Pentagon files becomes verifi...
11/04/2023

There remain multiple questions worth asking while the veracity and authenticity of recent Pentagon files becomes verified. The InfiniteEyes’ reporting protocol when it comes to leaks & controversial headlines is the 72 hour rule - see what outlasts the 24 hour news cycle, observe the response of the information ecosystem, who is saying and see what information is actionable at the end.

Here is what we know:

Most “news” media institutions are offering conjecture regarding source content of leaked documents, without fully disclosing, specifically referencing, or showing any contents of leaked information at all. Similar to when Snowden intentionally, compartmentally, leaked the NSA archives to multiple outlets, many of the outlets went outside of his wishes as to what was to be reported. Instead of reporting on NSA ILLEGAL spying on US citizens, New York Times’ David Sanger specifically chose to report on NSA hacking foreign Google servers to intercept foreign communications, and infiltrating Chinese Telecomm entities, in essence painting Snowden as a traitor intending to cause harm to the US, outside of the harm the US caused itself by breaking its own laws and spying on its own & allied citizens.

Who exactly leaked these documents? What department were they leaked from? Why, unlike Assange, Snowden, Ellsberg, does this whistleblower not want their name attached? Does the damage the US security state or military industrial complex the same way Wikileaks and Snowden did? If you were the Pentagon, and knew Ukraine was in the middle of building a counter-offensive, and intended for this war to drag on a bit longer, what would you do? Prepare your citizens for a longer war they are losing the spirit of supporting through taking advantage of “Fog of War” logistics such as arms and death counts to establish your own narrative, perhaps?

Read full NYT article and analysis - infiniteeyesnews.substack.com

For decades, military and intelligence R&D have driven advancements throughout the rest of society, with Silicon Valley ...
06/04/2023

For decades, military and intelligence R&D have driven advancements throughout the rest of society, with Silicon Valley taking its cues from DARPA & InQTel, our energy and communication systems are hand-me-downs of research infrastructures that operated under the veil of secrecy, filtering down the most consumer/market friendly products to the rest of society. As the arbiters of encryption, their algorithms have managed to keep their data mostly safe, except from whistleblowers and sophisticated hackers such as Julian Assange or LulzSec. As more and more sensitive information is being unsecured, the need to shift from classically encrypted systems is starting to become more and more "water-cooler” conversation in the halls of innovators and policy-makers. The shift to quantum computing will shift our entire communications and computing infrastructure, and the protocols required to uphold them. As the race for quantum supremacy beats faster and faster, our intelligence agencies have reached out to the public and OSINT data to build quantum resistant systems and brace the public for the potential openness of secrets.

How much the U.S. is spending on quantum computing research is difficult to say. Although the government's share of total R&D spending is lower than it used to be, "when you include U.S. private companies, we still outpace pretty much everyone in the world," says Todd Harrison, director of defense budget analysis at the Center for Strategic and International Studies.

Corporate research doesn't include much basic R&D, which is what typically yields the biggest long-term payoffs. The military, which in the past has sowed world-changing technologies like the internet, could wind up playing a crucial role in quantum computing. Funding for unclassified military R&D has in general remained steady, according to Harrison. The Pentagon is probably also funding classified quantum computer research. Documents from the Edward Snowden cache revealed that the National Security Agency was spending about $80 million on a "cryptographically useful quantum computer," the Washington Post reported, all of it classified.

Welcome to the RESTRICT Act (S. 686). This bill is also currently known as the "Tik Tok ban" by many. It seems that all ...
29/03/2023

Welcome to the RESTRICT Act (S. 686). This bill is also currently known as the "Tik Tok ban" by many. It seems that all the hype around TikTok enflamed US Congress to pass 686 to the Senate with bipartisan support., whether or not these encroachments on privacy are actually constitutional, it gives massive powers to the Director of National Intelligence, Secretary of Commerce, Attorney General to designate and “review” any “foreign adversary or transaction” between US citizens or otherwise.

    The infrastructure subject to review includes: information and communications technology products or services used by a party to a covered transaction in a sector designated as critical infrastructure in Policy Directive 21 (February 12, 2013; relating to critical infrastructure security and resilience);

(2) software, hardware, or any other product or service integral to telecommunications products and services, including—

(A) wireless local area networks;

(B) mobile networks;

(C) satellite payloads;

(D) satellite operations and control;

(E) cable access points;

(F) wireline access points;

(G) core networking systems;

(H) long-, short-, and back-haul networks; or

(I) edge computer platforms;

(3) any software, hardware, or any other product or service integral to data hosting or computing service that uses, processes, or retains, or is expected to use, process, or retain, sensitive personal data with respect to greater than 1,000,000 persons in the United States at any point during
the year period preceding the date on which the covered transaction is referred to the Secretary for review or the Secretary initiates review of the covered transaction, including—

(A) internet hosting services;

(B) cloud-based or distributed computing and data storage;

(C) machine learning, predictive analytics, and data science products and services, including those involving the provision of services to assist a party utilize, manage, or maintain open-source software;

(D) managed services; and

(E) content delivery services

(Continued. Full article with source material at infiniteeyesnews.substack.com)

30 experts  forecasted the developmental trajectories of twelve emerging technologies in the United States, Russia, and ...
27/03/2023

30 experts  forecasted the developmental trajectories of twelve emerging technologies in the United States, Russia, and China until 2040 and to score their possible future impact on arms race stability, crisis stability, and humanitarian principles.

This study received funding from the German Federal Foreign Office through the 2019–2022 project grant `Arms Control and Emerging Technologies` (`Forschungs- und Transferprojekt Rüstungskontrolle und Neue Technologien`). in partnership with Institute for Peace Research and Security Policy at the University of Hamburg (IFSH).

The results reveal that, on average, their impact is expected to be negative, with some technologies negatively affecting all three dependent variables.

Using a machine learning algorithm to cluster the technologies according to their anticipated impact, this process identified technology clusters comprised of diverse high-impact technologies that share key impact characteristics but do not necessarily share technical characteristics.

In politics and economics, a Potemkin village (Russian: потёмкинские деревни, romanized: potyómkinskiye derévni) is any ...
21/03/2023

In politics and economics, a Potemkin village (Russian: потёмкинские деревни, romanized: potyómkinskiye derévni) is any construction (literal or figurative) whose sole purpose is to provide an external façade to a country that is faring poorly, making people believe that the country is faring better. The term comes from stories of a fake portable village built by Grigory Potemkin, former lover of Empress Catherine II , solely to impress the Empress during her journey to Crimea in 1787.There have been shouts from on high declaring the strength of the western central banking system since the failures of Silicon Valley Bank and Credit Suisse, declaring war on any apostate exposing the popsicle-stick foundation underneath the nice appearance of the global economic village. One needs not look further than the American dollar bill to understand the deeper vector of control behind our economic system. Last week was described as the “first social-media fueled bank run in history” and fears about “social media disinfo” started to be stoked. Once again, the use of linguistic trickery in order to discourage critical thinking is becoming less of a tool used by Twitter reply trolls and establishment journalists, transforming into a defensive weapon used by the State to uphold its facade of endless money printing and bad-faith loans ensured by a post-gold tied dollars. Bank CEOS and even Senators are using the term “disinformation” in order shut down discourse echoing sentiments of looming collapse and maintain the only value left holding up the dollar- trust. Trust that the Potemkin village is a real village, no matter how many times it picks itself up and reshapes itself at its convenience, right in front of our eyes.

Address


Alerts

Be the first to know and let us send you an email when InfiniteEyes News posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to InfiniteEyes News:

Shortcuts

  • Address
  • Alerts
  • Contact The Business
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share