Skip to main content

The altruism is a very effective tool for mapping the community, where somebody lives.


Kimmo Huosionmaa

Who of us doesn't want to be an altruist? We have to need to please people, and especially people, who deny something free and easy from children, who ask them easy and free service feels cold and heartless person. This is a very problematic thing because in the world of espionage the people use this kind of tricks to map the social network of targeted people. The idea of use empathy as the tool of the search and phishing data from the social network is easy and effective.

The person just shares the letter on Facebook, where some lovely girl or boy just asks help for the school job or something else. The job, what the person must do is simple. They must just write their name under the picture and then share this text in their Facebook-accounts. Who doesn't want to help the princess to accomplish the school job, and then the name is under the picture, where the most attractive thing is asking this help for making studies. The tool is effective because it can be used to map the social network very effectively.

The most effective version is, that this kind of angel-picture is delivered from some discussion group, what means that some person, who is a member of that group just delivers the picture or message to persons, who is in the group, but also Facebook-mates outside the group. This thing helps to map the social network of the members of the discussion groups. When I'm talking about "angel photo". I mean the thing, what is attractive and combines the group. Angel photo can be a picture of firearms cancer patients and something like that.

This makes Facebook and other social media very powerful tool for intelligence and criminals. The police can create the discussion group, where people have hobbies with guns, and then delivers some pictures or messages to the people, who are members of this group. Then they can search if those messages are coming in the walls of the members of some hardcore radical's forums. This makes possible to track the connections with gun hobbyists and radicals. Also, the "angel photos" can be used to map the cancer patients and another kind of persons, whose pain medicals are suitable for illegal markets. This makes Facebook a very effective tool also in the hands of criminals.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that