Posts

When Documents Attack AI: Hidden Instructions, Data Poisoning, and the Silent Manipulation of Machine Decisions

Document AI Under Attack: Data Poisoning, Hidden Instructions, and How to Defend Against Them Cybersecurity • Document AI • Adversarial ML Document AI Under Attack: Data Poisoning, Hidden Instructions, and How to Defend Against Them As AI systems increasingly read contracts, reports, emails, policies, and internal knowledge bases, the document itself is becoming a strategic attack surface. A file no longer needs to execute code to become dangerous. In some cases, it only needs to influence what the machine believes is true. By Ryan Khouja Analytical essay This article is written for awareness, governance, and defensive design in organizations using AI to process documents and support decisions. For many years, cybersecurity professionals treated PDFs, Wor...
Récupération et transformation de conteneurs 45 pieds High Cube en habitat modulaire de plain-pied Récupération de conteneurs 45 pieds High Cube en provenance de Tanger et Casablanca pour la création d’une maison modulaire de plain-pied La récupération de conteneurs maritimes de dernier voyage constitue aujourd’hui une solution à la fois industrielle, économique et architecturale pour développer des logements modulaires robustes, rapides à assembler et adaptés à des environnements variés. Dans le cas présent, le projet consiste à sélectionner des conteneurs 45 pieds High Cube en provenance des ports de Tanger et Casablanca, à les reconditionner en atelier, puis à les transformer en une habitation de plain-pied composée de cinq modules : quatre conteneurs alignés pour former les volumes principaux, et un cinquième utilisé comme noyau central de distribution et d’accès. Cette approche permet de valoriser des structu...

MOBILE WORLD CONGRESS. INTELLIGENCE GATHERING AND COUNTER INTELLIGENCE

Image
Trade Shows as High-Risk Environments: Defensive Awareness at Major Tech Events Major technology fairs concentrate decision-makers, prototypes, supply-chain relationships, and informal conversations in a dense urban footprint. That combination makes them attractive not only for legitimate networking, but also for corporate espionage , social engineering , and information harvesting . Why conferences amplify risk High signal-to-noise ratio: lots of relevant people in the same place, on predictable schedules. Lowered guard: social settings, after-hours meetings, and “conference friendliness” increase disclosure. Device exposure: public Wi-Fi, charging stations, Bluetooth accessories, and QR-driven workflows. Content leakage: photos of badges, screens, slides, and prototype details shared on social media. Common defensive scenarios (non-technical) The most frequent incidents are not cinematic. They are ordina...
Electronic “Fingerprints” in Modern SIGINT: How Aircraft Are Identified by Radar and Datalink Signatures Electronic “Fingerprints” in Modern SIGINT Radar & datalink signatures as an identification layer — from early warning to fusion-based air defense. Responsible use note: This article explains concepts at a high level for education and policy/technology literacy. It does not provide actionable instructions for interference, evasion, or targeting. 1) What is an “electronic signature” in defense? In military sensing and intelligence, an electronic signature is the distinctive pattern of measurable emissions and behaviors produced by a platform’s electronics. Think of it as a machine-readable identity trace that can complement radar returns, infrared cues, and visual recognition. In practice, “signature” is multi-domain. But SIGINT focuses on sig...

Rooftop NH₃ Flake Ice Plant

Rooftop NH₃ Flake Ice Plant (1–10 t/day) — Hygienic “Frost” Ice for Fish Processing Design basis (given): Capacity: scalable 1 to 10 tonnes/day (flake ice) Location: rooftop (azotea), restricted access (no public) Ambient design temperature: 35 °C Distance to consumption points: 50 meters (ice conveyance) Water feed: potable water with multi-stage filtration + UV Use case: fish factory (rapid chilling, product bedding, hygienic handling) Refrigerant: ammonia (NH₃) — industrial-grade safety concept required 1) System Overview This specification describes a rooftop NH₃ refrigeration package feeding one or more flake ice generators , with hygienic water treatment, controlled storage, and a 50 m delivery system to process areas. The design is modular: a 1 t/day “starter” module can be expanded to 10 t/day by adding additional flake units, increasing refrigeration capacity, and s...