just-art:

Grace Jones by Jean-Paul Goude

via

arxsec:

Brit Lauri Love faces more US hacking charges

— Lauri Love, a 29-year-old British man from Stradishall in Suffolk, has been charged by a US court with hacking into multiple US government computers …

arxsec:

Brit Lauri Love faces more US hacking charges

superseventies:

Shirley Bassey, 1974

superseventies:

Shirley Bassey, 1974

xxxshakespearexxx:

Bruce Lee 41 th Anniversary

Bruce Lee (Chinese: 李小龍; born Lee Jun-fan, Chinese: 李振藩; 27 November 1940 – 20 July 1973) was a Hong Kong American martial artist, Hong Kong action film actor, martial arts instructor, filmmaker,[3] and the founder of Jeet Kune Do. Lee was the son of Cantonese opera star Lee Hoi-Chuen. He is widely considered by commentators, critics, media and other martial artists to be one of the most influential martial artists of all time, and a pop culture icon of the 20th century.

http://en.wikipedia.org/wiki/Bruce_Lee

Currently reading through The Tao of Jeet Kune Do. It’s a beast.

neurosciencestuff:

Neuroscientists study our love for deep bass sounds
Have you ever wondered why bass-range instruments tend to lay down musical rhythms, while instruments with a higher pitch often handle the melody?
According to new research from Laurel Trainor and colleagues at the McMaster Institute for Music and The Mind, this is no accident, but rather a result of the physiology of hearing.
In other words, when the bass is loud and rock solid, we have an easier time following along to the rhythm of a song.
Read more

neurosciencestuff:

Neuroscientists study our love for deep bass sounds

Have you ever wondered why bass-range instruments tend to lay down musical rhythms, while instruments with a higher pitch often handle the melody?

According to new research from Laurel Trainor and colleagues at the McMaster Institute for Music and The Mind, this is no accident, but rather a result of the physiology of hearing.

In other words, when the bass is loud and rock solid, we have an easier time following along to the rhythm of a song.

Read more

Colors in Writing

inkmistress:

When the colors themselves won’t do, here are the names of some specific shades to add descriptive detail to your writing.

Red

-Amaranth

-Auburn

-Burgundy

-Candy Apple

-Cardinal

-Carmine

-Carnelian

-Cerise

-Chestnut

-Coral

-Crimson

-Fuschia

-Lava

-Magenta

-Mahogany

-Maroon

-Puce

-Raspberry

-Red-violet

-Rose

-Ruby

-Scarlet

-Terracotta

-Vermillion

-Wine

Orange

-Amber

-Apricot

-Champagne

-Gamboge

-Peach

-Portland Orange

-Rust

-Safety Orange

-Tangerine

-Tawny

-Vermillion

Yellow

-Amber

-Beige

-Chartreuse

-Cream

-Ecru

-Flax

-Gold

-Goldenrod

-Harvest Gold

-Jasmine

-Khaki

-Lemon

-Maize

-Mustard

-Olive

-Peach

-Saffron

-Sage

-Straw

-Vanilla

Green

-Army Green

-Asparagus

-Blue-green

-Camoflauge Green

-Emerald

-Fern Green

-Forest Green

-Harlequin

-Hunter Green

-Jade

-Kelly Green

-Lime

-Moss

-Olive

-Pine Green

-Shamrock Green

-Spring Green

-Teal

-Turquoise

-Viridian

Blue

-Azure

-Baby Blue

-Carolina Blue

-Cornflower

-Cyan

-Electric Blue

-Indigo

-Iris

-Light Blue

-Midnight Blue

-Navy

-Oxford Blue

-Periwinkle

-Persian Blue

-Powder Blue

-Prussian Blue

-Royal Blue

-Sapphire

-Sky Blue

-Teal

-True Blue

-Turquoise

-Zaffre

Purple

-Byzantium

-Cerise

-Eggplant

-Fuchsia

-Iris

-Lavender

-Lilac

-Magenta

-Mauve

-Mulberry

-Orchid

-Periwinkle

-Plum

-Red-violet

-Violet

Brown

-Beige

-Bronze

-Burgundy

-Chestnut

-Chocolate

-Coffee

-Copper

-Khaki

-Mahogany

-Maroon

-Russet

-Rust

-Sepia

-Sienna

-Tan

-Taupe

-Tawny

-Umber

-Wheat

Good luck, everyone!

Morgan Freeman is Vincent the Vegetable Vampire. Electric Company, early 1970s.

TL;DR - The Government Communications Headquarters (the NSA of the UK) has a suite of tools (at various levels of operational status) that can manipulate search engine results, censor YouTube, mine Facebook for photographs of specific targets, monitor Skype conversations in real time, etc.

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet
 By Glenn Greenwald 14 Jul 2014, 12:38 PM EDT
The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users.
But as the U.K. Parliament today debates a fast-tracked bill to provide the government with greater surveillance powers, one which Prime Minister David Cameron has justified as an “emergency” to “help keep us safe,” a newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.
The “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities:
• “Change outcome of online polls” (UNDERPASS)
• “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)
• “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
• “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO)
• “Find private photographs of targets on Facebook” (SPRING BISHOP)
• “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE)
• “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM)
• “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)
• “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
• “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)
• “Ability to spoof any email address and send email under that identity” (CHANGELING)
• “For connecting two target phone together in a call” (IMPERIAL BARGE)
While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”
And JTRIG urges its GCHQ colleagues to think big when it comes to internet deception: “Don’t treat this like a catalogue. If you don’t see it here, it doesn’t mean we can’t build it.”
The document appears in a massive Wikipedia-style archive used by GCHQ to internally discuss its surveillance and online deception activities. The page indicates that it was last modified in July 2012, and had been accessed almost 20,000 times.
GCHQ refused to provide any comment on the record beyond its standard boilerplate, in which it claims that it acts “in accordance with a strict legal and policy framework” and is subject to “rigorous oversight.” But both claims are questionable.
British watchdog Privacy International has filed pending legal action against GCHQ over the agency’s use of malware to spy on internet and mobile phone users. Several GCHQ memos published last fall by The Guardian revealed that the agency was eager to keep its activities secret not to protect national security, but because “our main concern is that references to agency practices (ie, the scale of interception and deletion) could lead to damaging public debate which might lead to legal challenges against the current regime.” And an EU parliamentary inquiry earlier this year concluded that GCHQ activities were likely illegal.
As for oversight, serious questions have been raised about whether top national security officials even know what GCHQ is doing. Chris Huhne, a former cabinet minister and member of the national security council until 2012, insisted that ministers were in “utter ignorance” about even the largest GCHQ spying program, known as Tempora—not to mention “their extraordinary capability to hoover up and store personal emails, voice contact, social networking activity and even internet searches.” In an October Guardian op-ed, Huhne wrote that “when it comes to the secret world of GCHQ and the [NSA], the depth of my ‘privileged information’ has been dwarfed by the information provided by Edward Snowden to The Guardian.”

TL;DR - The Government Communications Headquarters (the NSA of the UK) has a suite of tools (at various levels of operational status) that can manipulate search engine results, censor YouTube, mine Facebook for photographs of specific targets, monitor Skype conversations in real time, etc.

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet

By 14 Jul 2014, 12:38 PM EDT

The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.

The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users.

But as the U.K. Parliament today debates a fast-tracked bill to provide the government with greater surveillance powers, one which Prime Minister David Cameron has justified as an “emergency” to “help keep us safe,” a newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.

The “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities:

• “Change outcome of online polls” (UNDERPASS)

• “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)

• “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)

• “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO)

• “Find private photographs of targets on Facebook” (SPRING BISHOP)

• “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE)

• “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM)

• “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)

• “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)

• “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)

• “Ability to spoof any email address and send email under that identity” (CHANGELING)

• “For connecting two target phone together in a call” (IMPERIAL BARGE)

While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”

And JTRIG urges its GCHQ colleagues to think big when it comes to internet deception: “Don’t treat this like a catalogue. If you don’t see it here, it doesn’t mean we can’t build it.”

The document appears in a massive Wikipedia-style archive used by GCHQ to internally discuss its surveillance and online deception activities. The page indicates that it was last modified in July 2012, and had been accessed almost 20,000 times.

GCHQ refused to provide any comment on the record beyond its standard boilerplate, in which it claims that it acts “in accordance with a strict legal and policy framework” and is subject to “rigorous oversight.” But both claims are questionable.

British watchdog Privacy International has filed pending legal action against GCHQ over the agency’s use of malware to spy on internet and mobile phone users. Several GCHQ memos published last fall by The Guardian revealed that the agency was eager to keep its activities secret not to protect national security, but because “our main concern is that references to agency practices (ie, the scale of interception and deletion) could lead to damaging public debate which might lead to legal challenges against the current regime.” And an EU parliamentary inquiry earlier this year concluded that GCHQ activities were likely illegal.

As for oversight, serious questions have been raised about whether top national security officials even know what GCHQ is doing. Chris Huhne, a former cabinet minister and member of the national security council until 2012, insisted that ministers were in “utter ignorance” about even the largest GCHQ spying program, known as Tempora—not to mention “their extraordinary capability to hoover up and store personal emails, voice contact, social networking activity and even internet searches.” In an October Guardian op-ed, Huhne wrote that “when it comes to the secret world of GCHQ and the [NSA], the depth of my ‘privileged information’ has been dwarfed by the information provided by Edward Snowden to The Guardian.”

The Lion Gate at Hattusa, the Bronze Age capital of the Hittite Empire (modern-day Boğazkale, Turkey).

The Lion Gate at Hattusa, the Bronze Age capital of the Hittite Empire (modern-day Boğazkale, Turkey).

gutsanduppercuts:

Want to know a little more about Wing Chun. Well, Leo Au Yeung (choreographer of “Ip Man”) is here to tell you all about it with his new You Tube mini-documentary series, “Spirit of Kung Fu.”

Not only is this first part informative, but the cinematography is beautiful. I’m looking forward to seeing the Hung Gar episode and definitely the Choy Lee Fut one, which is a style I no very little about.

absolvd:

da Vinci Surgical System

absolvd:

da Vinci Surgical System