View allAll Photos Tagged encryption

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

Vera's third photo-shoot, in which we get to play with some theatrical props and explore extreme opposites.

They Type VIII, or Tigershark, is the Meermacht's first practical attack submarine since the dawn of the submarine warfare age in the Great War of the 1920's. The Type VII is much larger and more powerful than previous u-boat designs, but a tad slow compared to its contemporaries. This is made up for by a healthy armament as well as perhaps the world's most unbreakable cipher for radio transmissions, based on the Maian hieroglyphic script (which IRL itself took literally hundreds of years to decipher). To anyone who captures a V-boat and tries to decipher its encryption devices, I say to you, good luck.

 

Thanks to Wolfie for the hull, Nightmaresquid for the conning tower, and Brian Fitzsimmons for the bulge on the side of the hull.

 

PERKS & QUIRKS:

Gun: 88mm (+0)

Torpedoes: 14-16 (+0)

AA Guns: 2 (+0)

Speed: 18kn/9kn (+1)

Great Codes: +1

When wandering about a familiar patch of bush, encounters like this aren't common. Red is discordant. Sure, spotting the red of a mistletoe bird isn't alien. But this has me scratching my head. This is not a mistletoe bird.

 

Look at those symbols! Surely it's a script; writing. Excitingly, doesn't this point to alien intelligence? Goodness knows, we could use some.

 

What I have mistaken for Aurebesh, it turns out is nothing more than a pigpen cipher, also called a Freemason's cipher. I was hoping the aliens had landed and it turns out to be the masons! At least I won't be beamed up and probed. But what if one tries to shake my hand?

 

Previously I mistook this for an alien script. It can be deciphered, and after all that, I still have no idea what the masons are trying to say.

I wanted a high res image of the NYC subway map for my iPad. This is a direct extraction from their PDF on the MTA site. It was difficult to do becuase their PDF has encryption on it.

Alan Turing’s Teddy Bear

This Chad Valley Co Ltd Teddy Bear was purchased by Alan Turing as an adult and named ‘Porgy’. Alan had a “whimsical sense of humour” (Sara Turing) and at Cambridge is reputed to have practised his lectures in front of Porgy.

“One thing Alan specialised in was his choice of presents…His present to one small niece called forth the spontaneous exclamation, ‘ What a Christmas!’ “ (Sara Turing). This niece was 5 year old Shuna Turing who remembers “My mother, Alans sister-in-law, made me a little skirt with braces and red buttons and as a surprise, I woke up the next morning to find Porgy wearing matching trousers, braces and buttons. Porgy has worn them ever since - approximately 67 years!”

  

LET’S GO TO MONOPOLY SLOTS GENERATOR SITE!

 

[NEW] MONOPOLY SLOTS HACK ONLINE REAL WORKS 100% GUARANTEED: www.generator.mosthack.com

You can add Coins up to 999,999,999 and Diamonds up to 999 each day: www.generator.mosthack.com

Free and added instantly! This method 100% works for real: www.generator.mosthack.com

Please Share this working hack online method guys: www.generator.mosthack.com

 

HOW TO USE:

1. Go to >>> www.generator.mosthack.com and choose Monopoly Slots image (you will be redirect to Monopoly Slots Generator site)

2. Enter your Username/ID or Email Address (you don’t need to enter your password)

3. Select Platform and Encryption then click “CONNECT”, Popup Success alert click “OK”

4. Select Resources then click “GENERATE”, after that click “VERIFY”, finish verification process and check your account!

 

Try Another Free Safe and Secure Hack Online Generator Cheat Real Works 100% Here: www.mosthack.com

 

#generatorgame #onlinegeneratorgame #mosthack #generatormosthack #monopolyslots #monopoly #monopolydeal #monopolymoney #monopolyatmaccas #monopolyempire #monopolyman #monopolygang #monopolynight #monopolytime #monopolyjunior #monopolyguy #monopolygame #monopolymillionaire #monopolyjr #monopolyvision #monopolycity #monopolyking #monopolyhotels #monopolychamp #monopolym #monopolymonday #monopolypubcrawl #monopoly2015 #monopolyboy #monopolylife

 

HACK MONOPOLY SLOTS NOW!

Why? Because I can now use it with WinAmp!! (via ml_ipod) Before only FW1.x could be used with ml_ipod as Apple did some encryption trickery on the FW2.x iPod Touch/iPhone. It has been broken finally and my unit has been liberated from iTunes!! I'm so happy.

 

I was just using it to read email and surf the web -- now I can finally listen to music on it again. The cover art you see there was loaded via WinAmp.

 

Finally all three of my iPods can live in harmony, sharing playcounts, ratings and my top rated music!

 

I tried iTunes and it was OK -- but it's so inflexible compared to WinAmp. Specifically you cannot sync ratings and playcounts back to your computer from the iPod if you manage your music manually!! I have to do this as my library is about 130gigs -- much bigger than my iPods. If I like a song, I rate it on the iPod and that rating needs to go back to my PC. With iTunes, not possible. With Winamp, works perfectly!

Hackerspace Hack42 is proudly housing and hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.

Russia’s accession to the WTO cleared a major hurdle when the WTO Working Party on its accession approved, ad referendum on 10 November 2011, the package spelling out Russia’s terms of entry to the organization. The Working Party will now send its accession recommendation to the 15 —17 December Ministerial Conference, where Ministers are expected to approve the documents and accept Russia as a WTO Member.

 

On 10 November 2011, the Working Party on Russia’s accession, chaired by Ambassador Stefán Jóhannesson (Iceland), agreed, ad referendum, on the terms of the country’s membership to the WTO by adopting the package containing reforms to Russia’s trade regime, and the commitments that Russia undertook to implement as part of its WTO accession.

 

“It has been a long journey, but today Russia has taken a big step towards its destination of membership in the WTO. In acceding to the WTO, Russia embraces a series of rules and commitments that are the foundation of an open, transparent and non-discriminatory global trading system. This system provides important guarantees for Russia and for the 153 other Members of our organization. This win-win result will bring Russia more firmly into the global economy and make it a more attractive place to do business. For the WTO, it comes as a most welcome deliverable for the upcoming WTO Ministerial Conference and signals anew the relevance and vibrancy of the WTO as an instrument for international co-operation,” said Director-General Pascal Lamy.

 

“It is gratifying to see that after 18 years of sometimes uneasy negotiations the process of WTO accession is completed today. The agreement as negotiated brings us into the system of multilateral trading rules, creating new opportunities for our traders and investors and enabling us to protect their commercial interests even more effectively than before,” said Maxim Medvedkov, chief negotiator for the Russian Federation.

 

“The completion of this Working Party’s activity represents an historic achievement for the WTO. I am convinced that Russia’s accession to the WTO will bring substantial benefits both to Russia and to the Members of this organization. In these difficult economic times, this represents good news and I have no doubt that Russia joining our WTO family will strengthen the multilateral trading system and enhance global economic cooperation,” said Working Party Chairman Ambassador Jóhannesson.

   

Information about the

Russian Federation’s WTO commitments

 

As part of the accession accord, Russia has agreed to undertake a series of important commitments to further open its trade regime and accelerate its integration in the world economy. The deal offers a transparent and predictable environment for trade and foreign investment.

 

From the date of accession, the Russian Federation has committed to fully apply all WTO provisions, with recourse to very few transitional periods (see details below). The Russian Federation’s commitments will include the following:

   

Market access for goods and services

 

As part of the accession, Russia concluded 30 bilateral agreements on market access for services and 57 on market access for goods.

 

Market access for goods — tariff and quota commitments

 

On average, the final legally binding tariff ceiling for the Russian Federation will be 7.8% compared with a 20111 average of 10% for all products2:

 

The average tariff ceiling for agriculture products will be 10.8%, lower than the current average of 13.2%

The ceiling average for manufactured goods will be 7.3% vs. the 9.5% average today on manufactured imports.

  

Russia has agreed to lower its tariffs on a wide range of products. Average duties after full implementation of tariff reductions will be:

 

14.9% for dairy products (current applied tariff 19.8%)

10.0% for cereals (current applied tariff 15.1%)

7.1% for oilseeds, fats and oils (current applied tariff 9.0%)

5.2% for chemicals (current applied tariff 6.5%)

12.0% for automobiles (current applied tariff 15.5%)

6.2% for electrical machinery (current applied tariff 8.4%)

8.0% for wood and paper (current applied tariff 13.4%)

Final tariffs will be bound at zero for cotton and information technology (ITA) products (current applied tariff on ITA products is 5.4%).

 

The final bound rate will be implemented on the date of accession for more than one third of national tariff lines with another quarter of the tariff cuts to be put in place three years later. The longest implementation period is 8 years for pork, followed by 7 years for motor cars, helicopters and civil aircraft.

 

Tariff rate quotas (TRQs) would be applied to beef, pork, poultry and some whey products. Imports entering the market within the quota will face lower tariffs while higher duties will be applied to products imported outside the quota.

 

The in-quota and out of quota rates are listed below with the out of quota rates in parentheses:

 

For beef 15% (and 55%)

For pork zero (and 65%). The TRQ for pork will be replaced by a flat top rate of 25% as of 1 January 2020.

25% (and 80%) for some selected poultry products

10% (and 15%) for some whey products

Some of these quotas are also subject to member-specific allocations

  

Market access for services

 

The Russian Federation has made specific commitments on 11 services sectors and on 116 sub-sectors.

 

On telecommunications, the foreign equity limitation (49%) would be eliminated four years after accession. The Russian Federation also agreed to apply the terms of the WTO’s Basic Telecommunications Agreement.

 

Foreign insurance companies would be allowed to establish branches nine years after Russia accedes.

 

Foreign banks would be allowed to establish subsidiaries. There would be no cap on foreign equity in individual banking institutions, but the overall foreign capital participation in the banking system of the Russian Federation would be limited to 50% (not including foreign capital invested in potentially privatized banks).

 

On transport services, the Russian Federation made commitments in maritime and road transport services, including the actual transportation of freight and passengers.

 

On distribution services, Russia would allow 100% foreign-owned companies to engage in wholesale, retail and franchise sectors upon accession to the WTO.

   

Export duties

 

Export duties would be fixed for over 700 tariff lines, including certain products in the sectors of fish and crustaceans, mineral fuels and oils, raw hides and skins, wood, pulp and paper and base metals.

   

General commitments on market access

 

Quantitative restrictions on imports, such as quotas, bans, permits, prior authorization requirements, licensing requirements or other requirements or restrictions that could not be justified under the WTO provisions would be eliminated and not (re) introduced.

 

Railway transportation charges on goods in transit would, by 1 July 2013, be applied in a manner which conforms with the WTO provisions. The Russian Federation would apply the same rail transportation charges to imported products as they do to similar products moving between domestic locations. Regulated railway tariffs for transit of goods would be published before their entry into force.

 

From the date of accession, importers of alcohol, pharmaceuticals and some products with encryption technology would not need import licences.

 

Upon accession, the Russian Federation would apply the Custom Union Generalised System of Preferences scheme (CU GSP) for developing and least-developed countries. 152 developing countries and least-developed countries benefit from the CU GSP.

Under this scheme, the import duties applicable to products eligible for tariff preferences and originating from developing countries were at the level of 75% of the MFN duty rates and from least-developed countries at the level of 0%.

 

The Russian Federation would reform its tariff regime for sugar in 2012, with a view to further liberalisation.

 

By the date of accession, any tariff exemption for space equipment would be provided on a Most Favoured Nation basis.

 

No licences would be required for imports of more than a dozen encryption technology products (the list includes electronic digital signature devices, personal smart-cards or wireless radio equipment). For those products, any existing import restrictions would be eliminated. No new restrictions, including experts’ evaluations, approvals, and licences, would be adopted or applied. For those encryption technology related products needing an import licence, expert evaluation and approval would only be needed once.

 

Products including alcohol, wood and meat would be subject to measures requiring their declaration and/or entry at designated customs checkpoints. Any measures contrary to the WTO Agreement would be eliminated as of the date of accession. The Russian Federation would not apply country-specific customs procedures.

 

The Russian Federation would apply all its laws, regulations and other measures governing transit of goods (including energy) in conformity with GATT and WTO provisions. From accession, all laws and regulations regarding the application and the level of charges and customs fees imposed in connection with transit would be published.

 

The Russian Federation would review market access requirements for the establishment of direct branches of foreign banks and securities firms in the context of future negotiations on the accession of the Russian Federation to the OECD or within the framework of the next round of WTO multilateral trade negotiations.

 

In its participation in preferential trade agreements, Russia would observe the provisions of the WTO Agreement without any differentiating between those agreements already in effect upon accession and those which would come into effect in the future.

Government Procurement Agreement

 

The Russian Federation intends to join the WTO Government Procurement Agreement (GPA) and would notify this intention to the WTO Government Procurement Committee at the time of accession. Russia would become an observer to the GPA and would initiate negotiations for membership within four years of its accession. Russian government agencies would, upon accession, award contracts in a transparent manner.

   

Industrial and agricultural subsidies

 

Industrial subsidies

 

The Russian Federation would eliminate all its industrial subsidies programmes or modify them so that any subsidy provided would not be contingent upon exportation or upon the use of domestic over imported goods. The Russian Federation would notify its subsidies to the WTO and would not invoke any of the provisions of Articles 27 and 28 of the WTO Agreement on Subsidies and Countervailing Measures.

 

Agricultural subsidies

 

The total trade distorting agricultural support would not exceed USD 9 billion in 2012 and would be gradually reduced to USD 4.4 billion by 2018.

 

To avoid excessive concentration of support on individual products, from the date of accession to 31 December 2017, the annual agricultural support going to specific products would not exceed 30% of the agriculture support that is not for specific products.

 

All agricultural export subsidies will be bound at zero.

 

The VAT exemption applied to certain domestic agricultural products would be eliminated upon accession.

   

Pricing of energy

 

Producers and distributors of natural gas in the Russian Federation would operate on the basis of normal commercial considerations, based on recovery of costs and profit.

 

The Russian Federation would continue to regulate price supplies to households and other non-commercial users, based on domestic social policy considerations.

   

Sanitary and phytosanitary measures (SPS) and technical barriers to trade (TBT)

 

All SPS measures would be developed and applied in the Russian Federation and the Custom Union, in accordance with the WTO Agreement.

 

The Russian Federation would ensure that all legislation related to technical regulations, standards and conformity assessment procedures complies with the WTO TBT Agreement.

 

The Russian Federation would develop and apply international standards on SPS measures through membership and active participation in the Codex Alimentarius, the World Organization for Animal Health (OIE) and the International Plant Protection Convention.

 

The reasons for suspension, cancellation, or refusal of an import permit would be consistent with international standards, recommendations, and guidelines as well as the WTO SPS Agreement.

 

The Russian Federation would negotiate veterinary export certificates that include requirements different from those of the Custom Union if an exporting country made a substantiated request prior to 1 January 2013 to negotiate such a certificate.

 

Except in case of serious risks of animal or human health, Rosselkhoznadzor, the Federal Service for Veterinary and Phytosanitary Surveillance, would not suspend imports from establishments based on the results of on-site inspection before it had given the exporting country the opportunity to propose corrective measures. Rosselkhoznadzor would send a preliminary report to the competent authority of the exporting country for comments.

 

The Russian Federation would use international standards for the development of technical regulations unless they were an ineffective or inappropriate means for achieving the pursued objectives.

 

By the end of 2015, mandatory requirements for telecommunication equipment used in public networks would be limited to the requirements contained in technical regulations adopted consistently with the Eurasian Economic Community and Custom Union agreements.

 

The Russian Federation would regularly review its lists of products subject to obligatory certification or declaration of conformity, as well as all the technical regulations applied on its territory (Custom Union and Eurasian Economic Community included) to ensure that they remained necessary to achieve the Federation’s objective, in accordance with the WTO TBT Agreement.

 

Certified accreditation bodies would be replaced by a single national accreditation body no later than 30 June 2012. The name and other information regarding this body would be published on the Rosstandart website and the website of the Custom Union Commission.

   

Trade-related investment measures

 

The Russian Federation would ensure that all laws, regulations and other measures related to the Agreement on Trade-Related Investment Measures would be consistent with the WTO provisions.

 

All WTO-inconsistent investment measures, including preferential tariffs or tariff exemptions, applied in relation to the existing automobile investment programmes and any agreements concluded under them would be eliminated by 1 July 2018. No other trade related investment measures inconsistent with the WTO Agreement may be applied after Russia’s accession to the WTO.

   

Protection of trade-related intellectual property

 

The Russian Federation would fully apply the provisions of the WTO Agreement on Trade-related Aspects of Intellectual Property Rights including provisions for enforcement, without recourse to any transitional period.

 

The Russian government would continue to take actions against the operation of websites (with servers located in the Russian Federation) that promote illegal distribution of content protected by copyright or related rights.

 

The Russian Federation would investigate and prosecute companies that illegally distribute objects of copyright or related rights on the Internet.

 

By the time of its accession, the Russian Federation would apply all rules of the Berne Convention for the Protection of Literary and Artistic Works.

   

Transparency

 

The provisions of the WTO Agreement would be applied uniformly throughout the Russian Federation territory, including in regions engaging in frontier traffic, special economic zones and other areas where special regimes for tariffs, taxes and regulations could be established.

 

All legislation affecting trade in goods, services and intellectual property rights would be published promptly, consistent with WTO requirements. The Russian Federation would regularly update its official publications including websites and make these laws readily available to WTO members, individuals and enterprises.

 

To improve access to official publications, the Russian Federation would establish an enquiry point providing assistance to members and all other stakeholders.

 

In particular, the Russian Federation would publish all legislation, affecting trade in goods, services, or intellectual property rights, prior to their adoption and would provide a reasonable period of time, no less than 30 days, for members to comment, except for emergency cases, national security, monetary policy, measures whose publication would impede law enforcement, be contrary to the public interest, or prejudice the commercial interest of particular public or private enterprises. No legislation affecting trade in goods, services or intellectual property rights would become effective prior to publication.

 

The Russian Federation would provide annual reports to WTO members on developments in its on-going privatization programme for as long as it would be in existence.

 

Lists of goods and services subject to state price controls would be published in the Rossiiyskaya Gazeta from the date of accession. Russia would apply price controls on certain products and services, including natural gas, raw diamonds, vodka, water supply services, gas transportation services, baby food, medical goods, public transport services and railway transportation services. Price control measures would not be used for purposes of protecting domestic products, or services provided.

   

Functioning of the Custom Union between Russia, Kazakhstan and Belarus

 

The Custom Union between Russia, Kazakhstan and Belarus was created on 1 January 2010. All customs borders were removed between the three countries on 1 July 2011.

 

From 1 January 2012, the three states would have a single economic space.

 

The Russian Federation would publish any Custom Union legislation before adoption and would provide a reasonable period of time for WTO members and all stakeholders to comment to the competent Custom Union Body.

   

Next steps

 

Members agreed to directly forward Russia’s accession package to the 8th Ministerial Conference for adoption by Ministers on 15-17 December 2011.

 

Russia should ratify its accession package within 220 days as of the Ministerial decision (until about 22 July 2012).

 

Thirty days after the notification to the WTO of the ratification, the Russian Federation will become a fully-fledged member.

   

Background information on

the Russian Federation accession process

 

The Russian Federation applied to the WTO in June 1993.

The Working Party was created on 16-17 June 1993.

The first meeting of the Working Party took place in July 1995.

The Working Party has met formally 31 times since 1995. Numerous informal meetings also took place.

Three ambassadors chaired the Working Party: Ambassador William Rossier (Switzerland) from 1995 to 2000, Ambassador Kare Bryn (Norway) from 2000 to 2003 and Ambassador Stefán Jóhannesson (Iceland) from 2003 to 2011.

 

General statistical information about the Russian Federation

(Sources: WTO statistics and World Bank)

 

Basic indicators

 

Population (thousands, 2010): 141 750

GDP (million current US$, 2010): 1 479 819

Current account balance (million US$, 2010): 71 129

Trade per capita (US$, 2008-2010): 5 279

Trade to GDP ratio (2008-2010): 51.5

Life expectancy at birth, total (years): 69 (2009)

Poverty headcount ratio at national poverty line (% of population): 11.1% (2006)

Unemployment, total (% of total labour force): 8.2% (2009)

CO2 emissions (metric tons per capita): 10.8 (2007)

Rank in world trade (2010)

 

Merchandise: 12 (exports) and 18 (imports)

Commercial services: 23 (exports) and 16 (imports)

Merchandise trade (2010)

 

Merchandise exports, f.o.b. (million US$): 400 132

Merchandise imports, f.o.b. (million US$): 248 738

Main destination of exports: European Union (52.2%), Ukraine (5.8%), Turkey (5.1%), China (5.1%) and Belarus (4.5%)

Main origin of imports: European Union (38.3%), China (15.7%), Ukraine (5.6%), United States (4.5%) and Japan (4.1%)

Principal goods traded (exports and imports): agriculture, fuels and mining products, manufactured products

Share in world total exports: 2.63%

Share in world total imports: 1.61%

Commercial services trade (2010)

 

Commercial services exports (million US$): 43 961

Commercial services imports (million US$): 70 223

Principle services traded (exports and imports): Transportation and travel

Share in world total exports: 1.19%

Share in world total imports: 2%

  

Fortune Brainstorm TECH 2016

WEDNESDAY, JULY 13TH, 2016: ASPEN, CO

 

8:00 AM–8:45 AM

BREAKFAST ROUNDTABLES

ENCRYPTION AND SECURITY FOR THE THREAT-SET

Ask any board chairman or CEO—the most pressing issue by far at any corporation this year is cybersecurity. Have you been hacked? (Yes.) Will you be hacked again? (Yes.) What can you do about it? Attend this session and hear from top industry experts about what to look for and what to do about it.

Steve Herrod, Managing Director, General Catalyst Partners

Paul Judge, Chairman, Luma

Lara J. Warner, Chief Compliance and Regulatory Affairs Officer, Credit Suisse Group

Michelle Zatlyn, Head of User Experience, CloudFlare

Moderator: Robert Hackett, Fortune

Intelligence track hosted by KPMG

 

PHOTOGRAPH BY Stuart Isett/Fortune Brainstorm TECH

German WWII Enigma encryption machine

-Oof! Here we are. Why’re we looking at this old place, anyways?-

 

Commissioner got an anonymous tip about it. Apparently Freeze’s been making trips here every now and then in-between attacks- dropping by with supplies and stuff like that.

 

-Ah- so it’s his base?-

 

That’s what Gordon thinks. Word is he’s got a high-tech lab in the basement. Seems important to him.

 

-Hey- what's this thing in the middle of the floor?-

 

-Yeah, what does he need this much tech for?-

 

-Probably a life-support system. You heard about his wife, right?-

 

Well, only one way to find out. C’mon, let’s move to the basement.

 

-------------------------------

 

Extracted From: Security Camera #992 at Cybertron Robotics

Video Recorded 10/6 16:14

Accessed 10/6 by commjgordon@gcpd.net passcode 09141992

CLASSIFIED

 

Emailed to: waynesecurity@oracle.net

Subject Line: Investigations

Encrypted Message Decrypt key 02011968

Still using codespeak? Encryption much faster. First part of security vid attached. They've gone offline in basement, try to boost power there- we need that footage.

Also- something going on at Club Olympus. Some sort of lighting storm building up- I don't trust it.

Can one of you check it out?

 

- G

SYSTEM ERROR

 

FOLLOWING MESSAGE IS CORRUPT

 

//rd. SYSTEM WIDE CHANNEL

//Encryption value #967J6_K8__46R-657H34S

M_ssage re_ds:

 

//D_spa_ch: ________ division, now designa_ed HITTEAM has l_ft the ISLAND. All units battle ready ACTIVE IMMEDI_TE_Y

 

ERROR...DATA VALUES MISSING

 

//: Precautions activat_d, ISLAND is sealed.

//HITTEAM We are on th_ m_ve. Land now designa_ed CROSSBOW. Air now designated SLINGSHOT. All un_ts provide code w_rd autho_iz_tion.

//CROSSBOW Kingfisher.

//SLINGSHOT Ferris Wheel.

 

//: Cod_s Acc_pted. Defense divis_ons report code w_rd.

 

//Def_nce: Ember.

 

// Acc_pted. Operation P_rad_se will procc_ed.

   

Borders are lines on paper.

 

[1][2][3][4]

Linux TCP flaw lets 'anyone' hijack Internet traffic0

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

This 7 days, we went to Barcelona for Mobile World Congress 2016. We covered a panel about cell advert blocking, Mark Zuckerberg talked about Absolutely free Fundamentals and encryption, Samsung announced the Galaxy S7 and S7 Edge, we went hands on with the modular LG G5, and oh, by the way, ...

First 1000 businesses who contacts honestechs.com will receive a business mobile app and the development fee will be waived. Contact us today.

‪#‎electronics‬ ‪#‎technology‬ ‪#‎tech‬ ‪#‎electronic‬ ‪#‎device‬ ‪#‎gadget‬ ‪#‎gadgets‬ ‪#‎instatech‬ ‪#‎instagood‬ ‪#‎geek‬ ‪#‎techie‬ ‪#‎nerd‬ ‪#‎techy‬ ‪#‎photooftheday‬ ‪#‎computers‬ ‪#‎laptops‬ ‪#‎hack‬ ‪#‎screen‬

 

honestechs.com/2016/02/27/highlights-from-mobile-world-co...

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

Vera's third photo-shoot, in which we get to play with some theatrical props and explore extreme opposites.

Wondering “is BitLocker good and a reliable solution to protect sensitive information from unauthorized access”? Microsoft BitLocker is a volume encryption feature that keeps the files safe and ensures efficient drive encryption. However, managing the BitLocker systems is itself a challenge which is possible to do effectively with the centralized cloud-based solution-BitTruster.

dark | light | closer

 

[1] [2] [3] [4] [5] [6] :: [semaphore] sensory

 

visual study in

perception of self

and the environment

in relation to the five

physical senses

  

A small compact Wi-Fi cloud camera with a ton of features to protect what you value the most. Check the best price at: koacctv.com/ezviz-mini-720p-hd-wi-fi-ip-camera/

• CLEAR VIDEO in 720p high definition

• 8x ZOOM & AUDIO RECORDING CAPABILITY

• GREATER VISIBILITY WITH NIGHT VISION

• MOTION DETECTION ALERTS

• MULTILAYER ENCRYPTION

• 16 GB LOCAL STORAGE, SD cards up to 64 GB

• EASY INSTALLATION

‪#‎Wi_Fi_camera‬, ‪#‎ezviz_camera‬ ‪#‎Ezvoz_mini‬ ‪#‎KOACCTV‬ ‪#‎security_camera‬

Digital files can be uploaded to the bitcoin blockchain, to be propagated with every transaction, and critically, in the current implantation, they can not be removed by anyone. As an early proof of principle, a picture was permanently inserted in 2011.

 

Now imagine that illegal content is inserted by someone (presumably from a geography where it is not illegal by international jurisdiction). From that point on, every participant will be trafficking in that illegal content, knowingly once the word gets out. So, the question becomes: what kind of content would motivate enforcement of the law, and/or public rejection of the system? DMCA and munition (encryption code) export violations are not quite motivating enough. Perhaps child porn or denigrating cartoons of Allah would do the trick in certain cultures. Anyone using bitcoin would be trafficking in these steganographically encoded images.

 

What am I missing? (And clearly, some people would not care about any of this; my question is whether this easy act would cripple mainstream adoption)

 

Meanwhile, HAPPY BIRTHDAY Bitcoin!

Today is six years from the first block.

Evolution knows no math, but it knows how to count. It pays scant regard to geometry and calculus, but it effortlessly employs techniques that make use of those very principles. It does not have intelligence, but it can build brains. It knows nothing of electrical engineering, but it constructs nervous systems we can only admire for their complexity and functionality.

 

How come?

 

We say we are rational beings and we trust in the scientific method. At the same time we entrust our systems to our unproven beliefs. We commit our governments’ secrets, and all of our Internet commerce, to mathematical encryption - which is based upon a single assumption: that multiplication cannot easily be reversed. We send people to war based upon assumptions, only to find out we were wrong afterwards. We assume that our systems and our strategies can protect us from natural disasters, and then New Orleans happens.

 

Why are we so confident?

 

If all else fails, most claim that they trust in God. But do we really? Given how little we know about ourselves and about the laws of nature, what makes us think we know more about Him?

 

Are we assuming too much?

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.

Board game letters spelling out privacy and encrypt. For attribution please link to www.comparitech.com/ Thanks!

"Cypherpunks is gripping, vital reading, explaining clearly the way in which corporate and government control of the internet poses a fundamental threat to our freedom and democracy". — Oliver Stone

 

"Obligatory reading for everyone interested in the reality of our freedoms." — Slavoj Zizek

 

"The power of this book is that it breaks a silence. It marks an insurrection of subjugated knowledge that is, above all, a warning to all." — John Pilger

 

Buy Cypherpunks Freedom and the Future of the Internet here: stores.ebay.co.uk/Iron-Man-Shop

 

Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.

 

Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?

 

The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.

 

Publication November 2012 • 192 pages

Paperback ISBN 978-1-939293-00-8 • Ebook ISBN 978-1-939293-01-5

 

Julian Assange is the editor in chief of WikiLeaks. An original contributor to the cypherpunk mailing list, Assange is the author of numerous software projects in line with the cypherpunk philosophy, including the Rubberhose encryption system and the original code for WikiLeaks. An 'ethical hacker' in his teens, and subsequently an activist and internet service provider to Australia during the 1990s, he is the co-author (with Sulette Dreyfus) of Underground, a history of the international hacker movement. "Julian is currently a refugee under the protection of the government of Ecuador, and lives in the Ecuadorian embassy in London."

 

Jacob Appelbaum is a staff research scientist at the University of Washington, and a developer and advocate for the Tor Project, which is an online anonymity system for everyday people to fight against surveillance and against internet censorship.

 

Andy Müller-Maguhn is a long time member of, and former spokesman for, the Chaos Computer Club in Germany. A specialist on surveillance he runs a company called Cryptophone, which markets secure voice communication devices to commercial clients.

 

Jérémie Zimmermann is the co-founder and spokesperson for the citizen advocacy group La Quadrature du Net, the most prominent European organization defending anonymity rights online and promoting awareness of regulatory attacks on online freedoms.

 

AN EXCHANGE FROM CYPHERPUNKS:

 

JULIAN:

I want to look at what I see as a difference between a US cypherpunk perspective and the European perspective, which I think is quite interesting. The US Second Amendment is the right to bear arms. Just recently I was watching some footage that a friend shot in the US on the right to bear arms, and above a firearms store it says 'Democracy, Locked and Loaded,' and that’s the way that you ensure that you don’t have totalitarian regimes – that people are armed and if they are pissed off enough, then they simply take their arms and they retake control by force. Whether that argument is still valid now is actually an interesting one because of the difference in the types of arms that have occurred over the past 30 years. So, we can look back to this declaration that code-making, providing secret cryptographic codes that the government couldn’t spy on, was in fact a munition, and this big war that we fought in the 1990s to try and make cryptography available to everyone, which we largely won.

 

JAKE:

In the West?

 

JULIAN:

In the West we largely won and it's in every browser – it is now perhaps being back-doored and subverted in different kinds of ways. The notion is that you cannot trust a government to implement the policies that it says that it is implementing, and so we must provide the underlying tools, cryptographic tools that we control, as a sort of use of force, in that if the ciphers are good no matter how hard it tries a government cannot break into your communications directly. Maybe it can put a bug in your house or whatever.

 

JAKE:

Force of authority is derived from violence. One must acknowledge with cryptography no amount of violence will ever solve the math problem.

 

JULIAN:

Exactly.

 

JAKE:

And this is the important key. It doesn't mean you can't be tortured, it doesn't mean that they can't try and bug your house or subvert it some way but it means that if they find an encrypted message it doesn't matter if they have the force of the authority behind everything that they do, they cannot solve that math problem. This is the thing though that is totally non-obvious to people that are non-technical and it has to be driven home. If we could solve all of those math problems, it would be a different story and, of course, the government will be able to solve those math problems if anyone could.

 

JULIAN:

But it's just a fact. It just happens to be a fact about reality, such as that you can build atomic bombs, that there are math problems that you can create that even the strongest state cannot directly break. I think that was tremendously appealing to Californian libertarians and others who believed in this sort of 'democracy locked and loaded,' and here was a very intellectual way of doing it – of a couple of individuals with cryptography standing up to the full power of the strongest suit of power in the world. And we're still doing that a little bit, but I wonder, I have a view that the likely outcome is that those are really tremendously big economic forces and tremendously big political forces, like Jérémie was saying, and that the natural efficiencies of these technologies compared to the number of human beings will mean that slowly we will end up in a global totalitarian surveillance society. By totalitarian I mean a total surveillance, and that perhaps there'll just be the last free living people – and these last free living people are those who understand how to use this cryptography to defend against this complete, total surveillance, and some people who are completely off-grid, neo-Luddites that have gone into the cave, or traditional tribes-people. And these traditional people have none of the efficiencies of a modern economy so their ability to act is very small. Are we headed for that sort of scenario?

 

JÉRÉMIE:

First of all, if you look at it from a market perspective, I'm convinced that there is a market in privacy that has been mostly left unexplored, so maybe there will be an economic drive for companies to develop tools that will give users the individual ability to control their data and communication. Maybe this is one way that we can solve that problem. I'm not sure it can work alone, but this may happen and we may not know it yet. Also it is interesting to see that what you’re describing is the power of the hackers, in a way – 'hackers' in the primary sense of the term, not a criminal. A hacker is a technology enthusiast, is somebody who likes to understand how technology works, not to be trapped into technology but to make it work better. I suppose that when you were five or seven you had a screwdriver and tried to open devices to understand what it was like inside. So, this is what being a hacker is, and hackers built the Internet for many reasons, also because it was fun, and they have developed it and have given the Internet to everybody else. Companies like Google and Facebook saw the opportunity to build business models based on capturing users' personal data. But still we see a form of power in the hands of hackers and what is my primary interest these days is that we see these hackers gaining power, even in the political arenas. In the US there has been these SOPA (Stop Online Piracy Act) and PIPA (Protect IP Act) legislations – violent copyright legislation that basically gives Hollywood the power to order any Internet company to restrict access and to censor the internet.

 

JULIAN:

And banking blockades like the one we're suffering from.

 

JÉRÉMIE:

Exactly. What happened to WikiLeaks from the banking companies was becoming the standard method to fight the evil copyright pirates that killed Hollywood and so on. And we witnessed this tremendous uproar from civil society on the Internet – and not only in the US, it couldn't have worked if it was only US citizens who rose up against SOPA and PIPA. It was people all around the world that participated, and hackers were at the core of it and were providing tools to the others to help participate in the public debate.

Motorola SECTEL 3500 STU-III phone installed with VDU (video display unit).

 

Allows encrypted video conferences, and attaches to larger screens & better cameras via RCA video/audio inputs and outputs in rear.

 

Requires 40w power adapter.

Silhouette: A-Line

 

Sleeve Length: Sleeveless

 

Embellishment: Ruched, Beaded, Appliques

 

Closure: Zipper

 

Fabric: Tencel Chiffon,Encryption Viscose,Lining

 

Built-In Bra: Yes

 

Waist: Natural

www.blackdressdirect.com/fashion-women-knee-length-one-sh...

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

Vera's third photo-shoot, in which we get to play with some theatrical props and explore extreme opposites.

  

LET’S GO TO FRUIT NINJA GENERATOR SITE!

 

[NEW] FRUIT NINJA HACK ONLINE REAL WORKS 100% GUARANTEED: www.generator.fewhack.com

Hack Deflects, Peachy Times, Strawberry Blasts, Juice and Starfruit: www.generator.fewhack.com

Unlock All Backgrounds and All Blades! All for Free guys: www.generator.fewhack.com

Please Share this real working online hack method: www.generator.fewhack.com

 

HOW TO USE:

1. Go to >>> www.generator.fewhack.com and choose Fruit Ninja image (you will be redirect to Fruit Ninja Generator site)

2. Enter your Username/ID or Email Address (you don’t need to enter your password)

3. Select Platform and Encryption then click “CONNECT”, Popup Success alert click “OK”

4. Select Features and Resources then click “GENERATE”, after that click “VERIFY”, finish verification process and check your account!

 

Try Another Secure Hack Online Generator Cheat Real Works 100% Guaranteed: www.fewhack.com

 

#generatorgame #onlinegeneratorgame #fewhack #generatorfewhack #fruitninja #fruitninjas #fruitninjamaster #fruitninjafree #fruitninjafail #fruitninjakinect #fruitninjaobsessed #fruitninjahd #fruitninjafx #fruitninjahighscore #fruitninjaaddict #fruitninjahzkrew #fruitninjafacts #fruitninjawarrior #fruitninjagame #fruitninjapro #fruitninjagummies #fruitninjachamp #fruitninjapussinboots #fruitninjaarcade #fruitninjagroup #fruitninja2 #fruitninjainreallife #fruitninjainthisb #fruitninjagenerators #fruitninjacheats

 

HACK FRUIT NINJA NOW!

Yep, it's me!!

 

Back in my apartment. Back on my high-speed internet backbone complete with 64-bit encryption. Back in my pad with my new room mates: paint fumes and eau de hardwood floor lacquer. Slowly catching up with all of you.

 

Simply, totally, un-aromatically, I am - in the words of Quincy Jones & Company -

 

Back On The Block

f/ Big Daddy Kane, Ice-T, Kool Moe Dee, Melle Mel

(Hit the play button in the right third of the page)

  

Back, on the block, so we can rock

With the soul, rhythm, blues, be bop and hip hop

 

Back on the block

Back on the block

 

[ VERSE 1: Ice-T ]

Ice-T, let me kick my credentials

A young player, bred in South Central

L.A., home of the bodybag

You wanna die, wear the wrong color rag

I used to walk in stores and yell: "Lay down!"

You flinch an inch - AK spray down

But I was lucky cause I never caught the hard time

I was blessed with the skill to bust a dope rhyme

All my homies died or caught the penzo

Lost their diamonds, cops towed their Benzos

Livin that life that we thought was it

Fast lanin, but the car flipped

I'm not gonna lie to ya, cause I don't lie

I just kick thick game, some people say: why?

Cause I'm back on the block, I got my life back

So I school the fools about the fast track

I get static from the style of my technique

Profanity, the blatant way in which I speak

But the Dude knows the streets ain't no kiddie game

You don't know the Dude? Quincy's his first name

He told me: "Ice, keep doin what you're doin, man

Don't give a damn if the squares don't understand

You let em tell you what to say and what to write

Your whole career'll be over by tomorrow night

Rap from your heart, and your heart's with the street

Rap on my record, man, Kimiko, send Ice the beat"

The Dude is def no doubt, what can I say?

The man can roll with Ice-T or Michael J

 

[ all ]

Back

Back on the block

Back

Back on the block

 

Back, on the block, so we can rock

With the soul, rhythm, blues, be bop and hip hop

 

Back on the block

Back on the block

 

[ VERSE 2: Melle Mel ]

I'm back, on the block, on the screen

I'm on the wax, I'm on the stage, I'm on the scene

I'm on the case, just like an attorney

The Dude took me on a magic journey

To dance in France, alone in Rome

On the farmlands of Nebraska, the cold of Alaska

The heat of the motherland

To be with my brotherman

On top of a snowcapped mountain I'm scoutin

What another man saw in a race of people

To see him give his life for the price of equal

The highest wisdoms, the richest kingdoms

The Song of Songs we heard David sing them

He showed me me when I was young and hung out

He showed me makin love, even showed me strung out

He showed me poppin nines, standin on a rock

But tears came to my eyes when he showed me my block

 

[ Tevin Campbell (& Andrae Crouch Singers) ]

Stokie's just Stokie, mama

(Stokie's Stokie)

And one by one each woman he kiss

(He kiss her and she gon' fall in love)

Stokie's just Stokie, you know?

(Stokie's Stokie)

Till someone shows that they care enough

(Ain't nothin gonna bother Stokie much)

Some say they can't take it no more

(Comin here, comin here startin stuff)

But Dude is back on duty fo' sho'

(Back on the block to stay)

They say he ain't gonna be with it

(Comin back, comin back to the street)

But Dude he know you'll never forget it

(Back on the block to stay)

 

[ VERSE 3: Big Daddy Kane ]

Back up and give the brother room

To let poetry bloom to whom

It may concern or consume

As I reminisce before this

The bliss that exist

But now we brought about a twist

Cause I remember of my people bleedin

Put through slavery and killed for bravery

We shoulda got our freedom much sooner

You never seen a blackman on _The Honeymooners_

But now somehow we've learned to earn, to grow, to show

The elevation of a people built is so

Jesse Jackson, Miss America a black one

No more livin for just a small fraction

I was once told by the Dude that knowledge is a food

To nourish, so to conclude

This from an Asiatic descendant, Big Daddy is shocked

Yo Q, we back on the block

 

[ all ]

Back

Back on the block

Back

Back on the block

 

Back, on the block, so we can rock

With the soul, rhythm, blues, be bop and hip hop

 

Back on the block

Back on the block

 

[ VERSE 4: Kool Moe Dee ]

An everlasting omnipresence is my present

State of being, seeing the unpleasant

Sight of righteous souls live like peasants

The mind stunts growth in adolescence

My insight enables me to enlight

The weakest of minds, and I put em in flight

As I transcend, a-scend or de-scend

Re-create, re-incarnate and re-send

The powerful spirits of our ancestors

For those that don't know how God blessed us

Because man messed up, the media dressed up

Lies perpetrated as truth, and it left us

Confused, but I've seen it all before

>From Babylon to the Third World War

I'm more than a man, I'm more like an entity

Back on the block, and this time my identity

Is the Dude

 

Ba-ba-ba-back on the

Ba-back on

Ba-ba-back on the block

Ba-ba-back on

Ba-ba-back on the block

 

[ Tevin Campbell (& Andrae Crouch Singers) ]

Stoki, ke Stoki, mai-bo

(Stoki, Stoki)

Wam babma, wam bamb'u mandisa

(Wahm bamba wahm bamboo mandisa)

(Stoki ke Stoki, mai-bo)

(Stoki, Stoki)

Wam babma, wam bamb'u mandisa

(Wahm bamba wahm bamboo mandisa)

M'yeke, yeke, yeke, wena

(Kha'mye, kha'myeke wena)

Yo khala, khala, khala, u mama

(Yo khal'u mama khe)

M'yeke, yeke, yeke, wena

(Kha'mye, kha'myeke, wena)

Yo khala, kha, 'yok 'shaya u baba

(Yok shaya u baba khe)

 

[ Rev. Jesse Jackson ]

(Now I would - I would contend that ah -

The rappers - rap is here to stay)

  

The legibility of an encry

pted message does not just

depend on the complexity

of the encryption algorith

m, but also on the placeme

nt. DCT is used to describ

e a finite set of patterns

, called macroblocks, that

could be described as the

64 character making up th

e JPEG image, adding lumo

and chroma values as inton

ation. If an image is comp

ressed correctly, its macr

oblocks become invisible.

The incidental trace of th

e macroblocks is generally

ignored as atifact or err

or.Keeping this in mind, I

developed DCT. DCT uses t

he esthetics of JPEG macro

blocks to mask its secret

message as error. The encr

ypted message, hidden on i

mage is only legible by th

e ones in the know.///////

   

Well-trained fighting men.

CHECK.

 

Newest and the best contemporary military technology on land, sea, or in the air.

CHECK.

 

Eager, fearless, and courageous Canadians, British, and American Infantry.

CHECK.

 

Hasty, cavalier plan of attack with unrealistic objectives (capture the port and hold it for two tides, gather intelligence from prisoners and captured material, lure the Luftwaffe into open battle, and steal German encryption equipment for Allied code-breakers) .

CHECK.

 

Imminent disaster for all involved.

CHECK. CHECK.

  

AUGUST 19, 1942…all of Europe was under Nazi domination.

 

Ignoring that sobering point that should have been reflected upon…the Raid on the French coastal town of Dieppe began in earnest, at 5am…as 6,000 men storm the six beaches of Dieppe.

 

While Churchill and Admiral Mountbatten presumptuously oversaw and authorized the raid, months before General Montgomery had been firmly against raiding the French sea port, or any French sea port. He predicted disaster. However, and unfortunately for Canada, Montgomery was now in North Africa heading up the desert campaign…so cooler heads would not prevail in this August of '42, as the Canadian government and the Chiefs of Staff concurred with Churchill and Mountbatten to authorize the suicidal raid that consisted mostly of Canadians.

 

Since June, months before the ill-fated raid, the BBC had been warning the occupied French coastal towns to evacuate because war was coming to the neighbourhood. Typical misguided leftist sympathies. And what was the actual effect of these dire BBC radio warnings? Did the French citizens leave?

 

Nope.

 

But the Germans listened and dug in even deeper and reinforced the entire French coast against such an attack!

 

Good one, BBC!

 

Air recon units of the Nazi Luftwaffe confirmed a build up of Allied military activity along the Southern English coast, while simultaneously French double-agents warned of a British interest in Dieppe.

 

And to add a final stupidity to the mix, those emasculated Canadian and British military personnel ninnies that planned the Dieppe Raid felt they should play nice, avoid civilian losses, and not anger the traitorous collaborating Vichy government by letting the beach area reap the whirlwind.

 

So the trusting Canadians were expected to make a full frontal assault on those fortified beaches of Dieppe without prior air and naval bombardment of the port city's defences!

 

Huh?

 

THAT was never done before. Ever.

 

You always bomb the hell out of the landing arena.

 

How do you spell die, as one of the Canadian soldiers from the 2nd Canadian Infantry noted while enroute to his demise at Dieppe?

 

"Why look the first three letters of Dieppe are D-I-E …" he noted ominously.

 

Two days before the raid, on August 17, former footballer turned high school teacher, Leonard Dawe compiled the Daily Telegraph crossword with the clue "French port". The answer appeared in the English newspaper the following day. The answer was Dieppe!

 

Was Dawe passing intelligence on to the enemy?

 

The War Office called up the Scot, Lord Tweedsmuir, who was then assisting the Canadian Army as a senior intelligence officer. Dawe needed to be investigated. Tweedsmuir called upon MI5, the counter-intelligence and security agency of Great Britain.

 

After an immediate and intense inquiry of Dawe, at his home, it was determined the crossword containing the solution, was a complete fluke, a MERE coincidence!

 

Dawe was cleared of any suspicion.

 

Fast forward to 1944, one month before D-Day. Another crossword coincidence authored by Dawe appears in the Telegraph. This time there are multiple references to Operation Overlord, or D-Day, the Allied invasion of North Eastern Europe. Heck, even Overlord appeared in the crossword on May 27! Previous Dawe crosswords had contained, Juno, Gold, Sword and Omaha which were all code names for beaches assigned to various Allied forces. Juno was the beach assigned to the Canadian attack force. This was too much. MI5 was again called in to investigate the crossword compiler, Dawe.

 

In the end it is again concluded that relevant invasion terms that appear in Dawe's Telegraph crossword were an explainable coincidence.

 

However, the general public didn't find out the "rest of the story" until 1958 when Dawe appeared in a BBC TV interview. At the time, during the war, Dawe would encourage his school kids to come into his study and help him fill in the blank crossword puzzles. They provided the solution word. Then Dawe would create the clues for their chosen words.

 

In the end, the British teenagers were getting the code words from Canadian and American soldiers who were billeted close to Dawe's school!

 

Mystery solved. Now, back to the raid.

 

When the Dieppe Raid was over at 10:50 am that morning, 3,367 Canadians were dead, wounded or captured! The Canadians had landed on the beach only to be pinned down, and trapped on that beach by the high sea wall and the German machine guns.

 

The British suffered 934 dead, wounded, or captured.

 

The Germans were unimpressed with the raid.

 

General Conrad Haase described the Dieppe Raid as "incomprehensible". How could a single division be expected to overrun a German regiment that was heavily fortified in its surroundings and supported in that position by heavy artillery.

 

The Churchill tanks although a new and fresh British design were "easy to fight", "poor and obsolete".

 

German Field Marshall Von Rundstedt noted the Allies would not have another Dieppe because "it has gained that experience dearly."

 

…and notably, from Wikipedia,

 

ALLIED ANAYSIS of the DIEPPE RAIDTHE LESSONS LEARNED AT DIEPPE essentially became the textbook of “what not to do” in future amphibious operations, and laid the framework for the Normandy landings two years later.

 

Most notably, Dieppe highlighted:

 

1. the need for preliminary artillery support, including aerial bombardment;

 

2. the need for a sustained element of surprise;

 

3. the need for proper intelligence concerning enemy fortifications;

 

4. the avoidance of a direct frontal attack on a defended port city; and,

 

5. the need for proper re-embarkation craft.

 

As a consequence of the lessons learned at Dieppe, the British developed a whole range of specialist armoured vehicles which allowed their engineers to perform many of their tasks protected by armour, most famously Hobart's Funnies. The operation showed major deficiencies in RAF ground support techniques, and this led to the creation of a fully integrated Tactical Air Force to support major ground offensives.

 

Another effect of the raid was change in the Allies' previously held belief that seizure of a major port would be essential in the creation of a second front. Their revised view was that the amount of damage that would be done to a port by the necessary bombardment to take it, would almost certainly render it useless as a port afterwards. As a result, the decision was taken to construct prefabricated harbours, codenamed "Mulberry", and tow them to lightly defended beaches as part of a large-scale invasion.

 

(FAMOUS DIEPPE photos tinted, cropped, blown out by me)

 

these were all on my desk about a week ago. each pattern a different financial institution.

Headline news states that in the UK many businesses and NHS Trusts ave been victims of a computer encryption virus - here is how it may have happened. An incoming eMail to an employee refers to an unpaid invoice, the employee clicks on a link to an external website (eg. Sharepoint) where the criminal hackers have been allowed to host their encryption ransomware / malware.

 

170510-BTInvoiceMalicious-SharepointUsedA

1 2 ••• 4 5 7 9 10 ••• 79 80