22021
My Thoughts on America in June of 2018 - Daniel Miessler
I feel like America is special, and that we should keep this equality and populist concept from the 50’s, where the boss only made like 3-5x what you made. And everyone still lived in the same neighborhood.

It’s not like that at all now. Not anymore

Star Trek is very equal. It’s equal because money has stopped being the focus, replaced by intellectual curiosity, public service, and other higher pursuits

Basic Needs - It's hard to earn things these days. That’s the problem.

They’re either given to us (not earned), or they’re impossible to earn no matter how hard you try.
politics  russia  economics  china  wealth  society  danielmiessler  startrek  suicide  happiness  violence 
17 hours ago
Pelican Elite EL-22 case review & replacement - YouTube
drill 3 holes through top for warranty
Warranty alone makes the Elite worthwhile
pelican  case  warranty  travel  airlines 
yesterday
It might only be a couple years away. - Recession by 2020?
There’s nothing wrong with a low unemployment rate. But as workers grow scarce, wages rise, which means companies need to charge more for products and services, which generates more inflation. The Federal Reserve responds by raising interest rates, to prevent inflation from getting too high. Higher rates, in turn, depress investment and spending, stress some borrowers and cause some loan defaults. This pattern, in itself, doesn’t necessarily cause a recession. But toss in external factors such as an energy shock, an asset bubble or bad government policy and the economy can easily contract for half a year or more, which is the traditional definition of a recession.
economics  finance  recession  politics 
yesterday
China will have world's most powerful naval gun by 2025: US intelligence report
The rounds used in China's railgun cost between $25,000 and $50,000 each, according to the intelligence assessment. Though not an exact comparison since the weapons have different technologies, the U.S. Navy's Tomahawk cruise missile has an estimated price tag of $1.4 million each.

China's railgun was first seen in 2011 and underwent testing in 2014, according to people who spoke to CNBC on the condition of anonymity. Between 2015 and 2017 the weapon was calibrated to strike at extended ranges, increasing its lethality. By December 2017, the weapon was successfully mounted on a warship and began at-sea testing, a feat no other nation has accomplished.
railgun  china  military 
yesterday
Supreme Court rules that states can force online shoppers to pay sales tax
States have broad authority to force online retailers to collect potentially billions of dollars worth of sales taxes, the U.S. Supreme Court ruled on Thursday, siding with South Dakota in its high-profile fight with e-commerce companies.

The justices, in a 5-4 ruling against Wayfair, Overstock.com and Newegg, overturned a 1992 Supreme Court precedent that had barred states from requiring businesses with no "physical presence" in that state, like out-of-state online retailers, to collect sales taxes.
internet  taxes  shopping  law  supremecourt 
yesterday
Denali or Mount McKinley? - Denali National Park & Preserve (U.S. National Park Service)
On the eve of the National Park Service’s 100th anniversary, the name of the highest peak in North America changed from “Mount McKinley” to “Denali.” The timing of the change not only helps mark the agency’s centennial, it shines a light on the long human history of the park, and illuminates a naming debate that has lasted more than 100 years.
alaska  denali  photography  travel  nationalparks 
2 days ago
GIAC - Certified Detection Analyst (GCDA)
The GIAC Certified Detection Analyst (GCDA) is an industry certification that proves an individual knows how to collect, analyze, and tactically use modern network and endpoint data sources to detect malicious or unauthorized activity. This certification shows individuals not only know how to wield tools such as Security Information and Event Management (SIEM) but that they know how to use tools to turn attacker strengths into attacker weaknesses. - Justin Henderson, SANS SEC555 Course Author
sans  giac  cybersecurity  certification 
2 days ago
Display or hide zero values - Excel
Hide zero values in selected cells
1.Select the cells that contain the zero (0) values that you want to hide.
2.You can press Ctrl+1, or on the Home tab, click Format > Format Cells.
Format Cells on the Home tab
3.Click Number > Custom.
4.In the Type box, type 0;;;@, and then click OK.

for 0.0 or 1 decimal point formatting, use "0.0;;;@"
excel  support  spreadsheet 
3 days ago
Interview with National Park’s “Ansel Adams,” Jarob Ortiz – Studio C-41
From day one, Jarob hit the ground running. Architects came to him as he was walking through the door ready to go shoot. He didn’t have a chance to inventory his systems or check on the status of the darkroom, which hadn’t been used in nearly three years.

We learned a lot about his process. While the goal of his work is to document architecture through the use of photography, he does find that he has artistic freedom with his imagery. It is incredibly important that his images are perfectly exposed; never leaving out a single detail to the shadows. He has to get everything in the image within 5-stops, zones 3-8. He accomplishes that through a spot meter and calculating the required light through a set of strobes to give detail in those darkest points of his images.

He works primarily with a 5×7 Canham Camera and a series of Schneider-Kreuznach and Nikon lenses designed for 8×10 cameras. He shoots primarily with Ilford FP4 sheet film for black and white, and, while it’s still available, Fujifilm Velvia 100 and Provia 100F for his 4×5 color work. While it is most notable for its archival capabilities, new factors hinder the sustainability of using film to archive his work:

The Library of Congress has assured that digital imagery can be preserved and adequately archived.
The E6 process is dying. Fujifilm is the only supplier for large format slide film.
As a result, the National Park Service is preparing to move into digital technical cameras strapped with Phase One 100 Megapixel backs. These cameras can now provide the resolution and color needed for archiving digital imagery.
nationalparks  anseladams  jarobortiz  filmphotography  phaseone 
3 days ago
What is Focus Shift? - Photography Life
When the lens is stopped down (the size of the aperture is decreased), light rays no longer reach the edge or the “periphery” of the lens and only the ones close to the optical axis make it through. As a result, the point of best focus with the circle of least confusion is moved to the right, as shown in the second illustration above. If focus is not re-adjusted after this change of aperture, it will shift the sharpest focus plane (hence the name “focus shift”) away from the lens, essentially moving it slightly behind the focused area. Imagine focusing on an eye, only to find out later that you ended up with a nose in focus instead, just because you changed camera aperture.

AF Fine Tune function in some advanced cameras like Nikon D7000 is not going to help, because it does not allow micro-adjusting focus for different apertures. If you adjust focus for a lens at f/2.8, focus will certainly shift at f/1.4 and vice-versa.

Anyway, here is the list of tricks or workarounds to reduce focus shift:

1) Use maximum aperture – take pictures at the maximum aperture and you won’t have to worry about focus shift. Might not be practical for most lenses, because they are soft wide open. See the next bullet point for an alternative solution.
2) AF Fine Tune optimal aperture – if your camera has the ability to fine tune autofocus, set your lens to its optimal aperture that you will be primarily using, then fine tune autofocus. You will then have to shoot at this optimized aperture all the time and stop down when needed. Using larger apertures will result in focus errors after this type of calibration.
3) Use a slower lens – if you want to avoid focus shift problems, use slower f/1.8-f/2.8 lenses that have much less issues with focus shift.
4) Stop down the lens – usually stopping down the lens to apertures smaller than f/2.8 will take care of the focus shift problem due to increased depth of field. Not very practical for fast aperture lenses, but will certainly take care of the problem.
5) Use Contrast Detect AF – not practical for most situations, because Contrast Detect AF is slow and requires the mirror to be raised up, blocking the viewfinder.
6) Use Manual Focus Lenses with Aperture Rings – a manual focus lens with an aperture ring will allow you to control the aperture from the lens, so you can stop it down before manually acquiring focus. You will have to reacquire focus every time you change aperture though.
focus  dof  focusshift  photography  reference  lens  autofocus  manualfocus  optics  science 
3 days ago
A pack of wolves is about to save this national park | Popular Science
When a Chicago man brought his sick dog on a fishing trip to Isle Royale National Park, he set off the outbreak of a virus that would devastate the island’s wolves. The disease, canine parvovirus, “went through the population of wolves like wildfire,” says Phyllis Green, superintendent of the park, a boreal forest on the western edge of Lake Superior, in Michigan. None of the wolf pups survived the winter. Within two years, 36 of the island’s 50 wolves were dead. That was 1982. Today, only two wolves roam the island. The pair is an inbreeding disaster—the father mated with his mother, so his daughter is also his sister. Unable to reproduce, the predators were all but certain to die out.

That was until earlier this month, when the National Park Service announced its final decision to reintroduce 20 to 30 wolves to Isle Royale over the next three to five years, starting as early as September. “This is a bold action,” says Lynn McClure, regional director for the National Parks Conservation Association. “It’s the first big step towards getting the wolves back.”
conservation  michigan  wolves  nature 
3 days ago
This giant demon plant gives you burns if you touch it, and it's spreading | Popular Science
This horrifying nightmare of a plant mostly grows in the northeastern part of the U.S., but recently it’s been spreading. Folks recently found a patch of giant hogweed in Virginia, considerably farther south than the plant has crept in the past. Unlike many other invasive species, it’s not just harmful to the environment—it’s directly harmful to humans.
weed  sunburn  science  medical 
3 days ago
Yes, a tax bill can—and likely will—spoil America’s most pristine wildlife refuge | Popular Science
he Arctic National Wildlife Refuge is the largest swath of undeveloped land in the United States—a pristine frontier boasting unparalleled biodiversity and natural beauty. Protected by law for decades, the region is now at risk. And surprisingly, a tax bill is to blame for its peril.

The Tax Cuts and Jobs Act of 2017, greenlit by President Trump and Secretary of the Interior Ryan Zinke, could put 2,000 acres of ANWR land up for sale by summer 2019.
alaska  oil  trump  nature 
3 days ago
Inside the facility where Kodak brings film back to life | Popular Science
2018-06-13T09:30:00-04:00 Since 2015, a growing enthusiast market and a goose from cinematic heavies such as directors J.J. Abrams and Christopher Nolan have helped 35-millimeter-film sales rebound. The trend spurred Kodak to revive Ektachrome.

Over the past 18 months, the Rochester, New York, company has worked to fine-tune the chemical mix that made the iconic film. Kodak will have it back in the hands of photographers later in 2018. Here’s a look at how thin strips of acetate become tiny blank canvases.
photography  kodak  ektachrome 
3 days ago
Google reveals how to simulate shallow DOF from a single mobile camera: Digital Photography Review
Google has published an 18-page study fully detailing the synthetic depth-of-field technology that makes its single-camera Portrait Mode possible. Google introduced its evolved Portrait Mode feature on the Pixel 2 and Pixel 2 XL, though neither smartphone model has the dual-camera hardware typically required to produce this effect.

Some mobile camera apps attempt to simulate a shallow DOF by separating an image's pixels into two layers, isolating the foreground, and then blurring the remaining pixels; this is called semantic segmentation. The lack of depth data, however, means the software doesn't know how much blur to apply to any arbitrary object in the scene. The results can often be lackluster or unrealistic, without the gradual optical blur expected of objects receding into the distance.

That's where Google's "authentic defocus" technology comes in. The Pixel 2 smartphones utilize the semantic segmentation method for images taken with the front-facing camera, but they also use a stereo algorithm for images taken with the rear camera... despite there only being a single lens
photography  portrait  bokeh  dof  google  smartphone 
3 days ago
Behind the scenes of Drew Gardner's gigapixel shot of British royal family: Digital Photography Review
I love the Fujifilm GFX 50S. It really suits the way I shoot medium format camera, and it weighs less than most DSLRs. Image quality is stunning and it has proven very reliable.

What I really like about the GFX is its high ISO performance. Even though the light was excellent I shot at ISO 1600 to allow me to stop down to F11-16 for better depth-of-field. To move the camera I used a Seitz VR drive motorized head - the same head that I use for all my 360 degree still images, too.
gigapixel  royalwedding  photography  stitching  fujigfx 
3 days ago
Kenneth Lee Gallery - Technique
Piezography Pro is impressive: superb tonality, highest dMax, optimized gloss and matte options. Most important: the ability to combine neutral, warm and cool shades along the tonal scale. My favorite toning effect consists of warm shadows which smoothly transition to neutral high values: a linearized "split-tone".
largeformat  photography  scanner  film  advice  reference  monitor  printing 
3 days ago
Joey L. - THAILAND'S COCONUT FARMERS
An intimate portrait of Thailand’s coconut farmers


I recently travelled to Thailand’s Ratchaburi province to photograph the farmers of Harmless Harvest— a popular fair trade, organic coconut water. Rather than the typical advertising campaigns of palm trees and coconuts on a beach, we set out to create a window into the life of the real agriculturists behind the label: the harvesters who work on family-run plantations. These portraits would be used all over Los Angeles, New York, and beyond as print advertisements and billboards.

The people we chose to celebrate in the images are hardworking and proud stewards of nature. Within the vast irrigation canals of the coconut fields is an ecosystem of mixed agriculture: rare herbs on top to prevent soil erosion, medicinal grasses grown on the sides, and schools of fish within the water itself. Instead of using pesticides, a variety of beneficial insects are released into the fields to battle pests.
thailand  coconut  portrait  blackandwhite  joeyl  portraiture  documentary  photos 
4 days ago
Amazon to block Australians from shopping on its international sites - The Verge
Australian shoppers will find themselves limited to a much smaller Amazon item selection beginning on July 1st. Instead of being able to visit and make purchases from international versions of Amazon’s web store — as most of us can do — they’ll be redirected to the local Australian site. Geoblocking isn’t the only strategy Amazon is taking; Amazon.com and the company’s other sites will no longer ship to Australian addresses as of the same date.

When I say “much smaller,” Amazon’s local Australia site still sells tens of millions of products, but it’s definitely a significantly lesser total than you’d find from Amazon’s US site. Reuters estimates that it offers one-tenth of Amazon.com’s selection. All the basics should be readily available, but this will be a real problem for certain item categories.

The move is the result of Amazon’s unwillingness to cooperate with Australia’s updated GST (goods and services tax), which would require the online retail giant to collect a 10 percent tax on all purchases that are shipped to Australia from overseas; previously the GST only applied to imported items over A$1,000.
amazon  australia  taxes  internet 
8 days ago
In Apple Mail, There’s No Protecting PGP-Encrypted Messages
In a nutshell, the EFAIL attack works like this: First, the attacker needs a copy of a message that’s encrypted to your public key. They could get this by hacking your email account, hacking your email server, compelling your email provider to hand it over with a warrant, intercepting it while spying on the internet, or other ways. PGP was specifically designed to protect against this — the promise of PGP is that even attackers with copies of your encrypted messages can’t decrypt them, only you can. When you receive an email that’s encrypted to your public key, your email client automatically uses your secret key to decrypt it so that you can read it. The EFAIL researchers discovered that they could craft a special email that secretly includes a stolen encrypted message within it, and then send it to you. When you receive the malicious email, your email client uses your secret key to automatically decrypt the pilfered message within the malicious email, and then sends a decrypted copy of the stolen message back to the attacker — for example, through a web request to load an image into the email.
efail  encryption  pgp  gpg  email  cybersecurity 
8 days ago
New PGP Encryption Exploits Are Being Discovered Almost Every Other Day
Gizmodo was alerted to flaws discovered as recently as Wednesday that currently impact multiple PGP implementations, including Enigmail (Thunderbird) and GPGTools (Apple Mail)—the technical details of which are withheld here while the appropriate developers are contacted and given time to address them.

“It wasn’t a case of having to write software to do this. You could literally just cut and paste what they said in the paper and use it. The video of how easy it was to use, that was the thing that clinched it for me—sitting and watching a video of someone just clicking a few buttons and being able to exfiltrate data.”

“It’s sometimes better to [temporarily] disable encryption (or decrypt in the terminal) than to have your whole past communication at stake.”
pgp  gpg  cybersecurity  crypto  encryption  efail  vulnerability 
8 days ago
U.S. Imposes New Russia Sanctions Over Cyberattacks, Threats to Undersea Internet Cables
The Associated Press reports the sanctions were a response to last year’s NotPetya attack, as well as “intrusions into the U.S. energy grid and global network infrastructure.” The report says the U.S. also detected Russian efforts to track undersea cables carrying global internet communications.

U.S. intelligence officials have long worried that Russian submarines might attack the cables. Russian ships have for years been tracked along their routes in the North Sea and even close to Eastern Coast of the United States.
russia  sanctions  cybersecurity  notpetya  underseacables 
8 days ago
Fired FBI Official Discovers Former Employer Sucks at Transparency
That a career FBI official of some 22 years had the occasion to gripe about the bureau’s lack of transparency and disregard for FOIA regulations is priceless—at least, to virtually anyone who’s battled the bureau for access to public records at any point over the past several decades.
foia  fbi  irony 
8 days ago
I can be Apple, and so can you | Okta
A bypass found in third party developers’ interpretation of code signing API allowed for unsigned malicious code to appear to be signed by Apple.
Known affected vendors and open source projects have been notified and patches are available.
However, more third party security, forensics, and incident response tools that use the official code signing APIs are possibly affected.
Developers are responsible for using the code signing API properly, POCs are released to help developers test their own code.
The bypass affects Fat/Universal file format and the lack of verification of nested formats.
Affects only macOS and older versions of OSX.

Conditions for the vulnerability to work:

The first Mach-O in the Fat/Universal file must be signed by Apple, can be i386, x86_64, or even PPC.
The malicious binary, or non-Apple supplied code, must be adhoc signed and i386 compiled for an x86_64 bit target macOS.
The CPU_TYPE in the Fat header of the Apple binary must be set to an invalid type or a CPU Type that is not native to the host chipset.
apple  codesigning  cybersecurity  certificates  osx 
8 days ago
Apple macOS Security: Flaw Let Malware Pose as Apple Software
The vulnerability is in how vendors such as Google and Facebook verify the origin of code to ensure it hasn’t been modified. Tools produced by these companies and several others use official code-signing APIs to confirm that code can be trusted. The method being used was flawed, however, making it easy for a hacker to pass off code as if it had been signed by Apple—to masquerade as Apple, in other words.

The issue was discovered by security firm Okta in February 2018.

In remarks published by Okta, Apple seems to indicate it was the developers’ fault for not running the checks properly. The developers, meanwhile, say that Apple’s documentation—which has supposedly been updated—was both confusing and unclear. Given the wide range of products affected, the latter seems more than likely.
cybersecurity  codesigning  certificates  apple  software  microsoft 
8 days ago
NASA wants its long-lost Moon dust back
When the Apollo 11 crew returned from its historic flight in 1969, the Moon rocks and soil collected made their way to no less than 150 labs worldwide. One of these was the Space Sciences Laboratory in Latimer Hall on the UC Berkeley campus. But after tests on the dust were completed, the samples were supposed to have been sent back to NASA.
nasa  moon  science 
8 days ago
Woman Sues NASA to Keep Its Hands Off Her Precious Vial of Neil Armstrong Moon Dust
Armstrong was allegedly friends with Cicco’s father, late U.S. Army Air Corps pilot Tom Murray. Both men were reportedly members of Quiet Birdmen, a secret club for male aviators. Armstrong reportedly gave the vial to Cicco in the ‘70s, which included a handwritten note on the back of one of her father’s business cards. It reads: “To Laura Ann Murray — Best of luck — Neil Armstrong Apollo 11.”
nasa  moon  history  legal 
8 days ago
A Swarm of Drones Ruined an FBI Hostage Raid
“They had people fly their own drones up and put the footage to YouTube so that the guys who had cellular access could go to the YouTube site and pull down the video,” Mazel told the conference.

Of course, law enforcement isn’t exactly innocent on this front either, as they have their own questionable intentions for the technology. Local and federal agencies have been all too happy to try to push for drones that can be used to do everything from intercepting cell phone signals to spying on citizens without a warrant to killing people.
drones  privacy  cybersecurity  fbi 
8 days ago
Humans Are the Weakest Link: Tales of a Social Engineer
was able to covertly gain access to a CEO’s office—only, he didn’t know the CEO had his own private security. It was only after he had been tackled and hogtied that the security staff learned that he’d actually been hired to burglarize the office.
pentest  cybersecurity  socialengineering 
8 days ago
NSA Accredits Seven Companies In National Cyber Security Program - Defense Daily Network
18 June 2014 - The National Security Agency (NSA) on June 6 said it has accredited seven companies under its National Security Cyber Assistance Program (NSCAP), showing the companies have consistently demonstrated cyber incident response assistance (CIRA) to owners and operators of National Security Systems. 

The accreditations are the first by the agency under NSCAP.

Lockheed Martin’s [LMT] Information Systems and Global Solutions business, one of the qualified vendors, announced their accreditation on June 5. The other companies receiving CIRA accreditation by the NSA are Booz Allen Hamilton [BAH], CrowdStrike Services Inc., FireEye Inc. [FEYE], Mandiant, which was acquired by FireEye after it had begun the assessment, Maddrix LLC, and Verizon [VZN].

The accreditations expire on May 26, 2015. The companies earned the CIRA accreditation by undergoing a positive assessment in 21 critical focus areas derived from industry and government best practices. Some of the focus areas are incident analysis, containment and remediation, rules of engagement, and network traffic data collection and analys
nsa  iad  cybersecurity  incidentresponse 
9 days ago
CREST Signs Cyber Security Incident Response Agreement With NSA
The NSA's IAD provides advanced Cyber Incident Response Assistance (CIRA) and Vulnerability Assessment (VA) services to address a growing number of sophisticated security incidents against National Security Systems (NSS). The National Security Cyber Assistance Program (NSCAP) was created to leverage the cyber expertise of industry to perform select cyber security services for NSS owners and operators. Accreditation of highly qualified commercial industry partners capable of consistently providing a high level of cyber security assistance services is based on a stringent set of criteria created from NSA, Industry and Government best practices.
dfir  cybersecurity  nsa  iad  incidentresponse 
9 days ago
Determining the effective speed and development time – Printer Attic
To illustrate the methods, I will show you the (intermediate) results of my attempt at characterizing Ilford FP4+, but it will easily apply for other films as well. The procedures below can also be found in Beyond Monochrome (2e) by Lambrecht and Woodhouse in the chapter titled “Customizing Film Speed and Development” and in Beyond the Zone System by Phil Davis. Lambrecht and Woodhouse outline three ways of finding the effective film speed and development time: a quick and easy rule of thumb (will be briefly discussed below), a fast and practical test you can do without a densitometer, and the full densitrometric approach that requires plenty of tests and a densitometer.
largeformat  exposure  iso  reciprocity  darkroom  advice  development  fp4  densitometer 
9 days ago
Profile No. 3—Jacob Morel (@seven.thirty.one) – Profiles in Photography
In that same year, Morel’s girlfriend gave him the Yashica twin-lens reflex he uses today. Though he never abandoned digital, he fell in love with film for its verisimilitude. “The wide latitude I was able to obtain in a single exposure was a different level I hadn’t ever been with my work,” he wrote. “When shooting film, I had every detail I wanted in the brightest of my highlights and in the darkest of my shadows.” He prefers Fujifilm’s Provia 100F slide film today, partly for personal reasons: he is red-green, blue-purple, and yellow-green colorblind, which makes color-correcting film scans especially difficult. With slides, which display a positive image and don’t have negative film’s orange cast, Morel is able to see what the final corrected scan should look like simply by looking at the film, and consequently spends much less time in post.
photographer  interview  baltimore  provia  friends 
11 days ago
These are the film stocks Fujifilm will abandon in 2018 - DIY Photography
MARCH 2018
The first round of product culls begins in March. Several 3 and 5 packs of film are being killed off, although single rolls should still be available. Obviously, though, single rolls come at a greater overall cost, and who knows how long those will last?

Fujicolor Superia X-Tra 400, 24 exposure, 3 packs
Fujicolor Superia X-Tra 400, 36 exposure, 3 packs
Fujichrome Velvia 50, Professional, 36 exposure, 5 packs
Fujichrome Velvia 100, Professional, 36 exposure, 5 packs
Fujichrome Provia 100F, Professional, 36 exposure, 5 packs

MAY 2018
This is where we start to see the actual killing off of certain stocks. Large format photographers will not be happy.

Fujicolor Natura 1600, 36 exposures, individual rolls
Fujicolor 1600 Single Use Cameras (39 and 27 exposures)
Neopan 100 Acros 4×5 (20 pieces)
Neopan 100 Acros 8×10 (20 pieces)
fuji  fujifilm  filmphotography  discontinuation  provia  acros  velvia 
11 days ago
US Spy Satellites Used to Drop Photos in 'Film Buckets' from Space for Airplanes to Catch in Mid-Air
1960s US Air Force satellites had to drop film with a parachute to be caught by a plane.

Strange as this seems, this is in fact how it worked, as you can see in the video above. Photographs captured by these so-called “Corona” satellites were shot on special 70 millimeter Kodak film using two panoramic cameras that evolved over the course of the program.

The satellites carried anywhere between 8,000 and 16,000 feet of film per camera (depending on the year and thickness of the film) and once one of these rolls was spent, it would be jettisoned in a GE reentry capsule nicknamed “film bucket.” This is where it gets interesting.

Of course, there were other, less dramatic ways to recover these capsules. They were also designed to be able to land at sea, where a salt plug would slowly dissolve and sink the film if it wasn’t recovered within two days. And after one was discovered by a Venezuelan farmer in ’64, the US Government stopped labeling them “Secret” and instead offered a reward in eight languages to anyone who returned it to the United States.
spy  history  photography  satellite  coldwar  video  petapixel 
11 days ago
Creative Applications of Color Theory in Landscape Photography
Processing Tips: There is a wide variety of options for editing colors selectively in Adobe Lightroom, Photoshop, or similar applications. Targeted masks in Photoshop provide the greatest amount of control, especially those based on color or luminance values in an image, such as luminosity masks. Regardless of whether or not you use masks, the following options are very useful for editing specific colors:

• The HSL panel (Adobe Camera Raw/Lightroom).
• A Selective Color adjustment layer (Photoshop).
• A Hue/Saturation adjustment layer set to a single color rather than the “Master” setting. (Photoshop).
• A Curves adjustment set to a single color channel rather than the composite channel (Lightroom and Photoshop).
photoshop  landscape  photography 
11 days ago
Camera, Aerial, Hycon 73B | National Air and Space Museum
During the Cold War, the Hycon 73B installed in the Lockheed U-2 reconnaissance aircraft, was an essential intelligence-gathering tool of the United States. As the world's premier high-resolution, high-altitude camera, it enabled the United States to conduct routine reconnaissance in relative safety and to observe global hot spots in astonishing detail. In October1962, this B camera, as it was also known, provided positive proof of the existence of Soviet missiles in Cuba, precipitating a crisis that led the world to the brink of nuclear war.

Shooting through seven glass encased windows in the belly of the U-2, the B camera recorded everyting along a 3,500 km (2,700 mile) course up to 200 km (125 miles) wdie, and it could provide up to 4000 pairs of stereoscopic photographs. The 36-inch focal length lens resolved features as small as .75 m (2.5 feet) from an altitude of 19.6 km (65,000 feet). The Central Intelligence Agency displayed this B camera in a 1972 Cuban Missile Crisis exhibit at CIA Headquarters and then, in 1977, transferred it to the Museum along with light tables and elevating tables used in photographic interpretation.

Shortly after the end of World War II, Dr. Edwin Land, an eminent photographic scientist, initiated the development of a new automatic camera design with a lens barrel capable of rotating from side to side and filming from horizon to horizon. By 1953, prototype cameras were being tested for use in the new reconnaissance aircraft, the Lockheed U-2, under development by "Kelly" Johnson and his legendary "Skunk Works." The development and application of this new technology were under the auspices of the Central Intelligence Agency.

The panoramic camera was a revolutionary design with image-movement compensation that allowed for the motion of the aircraft and the vibration of the engine, as well as the movement of the highly sensitive, fast, and ultra thin Kodak film also especially designed for the project.
filmphotography  history  cia  spy  u2  lockheedmartin  skunkworks  camera 
11 days ago
Film Photography at 70,000 Feet in the U-2 Spy Plane
The military standardized on three primary film widths, 70 mm, 5 inch and 9 1/2 inch.
From my Navy days the biggest roll of aerial film you could buy was 2,000 ft (3411/3412/3414). The Air Force once used special order products for the SR-71 (SO-649) and I have no idea what lengths that came in
From my Air Force days working on the SR-71 and U-2 program, no the film is not spliced. It's a solid length. Moreover, the film path through the Optical Bar Camera has tolerances too close and operation too rapid to risk a splice.

The OBC shoots a 5-inch x 5-foot panoramic frame in stereo. It rocks forward to shoot a frame ahead of the aircraft, then rocks back to shoot the stereo frame from the rear. The film is zipping constantly through a complex path across the 5-foot-long curved film plane, across sets of 90-degree turns from the supply spool to the take-up spool.

The SR-71 and the U-2 used essentially the same OBC, although the SR version was beefed up to stand much more rapid operation.

The reason the U-2 still uses film is because imagery from the old system can be classified at SECRET or even less for dissemination to allied regional forces. The US digital system is still NOFORN--not for foreign dissemination.

the design of the U-2 and SR-71 cameras where the personal projects of Dr. Edwin Land, who apparently had copious time off from designing and promoting Polaroid and their ghastly consumer cameras.

https://airandspace.si.edu/collection-objects/camera-aerial-hycon-73b
u2  spy  photography  filmphotography  history 
11 days ago
Employees left jobless and customers let down as Picture People studio chain shuts down without notice - DIY Photography
Without prior notice to either its employees or customers, The Picture People studios abruptly closed its doors last week. With the parent company going out of business, studios all over the USA have closed, leaving their employees jobless. Furthermore, customers who have paid for, but not yet had, their shoots and those with gift cards are all in a state of limbo.


Reportedly, The Picture People has been on the Better Business Bureau’s radar for a few years. The business had an “F” rating due to 50 complaints filed against it over the last three years. The chain operated across the USA in WalMart, Buy Buy Baby, Sears, and other in-mall locations. Dead Pixel Society writes that the chain filed for Chapter 11 bankruptcy in 2016.
photography  business  portrait  studio  bankruptcy 
11 days ago
[Closed] - My 70mm film for Canon EOS 1v | PHOTRIO
The 1N can do everything a photographer needs, and I speak from 24 years experience as a professional landscape/scenic user (incidentally my 1N was recently serviced to remove dust from the upper prism/AF target panel -- a 1 hour job and the very first service of the camera since bought in August 1994). The 1N was bought (along with $13,000 of lenses) because of irritating problems with reliability of the silly, plastic-y EOS 5 (a camera I definitely would not recommend). Though I have used it briefly, the 1V has never appealed to me because of the high level automation and clustered metering which is much tighter than the 1N (and from experience I know I do not needmore AF focusing points). I, and others like me, are not interested in fancy camera electronics, AF, frame speeds and automation: we spend money on lenses (not Tamron. Not Sigma. Just Canon's best).

The 1N and 1V are both excellent (and heavy) cameras in competent, experienced hands used with quality Canon lenses (the AF/AE matrice is hobbled by using third-party or adapted lenses, as Canon never licensed algorithms to third party manufacturers), but if an amateur went angling for a 1V, I would indeed steer him down to the 1N, just for some "nursery" experience, and I can see that is needed by your question of the differences between the two cameras (custom functions are still hand-me-downs from the 1N pedigree). Guaranteed the 1N, available for peanuts now when it cost me $4,000 (body only) in '94, a beautiful, silent, fast and powerful camera. Buy that, and put your spare change toward a couple of L-series lenses.
canon  filmphotography  eos1v  eos3  eos1n 
14 days ago
MyHeritage Says Over 92 Million User Accounts Have Been Compromised
Hacked 8 months ago - still investigating - db found by someone else

After analyzing the file, the company found that the database, which included the email addresses and hashed passwords of nearly 92.3 million users, are of those customers who signed up for the MyHeritage website before October 27, 2017.

While the MyHeritage security team is still investigating the data breach to identify any potential exploitation of its system, the company confirmed that no other data such as credit card details and family trees, genetic data were ever breached and are stored on a separate system.

https://blog.myheritage.com/2018/06/myheritage-statement-about-a-cybersecurity-incident/
databreach  cybersecurity  genetics  israel 
14 days ago
Destructive and MiTM Capabilities of VPNFilter Malware Revealed
Initially, it was believed that the malware targets routers and network-attached storage from Linksys, MikroTik, NETGEAR, and TP-Link, but a more in-depth analysis conducted by researchers reveals that the VPNFilter also hacks devices manufactured by ASUS, D-Link, Huawei, Ubiquiti, QNAP, UPVEL, and ZTE
vpnfilter  router  cybersecurity  vulnerability 
14 days ago
Bad RSA Library Leaves Millions of Keys Vulnerable | Hackaday
So, erm… good news everyone! A vulnerability has been found in a software library responsible for generating RSA key pairs used in hardware chips manufactured by Infineon Technologies AG. The vulnerability, dubbed ROCA, allows for an attacker, via a Coppersmith’s attack, to compute the private key starting with nothing more than the public key, which pretty much defeats the purpose of asymmetric encryption altogether.

Affected hardware includes cryptographic smart cards, security tokens, and other secure hardware chips produced by Infineon Technologies AG. The library with the vulnerability is also integrated in authentication, signature, and encryption tokens of other vendors and chips used for Trusted Boot of operating systems. Major vendors including Microsoft, Google, HP, Lenovo, and Fujitsu already released software updates and guidelines for mitigation.

The following key length ranges are now considered practically factorizable (time complexity between hours to 1000 CPU years at maximum): 512 to 704 bits, 992 to 1216 bits and 1984 to 2144 bits. Note that 4096-bit RSA key is not practically factorizable now, but may become so, if the attack is improved.

The time complexity and cost for the selected key lengths (Intel E5-2650 v3@3GHz Q2/2014):

512 bit RSA keys – 2 CPU hours (the cost of $0.06);
1024 bit RSA keys – 97 CPU days (the cost of $40-$80);
2048 bit RSA keys – 140.8 CPU years, (the cost of $20,000 – $40,000).
encryption  pki  tpm  cybersecurity  vulnerability  crypto  keylength  rsa  hack 
14 days ago
OPSEC Terms and definitions -OSPA
critical information: Specific facts about friendly (e.g., U.S.) intentions, capabilities, or activities vitally needed by adversaries for them to plan and act effectively so as to guarantee failure or unacceptable consequences for accomplishment of friendly objectives.

Essential Elements of Friendly Information: In the context of "friend or foe," these are specific pieces of information regarding friendly (i.e., our) intentions, capabilities, and activities which are likely to be sought by our foes (i.e., our enemies/competitors).

Essential Elements of Information: In the context of "friend or foe," these are specific pieces of information which are likely to be sought by friendly planners about specific adversaries' intentions, capabilities, and activities. essential secrecy. The condition achieved by denial of critical information to adversaries (DOD JP 1997a).
opsec  reference  security  cybersecurity 
14 days ago
Cisco's Talos Intelligence Group Blog: The MeDoc Connection
The investigation found a supply chain-focused attack at M.E.Doc software ( most popular accounting software in Ukraine) that delivered a destructive payload disguised as ransomware. By utilizing stolen credentials, the actor was able to manipulate the update server for M.E.Doc to proxy connections to an actor-controlled server. Based on the findings, Talos remains confident that the attack was destructive in nature. The effects were broad reaching, with Ukraine Cyber police confirming over 2000 affected companies in Ukraine alone.

webshell to be a slightly modified version of the open source PHP webshell PAS. The webshell is stored in an encrypted form and requires a passphrase set in a HTTP POST variable to decrypt.
notpeyta  talos  cisco  cybersecurity  ukraine  ransomware  webshell  apt 
14 days ago
SANS Institute: Reading Room - Incident Handling
Lots of great white paper articles and reports on cybersecurity topics
sans  dfir  whitepaper  pdf  reference  soc  cybersecurity 
14 days ago
Sofacy Group’s Parallel Attacks - Palo Alto Networks Blog
nabling the “Toggle Field Codes” feature reveals the DDE instructions to us and shows that the author had set instructions to size 1 font and with a white coloring. The use of a white font coloring to hide contents within a weaponized document is a technique we had previously reported being used by the Sofacy group in a malicious macro attack.

The DDE instructions attempt to run the following the following command on the victim host, which attempts to download and execute a payload from a remote server:
apt  sofacy  cybersecurity  powershell 
14 days ago
Ryan Stillions: The DML model
The DML consists of nine maturity levels (0-8), with the lowest levels being most technically specific and the highest levels the most technically abstract.
DML-8 Goals (Adversary Wants)
DML-7 Strategy (Adversary Wants)
DML-6 Tactics (Adversary How)
DML-5 Techniques (Adversary How)
DML-4 Procedures (Adversary How)
DML-3 Tools (Adversary How)
DML-2 Host & Network Artifacts (Adversary Evidence / Indicators)
DML-1 Atomic IOCs (Adversary Evidence / Indicators)
cyberthreatintel  threathunting  cybersecurity  blog  apt 
15 days ago
How Microsoft’s top-secret database of bugs got hacked | Reuters.com
How Microsoft’s top-secret database of bugs got hacked
Friday, October 13, 2017 - 02:23

Microsoft’s top-secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group several years ago, five former Microsoft employees told Reuters.

Breach hidden for 4 years, Joseph Men (would be super embarrassing for the arsenal to have been exposed), security was insufficient, password only access, internal review said bugs not used in hacking campaigns (presumably), NSA lost control of even larger bug/exploit database with Vault7
microsoft  history  apt  cybersecurity  vulnerability 
15 days ago
« earlier      
abortion adventure advertising advice apple architecture art article audio automobile awesome backup baltimore beauty blackandwhite blog book books business california camera camping canon catholic chasejarvis climbing code collab compsci copyright crypto culture cybersecurity darkroom dc death design development diy dod download eats editorial edu education election08 email europe events exercise facebook fashion film filmphotography firefox flash flickr food forensics foss free friends fuji gallery gear german germany google gps guns hack hacking hacks hawaii health hiking history home hotel howto humor inspiration international internet interview iphone iran iraq italy java landscape language laptop largeformat law legal lens life lighting lightroom linux magazine map maps maryland md military mobile model money monterey motorcycle movie mp3 music nature networking news norway npr nude nyc obama omaha outdoors panorama pdf people perl petapixel philosophy photo photographer photography photos photoshop php plugin polaroid politics portfolio portrait postprocessing printing privacy productivity programming psychology quote quotes radio realestate ref reference relationships religion rental research review ronpaul running sailing science search seattle security server service shopping society software strobist studio stuttgart switzerland tech techsupport threathunting tips todo tools toread trance travel tutorial tv video vimeo visualization volunteer war web web2.0 website wedding wifi windows windoze wireless women wordpress youtube

Copy this bookmark:



description:


tags: