Tumgik
#chss
disguisedcheezed · 4 months
Text
Tumblr media
dirkjohn notes.
88 notes · View notes
chessb0r3d · 4 months
Text
Tumblr media
89 notes · View notes
thelovetheystole · 2 months
Text
Part 2 of the spoilers, that involves Aaron, Chas & Paddy, and some interesting excerpts from a Dominic interview.
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
2 notes · View notes
Text
Listen if I get a custom made chess set right? And I get this chess set colour coded with the colours of myself and my childhood best friend turned nemesis. And then one of the pawns on the nemesis side looks suspiciously like said nemesis. And then I update the chess set over the years to swap out which piece is the nemesis and update its characteristics. Then absolutely do not assume I'm in love with them. This is just casual arch nemesis things and it's not gay.
2 notes · View notes
thelilreddragon · 1 month
Text
Harximoff Drabble 2:
“Aggie, I’m hungry... I want snacks.”
“If you call me Aggie one more time… I swear to the goddess… Go get food then, dear.”
“Don’t wanna move. Did you buy the Easter chocolates I wanted?”
“You’re literally on top of me. And yes, dear. You kept reminding me.”
“Can you go an grab me some…” Wanda pauses, with a grin. “Mini Ags? Badum chss.”
Agatha sits up and pushes Wanda off the bed.
Authors Note: Should I start posting these to Ao3? I’ve never done that sort of thing before.
12 notes · View notes
oldschool-analog · 2 months
Note
[Elementary]
Mr. Reyes: I'm calling your parents
Young Jeremy: NO! WAIT!
Everyone: Ooooh
[Vs High school]
Mr. Reyes: I'm calling your parents.
[Jeremy puts r on the desk]
Jeremy: Home, cell, work, with the extension!
Everyone: AYYYYY!
https://youtube.com/shorts/6QxGzk2tr1g?si=WnmrkCKF_ZSfqaSz
Shouldn’t he mean… parent? *ba dum chss*
7 notes · View notes
natrowlandart · 1 year
Text
I animated some of the designs I made for this birthday card range I created for Chest Heart and Stroke Scotland.
You can purchase one full set of twelve from me here on Etsy, or choose an individual one from CHSS.
2 notes · View notes
distillerchic92 · 3 days
Link
Check out this listing I just added to my Poshmark closet: Lululemon Ivivva Pink Blue CHSS Print Reversible KeepUrCool Racer Racerback Tank.
0 notes
iloveerror404 · 24 days
Text
WHY THW CHSS DID I GET A WAENING ON THE NK DISCORD???? I HAVENT POSTED ON IT SIMCE LIKE THURSDAY AS IT IS BUT I GOT A WARNING THIS MORNING EVEN THOUGH I LITERALLY HAVENT DONE ANYTHING KNOWINGLY WRONG LIKE GRRR SILLY MODERATERS
edit: ITS FPR PROFANITY BYPASIMG SON IV THINI ITS BC I ALWAYS SAY WHAT THE CYSS AND WHAT THE FUSS IM GANNA CRIIIII
0 notes
bllsbailey · 3 months
Text
So, That's a New Disturbing Development in the Russian Collusion Saga
Tumblr media
Some might have speculated this was the case long before independent journalists covered it. Michael Shellenberger, Alex Gutentag, and Matt Taibbi dropped this latest development in the Russian collusion saga: the CIA plotted with the intelligence services of foreign allies to illegally monitor at least two dozen Trump associates before the FBI’s official counterintelligence probe in the summer of 2016. 
The established narrative was that the FBI brass took the Steele Dossier as gospel despite knowing it was a Clinton-funded opposition research project that led to the Crossfire Hurricane operation and related surveillance of Trump campaign officials. Disgraced counterintelligence agent Peter Strzok signed off on the probe, which Special Counsel Robert Mueller later took over. Shellenberger, Gutentag, and Taibbi added this latest development, which exposes a new layer of the Russian collusion hoax.  
We knew the FISA warrants against Carter Page were illegally obtained, with FBI officials doctoring evidence, but that was just one piece of the puzzle. While that surveillance operation was illegal, the rest of the investigation was more or less viewed as a politically driven wild goose chase aimed to damage the Trump presidency. As it turns out, the whole operation was illegal, according to sources who reached out to these three reporters. It was plotted before the FBI’s probe, which has been viewed as the starting point for this collusion circus, and our allies' services, the “Five Eyes,” helped manufacture probably the greatest political hit jobs of all time. It lends further credence to the belief that there is a deep state and they're working to thwart the will of the voters: 
Last year, John Durham, a special prosecutor for the Department of Justice (DOJ), concluded that the Federal Bureau of Investigation (FBI) should never have opened its investigation of alleged collusion by then-presidential candidate Donald J. Trump and Russia in late July of 2016.  Now, multiple credible sources tell Public and Racket that the United States Intelligence Community (IC), including the Central Intelligence Agency (CIA), illegally mobilized foreign intelligence agencies to target Trump advisors long before the summer of 2016.  […]  Until now, the official story has been that the FBI’s investigation began after Australian intelligence officials told US officials that a Trump aide had boasted to an Australian diplomat that Russia had damning material about Democratic presidential candidate Hillary Clinton.  In truth, the US IC asked the “Five Eyes” intelligence alliance to surveil Trump’s associates and share the intelligence they acquired with US agencies, say sources close to a House Permanent Select Committee on Intelligence (HSPCI) investigation. The Five Eyes nations are the US, UK, Canada, Australia, and New Zealand.  After Public and Racket had been told that President Barack Obama’s CIA Director, John Brennan, had identified 26 Trump associates for the Five Eyes to target, a source confirmed that the IC had “identified [them] as people to ‘bump,’ or make contact with or manipulate. They were targets of our own IC and law enforcement — targets for collection and misinformation.”  […]  “They were making contacts and bumping Trump people going back to March 2016,” a source close to the investigation said. “They were sending people around the UK, Australia, Italy — the Mossad in Italy. The MI6 was working at an intelligence school they had set up.”  The IC, a source said, considered the 26 Trump campaign people identified to “bump” or “reverse target,” or manipulate through confidential human sources (CHSs), to be easy marks because of their relative inexperience.  Doing so was illegal, both because US law prohibits such intelligence gathering unless authorized by a Foreign Intelligence Surveillance Act (FISA) warrant and because the weaponization of the IC for political purposes constitutes election interference.  […]  The FBI has already admitted that it should not have sought FISA warrants to wiretap Carter Page, a Trump foreign policy advisor. FBI had included in its FISA warrant application for Page noncredible intelligence from a confidential human source (CHS) named Christopher Steele, a former British spy.  A source told Public and Racket that IC officials had targeted Page because they viewed him as inexperienced. “You look at some of the people who were there,” the person said. “They weren’t sophisticated or experienced at disinformation or at [dealing with] IC people planting ideas or befriending you.”  In 2018, HPSCI released a 243-page clearing Trump of allegations that he and his team colluded with Russia to interfere in the 2016 election. House Republicans had made a deal with the CIA to place their documents inside a safe within the CIA’s vault. 
Recommended
Today, the trio will dive more into the information that was illicitly obtained that the intelligence community doesn’t want us to see. Shellenberger and Taibbi were the pair that also combed through the ‘Twitter Files,’ another multi-part investigative journalism project that exposed the social media company’s working partnership with the FBI to influence public opinion, among many other creepy anti-democratic things, pre-Elon Musk. 
0 notes
chessb0r3d · 10 months
Text
something something dirk at some point asked jake about poppop, but not ask jane? huh.
and in contrast to john's reaction to beta dirk's beta version; "he's a weirdo", while dirk's reaction to poppop is like he wanted to dicksuck him tbh put him under a lab observation(because he knows he's seen some terrible and fucked up shit).
Tumblr media Tumblr media
and nearing the end of the comic, dirk could finally meet john face to face. who is dirk going talk to?
... john? no you dingus. dave, john's best friend, of course.
Tumblr media
He'd like to get to know him.
125 notes · View notes
gusty-wind · 7 months
Text
FBI LOST COUNT
House Judiciary Committee Republicans – FBI LOST COUNT of How Many Paid Informants They Had in the Trump Crowd on January 6!
The House Judiciary Republicans sent out an explosive email on Tuesday night that CHANGES EVERYTHING!
The House Judiciary Republicans sent out a letter Tuesday that includes transcribed testimony from former Assistant Director-in-Charge of the Washington Field Office (WFO) Steven D’Antuono.
D’Antuono testified that the FBI had numerous confidential human sources (CHS) in the Trump crowd on January 6.
In fact, they had so many FBI operatives in the crowd they they had no idea how many were actually there that day!
From the document.
D’Antuono explained that due to the large number of CHSs present at the Capitol, the WFO asked FBI Headquarters “to do a poll or put out something to people saying w[ere] any CHSs involved” so the FBI could try to ascertain how many CHSs had been in attendance.5 D’Antuono stated after the outreach from Headquarters was “when we started getting responses back.”6 As one example, he recalled that a CHS from the Kansas City Field Office was on site at the Capitol and had allegedly been in contact with his handler while at the event.7 The CHS reported to his handler “while they were in the crowd, I think, saying that they were going in. They were trying to stop some of the action happening and they left or whatnot.”8
This new information is extremely concerning. It suggests that the FBI cannot adequately track the activities and operations of its informants, and that it lost control of its CHSs present at the Capitol on January 6. These revelations reinforce existing concerns, identified by Special Counsel Durham, about the FBI’s use of, and payment to, CHSs who have fabricated evidence
and misrepresented information. 9 The Justice Department Inspector General also identified critical problems in the FBI’s CHS program, including the FBI’s failure to fully vet CHSs and the FBI’s willingness to ignore red flags that would call into question an informant’s reliability.10
Here is the document released Tuesday night by the House Judiciary Republicans.
1 note · View note
jokerflame98 · 9 months
Text
Tumblr media
BACKSTORY 14º - " '¿No encontráis a Lyon raro últimamente?' - comenta Nago.
Hotaro le responde extrañado - 'Lo veo algo distraído la verdad, pero no sé...'
-'¿Será por una hembra?'- dice Nago bromeando.
Light se gira sobresaltada -'¡¿Una hembra?! '-
-'¡Chss! No grites Light.'- le dice Nago.
-'Si es así... sería increíble. Un lobo tan peligroso como Lyon siendo endulzado por una hembra.'- comenta Hotaro dejando salir una pequeña sonrisa.
Nago y Hotaro en voz baja seguían creando situaciones imaginarias sobre Lyon y la misteriosa hembra, aunque Light no parece muy aliviada."
0 notes
mudricky · 10 months
Text
"I survived three strokes in three days" - Renfrewshire stroke survivor Tim fronts Chest, Heart & Stroke Scotland summer fundraising appeal
Tim Clark has survived three life-changing strokes in 2017 aged just 36. He was supported in his recovery by Chest, Heart & Stroke Scotland (CHSS), Scotland’s leading health charity. Continue reading Untitled
Tumblr media
View On WordPress
0 notes
alwayscrazyninja · 1 year
Text
The Cyber Edge Writing Contest 1st-Place Winner, 2023
MIT Lincoln Laboratory and the Space Cyber-Resiliency group at Air Force Research Laboratory-Space Vehicles Directorate have prototyped a practical, operationally capable and secure-by-design spaceflight software platform called Cyber-Hardened Satellite Software (CHSS) for building space mission applications with security, recoverability and performance as first-class system design priorities. Following a successful evaluation of CHSS against an existing U.S. Space Force (USSF) mission, the CHSS platform is currently being extended to support hybrid space vehicle architectures that incorporate both CHSS-aware and legacy subsystems. CHSS has the potential to revolutionize the cyber-resiliency of space systems and substantially ease the burden of defensive cyber operations (DCO).
DCO on space systems has historically ranged from intractable to impossible due to the inherent constraints of the domain. Not only are satellites physically inaccessible, with bandwidth-constrained and intermittent communication links, but cyber-physical safety constraints impose strict timing and predictability requirements that few existing DCO tools could meet. Moreover, the importance of space heritage results in mission-critical code with strong resistance to modernization. A satellite is an integrated system of opaque software and hardware components with complex and diverse provenance. Without the ability to inspect or command these components, DCO tools are often relegated to best-effort monitoring of the communications bus. The combined challenge is akin to defenders being asked to defend a tank that lacks armor and whose crew is actively opposed to the idea. The attacker has every advantage.
One might incorrectly believe that satellite software is a difficult cyber target. Unfortunately, that’s not the case. MIT Lincoln Laboratory researchers analyzed common spaceflight software inventories and identified major concerns with widely deployed operating systems, third-party software dependencies and firmware that allow adversaries to implant automated malware via software supply chain attacks during satellite development or integration. Furthermore, software supply chain attacks are just one of many possible cyber threat vectors. For example, the increasingly networked world of cross-linked constellations offers another avenue for attackers to leverage one compromised satellite to attack others.
This hostile environment requires a revolutionary approach to defensive cyber operations to regain the advantage and deny attackers access to critical space systems.
Revolutionizing DCO: To tackle this problem, MIT Lincoln Laboratory researchers distilled the challenges outlined above into four adversarial conditions that spaceflight software must tolerate during operation. That is, the only way for spaceflight software to be resilient to cyber attack by nation-state actors is to function despite these conditions:
A cyber attack has already succeeded. One or more flight software components are compromised. DCO personnel do not know which one in advance or the end goal of the malware. This is consistent with software supply chain attacks that go undetected until malware activation.
Humans are unavailable at the necessary timescales. Malware operates at the speed of computation. A human operator cannot respond in real time, especially given that ground segment links are often intermittent and bandwidth-limited.
Safety violations are worse than security violations. Violation of cyber-physical requirements can damage or destroy the satellite. If DCO software causes safety violations, it imposes an unacceptable risk to the mission system.
Uncooperative software will always be present. Proprietary software, unmodifiable space heritage software, software built for specific operating systems, binary-only software or software from stakeholders that do not value cyber-resiliency is unavoidable. There are too many subsystems and different units of integration to avoid opaque components that must be trusted but cannot be proven as trustworthy.
These conditions effectively act as security design requirements for spaceflight software that, when satisfied, result in a revolutionary DCO capability to return the advantage to the defender. Such spaceflight software could operate through cyber attacks that have already established a foothold, mitigate the attack at least semiautonomously, meet cyber-physical timing requirements, integrate with existing spaceflight software and avoid removing existing flight heritage or imposing unrealistic requirements on stakeholders.0
CHSS is a promising starting point for realizing this ambitious vision. CHSS is a mission-agnostic spaceflight software platform whose functionality was inspired by NASA’s core Flight System but with an emphasis on cyber-resiliency. Most notably, CHSS offers security without sacrificing performance.
At its core, CHSS builds on the seL4 microkernel as a secure foundation and root of trust. seL4 is formally verified, which is a powerful but labor-intensive process to mathematically prove the absence of bugs and the correctness of a software implementation. For this reason, seL4 has previously been used on the Defense Advanced Research Projects Agency High Assurance Cyber Military Systems and Air Force Research Laboratory Amateur Radio Emergency Service programs. However, as a microkernel, seL4 alone offers only limited system functionality.
As a major step up from the basic functionality of seL4, CHSS implements a feature-rich set of operating system services, a security-mediated software data bus for cross-application communication, autonomous recovery mechanisms and modular flight software applications that support operating through and remediating cyber attack.
As elaborated, CHSS’ design and prototype currently satisfy the first three adversarial conditions and are currently being extended to support containerization and transparent protection of legacy spaceflight components to satisfy the fourth requirement.
To limit the harm of a compromised dependency, driver or a future application, CHSS is carefully architected using the core cybersecurity principles of functional isolation and least privilege (akin to zero trust). Furthermore, CHSS is implemented in the memory-safe Rust language, which is one of the languages recommended by the National Security Agency for secure system implementation.
Functional isolation limits cross-application interactions to the pre-approved communication channels. Software in CHSS is decomposed into discrete modules with well-defined inputs and outputs. Each module is given its own dedicated resources and memory domain at system start. The only way for modules to communicate with one another is through a software data bus that enforces a security policy on messages. This approach simultaneously isolates malicious code to its original module and encourages the reuse of modules across different missions.
Least privilege is a design principle in which every system component must only receive access to the resources it needs to perform its legitimate purpose and no more. Inspired by this principle, CHSS distributes capabilities, or unforgeable tokens, to processes that allow access to specific system resources (e.g., memory pages). Much like a traveler without a valid plane ticket, a process without a capability cannot access the associated system resource. Because seL4 manages capabilities for CHSS, their security derives from the formally verified correctness of seL4.
In CHSS, since human DCO operators are assumed to be unavailable at the necessary timescales to mitigate an ongoing cyber attack, malicious behavior and non-malicious faults trigger a phased autonomous recovery process. This process begins with module-level restarts, escalates to flight software and full-system reboots and culminates with fallback to a known safe state. Triggers include both explicit policy violations and failures to periodically alert a recovery handler that a module is in a good state. Normally, this kind of fine-grained recovery risks the desynchronization of flight software modules due to stale data, missed requests, etc., but CHSS explicitly designs applications with recovery in mind. Specifically, communication is stateless, and the recovery period is fast enough to avoid any safety violations in the cyber-physical regime.
1 note · View note
Is Aaron Having a Change of Heart?
Mackron Fanfic.
Mack was sitting in the pub hoping to see Aaron.
"What's he hanging about for?" asked Chas
"He's hoping to see Aaron obs" said Charity. "Go and have a word with Aaron Chas he looks pathetic sitting there on his own"
Chas went into the back room to talk to Aaron.
"Right" said Chas approaching Mack . "Aaron said you can see Isla for a while as long as you stay in the pub with her"
"Yes, of course" replied Mack
Aaron brought Isla out and handed her to Mack
"Thank you for this Aaron" said Mack taking Isla..
"Don't think I'm going soft coz I'm not" said Aaron just as Isla gave Mack a big smile
"Dadada" said Isla.
"She spoke Aaron. Did you hear that?" said Mack with a tear in his eye. "I love you so much baby and I miss you" Mack said cuddling his daughter.
Aaron nodded and went into the back room followed by Chss.
"Mum Isla called him dad" said Aaron bursting into tears.
"The way she looked at him" said Aaron "This is killing me mum"
"Well it's up to you Aaron if you want to save your marriage I'll support you" said Chas.
"I love him so much mum" said Aaron.
"I know you do Aaron" said Chas.
Aaron went back into the bar and sat by Mack "I've put it in her baby book that she said her first word today"
"Thanks Aaron" said Mack handing Isla to Aaron.
"She's crying coz I handed her back to you Aaron" said Mack watching his daughters gaze following him as Aaron headed to the bar with Isla"
"She wants her daddy Aaron" said Bear.
"I'm her dad" snapped Aaron taking Isla into the back room.
"Macks face when Isla cried as I took her off him mum. It broke me" said Aaron
"Why are you putting yourself through this Aaron it's obvious you still love him" said Chas "Can't you make it up with him?"
"I'll be back in a minute mum" said Aaron who went into the bar and sat next to Mackenzie.
"You can see Isla whenever you want Mack" said Aaron "But only in the pub"
"Thanks Aaron it means a lot" said Mack.
"I'm sorry about your you head" said Aaron "I never intended to put you in hospital again and I hope Reuben pulls through" he said getting up to go the back room.
"Progress at last" said Bear.
"I'm over the moon Bear" said Mack just as Aasha walked in.
"Just ignore her Mack" said Bear.
"How much do you want to pay me to leave me alone?" Mack asked Aasha
"Steady on lad" said Bear "You're playing right into her hands"
"I'd like you to admit this is your child and you are willing to pay enough maintenance to keep us in the luxury we deserve just like Chloe" Aasha replied thinking she was on to a good thing.
"Just get out" snapped Aaron who had just come from the back room and heard the conversation..
"If you know what's good for you you'll leave lady" said Chas to Aasha as Aaron went to sit by Mackenzie.
"Mack you need to stand up to her" said Aaron "I'm sorry for doubting you and I've seen first hand what she's like"
"Does that mean there's a chance for us?" said Mack taking hold of Aaron's hand.
"Mack I'm not ready yet" Aaron said pulling his hand away.
"I can't live without you Aaron" said Mack tearfully
"Don't cry" said Aaron fighting back his tears "I can't handle it when you cry" he said getting up to leave.
"I wish you'd stop punishing yourself Aaron" said Chas as Aaron came into the back room followed by his mum.
Tumblr media
"I feel in my heart I want him back mum" said Aaron "But he's hard work and I don't know if I can handle it anymore"
"Well you won't know until you try and that little girl needs both her daddies" said Chas.
11.5.23.
0 notes