Dolls | SeMeN SPeRmS SuPeR SiTe

New York Dolls Flyer

File under SeMeN SPeRmS BLArRrG

Conjured by o~ SeMeN SPeRmS ~o on September 21, 2015

Tags: , , , ,

New York Dolls Flyer

File under SeMeN SPeRmS BLArRrG

Conjured by o~ SeMeN SPeRmS ~o on September 21, 2015

Tags: , , , ,

Dolls

File under SeMeN SPeRmS BLArRrG

Conjured by o~ SeMeN SPeRmS ~o on March 22, 2015

Tags: ,

Iggy Pop, Kim Fowley, Some New York Dolls, ‘n Friends

File under SeMeN SPeRmS BLArRrG

Story Of A Junkie (1985) Gringo 80’s East Village NYC Heroin Addict Docudrama

John Spacely Gringo Story Of A Junkie

Story of a Junkie is a 1987 drama film directed by Lech Kowalski and starring John Spaceley. Distributed by Troma Entertainment. Filmed in documentary-style, the film follows the character of Gringo, a young man looking for fortune in New York, only to fall into heroin addiction.

John Spacely Gringo Story Of A Junkie

The movie has amassed quite a reputation in certain circles for its depictions of hard drug usage in New York City’s East Village area. Many of the cast members, including leading man John Spaceley, are actual junkies. The numerous shooting-up sequences are reportedly entirely real, as are many of the drug dens and their denizens. Perhaps even more notable than the cinema verite structure is the almost total lack of moralizing on the part of the producers or its characters.

John Spacely Gringo Story Of A Junkie

Lead actor Spaceley died in the early 1990s, reportedly from AIDS, which he contracted through intravenous drug use. His final moments are chronicled in yet another Lech Kowalski film, “Born to Lose: The Last Rock & Roll Movie”, a documentary about deceased former New York Dolls guitarist Johnny Thunders.

Troma Entertainment hails Story of a Junkie as one of the company’s best films; it’s one of the most well-known outside of the films directed by Troma founders Lloyd Kaufman and Michael Herz.

Gringo Story Of A Junkie

A harrowing, bloody story of heroin addiction that puts films like Trainspotting to shame, Gringo mixes documentary footage with staged scenes to show the life of addict John Spacely.

story-of-a-junkie-02

Perhaps you’ve seen him somewhere and just can’t remember his name. The face is about an enigmatic as they come: classic Roman features topped by a greasy dyed matt of slicked back blond hair, pirate-style patch covering his right eye and cigarette dangling from an ever-present smirk. Or maybe you’ve never really noticed him and could frankly care less who he is or was. To you, John Spacely is just another loser, a human being throwing their life away by indulging in the most shameless of self-satisfactions: drug abuse. The minute you learn he’s a card-carrying member of the Riders of the White Horse, you’re thoughts turn to how selfish and stupid he is, how addiction is for the weak and lazy. You now no longer wish to know anything about him, his life, or how he ended up strung out in New York City. Instead, you sneer down your self-righteous nose and blame him (and his kind) for all the problems of the world. Maybe it would help you to learn a little about who John Spacely is. Perhaps your perceptions will change when you learn what drove him to drugs and what he has to do on a daily basis to survive. One thing’s for sure, the minute you see the horrifying docudrama Story of a Junkie, you will think twice about ever attempting to use drugs. This film is as successful a PSA warning about the terrors of dependency that you will probably ever see. It makes the Hollywood glamorization of such struggling souls that much more laughable.

John Spacely Gringo Story Of A Junkie

GRINGO Story of a Junkie is about as close to pure European neo-realism as an American movie is ever likely to get. It is also a stunning example of the cinema vérité style of filmmaking, the capturing of events as they happen without concern about continuity or performance. Part documentary, part confessional, this occasionally brilliant but always brave movie is an incredibly searing indictment on the use and abuse of drugs.
Whereas Tinsel Town tripe likes to romanticize the ritualistic intake of mind and or mood altering substances as a photogenic character flaw, Story of a Junkie tells it like it really is. Never once white washing or trivializing the life of a heroin addict, director Lech Kowalski and his cast of real life drug users draw us directly into the warped urban war zone where the vast majority of pusher and partakers exist. Never cringing from the sights, the sounds, the smells and the surreality of the real drug culture, the desperation is palpable and the danger, predominant. From how fixes are “cut” to the hierarchy in a shooting gallery, you’ll be hard pressed to find another film that tackles this terrible subject with more authenticity. It is drug abuse as slasher film, a frightening, sometime funny and often fatalistic representation of people living a life with a maniacal monkey on their back.

John Spacely Gringo Story Of A Junkie

It’s impossible for us non-addicts to understand the struggles and the will to survive (if only for the next score) of the person hopelessly obsessed with using. But for some reason, we are no longer a society that accepts brutal honesty. Everything needs to be sugarcoated with a small fraction of hope inserted to keep us feeling safe and secure. Frankly, the plain truth is all that Story of a Junkie has to offer. Without its integrity, its desire to get to the very heart of this corrupt cosmos, all we’d have is a carnival sideshow, a scandalous showcase of pure exploitation. But because of the tales it tells and the people who tell them, Story of a Junkie transcends its trappings to become a work of astounding power.

-Source

File under Cult Movies, Culture, Massive Consumption of Drugs, New York City History, Punksploitation, SeMeN SPeRmS BLArRrG, SeMeN SPeRmS ViDeO CLuB

New York Dolls

File under SeMeN SPeRmS BLArRrG

Conjured by o~ SeMeN SPeRmS ~o on February 10, 2014

Tags: , , ,

Money $hot$

Cop Money Shot
.
.

Fake Walnuts Filled with Concrete in China

There’s a set of photos making the rounds on the Internet these days, but even though they recently went viral, they were actually released a year ago. They show a bunch of normal-looking walnuts that when cracked open reveal a very hard filling – concrete pebbles. According to Ministry of Tofu, these fake walnuts were bought by a certain Mr. Li, last February, from a street vendor in Zhengzou, Henan province. When he got home and started cracking them, he noticed that instead of a meaty seed, many were actually filled with concrete pebbles wrapped in tissue. But Li’s case is not an isolated one. Apparently, many Chinese walnut vendors try to maximize their profits by carefully cracking open the hard shell, taking out the nutmeat, replacing it with concrete and tissue so it doesn’t make a strange noise, and gluing it shut. This way they can sell the nuts and the seeds separately.
.
.
Here’s How You Buy Your Way Onto The New York Times Bestsellers List – Forbes
So it would’ve cost more than $211,000, and that’s before ResultSource’s fee, which is typically more than $20,000. Kaplan settled for making the Journal’s list, reaching the pre-sale figure of 3,000 by securing commitments from corporate clients, who agreed to buy copies as part of his speaking fees, and by buying copies for himself to resell at public appearances. Kaplan expresses significant reservations about taking part in what is essentially a laundering operation aimed at deceiving the book-buying public into believing a title is more in-demand than it is. “It’s no wonder few people in the industry want to talk about bestseller campaigns,” he writes “Put bluntly, they allow people with enough money, contacts, and know-how to buy their way onto bestseller lists.”
.
.

Napster: the day the music was set free

I was 17, and the owner of an irregular music collection that numbered about 20 albums, most of them a real shame (OMC’s How Bizarre, the Grease 2 soundtrack). One day I had unsupervised access to the family PC and, for reasons forgotten, an urge to hear the campy orchestral number from the film Austin Powers. I was a model Napster user: internet-equipped, impatient and mostly ignorant of the ethical and legal particulars of peer-to-peer file-sharing. I installed the software, searched Napster’s vast list of MP3 files, and soon had Soul Bossa Nova plinking kilobyte by kilobyte on to my hard drive. “It’s difficult to describe to people… how much material was suddenly available,” the technology guru John Perry Barlow tells Alex Winter, the director of Downloaded, in his new documentary. Speaking to me on the phone from the US, Winter added: “There was no ramp up. There was no transition. It was like that famous shot from 2001: A Space Odyssey, when the prehistoric monkey throws a b…
.
.

Emoticon-based “Moby Dick” gets its day in the sun: In the US Library of Congress

The US Library of Congress welcomed Moby Dick onto its vaunted shelves this week but it wasn’t the famous Herman Melville-penned whale tale version oh no, it was the version told exclusively in emoticon – you know those little signs like J, ;). Emoji are the emoticons typically used in Japanese texting though they obviously are used world-wide to annoy or entertain everyone depending on your opinion of them. Called “Emoji Dick,” the emoticon book project was undertaken back in 2009 by data engineer Fred Benenson. According to the Library of Congress’ blog, in 2009 Benenson started a campaign to fund the “Emoji Dick” project and within a month raised enough money to put it together – $3,500.
.
.

NASCAR Crash Daytona 500 2013 [Video]

Fans sprayed with debris. Someone got mashed by a tire. NASCAR tried to take this down.
.
.

Kurt Cobain had the worst jeans.

.
.

Kara Vandereyk – Jailed After Having Sex With Pit Bull In Front Yard

According to Las Vegas Metro Police, an officer was patrolling the 300 block of N. 16th st. Tuesday when he came across a naked woman who appeared to be engaged in sexual relations with a dog. Officers arrived on the scene to find the woman, who was still undressed, laying on the ground. When the woman saw officers approaching, she said “Hi” to them and then began fondling the dog in a sexual manner.
.
.

Drivers stoned on marijuana test their driving skills

CNN may have just posted their best piece of investigative journalism in years. In the following video, three drivers of varying ages got incredibly high on marijuana and test-drove cars around a course. A driving-ed instructor accompanied them to avert any chance of an accident, and police watched from the sidelines to spot any visible ‘signs’ of inebriation in their movements.
.
.

An ‘alternative universe’ will eventually destroy ours, says Higgs researcher

Remember that Higgs-like particle that scientists finally managed to pin down last year at the Large Hadron Collider? Well, it’s proving to be a harbinger of bad news. According to Joseph Lykken, a theoretical physicist at the Fermi National Accelerator Laboratory, the mass of the Higgs boson indicates that “the universe we live in is inherently unstable, and at some point billions of years from now it’s all going to get wiped out.”
.
.

Gallon Smashing: The Video Sensation Out To Destroy Harlem Shake

I love this. I know that the comments are going to be filled with people decrying the destructive aspects of ‘Gallon Smashing,’ and they’re not wrong, but there’s so much that’s great about this concept. There’s a level of straight up slapstick comedy that is incredible. This kid (is it the same kid every time? I think it might be) has the moves of a silent comedy star. I like that the prank isn’t necessarily about getting other people wet or anything (although that happens, as is the unpredictable nature of smashing gallons of milk). And I like that this guy seems to be in his teens – exactly the right age to be doing stupid, destructive, anti-social prank behavior. When frat boys start doing this it won’t be funny.
.
.

College women told to urinate or vomit to deter a rapist

The list of 10 tips by the University of Colorado at Colorado Springs was billed as “last resort” options to deter a sexual assault. “Tell your attacker that you have a disease or are menstruating,” read one tip. “Vomiting or urinating may also convince the attacker to leave you alone,” read another.
Thanks Jasmine
.
.

Scorecard: How Many Rights Have Americans REALLY Lost?

For example, the following actions may get an American citizen living on U.S. soil labeled as a “suspected terrorist” today: Being young (if you live near a battle zone, you are fair game; and see this) Using social media Reporting or doing journalism Speaking out against government policies Protesting anything (such as participating in the “Occupy” movement) Questioning war (even though war reduces our national security; and see this) Criticizing the government’s targeting of innocent civilians with drones (although killing innocent civilians with drones is one of the main things which increases terrorism. And see this) Asking questions about pollution (even at a public Congressional hearing?) Paying cash at an Internet cafe Asking questions about Wall Street shenanigans Holding gold Creating alternative currencies Stocking up on more than 7 days of food (even though all Mormons are taught to stockpile food, and most …
.
.

How a “revenge porn” site got built: Fake identities to trade photos

Earlier this month, “revenge porn” entrepreneur Craig Brittain sat for an on-camera interview with CBS4-Denver, where he explained how his website IsAnybodyDown is nothing more than “entertainment.” Brittain’s site shows nude pictures of people, mostly women, without their consent, along with their personal contact info. The website advertises links to a service called “Takedown Hammer” which promises to get victims off the site if they pay $250. Many assume the “Hammer” is Brittain, since its e-mails come from the same IP address; Brittain denies it. In any case, to many of the victims, Brittain’s site looks like a simple extortion scheme.
.
.

USA vs China: Who Is Hacking Who? Part 2 – Eastern Europe

Facebook, Twitter, The New York Times. The United States of America. All seemingly hacked by the Chinese. China. Seemingly hacked by the US. Big time. But is there another option? “At least 40 companies including Apple Inc., Facebook Inc. and Twitter Inc. were targeted in malware attacks linked to an Eastern European gang of hackers that is trying steal company secrets, two people familiar with the matter said.” Bloomberg Chinese-hackers According to Tom Kellerman of Trend Micro there could well be – “We’ve all been watching China, but they’re not the most advanced cybercriminals. The most advanced are from the Eastern Bloc and Russia.” Tom Kellerman via CNN
.
.

Dairy farmers spray milk at the European Parliament in Brussels

A protest staged by dairy farmers in Brussels has entered its second day. Farmers sprayed thousands of litres of fresh milk at the European Parliament in Brussels on Monday in protest at what they say are excessive milk quotas and prices below the cost of production.
.
.

Airport diamond heist: It is shockingly easy to breach perimeter security at most airports.

The testimony at the hearing made it very clear that airport security is only as strong as its weakest link. This seems self-evident. Yet, despite all the money and manpower wasted on airport security theater in this country and around the world, perimeter security remains so lax that a guy with a costume and some bolt cutters can make a hole large enough to drive a van through. This is great news for heist fans, to be sure. But it’s pretty alarming for everyone else.
.
.

Power and the Internet

All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that’s only half the story. The Internet empowers everyone. Powerful institutions might be slow to make use of that new power, but since they are powerful, they can use it more effectively. Governments and corporations have woken up to the fact that not only can they use the Internet, they can control it for their interests. Unless we start deliberately debating the future we want to live in, and the role of information technology in enabling that world, we will end up with an Internet that benefits existing power structures and not society in general.
.
.

‘I’ve been cleared to have sex!’ Porn legend Ron Jeremy gets back to business after near-fatal aneurysm

Porn legend Ron Jeremy, 59, has been released from hospital after a near-death experience and he’s already planning on getting back to business. Doctors have told the prolific star that he’s cleared to have sex after he left Cedars-Sinai Medical Center in Los Angeles around week ago.
.
.

Large Labia Project Tumblr

.
.

Earlie Johnson’s vintage porn collection stolen

“I had a sinking felling because my porn collection is valuable, man,” Johnson told WZZM 13. Johnson collects rare performances by black adult film stars that were difficult for him to find and impossible to replace. He says the stolen pornography collection is worth $7,500, much more than the televisions that were taken. “I had a collection that had every African American that’s ever been in porn, from the 70s up until now,” explained Johnson. “My collection was the best in Michigan– a guy in Connecticut told me that,” said Johnson. He believes the thieves realized the value when they stumbled on the porn. “They came upon it and looked at the titles and realized what they had ran across… and realized people will pay cash money for them DVDs.” Johnson says his rare footage can’t be found on the internet. “I trade and I collect and I look at them too. I ain’t got no problem with that,” said Johnson.
.
.

Chinese Eugenics

The BGI Cognitive Genomics Project is currently doing whole-genome sequencing of 1,000 very-high-IQ people around the world, hunting for sets of sets of IQ-predicting alleles. I know because I recently contributed my DNA to the project, not fully understanding the implications. These IQ gene-sets will be found eventually—but will probably be used mostly in China, for China. Potentially, the results would allow all Chinese couples to maximize the intelligence of their offspring by selecting among their own fertilized eggs for the one or two that include the highest likelihood of the highest intelligence. Given the Mendelian genetic lottery, the kids produced by any one couple typically differ by 5 to 15 IQ points. So this method of “preimplantation embryo selection” might allow IQ within every Chinese family to increase by 5 to 15 IQ points per generation. After a couple of generations, it would be game over for Western global competitiveness.
.
.

New anti-piracy system will hit U.S. Internet users next week

Starting next week, most U.S. Internet users will be subject to a new copyright enforcement system that could slow the Internet to a crawl and force violators to take educational courses. A source with direct knowledge of the Copyright Alert System (CAS), who asked not to be named, has told the Daily Dot that the five participating Internet service providers (ISPs) will start the controversial program Monday. The ISPs—industry giants AT&T, Cablevision, Comcast, Time Warner, and Verizon—will launch their versions of the CAS on different days throughout the week. Comcast is expected to be the first, on Monday.
.
.

Boy meets girl. Girl strips on webcam. Tells boy to do the same. Girl blackmails boy

Now, people are being warned about another risk of finding love in the online world – webcam extortion. Webcam extortion. Image from ShutterstockBut it’s not the familiar headline of perverted hackers blackmailing young women into stripping in front of the camera. This time the tables have turned, and it’s *men* who are being victimised by *women*, in a peculiar twist on traditional webcam extortion. Singapore’s Police Force has warned of femme fatales befriending potential victims on sites such as Facebook and Tagged.com. The women enter steamy webcam conversations with their prey, where they strip and encourage their male victim to do the same. What the man doesn’t realise, as he feverishly rips his clothes off and agrees to engage in various sexual acts in front of the camera, is that his female love interest is secretly recording everything that’s going on. The male victim is then blackmailed for money by the woman who threatens to circulate the compromising photographs
.
.

As Secretive “Stingray” Surveillance Tool Becomes More Pervasive, Questions Over Its Illegality Increase

Of course, we’ve seen this pattern over and over and over. The government uses “terrorism” as a catalyst to gain some powerful new surveillance tool or ability, and then turns around and uses it on ordinary citizens, severely infringing on their civil liberties in the process. Stingrays are particularly odious given they give police dangerous “general warrant” powers, which the founding fathers specifically drafted the Fourth Amendment to prevent. In pre-revolutionary America, British soldiers used “general warrants” as authority to go house-to-house in a particular neighborhood, looking for whatever they please, without specifying an individual or place to be searched. The Stingray is the digital equivalent of the pre-revolutionary British soldier. It allows police to point a cell phone signal into all the houses in a particular neighborhood, searching for one target while sucking up everyone else’s location along with it. With one search the police could potentially invade count…
.
.

Banksy Work, Taken From London Wall, Turns Up in Miami, for Auction

“Slave Labor (Bunting Boy),” a 2012 work by the mysterious British graffiti artist Banksy, has vanished from a wall outside a discount store in London, and turned up at an auction house in Miami. And the town council in Haringey, the north London borough where the Banksy work appeared last May and disappeared last week, say that they want the piece returned. The stenciled piece, which shows a young boy at an old fashioned sewing machine creating a string of Union Jacks – the flags are in bright red, white and blue; the rest of the picture is in black, white, grey and sepia – appeared last year during the celebrations commemorating Queen Elizabeth’s 60 years on the throne. It was taken as an acerbic social comment, as most of Banksy’s works are, and has been regarded as a cultural attraction in the Turnpike Lane neighborhood where it stood.
.
.

More on Chinese Cyberattacks

Wow, is this a crazy media frenzy. We should know better. These attacks happen all the time, and just because the media is reporting about them with greater frequency doesn’t mean that they’re happening with greater frequency. Hype aside, the Mandiant report on the hackers is very good, especially the part where the Chinese hackers outted themselves through poor opsec: they logged into Facebook from their work computers. But this is not cyberwar. This is not war of any kind. This is espionage, and the difference is important. Calling it war just feeds our fears and fuels the cyberwar arms race.
.
.

JStylo-Anonymouth – Writing Style Anonymization

JSAN is a writing style anonymization framework. It consists of two parts: JStylo and Anonymouth. JStylo is a standalone platform for authorship attribution. It is used as an underlying feature extraction and authorship attribution engine. Anonymouth is the writing style anonymization platform. It uses the extracted stylometric features and classification results obtained through JStylo and suggests users changes to anonymize their writing style.
.
.

Science of Stylometry a Weapon Against Hackers, Trolls, Malware

It’s been used to question or confirm the authorship of Shakespeare’s plays, Homer’s Illiad and Odyssey and St Paul’s letters for hundreds of years. Now the science of stylometry could be used in the fight against hackers, trolls and malware writers that wreak havoc on the web. At the same time, stylometry – the analysis of a person’s unique writing style – could also be used by employers to identify whistleblowers or whingers among their staff. What you say online could be traced back to you using stylometry. “Your writing style can give you away and on the internet anonymity is difficult to achieve,” say the US researchers who have developed online tools to analyse writing. Advertisement The researchers, from Drexel University in Philadelphia, studied the leaked conversations and contributions of hundreds of anonymous users in underground online forums. They were able to identify 80 per cent of users using stylometric analysis to match writing styles to authors.
.
.

Barnacle sex, superlong penises and spermcasting

Barnacles are known for having very long penises. National Geographic reported in 2008: To cope with changing tides and a sedentary lifestyle, the gnarly crustaceans have evolved penises that are eight times the length of their bodies—the longest relative to body size of any animal. My sedentary lifestyle has had no such effect. I feel cheated. That article also noted that barnacles have the ability to change the size and shape of their penises to suit their living conditions. Barnacles living in gentle waters have long, thin penises best equipped for maximum reach, the study found. But those animals living in rough waters have shorter, stouter penises that are better able to withstand strong waves. […] The researchers also transplanted barnacles living in gentle waters to rough waters and vice versa, to make sure the penis variations they observed were a result of the environment and not due to genetic differences. The results showed that barnacles coul…
.
.

Facebook Hacked! Facebook OAuth flaw allows gaining full control over any Facebook account – Hacking News

Facebook OAuth is used to communicate between Applications & Facebook users, to grant additional permissions to your favorite apps. To make this possible, users have to ‘allow or accept’ the application request so that app can access your account information with required permissions. As a normal Facebook user we always think that it is better than entering your Facebook credentials, we can just allow specific permissions to an app in order to make it work with your account.
.
.

Circumcision: The History of Metzitzah BʼPeh Disease Transmission

More than 200 years of disease and death transmitted through metzitzah b’peh, the direct mouth-to-genital suction done by mohels to the bleeding just-circumcised-penises of baby boys.
.
.

Revealed: al-Qaeda’s 22 tips for dodging drones

The document includes advice such as “hide under thick trees” (believed to be bin Laden’s contribution), and instructions for setting up a “fake gathering” using dolls to “mislead the enemy”. Found by the Associated Press in a building in Timbuktu, the ancient city occupied by Islamists last year, the document is believed to have been abandoned as extremists fled a French military intervention last month. It is a Xeroxed copy of a tipsheet authored by a Yemeni extremist that has been published on some jihadi forums, but that has made little appearance in English. The list reflects how al-Qaeda in the Islamic Maghbreb anticipated a military intervention that would make use of drones, as the war on terror shifts from the ground to the air.
.
.

Submit Links:
SeMeNSPeRmS@SeMeNSPeRmS.com

File under Comedy, Fashion, Graffiti, Music, SeMeN SPeRmS BLArRrG, SeMeN SPeRmS Links 'o Death, Sex

Conjured by o~ SeMeN SPeRmS ~o on February 25, 2013

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Ghoul Dolls

File under SeMeN SPeRmS BLArRrG

Conjured by o~ SeMeN SPeRmS ~o on June 7, 2012

Tags: , ,