Monday, November 30, 2009
CANTON, NY – The election results certified by the St. Lawrence County Board of Elections for New York’s 23rd Congressional District contain some numbers that are mathematically impossible. These numbers were requested in person and transmitted by e-mail just hours before certification on Tuesday, November 24th, 2009.
For six election districts in St. Lawrence County (the 2nd, 4th, 6th, and 7th districts in Canton, the 14th district in Massena, and the 2nd district in Oswegatchie) negative numbers appear in the column for “blank” ballots, known in other states as “undervotes.”
Blank vote counts are ballots in which the voter did not choose any candidate in a given election and are determined by subtracting the total number of votes cast for the candidates from the number of voters who completed ballots. The remaining number would be those voters who didn't cast a vote for that election.
In Canton's 7th district, the certified results show a total of 148 ballots cast. The results of those votes were counted as 88 votes for Owens, 11 votes for Scozzafava, and 80 votes for Hoffman. The problem is that these numbers add up to 179 votes counted for the candidates, and there were only 148 ballots cast; St. Lawrence County certified these numbers to the state as accurate with the number of 'blank' ballots reported as -31.
The Board of Elections stated repeatedly that their numbers add up, and strictly speaking, they do. But negative numbers should not be required to make this happen.
Election analysts refer to this phenomenon as “phantom voters,” because they are apparitions. They do not actually exist. There can never be more votes counted for any office than the number of actual voters who cast ballots. There could be one or two, if on occasion an actual voter forgot to sign the poll book, but never 31.
In addition to the 31 “phantom votes” certified in Canton's 7th district, there are 16 more in Canton's 2nd district, two in Canton's 4th district, 20 in the 7th, 22 in Massena 14th district, and 2 in Oswegatchie 2nd district.
These numbers are minimums. As 'blank' votes do often occur when a voter does not choose a candidate, the number of blank ballots are commonly a positive number. According to the certiified results there were 757 "blank" ballots countywide, or 3.0% of the total ballots cast. Thus, along with the -31 "phantom votes" in Canton's 2nd district, there were likely four or five people who actually cast a 'blank' ballot, meaning that the number of phantom votes is more like 35 or 36 for that district.
An audit of the poll books revealed that there were 537 actual voters at the polls in Canton's 7th and 8th district, which voted at the same polling place, and there were 25 absentee ballots, for a total of 562. According to the certified results, there were 179 votes counted for Congress in Canton's 7th and 375 in Canton's 8th, making 554 altogether, but only 529 voters cast ballots.
Similarly, there were 435 actual voters at the polls in Canton 2, 4 and 6, which voted at the same polling place, and there were 26 absentee ballots, for a total of 461. According to the certified results, there were 449 votes counted for Congress, but only 411 ballots cast.
In Massena's 14th district, a single-precinct polling place, there were 365 actual voters at the polls, and there were 14 absentee ballots, for a total of 379. According to the certified results, there were 363 votes counted for Congress, but only 341 ballots cast.
In Oswegatchie 2nd and 4th districts, which voted at the same polling place, there were 412 actual voters at the polls, and there were 35 absentee ballots, for a total of 447. According to the certified results, there were 436 votes counted for Congress, and 442 ballots cast.
Thus, in the cases cited above, there may have been enough actual voters at the polls to account for the vote totals for the candidates. But the numbers do not match up, they do not withstand an audit, and they should not be certified by the State.
Oswegatchie illustrates perfectly how 'blank ballots' and 'phantom votes' can cancel each other out. Officially, there were two 'phantom votes' in Oswegatchie 2nd district (or -2 blank ballots), and a total of 25 blank votes in Oswegatchie's 1st, 3rd, and 4th district. The town of Oswegatchie's total number of blank votes was therefore reported as 23. For every town except Canton, the town totals for blank votes are positive numbers. “Phantom votes” are rarely visible except when scrutinizing the results at the precinct level.
In the certified election results from the above districts, where the voting machines appeared to be working properly, the computer-generated vote counts cannot possibly be accurate as they are showing more votes counted than voters.
Fundamentally, the fault does not lie with the Board of Elections, although perhaps they should have noticed the negative numbers before certifying them. The fault lies with computerized vote counting and our willingness to trust it.
It has already been reported that zero votes were incorrectly reported in numerous precincts in Jefferson, Madison, and Oswego Counties for one of the Congressional candidates, and that voting machine failures occurred in dozens of polling places in at least three different counties.
In St. Lawrence County, ballots from eight polling places had to be hand counted due to voting machine failure. Machines in Louisville, Waddington, Clare, and Rossie "broke" early in the voting process on Election Day. Republican Commissioner Deborah Pahler said that the machines kept "freezing up... like Windows does all the time". Machines in Hermon, Lawrence, Colton's 2nd district, and Massena's 1st and 2nd districts failed to print the results. Frank Hoar, an attorney for the Democratic Party, initially ordered the impoundment of malfunctioning machines but released the order on November 5th so that Bill Owens could be sworn in to Congress in time to vote on the House health bill on November 7th.
Electronic vote counting is much too vulnerable to failure and/or manipulation. If a mechanical (lever-style) machine breaks down, the failure is visible, and only the one machine is affected. With electronic vote counting, one person can change the outcome of an election and not leave a trace. This has been shown over and over again in scientific studies, including those commissioned by the Secretaries of State in California and Ohio.
But more than that, how can we have a democracy if we cannot know if the vote count is accurate? If election officials cannot know, and if the candidates cannot know, and if the voters cannot know that the official results are true and correct, why even have an election? Why go through the motions?
In New York State, 232 years of election case law pursuant to the state constitution has strongly upheld the requirement that votes be counted visibly, in public view, and the results proclaimed, before the ballots or the lever machines leave the polling place. It has long been understood that vote counting concealed from the public is a crime waiting to happen. Because electronic vote counting is an invisible process, it flies in the face of tradition and case law.
Richard Hayes Phillips, Ph.D., is one of the leading election fraud investigators in the United States. His book on the 2004 Ohio election, Witness to a Crime: A Citizens’ Audit of an American Election, based on examination of some 30,000 photographs of actual ballots, poll books, and other election records, is available at http://www.witnesstoacrime.com
Sally Castleman, co-founder of Election Defense Alliance (EDA), a national organization committed to honest, secure and transparent elections, contributed to this article.
The author thanks the St. Lawrence County Board of Elections for providing unfettered access to election records.
Christo Garcia is the winner of Charlie Sheen’s 20 Minutes with the President video contest.
Professor Phil Jones, the head of the Climate Research Unit, and professor Michael E. Mann at Pennsylvania State University, who has been an important scientist in the climate debate, have come under particular scrutiny. Among his e-mails, Mr. Jones talked to Mr. Mann about the "trick of adding in the real temps to each series ... to hide the decline [in temperature]."
Mr. Jones told Mr. Mann: "If they ever hear there is a Freedom of Information Act now in the UK, I think I'll delete the file rather than send to anyone" and, "We also have a data protection act, which I will hide behind."
In another e-mail, Mr. Jones told Mr. Mann, professor Malcolm K. Hughes of the University of Arizona and professor Raymond S. Bradley of the University of Massachusetts at Amherst: "I'm getting hassled by a couple of people to release the CRU station temperature data. Don't any of you three tell anybody that the UK has a Freedom of Information Act!"
At one point, Mr. Jones complained to another academic, "I did get an email from the [Freedom of Information] person here early yesterday to tell me I shouldn't be deleting emails." He also offered up more dubious tricks of his trade, specifically that "IPCC is an international organization, so is above any national FOI. Even if UEA holds anything about IPCC, we are not obliged to pass it on." Another professor at the Climate Research Unit, Tim Osborn, discussed in e-mails how truncating a data series can hide a cooling trend that otherwise would be seen in the results. Mr. Mann sent Mr. Osborn an e-mail saying that the results he was sending shouldn't be shown to others because the data support critics of global warming.
No wonder then Obama's energy czar, Carol Browner, dismissed this as much ado about nothing. She was on the board of APX, one of the leading carbon offset trading companies and EPA Administrator for eight years under Clinton. While Administrator of the EPA, she violated a federal judge’s order to preserve documents by wiping computers clean and her discrimination toward employees resulted in many becoming whistle blowers. Appalled by the actions of Carol Browner, congress enacted the Whistle blower Protection Act of 1999.
Carol Browner is one of 14 leaders of a socialist group's Commission for a Sustainable World Society, which calls for "global governance" and says rich countries must shrink their economies to address climate change.
Al Gore was confronted with activists wanting to question him about Climategate.
Gore does not like to answer questions.
Sunday, November 29, 2009
At a health care rally at the University of Maryland, a protester began heckling Obama. The man apparently yelled “Obama you’re a liar. Obama, your health care kills children. Abortion is murder.”
The man was promptly removed by police. The crowd is overjoyed and gleefully cheers as the man was carted off for having the temerity to challenge Obama publicly.
As the man mounts the stairs, one guy knocks his hat off, then a guy on the left spits on him but the cop sees it and carts him off too.
The company's website describes the product:
Phoenix Jr. (NSN: 5855-01-438-4588) is an extremely rugged and low cost Infrared marker beacon. The Phoenix Jr. was principally designed as an individual Combat Identification marker employed to minimize fratricide (the inadvertent destruction of battle field assets by friendly forces.) It has also been used as a vehicle ID marker, drop zone indicator and perimeter marker. Since its introduction in 1984, the Phoenix Jr. is the most widely used electronic Combat ID system in the world.
Phoenix Jr. and the war on terrorism. The Phoenix Jr. has been utilized by American and coalition forces for combat identification in theatres of operation such as Kosovo, Bosnia, Somalia, Afghanistan and Iraq. The Beacon has many uses in combat and other operations for marking personnel, vehicles, pathways or locations. It incorporates a flash rate that was specified to prevent confusion with small arms fire. Use the Phoenix Jr. to identify friendly force positions, demarcation lines or perimeters.
Phoenix Jr. is the world standard for covert signaling and identification of military, law enforcement, SWAT and homeland security assets.
Weight: 28 Grams | 1 Ounce
Size: 38.09 x 15.87mm | 1.5" x .625"
Flash Repeat cycle: 1.3 Seconds (fixed)
Flash Duration: 20 Milliseconds (fixed)
Battery: Common 9 volt
Configuration: 3 Light Emitting Diodes (LED)
Coverage: 240 degrees x 360 degrees
Switching: Attach or remove battery
Operating Depth: The Poseidon — Phoenix / Pegasus Mounting Clip (902801) provides a water tight casing for the beacon and battery assembly. If immersed without the Poseidon case, the unit will continue to operate until the contacts fail due to water and electrolytic corrosion. Given these conditions the depth limitation is solely determined by the battery’s ability to withstand depth.
Phoenix Jr. IR (902111IR)
Phoenix Jr. Red Training Model (902111R)
Phoenix Jr. NV Green Training Model (902111NV)
Intruder Trip Wire (902511)
Vehicle Auxiliary Power Supply (902611)
Poseidon — Phoenix / Pegasus Mounting Clip (902801)
Light Output Frequency :
Red - 640 nm
Infra Red - 880 nm
Alternate frequencies available on request
Thursday, November 19, 2009
Tuesday, November 17, 2009
Saturday, November 14, 2009
“Main article: Bowing (social)
Bowing (o)jigi (お辞儀, おじぎ), (o-)rei (お礼), is probably the feature of Japanese etiquette that is best-known outside Japan. Bowing is considered extremely important in Japan, so much so that, although children normally begin learning how to bow from a very young age, companies commonly provide training to their employees in how to execute bows correctly.
Basic bows are performed with the back straight and the hands at the sides (boys and men) or clasped in the lap (girls and women), and with the eyes down. Bows originate at the waist. Generally, the longer and deeper the bow, the stronger the emotion and the respect expressed.
Bows can be generally divided into three main types: informal, formal, and very formal. Informal bows are made at about a fifteen degree angle or just tilt over one’s head to the front, and more formal bows at about thirty degrees. Very formal bows are deeper.
The etiquette surrounding bowing, including the length and depth of bow, and the appropriate response, is exceedingly complex. For example, if the other person maintains his or her bow for longer than expected (generally about two or three seconds), it is polite to bow again, upon which one may receive another bow in return. This often leads to a long exchange of progressively lighter bows.
Generally speaking, an inferior bows longer, more deeply and more frequently than a superior. A superior addressing an inferior will generally only nod the head slightly, while some superiors may not bow at all and an inferior will bend forward slightly from the waist.
Bows of apology tend to be deeper and last longer than other types of bow. They tend to occur with frequency during the apology, generally at about 45 degrees with the head lowered and lasting for at least the count of three, sometimes longer…. The depth, frequency and duration of the bow increases with the sincerity of the apology and the severity of the offence….”
Friday, November 13, 2009
Thursday, November 12, 2009
As family and friends mourn a fallen U.S. paratrooper, his mother made an emotional plea to Obama that it's time to either bring home the troops or end the war in Afghanistan.
The body of Benjamin Sherman, 21, was recovered in Afghanistan Tuesday.
"It's time we do something. This has gone on too long. They either need to come home or we need to end it," a tearful Denise Sherman said.
Sherman was on his second tour of duty when he disappeared in Afghanistan last week during a mission to resupply troops in the western part of the country. He was a paratrooper with the 4th Brigade Combat Team, 82nd Airborne Division, based in Fort Bragg, N.C.
His family said Sherman jumped into a river to try to help another soldier when both were swept away. He was missing for about a week. "My brother is the type of man whose main values are honor, respect and standing up for what you believe in."
- Meredith Sherman, sister
Dozens of troops searched frantically for Sherman and his comrade and found the pair after about a week.
Tuesday, November 10, 2009
Friday, November 6, 2009
Dr. Walid Phares, Director, Foundation for Defense of Democracie's Future of Terrorism Project, is interviewed about Ft. Hood. He referred to the "Ft. Dix Six," a reference to the five of six Muslim immigrants who were convicted of plotting to massacre U.S. soldiers at Fort Dix, New Jersey; and, he noted that one private was killed--Private Long--and another soldier was wounded by a Muslim terrorist, Abdulhakim Mujahid Muhammad, at a Little Rock, Arkansas, Army recruitment center (in which a Muslim protester later appeared to proclaim "Islam is the religion of peace"). The American military has been a terrorist target according to Dr. Phares.
The shooting attack at Ft. Hood by a Muslim soldier, the Ft. Dix convictions, and the Little Rock shooting are anything but isolated incidents. Leaving out the numerous attacks on American soldiers overseas, by soldiers in uniform or in fake uniforms, attacks have continued in the U.S.
1) On 23 March 2003 there was a grenade attack by Muslim Sgt. Hasan Karim Akbar that killed Army Captain Christopher Seifert and Air Force Major Gregory Stone and wounded 14 others. He was convicted of two counts of premeditated murder and three counts of attempted premeditated murder on April 21, 2005. Notably, during his trial Akbar smuggled scissors out of a conference room, then asked the Military Police Officer guarding him to remove his hand cuffs so he could use the restroom. When the officer removed Akbar’s restraints, he stabbed the officer in the neck and shoulder before being wrestled to the ground by another officer.
2) While serving as a naval signalman on board the USS Benfoldin the months following the attack on the USS Cole, Hassan Abujihaad (a/k/a Paul R. Hall) actively provided Islamic terrorists with sensitive information about the location of Navy ships and their weaknesses. He also discussed sniper attacks on military personnel and attacks on U.S. military recruitment sites with Muslim terrorists as well. For his crimes, Abujihaad is currently serving a ten-(10) year sentence. On 5 March, 2008 Abujihaad was convicted by a jury and was sentenced to 10 years in prison.
3) There is also the case of U.S. Army captain James “Yousef” Lee, the former Muslim chaplain charged with espionage while serving at Guantanamo Bay, Cuba. Lee was arrested at a U.S. airport on charges of espionage after he was caught in possession of detailed maps of the detention facility along with other classified materials.
4) In addition to Lee, two other Islamic Arabic translators stationed at Guantanamo were convicted of unauthorized possession of classified documents.
Ultimately, the U.S. Army opted not to proceed with the espionage charges against Lee due to national security concerns arising from the evidence that would be made available to the public at the trial.
Colonel Terry Lee, a co-worker of the Ft. Hood suspect stated that Hasan made "outlandish" comments condemning U.S. foreign policy. In addition, numerous acquaintances who knew Malik recalled anti-American sentiments but no one filed a formal, written complaint about Hasan's comments out of fear of appearing discriminatory.
The Muslim Hasan was upset and said that Muslims should “stand up”. Muslims should not be fighting Muslims. He also publicly posted his ideas on Scribd.
Scholars have paralled [sic] this to suicide bombers whose intention, by sacrificing their lives, is to help save Muslims by killing enemy soldiers. If one suicide bomber can kill 100 enemy soldiers because they were caught off guard that would be considered a strategic victory. Their intention is not to die because of some despair. The same can be said for the Kamikazees [sic] in Japan. They died (via crashing their planes into ships) to kill the enemies for the homeland. You can call them crazy i you want but their act was not one of suicide that is despised by Islam. So the scholars main point is that "IT SEEMS AS THOUGH YOUR INTENTION IS THE MAIN ISSUE" and Allah (SWT) [sic] knows best.
The shooter's, Malik Hassan Malik, Facebook page states: "i love Islam; i love allah," and links to Islamist Facebook pages. "The apostates, they must be killed," according to Shaykh al-Islam Ibn Taiymiya, also linked on Facebook.
Hasan was put on probation early in his postgraduate work at the Uniformed Service University of the Health Sciences in Bethesda, Md. He was disciplined for proselytizing about his Muslim faith with patients and colleagues. During the shooting, one eye witness reported Malik shouting the Islamists typical cry of "Allah Akbar!" (Arabic: God is Great) before shooting.
The day of the shooting Malik was viewed calmly going about his typical schedule of buying coffee and hash browns that morning.
Army Major Shooter served on the Homeland Security Policy Institute’s presidential transition task force between April 2008 and January 2009.
There is no evidence that Americans have begun a backlash but Muslims are on the streets of America honoring Hasan. Revolution Muslim is mocking the dead American soldiers on their web site.
Sgt. Amy Krueger, 29, of Kiel, Wis., joined the Army after the 2001 terrorist attacks and had vowed to take on Osama bin Laden, her mother, Jeri Krueger said. The Muslim group labels a picture of her likeness as "Fail."
9/11 hijackers Khalid al Midhar and Nawaf al Hazmi came into contact with al Awlaki at the Rabat mosque in San Diego, though The 9/11 Commission Report notes that “We do not know how or when Hazmi and Midhar first met” him. According to The 9/11 Commission Report, the two “may even have met or at least talked to him the same day they first moved to San Diego.” Al Midhar and al Hazmi “reportedly respected al Awlaki as a religious figure and developed a close relationship with him.” The Congressional Joint Inquiry on 9/11 labels al Awlaki “their spiritual advisor” and asserts that there were reports of “closed-door meetings” involving the three. In January 2001, al Awlaki moved to Virginia and became the imam at the Dar Al Hijrah Islamic Center in Falls Church, VA, a mosque with ties to the Muslim Brotherhood. In April 2001, al Hamzi and fellow hijacker Hani Hanjour showed up at Dar al Hijrah. The 9/11 Commission Report asserts that al Hazmi’s “appearance may not have been coincidental. We have unable to learn enough about al Awlaki’s relationship with Hazmi and Midhar to reach a conclusion,”
The sole suspect in the massacre of 13 fellow US soldiers in Texas earlier this week was linked with radical imam, Anwar al-Awlaki, who was a “spiritual adviser” to three of the hijackers who attacked America on September 11, 2001.
Major Nidal Malik Hasan attended al-Awlaki’s Dar al-Hijrah mosque in Great Falls, Virginia, in 2001 at the same time as two of the September 11 terrorists.
Anwar al-Awlaki is an American-born Yemeni scholar who was banned from addressing a meeting in London by video link in August because he is accused of supporting attacks on British troops and backing terrorist organizations.
A fellow Muslim officer at the Fort Hood base in Texas, the scene of Thursday’s horrific shooting spree told the Telegraph that Hasan’s eyes used to light up when he mentioned his deep respect for al-Awlaki’s teachings.
Relatives said that the death of Hasan’s parents, in 1998 and 2001, turned him more devout.
Malik's professional background is sparse and he counseled for only a year according to his records.
The Little Rock incident referred to was a strange one in which, at the time, I believed to be a provocation. It did not work; people peaceably disagreed with the plant.
A Muslim terrorist killed an American soldier at this same site; thereafter, a Jihadist showed up to acclaim Islam as "the religion of peace."
These occurrences appear to be staged events provoking an attack. Consider for example that the Department of Justice, and Obama has stated publicly, that it is the duty of Federal government and the office of the president to defend jihadist causes.
"I consider it part of my responsibility as president of the United States to fight against negative stereotypes of Islam wherever they appear."Obama has consistently maintained his position:
"I shall stand with the Muslims should the political winds shift in an ugly direction."--Barack Hussein Obama, Audacity of Hope
An incident such as the one in Arkansas seems ripe for exploitation by an overzealous government as in the present regime. The incident seems to be an obvious Reichstag fire opportunity. On 30 January 1933 the Weimar Republic President Paul von Hindenburg appoints Adolph Hitler Chancellor as the fateful transition to dictatorship in Germany begins. On 28 February 1933 President Hindenburg and Chancellor Hitler invoke Article 48 of the Weimar Constitution, which permits the suspension of civil liberties in time of national emergency. This Decree of the Reich President for the Protection of the People and State abrogates the following constitutional protections:
* Free expression of opinion
* Freedom of the press
* Right of assembly and association
* Right to privacy of postal and electronic communications
* Protection against unlawful searches and seizures
* Individual property rights
* States' right of self-government
A supplemental decree creates the SA (Storm Troops) and SS (Special Security) Federal police agencies. The evidence is unclear as to who is actually responsible for the Reichstag Fire: Marinus van der Lubbe, an incompetent Dutch Communist, acting alone--a Communist plot--or a cynical ploy by the Nazis themselves in order to create an incident. There is historical evidence that points to Nazis involvement in the Fire.
But regardless of who actually planned and executed the fire, it is clear that the Nazis immediately took advantage of the situation in order to advance their cause at the expense of civil rights. The Decree enabled the Nazis to ruthlessly suppress opposition in the upcoming election.
On 5 March 1933 national elections provided the Nazis a 44% plurality in the Reichstag. Herman Göring [who later played a central role in the Nazi government and war effort] declares that there is no further need for State governments.
Over the next few weeks, each of the lawful Weimar State governments falls to the same ruse:
* Local Nazi organizations instigate disorder;
* The disorder is quelled by replacing the elected state government by appointed Nazi Reich Commissioners.
On 24 March 1933 the Reichstag passes the Law for Terminating the Suffering of People and Nation, also known as the Enabling Law, essentially granting Adolph Hitler dictatorial power.
The events in 1933 can be summarized as follows:
* While it is not clear whether the Nazis intentionally set the Reichstag fire in order to create a national crisis, or whether the Nazis simply were opportunistic, the event was used as justification for a sharp curtailment in constitutionally guaranteed civil liberties.
* The Nazis took advantage of the additional Federal police powers to suppress opponents.
* It is clear that in other situations, the Nazis did use the tactic of creating a "law and order" crisis so that they could provide a solution which further eroded civil liberties and entrenched their power.
* The central point to grasp is that a democracy can be destroyed by creating a law-and-order crisis and offering as a 'solution' the abdication of civil liberties and state's rights to a powerful but unaccountable central authority.
The equivalent of the Reichstag Fire is unfolding. The federal government has sided with Islam to actively promote its practice. The staged events appear designed to provoke a reaction amongst the American people. The Federal government would then seem duty-bound to intervene during an staged emergency granting extensive powers at the highest and most coercive level of government.
In the contemporary Arkansas incident some background is helpful to understand the situation.
The Muslim, Abdulhakim Muhammad, accused of killing an Army private never suffered torture or beatings while jailed on an immigration violation in Yemen, an official Embassy spokesman Mohammed Albasha stated. Muhammad became a terrorist after converting to Islam in the wake of 9/11. He pleaded not guilty to a capital murder charge in the death Monday of Pvt. William Long. Another soldier, Pvt. Quinton I. Ezeagwula, was wounded in the shooting. Muhammad, born Carlos Bledsoe, traveled to Yemen in September 2007 and taught English in the port city of Aden with the British Council for about two months, Albasha said. Muhammad then traveled to San'a, the country's capital, and taught English classes while attending Arabic courses with a group known as The City Institute, the spokesman said. Yemeni police arrested Muhammad on Nov. 14 for overstaying his visa and living illegally in the Middle Eastern nation, Albasha said. He was deported Jan. 29 to the U.S. A law enforcement official previously told the AP that Muhammad was arrested and jailed for using a Somali passport. Muhammad had such a passport at the time of his arrest, but said it was only to remain in the country with his wife. Yemen is a lawless and impoverished nation on the tip of the Arabian peninsula, is the ancestral home of Osama bin Laden's family. It was the scene of one of al-Qaida's most dramatic pre-9/11 attacks, the 2000 suicide bombing of the destroyer USS Cole off the Aden coast that killed 17 American sailors. Muhammed's attorney has disputed supposed Internet search records seized on a computer at Muhammad's Little Rock apartment, saying other people had accessed the secondhand computer. An FBI-Homeland Security intelligence assessment document obtained by the AP after the shooting suggested Muhammad may have considered targeting other locations, including Jewish and Christian sites. The FBI said he "conducted Internet searches related to different locations in several U.S. cities" including Atlanta, Little Rock, Louisville, Ky., Memphis, Tenn., New York, and Philadelphia. Material seized from Muhammad's truck and apartment this week included guns, ammunition, and Molotov cocktails.
I included a second version of the Jihadist video which is shorter but the distracting commentary is not included.
The original article, which has generated an incredible amount of hits, has mysteriously disappeared: 24 November 2014. http://www.wnd.com...
Historical precedents for Obama's Forward slogan.
Six-Day War The original Mandate for Palestine, agreed to unanimously by the League of Nations in 1920, designated 124,466 sq. km....
In modern times, the term Ides of March is best known as the date that Julius Caesar was killed in 44 B.C. Julius Caesar was stabbed (23 ti...
Rockefeller, Prager University Rockefeller
Video, article, and additional background are available. How the Iron Dome Works Israel deploys 'Iron Dome' anti-rocket system.
Handout photo shows a colorful billboard in Grand Junction, Colorado depicting US President Barack Obama as a suicide bomber, a gangster, a ...
Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions
- Abbot, Edwin A., Flatland;
- Accelerate: Technology Driving Business Performance;
- ACM Queue: Architecting Tomorrow's Computing;
- Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
- Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
- Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
- Allawi, Ali A., The Crisis of Islamic Civilization;
- Alperovitz, Gar, The Decision To Use the Atomic Bomb;
- American School & University: Shaping Facilities & Business Decisions;
- Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
- Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
- Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
- Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
- Armstrong, Karen, A History of God;
- Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
- Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
- Auletta, Ken, Googled: The End of the World As We Know It;
- Austen, Jane, Pride and Prejudice;
- Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
- Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
- Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
- Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
- Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
- Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
- Baseline: Where Leadership Meets Technology;
- Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
- Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
- Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
- Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
- Berman, Paul, Terror and Liberalism;
- Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
- Better Software: The Print Companion to StickyMinds.com;
- Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
- Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
- Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
- Bradley, James, with Ron Powers, Flags of Our Fathers;
- Bronte, Charlotte, Jane Eyre;
- Bronte, Emily, Wuthering Heights;
- Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
- Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
- Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
- Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
- Bush, George W., Decision Points;
- Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
- Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
- Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
- Campus Technology: Empowering the World of Higher Education;
- Certification: Tools and Techniques for the IT Professional;
- Channel Advisor: Business Insights for Solution Providers;
- Chariton, Callirhoe (Loeb Classical Library);
- Chief Learning Officer: Solutions for Enterprise Productivity;
- Christ, Karl, The Romans: An Introduction to Their History and Civilization;
- Cicero, De Senectute;
- Cicero, The Republic, The Laws;
- Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
- Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
- CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
- CIO Insight: Best Practices for IT Business Leaders;
- CIO: Business Technology Leadership;
- Clay, Lucius Du Bignon, Decision in Germany;
- Cohen, William S., Dragon Fire;
- Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
- Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
- Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
- Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
- Compliance & Technology;
- Computerworld: The Voice of IT Management;
- Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
- Conti, Greg, Googling Security: How Much Does Google Know About You?;
- Converge: Strategy and Leadership for Technology in Education;
- Cowan, Ross, Roman Legionary 58 BC - AD 69;
- Cowell, F. R., Life in Ancient Rome;
- Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
- Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
- CSO: The Resource for Security Executives:
- Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
- D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
- Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
- Daly, Dennis, Sophocles' Ajax;
- Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
- Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
- Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
- Dawkins, Richard, The Blind Watchmaker;
- Dawkins, Richard, The God Delusion;
- Dawkins, Richard, The Selfish Gene;
- de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
- Defense Systems: Information Technology and Net-Centric Warfare;
- Defense Systems: Strategic Intelligence for Info Centric Operations;
- Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
- Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
- Dennett, Daniel C., Consciousness Explained;
- Dennett, Daniel C., Darwin's Dangerous Idea;
- Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
- Dickens, Charles, Great Expectations;
- Digital Communities: Building Twenty-First Century Communities;
- Doctorow, E.L., Homer & Langley;
- Dodds, E. R., The Greeks and the Irrational;
- Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
- Dostoevsky, Fyodor, The Idiot;
- Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
- Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
- Dr. Dobb's Journal: The World of Software Development;
- Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
- DT: Defense Technology International;
- Dunbar, Richard, Alcatraz;
- Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
- Edwards, Aton, Preparedness Now!;
- EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
- Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
- Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
- Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
- Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
- Ellis, Joseph J., His Excellency: George Washington;
- Emergency Management: Strategy & Leadership in Critical Times;
- Emerson, Steven, American Jihad: The Terrorists Living Among Us;
- Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
- ESD: Embedded Systems Design;
- Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
- Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
- eWeek: The Enterprise Newsweekly;
- Federal Computer Week: Powering the Business of Government;
- Ferguson, Niall, Civilization: The West and the Rest;
- Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
- Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
- Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
- Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
- Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
- Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
- Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
- Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
- Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
- Forstchen, William R., One Second After;
- Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
- Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
- Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
- Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
- Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
- Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
- Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
- Fuller Focus: Fuller Theological Seminary;
- Fuller, Graham E., A World Without Islam;
- Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
- Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
- Gibson, William, Neuromancer;
- Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
- Global Services: Strategies for Sourcing People, Processes, and Technologies;
- Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
- Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
- Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
- Goldsworthy, Adrian, Caesar: Life of a Colossus;
- Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
- Goodman, Lenn E., Creation and Evolution;
- Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
- Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
- Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
- Government Health IT: The Magazine of Public/private Health Care Convergence;
- Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
- Government Technology: Solutions for State and Local Government in the Information Age;
- Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
- Grant, Michael, The Classical Greeks;
- Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
- Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
- Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
- Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
- Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
- Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
- Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
- Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
- Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
- Hanson, Victor Davis, The End of Sparta: A Novel;
- Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
- Hanson, Victor Davis, Wars of the Ancient Greeks;
- Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
- Harris, Alex, Reputation At Risk: Reputation Report;
- Harris, Sam, Letter to a Christian Nation;
- Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
- Hayek, F. A., The Road to Serfdom;
- Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
- Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
- Hinnells, John R., A Handbook of Ancient Religions;
- Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
- Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
- Hugo, Victor, The Hunchback of Notre Dame;
- Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
- Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
- Info World: Information Technology News, Computer Networking & Security;
- Information Week: Business Innovation Powered by Technology:
- Infostor: The Leading Source for Enterprise Storage Professionals;
- Infrastructure Insite: Bringing IT Together;
- Insurance Technology: Business Innovation Powered by Technology;
- Integrated Solutions: For Enterprise Content Management;
- Intel Premier IT: Sharing Best Practices with the Information Technology Community;
- Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
- Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
- Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
- Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
- Journal, The: Transforming Education Through Technology;
- Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
- Kagan, Donald, The Peloponnesian War;
- Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
- Karsh, Efraim, Islamic Imperialism: A History;
- Kasser, Rodolphe, The Gospel of Judas;
- Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
- Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
- Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
- Kepel, Gilles, Jihad: The Trail of Political Islam;
- Kiplinger's: Personal Finance;
- Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
- KM World: Content, Document, and Knowledge Management;
- Koestler, Arthur, Darkness at Noon: A Novel;
- Kostova, Elizabeth, The Historian;
- Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
- Lake, Kirsopp, The Text of the New Testament, Sony Reader;
- Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
- Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
- Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
- Lenin, V. I., Imperialism the Highest Stage of Capitalism;
- Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
- Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
- Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
- Lifton, Robert J., Greg Mitchell, Hiroshima in America;
- Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
- Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
- Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
- Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
- Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
- Mackay, Christopher S., Ancient Rome: A Military and Political History;
- Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
- Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
- Marshall-Cornwall, James, Napoleon as Military Commander;
- Maughm, W. Somerset, Of Human Bondage;
- McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
- McCullough, David, 1776;
- McCullough, David, John Adams;
- McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
- McLynn, Frank, Marcus Aurelius: A Life;
- McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
- McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
- McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
- McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
- McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
- Meacham, Jon, American Lion: Andrew Jackson in the White House;
- Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
- Meier, Christian, Caesar: A Biography;
- Menzies, Gaven, 1421: The Year China Discovered America;
- Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
- Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
- Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
- Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
- Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
- Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
- Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
- Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
- Murray, Williamson, War in the Air 1914-45;
- Müller, F. Max, Chips From A German Workshop;
- Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
- Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
- Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
- Nature: The International Weekly Journal of Science;
- Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
- Network Computing: For IT by IT:
- Network World: The Leader in Network Knowledge;
- Network-centric Security: Where Physical Security & IT Worlds Converge;
- Newman, Paul B., Travel and Trade in the Middle Ages;
- Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
- Nixon, Ed, The Nixons: A Family Portrait;
- O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
- O'Donnell, James J., Augustine: A New Biography;
- OH & S: Occupational Health & Safety
- Okakura, Kakuzo, The Book of Tea;
- Optimize: Business Strategy & Execution for CIOs;
- Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
- Parry, Jay A., The Real George Washington (American Classic Series);
- Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
- Pausanius, Guide to Greece 1: Central Greece;
- Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
- Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
- Peters, Ralph, New Glory: Expanding America's Global Supremacy;
- Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
- Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
- Pimlott, John, The Elite: The Special Forces of the World Volume 1;
- Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
- Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
- Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
- Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
- Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
- Pouesi, Daniel, Akua;
- Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
- Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
- Profit: The Executive's Guide to Oracle Applications;
- Public CIO: Technology Leadership in the Public Sector;
- Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
- Quintus of Smyrna, The Fall of Troy;
- Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
- Red Herring: The Business of Technology;
- Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
- Redmond Magazine: The Independent Voice of the Microsoft IT Community;
- Renan, Ernest, The life of Jesus (Sony eReader);
- Richler, Mordecai (editor), Writers on World War II: An Anthology;
- Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
- Rocca, Samuel, The Army of Herod the Great;
- Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
- Rodoreda, Merce, Death in Spring: A Novel;
- Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
- Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
- Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
- SC Magazine: For IT Security Professionals;
- Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
- Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
- Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
- Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
- Scheuer, Michael, Osama Bin Laden;
- Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
- Scholastic Instructor
- Scholastic Parent & Child: The Joy of Family Living and Learning;
- Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
- Schug-Wille, Art of the Byzantine World;
- Schulze, Hagen, Germany: A New History;
- Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
- Scott, Sir Walter, Ivanhoe;
- Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
- Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
- Seibel, Peter, Coders at Work;
- Sekunda N., & S. Northwood, Early Roman Armies;
- Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
- Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
- Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
- Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
- Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
- Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
- Simkins, Michael, The Roman Army from Caesar to Trajan;
- Sinchak, Steve, Hacking Windows Vista;
- Smith, RJ, The One: The Life and Music of James Brown;
- Software Development Times: The Industry Newspaper for Software Development Managers;
- Software Test Performance;
- Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
- Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
- Sophocles, The Three Theban Plays, tr. Robert Fagles;
- Sound & Vision: The Consumer Electronics Authority;
- Southern, Pat, The Roman Army: A Social and Institutional History;
- Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
- Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
- Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
- Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
- Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
- Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
- Steyn, Mark, America Alone: The End of the World As We Know It;
- Strassler, Robert B., The Landmark Herodotus: The Histories;
- Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
- Strassler, Robert B., The Landmark Xenophon's Hellenika;
- Strategy + Business;
- Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
- Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
- Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
- Sumner, Graham, Roman Military Clothing (2) AD 200-400;
- Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
- Swanston, Malcolm, Mapping History Battles and Campaigns;
- Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
- Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
- Swift, Jonathan, Gulliver's Travels;
- Syme, Ronald, The Roman Revolution;
- Talley, Colin L., A History of Multiple Sclerosis;
- Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
- Tech Briefs: Engineering Solutions for Design & Manufacturing;
- Tech Net: The Microsoft Journal for IT Professionals;
- Tech Partner: Gain a Competitive Edge Through Solutions Providers;
- Technology & Learning: Ideas and Tools for Ed Tech Leaders;
- Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
- Thackeray, W. M., Vanity Fair;
- Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
- Tolstoy, Leo, Anna Karenina;
- Trento, Joseph J., The Secret History of the CIA;
- Twain, Mark, The Gilded Age: a Tale of Today;
- Ungar, Craig, House of Bush House of Saud;
- Unterberger, Richie, The Unreleased Beatles Music & Film;
- VAR Business: Strategic Insight for Technology Integrators:
- Virgil, The Aeneid
- Virtualization Review: Powering the New IT Generation;
- Visual Studio: Enterprise Solutions for .Net Development;
- VON Magazine: Voice, Video & Vision;
- Wall Street Technology: Business Innovation Powered by Technology;
- Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
- Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
- Ward-Perkins, The Fall of Rome and the End of Civilization;
- Warren, Robert Penn, All the King's Men;
- Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
- Weber, Karl, Editor, Lincoln: A President for the Ages;
- Website Magazine: The Magazine for Website Success;
- Weiner, Tim, Enemies: A History of the FBI;
- Weiner, Tim, Legacy of Ashes: The History of the CIA;
- West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
- Wharton, Edith, The Age of Innocence;
- Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
- Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
- Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
- Wissner-Gross, What High Schools Don't Tell You;
- Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
- Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
- Woodward, Bob, Plan of Attack;
- Woodward, Bob, The Agenda: Inside the Clinton White House;
- Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
- Wright-Porto, Heather, Beginning Google Blogger;
- Xenophon, The Anabasis of Cyrus;
- Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;
Handy Tools, Links, etc.
Online Armor lets you view your firewall status.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
Blog Smith Headline Animator
- ► 2015 (908)
- ► 2014 (1221)
- ► 2013 (1266)
- ► 2012 (2427)
- ► 2011 (1976)
- ► 2010 (2168)
- Phantom Votes and more Election Fraud: NY 23
- Christo Garcia is the winner of Charlie Sheen’s 20...
- Weather Channel Founder and 30,000 Scientists inte...
- NSA's Ears Wide Open
- 7 stories Barack Obama doesn't want told
- HHS would become federal giant under Senate plan
- The World's Leading Banks, before and after the cr...
- Orly Responding to Slams by News Media
- Millions Go For Signs, Not For Jobs
- Time to Investigate Michelle?
- No Free Speech in Maryland
- Cato Experts Dissect Obama’s Health Care Town Hall...
- Phoenix Junior: Beacon for Warfare
- Fort Hood Shooter Before the Massacre
- What If China Collected on U.S. Debt?
- Web of Errors: Recovery.org's Bad Math
- How Low Will He Go?
- Chuck Norris on Copenhagen
- Paratrooper's Mom Begs Obama: 'End It' - Boston Ne...
- Co-Worker: Ft. Hood Suspect Made ‘Outlandish’ Comm...
- ▼ November (23)
- ► 2008 (775)
"Congress: I'm Watching"
A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.