Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Monday, November 30, 2015

Air Power

Click for air power policy.

Convention of States

As 2015 winds down, I want to give you a report on where things stand nationally and in Pennsylvania with the COS resolution, and plans for 2016. On the national front, we're still at 4 states having passed the resolution: Florida, Georgia, Alaska and Alabama. In 2015, the resolution was filed in 37 states, something that has never happened in a single year the history of the republic. Nine of those states were able to pass the resolution through at least one chamber in 2015, and eight of those will continue uninterrupted into 2016 with floor votes in the other chamber. We are hopeful that the state resolution "complete count" will be in the high teens (or better) by the end of 2016.

Bishops Accountable to No One


Sunday, November 29, 2015

Ian Hunter, Ringo Starr's All-Star Band, 2001

Day care vs. University


Saturday, November 28, 2015

Friday, November 27, 2015

Thursday, November 26, 2015

Saint Judas


Wednesday, November 25, 2015

Florida College Scam


British Women Support Islamic State


Obama Chooses Environment Over Safety


Obama Establishes Religion as Immigration Policy


Western Thinkers Dominate Most Influential Management Thinking


Fatwa Imam Funded by Justice Department

A radical imam quietly hired by the Obama administration to teach Muslim federal prisoners is holding a “peace and unity prayer” to denounce the Paris terrorist attacks at the same mosque that he was ousted from years ago for issuing a fatwa against an author critical of Islam.
The Egyptian-born imam, Fouad ElBayly, was forced to step down from the Islamic Center of Johnstown in Windber, Pennsylvania several years ago after publicly stating that an ex-Muslim critic of Islam should receive the death penalty. The woman, Ayaan Hirsi Ali, is a Somali-born activist who has long called for the reform of Islam to stop the radicals behind terrorist attacks and nations being run by Sharia law. Ali also operates a nonprofit dedicated to protecting girls and women’s rights, has published several books on Islam and her articles appear regularly in mainstream newspapers. She has long exposed how women suffer under Islam and is a fellow at the Harvard Kennedy School.
ElBayly was outraged when Ali was scheduled to appear at the University of Pittsburgh-Johnstown in 2007 and issued a fatwa, or death sentence, against her. A local newspaper covered the ordeal, which supposedly led to ElBayly’s ouster from the Islamic Center. “She has been identified as one who has defamed the faith,” the Egyptian imam said of the feminist author. “If you come into the faith, you must abide by the laws, and when you decide to defame it deliberately, the sentence is death.” ElBayly and Islamic Center of Johnstown founder Mahmood Qazi also pressured the university to cancel Ali’s appearance but the school didn’t budge.
A few weeks later the Islamic Center of Johnstown issued a public statement expressing shock and announcing ElBayly’s ouster. The center’s attorney wrote a letter to the local newspaper assuring that ElBayly’s views “are not shared or tolerated by the Muslims” associated with the mosque. “The Islamic Center of Johnstown was established to foster religious tolerance, education and the exercise of its religious beliefs,” the lawyer wrote, adding that members “strongly believe in exercising religious freedom, which is the right of all citizens. The Islamic Center of Johnstown sincerely respects the rights of individuals to speak their opinions openly and freely without the fear of reprisal.”
Incredibly, following the scandal the Obama administration hired ElBayly to teach Muslim federal prisoners. In 2014 the Department of Justice’s (DOJ) Bureau of Prisons gave the extremist imam two separate contracts totaling $12,900, according to government records. Americans paid ElBayly to deal with Muslim inmates at Cumberland Federal Correctional Institution in Cumberland, Maryland and provide them with “leadership and guidance.”
This week a town paper dedicated a laughable puff piece to ElBayly’s upcoming peace and unity prayer at the Islamic Center of Johnstown to denounce the Paris terrorist attacks. “Our religion is peace and harmony and brotherhood,” ElBayly says in the article. “We invite all good, peaceful people to come and join us.” He added that “we stand in love and unity” and stressed that ISIS terrorists don’t represent Islam. No mention of ElBayly’s fatwa against a religious critic or how he ended up as imam at a mosque he was supposedly ousted from over a jihadist order.
Sign Up for Updates!

Anti-Free Speech MTA



Tuesday, November 24, 2015

Chicago Shooting



Obama Imports Refugee Islamists Who Kill


Obama Arms Islamists


Pamela Geller at the MTA


Monday, November 23, 2015

Sunday, November 22, 2015

Saturday, November 21, 2015

Friday, November 20, 2015

Geller on Times

Nails it

Obama importing terrorists

Importing Terrorists Judicial Watch and a small band of patriots in Washington have been highlighting the existential threat to our nation caused by the lack of border security and the Obama administration's lawless approach to immigration. We have also exposed the dangerous pro-Islamist approach to counter-terrorism by the Obama administration that, for instance, saw Obama administration officials working with Islamists and terrorist fronts in putting forth the lie that an Internet video, rather than Islamic terrorists, were responsible for the attack on our facilities in Benghazi. After last week's terror attacks in France, likely assisted by at least one ISIS terrorist who posed as a Syrian refugee, it would be reasonable to think that good sense might prevail on the Islamist terrorist threat. Unfortunately for the safety of America, the Obama administration doubled down on its dangerous and dishonest radicalism. As the bodies of Islamic terrorist victims were still being identified in Paris, and as France went into a state of war in response to the carnage, the Obama administration's first substantive move on Islamic terrorism was to use the focus on the Paris attacks to release five al Qaeda terrorists from our secure military facility at Guantanamo Bay, Cuba. Obama, on a crusade to close Gitmo, is releasing terrorists from the facility on a regular basis, and is reportedly planning to try to move the terrorists into the United States despite a law absolutely prohibiting him from doing so. With Obama, amnesty isn't limited to illegal aliens - it includes the kinds of terrorists who murdered dozens in Paris and, just today, in Mali. The release of terrorists isn't enough for this administration; it imports terrorists, as well. Or, in the case of alleged refugees from what we are supposed to believe is Syria, Barack Obama would admit thousands from the center of the terrorist storm in the Middle East without any serious security background checks. Rather than listen to the American people, who oppose the refugee proposal in large and bipartisan numbers, Obama's plan to spend your tax money to bring 10,000 refugees from Syria to the United States is moving full speed ahead. Judicial Watch has long been monitoring this issue and reported over a month ago on how our national security officials confess they can't vet these refugees for terrorist ties: During a recent congressional hearing a director with U.S. Citizenship and Immigration Services (USCIS), which operates under the Department of Homeland Security (DHS), confirmed that the U.S. has no method of vetting the new refugees because the Syrian government doesn't have an intelligence database to run checks against. It's actually embarrassing to watch the footage of the DHS director, Matthew Emrich, getting grilled by the senator who chairs the committee that conducted the hearing a few days ago. The session was held to address the fiscal and security implications of the Obama administration's refugee resettlement program. Under questioning from Alabama Senator Jeff Sessions, Emrich admits that there is no reliable way to assure that individuals coming from Syria are properly checked. The exchange lasts about seven minutes and Emrich sounds desperate when he says "we check everything that we are aware of" and that "we are in the process of overturning every stone." The bottom line is that there is no way to verify the identity of Syrians so the defeated Homeland Security official proceeds to say that "in many countries of the world from which we have traditionally accepted refugees over the years the United States government did not have extensive data holdings." Obama's own FBI Director reconfirmed that there is no reliable way to "certify" these refugees will not pose a threat to national security. Obama's reaction to efforts to either slow down or, most appropriately, stop this refugee madness has been venomous. As is typical in Washington, the extremist Obama opposes modest (and likely ineffective efforts) to slow his refugee program down. Republicans (and many Democrats) are now defending a bill that, some suggest, would do little to stop Obama from pursuing his plans to increase the flow of refugees from Syria here by a factor of 20 times! I suppose a fake debate over a piece of legislation that would do nothing to address a serious problem is better than what typically goes on in Washington, D.C., as at least border security and the terrorist threat are under debate here. Once again, Judicial Watch is in the middle of this debate - exposing the facts, exploding the corrupt lies, and educating Americans about this core national security issue. We helped get the ball rolling on the refugee issue on Fox News this past Sunday. At the end of that interview, I suggested citizens ask their local leaders whether they were going to allow Syrian refugees to settle in their towns. We predicted that would be the issue over the next few weeks. Well, the American people needed no prodding as governors from across the nation immediately revolted and said their states would not allow Obama to settle refugees from Syria, for now, in their states (to see if your state is on the list of objectors, click here for a map.) In addition, as the refugee debated heated up in Congress this week, it was Judicial Watch's Pulitzer Prize-deserving reporting on the border terror threat that helped drive the argument for the pausing of the refugee program. Key House members pushing for tough border security cited our work, noting our April 2015 report that "ISIS was operating training bases in close proximity of the U.S. Southern border." Last year, our Corruption Chronicles first broke the news of Islamic terrorists on the border, including the fact they have already entered the United States through the Mexican border. Moreover, Homeland Security sources have told JW that four terrorists were apprehended by federal authorities and the Texas Department of Public Safety in McAllen and Pharr. We alerted Americans that ISIS is operating in a Mexican border town just eight miles from El Paso, Texas. Let me close with a point that you won't hear anywhere else but may well know as a Judicial Watch supporter: the Benghazi scandal and the ISIS disaster are connected. We proved this beyond all doubt in documents we forced out of the Obama gang thanks a court order issued in a May 15, 2014, Freedom of Information Act (FOIA) lawsuit we filed against the Defense and State Departments. The headlines from our May press release tell it best: Administration knew three months before the November 2012 presidential election of ISIS plans to establish a caliphate in Iraq Administration knew of arms being shipped from Benghazi to Syria That material provided the first official confirmation that the U.S. government was aware of arms shipments from Benghazi to Syria. The documents also included an incredibly important August 2012 analysis, warning of the rise of ISIS and the predicted failure of the Obama policy of regime change in Syria. The August 2012 document, from the Defense Intelligence Agency, deserves careful review by anyone interested in the ISIS threat and how it could have been prevented. As our release noted: [T]he opposition in Syria was driven by al Qaeda and other extremist Muslim groups: "the Salafist, the Muslim Brotherhood, and AQI are the major forces driving the insurgency in Syria." The growing sectarian direction of the war was predicted to have dire consequences for Iraq, which included the "grave danger" of the rise of ISIS: The deterioration of the situation has dire consequences on the Iraqi situation and are as follows: This creates the ideal atmosphere for AQI [al Qaeda Iraq] to return to its old pockets in Mosul and Ramadi, and will provide a renewed momentum under the presumption of unifying the jihad among Sunni Iraq and Syria, and the rest of the Sunnis in the Arab world against what it considers one enemy, the dissenters. ISI could also declare an Islamic state through its union with other terrorist organizations in Iraq and Syria, which will create grave danger in regards to unifying Iraq and the protection of its territory. Some of the "dire consequences" are blacked out but the DIA presciently warned one such consequence would be the "renewing facilitation of terrorist elements from all over the Arab world entering into Iraqi Arena." This DIA report is getting new attention these days, most recently in The New York Times this week. No wonder Obama gets so crazy when pushed on the Syria disaster, as this documents his alliance with jihadists in Libya led not only to the killing of four Americans in Benghazi but helped spark the ISIS war that threatens to ensnare the West in another world wide war. Our litigation, our reporting, our investigation, and our educational efforts on these national security and related immigration/border issues won't slow down. Your Judicial Watch takes the Islamist terrorist threat seriously, especially when the politicians of both parties move on to other, petty topics. You can track our work here, at Please get the word out about our essential work to your elected leaders, family, friends, and colleagues.

Islamic Conundrum

Obama's Conundrum Against the Islamic State

Pew Quiz


Thursday, November 19, 2015

1st Baptist vs. Islam


Hillary vs. Laughs


Christian Preacher Attacked at Mizzou


Islamic Conundrum


Entrepreneurial Inventor


Wednesday, November 18, 2015

One Brain Controls Another Person's Arm

Backyard Brains

1,000 Islamists: FBI

The Federal Bureau of Investigation (FBI) has nearly 1,000 active probes involving the terrorist group Islamic State of Iraq and Syria (ISIS) inside the United States, dozens of law enforcement officials disclose in a letter to President Obama.
The officials are elected sheriffs in Colorado making a case against the administration’s plan to transfer terrorists held at the U.S. military prison in Guantanamo Bay, Cuba to facilities in the state. Forty-one of Colorado’s elected sheriffs fired off the letter after two federal prisons in Florence (Supermax and the U.S. Penitentiary) along with a state complex near Canon City were reviewed by the Pentagon for the potential transfer. The plan is part of the president’s longtime promise to close the top-security compound at the U.S. Naval base in southeast Cuba.
The big question is what will the government do with the remaining captives, indisputably the world’s most dangerous terrorists? Just a few weeks ago Obama’s Defense Secretary said that around half of the remaining 112 prisoners at Gitmo must be locked up “indefinitely.” They include 9/11 masterminds Khalid Sheikh Mohammed (KSM), Ramzi Binalshibh, Ali Abdul Aziz Ali and Mustafa Ahmed Adam al Hawsawi as well as Abd al-Rahim al-Nashiri, the Al-Qaeda terrorist charged with orchestrating the 2000 attack on the Navy destroyer USS Cole.
The administration has considered relocating the captives to military facilities in the U.S., including Ft. Leavenworth in Kansas and the Navy Brig in Charleston, South Carolina. This has ignited outrage among officials in both states. Kansas Senator Pat Roberts was quick to say “not on my watch will any terrorists be placed in Kansas.” Roberts also co-authored a mainstream newspaper op-ed with South Carolina Senator Tim Scott vehemently rejecting the idea. “The notion that Kansas, South Carolina or any other state would be an ideal home for terrorist detainees is preposterous,” the piece reads. “Transferring these prisoners to the mainland puts the well-being of states in danger, posing security risks to the public and wasting taxpayer dollars. The detention facilities at Guantanamo are doing a fantastic job of holding these terrorists.” The governors of both states—Nikki Haley of South Carolina and Sam Brownback of Kansas—have also vowed to take any action in their power to stop the transfers, including suing the federal government.
Now Colorado is striking back for making the Pentagon’s shortlist. In their letter to the White House, the state’s sheriffs say the ill-conceived plan to transfer dangerous foreign enemy combatants to civilian prisons puts their citizens at risk. “We recently learned that the FBI has almost 1,000 active ISIS investigations taking place inside the borders of the United States,” the letter states. “We believe it would be dangerously naive not to recognize that a civilian prison with an untold number of enemy combatant inmates, located in our state, would provide a very tempting target for anyone wishing to either free these detainees or simply wishing to make a political statement.”
The cops cite repeated examples around the globe of coordinated, violent attacks against prisons holding radical Islamic militants. “We strongly protest actions that might well add our sate to the list of locations where such deadly attacks have occurred,” they write. Another big concern is transporting the terrorists across many counties from the facilities under consideration to the federal district courts or federal court of appeals in Denver, creating “many safety and security threats” to communities that must be addressed by local sheriffs.
“In the 1990s, we experienced the dangers and threats to our capital city, Denver, when two domestic terrorists, Timothy McVeigh and Terry Nichols, were tried there,” the letter to Obama says. “Security during that trial was unprecedented. We can only imagine the disruptions and dangers throughout our state if enemy combatants from Guantanamo Bay were routinely transported from Canon City to the heart of our capital city of Denver.”
Sign Up for Updates!

Nearly 70 Islamist Refugees in America Arrested


Islamists promoted to citizens.

Monday, November 16, 2015

Muslim Invasion of the United States

The map of the invasion indicates how "Syrians," and the FBI has nearly 1,000 ongoing investigations, have spread throughout the United States. According to our current treaties, we have absolutely no obligation to take in one single refugee. The United States has pledged humanitarian assistance for refugee camps set up in Syria. Moreover, surrounding Muslim majority nations are not taking in refugees, and that's why Obama is importing them here.

Dartmouth Library Black Nazis Matter

Dartmouth Black Lives Matter

Dartmouth Apologizes

Mott The Hoople, Mick Ralph's, guest on Sweet Home Alabama, Lynyrd Skynyrd

Mick Ralphs

Re-name Racist D.C. to Obama, D.C.


Trump Mosques


West Lost Will


Sunday, November 15, 2015

Obama's Orwellian Drone Language


Islamist Entry Points


Muslim Brotherhood Infiltration


Saturday, November 14, 2015

Missouri vs. Paris


Tracing Hillary's Accents


Friday, November 13, 2015

Hillary Lie Benghazi

Judicial Watch Proves Clinton Knowingly Lied about Benghazi

The infamous al Qaeda terrorist attack on the American diplomatic compound in Benghazi, Libya, took place on the evening of September 11, 2012, killing U.S. Ambassador J. Christopher Stevens and U.S. Foreign Service Information Management Officer Sean Smith. Shortly afterward, a second assault on a nearby compound killed two CIA contractors, Tyrone S. Woods and Glen Doherty. Ten others were also injured in the attacks. But right from the beginning, your Judicial Watch saw through the prevarication, deception and inaction by President Obama, Hillary Clinton, and Susan Rice (who is now Obama's national security adviser). Rather than tell the truth, and put Obama's reelection (and Hillary Clinton's then-nascent presidential campaign) at risk over the Libya mess and the lack of security - the Obama administration abandoned those under fire and instead issued public statements falsely portraying the attack had nothing to do with terrorism.
We know otherwise now, and we have some new bombshells to reveal. JW just released more of Hillary Clinton's emails confirming that, at 11:00 p.m. on the night of the deadly assault on the U.S. Consulate in Benghazi, then-Secretary of State Hillary Clinton informed her daughter that an "Al Qaeda-like group" was responsible for the deadly terrorist attack. This obviously conflicts with her description of the attack as being the result of "inflammatory material posted on the Internet," as Mrs. Clinton had claimed in her official public statement one hour earlier.

The documents were produced in response to lawsuits filed by Judicial Watch under the Freedom of Information Act (FOIA). Mrs. Clinton's email to Chelsea Clinton was first produced to the Select Committee on Benghazi on October 20 and widely publicized on the day of Mrs. Clinton's testimony, October 22, but court filings in Judicial Watch's litigation show that the email was only produced after two federal court judges ordered the State Department to produce more Benghazi-related records to Judicial Watch.

The State Department's records include a September 11, 2012, late-night email that Mrs. Clinton sent to her daughter Chelsea, who wrote under the pseudonym "Diane Reynolds" when using the Clinton email server:

From: H

Sent: Tuesday, September 11, 2012 11:11 PM

To: Diane Reynolds

Subject: Re: I'm in my office

Two of our officers were killed in Benghazi by an Al Qaeda-like group. The Ambassador, whom I handpicked and a young communications officer on temporary duty w a wife and two young children. Very hard day and I fear more of the same tomorrow.

Yet, in an earlier message, at 10:08 p.m. on September 11, Mrs. Clinton issued an official State Department press statement placing the blame for the attack on an obscure Internet video critical of the Islamic religion. At no point did she reference terrorist activity at or near the Consulate:

Some have sought to justify this vicious behavior as a response to inflammatory material posted on the Internet. The United States deplores any intentional effort to denigrate the religious beliefs of others. Our commitment to religious tolerance goes back to the very beginning of our nation. But let me be clear: There is never any justification for violent acts of this kind.

This key email shows that Hillary Clinton knowingly lied about the terrorist attack on Benghazi. In addition to the admission by Mrs. Clinton that the Benghazi assault was a terrorist attack, the email exchange between the Clintons also included an apparent attempt by Chelsea Clinton to equate Islamic terrorism with life in the United States before "modernism" was allowed "to take root:"

From: Diane Reynolds,

Sent: Tuesday, September 11, 2012 11:07 PM

To: H

Subject: RE: I'm in my office

I am so sorry about the State Department officer killed in Libya and the ongoing precariousness in Egypt and Libya. Such anathema to us as Americans - and a painful reminder or [sic] how long it took modernism to take root in the US, after the Enlightenment, the 14th, 15th, 16th 19th amendments, removal of censorship norms and laws, etc.

Ironically, the Obama administration's efforts to falsely blame an Internet video rather than al Qaeda for the terrorist attack in Benghazi included outreach to Islamist radicals who seek to censor criticism of Islam. The producer of the Internet video was also subsequently jailed by the Obama administration on a supposed probation violation.

The State Department first produced the smoking-gun Hillary Clinton email to her daughter to the Benghazi Select Committee on October 20. But the document was disclosed only after Judicial Watch pressed in litigation for additional searches of State Department records. Judges Amit P. Mehta and Amy Berman Jackson in two Judicial Watch cases ordered the State Department to disclose the newly found material to Judicial Watch. The court orders are dated July 31, 2015October 9, 2015, and October 20, 2015. In fact, on October 8, the State Department knew that it was going to be required to provide a report to the court by October 22 regarding the number of responsive documents in Mrs. Clinton's 30,000 emails, and specify how many responsive records pre-dated December 31, 2012.

The Select Committee on Benghazi subpoenaed records only through the end of 2012, however, a Judicial Watch lawsuit filed in May 2015 seeks records through the end of Mrs. Clinton's term as Secretary of State, to January 31, 2013. In July, the State Department had represented incorrectly that the document production up through December 2012 was complete.  But in responding to this request, the State Department says it found 242 additional emails from 2012, which the agency would later disclose included the email Mrs. Clinton wrote to her daughter on the night of the Benghazi attack. The State Department has yet to produce 87 records it found from Mrs. Clinton's account from January 2013.

A status hearing took place this morning before U.S. District Court Judge Amit P. Mehta. A Justice Department attorney, on behalf of the State Department, confirmed that Judicial Watch's FOIA forced the release of these smoking gun emails. The Obama administration, unfortunately, convinced Judge Mehta to give it until the middle of February to disclose these new Benghazi Clinton emails to Judicial Watch and the American people. What a relief for Hillary Clinton, as her new Benghazi emails will be kept secret by her co-conspirators in the Obama administration until after the Iowa caucuses and the New Hampshire primary.

As I told The Hill today: "The only way [the Benghazi Select Committee] had that Sept. 11 smoking gun is because of this FOIA case ... So who the heck knows what else is out there."

So once again, it was Judicial Watch lawsuits - not Congress - that forced the production of this smoking-gun email into the open for the American people. I have no doubt that the Obama administration and Hillary Clinton knew this email was out there and illegally stonewalled its release to Judicial Watch, the courts, and Congress. It is shameful that this stonewalling continues.

The new emails were produced to Judicial Watch in two separate Judicial Watch FOIA lawsuits. You can read about the two Benghazi lawsuits, filed in 2014 and 2015. They are hereand here.

Judicial Watch has now filed more than 40 FOIA requests, a Mandatory Declassification Review, and 12 lawsuits against the Obama administration relating to the Benghazi terrorist attack.

In April 2014, we forced the release of documents showing then-White House Deputy Strategic Communications Adviser Ben Rhodes and other Obama administration public relations officials attempting to orchestrate a campaign to "reinforce" President Obama and to portray the Benghazi consulate terrorist attack as being "rooted in an Internet video, and not a failure of policy." Judicial Watch's release of the Rhodes email, which had been withheld by the Obama administration from Congress, caused the House of Representatives to approve the Select Committee on Benghazi, which is now led by Rep. Trey Gowdy (R-SC).

This latest success shows again how Judicial Watch's Benghazi work is the nation's most historically significant investigation by a non-government organization. 

'Allah Akbar' Paris

Bataclan audio


Hostage heard sermon from the Islamic State.

Islamist mocks authorities
Anti-Semitic target: Bataclan

Volcano Explodes


Thursday, November 12, 2015

Free College vs. Cavuto


Minimum Wage: Fast Food Workers Do More than EMT


Racial Spaces


MRI: If I Only Had a Brain


Wednesday, November 11, 2015

Tuesday, November 10, 2015

Missouri Professor Thug Muscles Reporter

Professor Thug



Muslim Prejudice Against the Poles in Michigan

Get Poles

Monday, November 9, 2015

Sunday, November 8, 2015

Worst Small Cities cities

Satan's Toolbox, The Vortex


China and Russia

China Owns America

Kosovo Muslims Persecute Serbian Christians


Saturday, November 7, 2015

For Profit Student Debt For Profit

Islam's Impact on Europe and America


Interview with Egyptian Islamist researcher Ali Abd Al-Aal, which aired on Mayadeen TV on October 12, 2012.

Friday, November 6, 2015

George Carlin, The American Dream


Hillary Traded Secrets

Hillary Clinton Violated Law on Classified Material

Hillary Clinton thinks she's above the law, including a key law regarding the protection of classified material that, if released, could compromise our nation's security and get a lot of people killed. That's why we filed a Freedom of Information Act (FOIA) lawsuit against the U.S. Department of State to obtain records about Hillary Clinton's training on "making and marking" classified information. The lawsuit also seeks similar records for Clinton's top State Department aides Huma Abedin and Cheryl Mills. We filed the lawsuit last month after the State Department declined to comply with our simple information requests. 
Here's some background.

Barack Obama issued an Executive Order in 2009 requiring all employees with "original" or "derivative" classification capability to take mandatory training. The requirement became federal law in 2010. The State Department subsequently created a course, "Classified and Sensitive but Unclassified Information: Making and Marking," to satisfy that requirement. Those employees with "original classification authority" who fail to take the course each year are supposed to have their classification authority suspended.

State Department employees also are routinely denied access to classified and unclassified networks and systems for failure to complete this required training, according to Judicial Watch's investigation. This stands to reason, does it not? To have untrained officials accessing this sensitive material would be a menace to national security and could play into the hands of the Chinese, the Russians, the Iranians, and others who endanger American interests.

No wonder the Obama gang running the State Department ignored two separate FOIA requests for information on the required classification training by Clinton, Mills, Abedin, and other covered State Department officials.

Both requests were submitted on August 18, 2015. The first request sought:

• Records related to lists of employees required to complete the Foreign Service Institute course "Classified and Sensitive but Unclassified Information: Identifying and Marking" (PK323) either annually or biannually provided to A/GIS/IPS [Office of Information Programs and Services] by the Office of the Secretary of State; and

• Records regarding reports of employees whose classification authority was suspended due to failure to complete Foreign Service Institute course PK323 as required provided to A/GIS/IPS by the Office of the Secretary of State.

Our second request sought:

• Records concerning the successful completion of the Foreign Service Institute Course PK323, "Classified and Sensitive but Unclassified Information: Identification and Marking," by former Secretary of State Hillary Clinton. Such records include, but are not limited to, any records identifying the training requirements for former Secretary Clinton, any reports from FSI indicating the completion of the course by former Secretary Clinton, and any transcripts or certificate of completion for PK323 provided by former Secretary Clinton to the designated bureau training official in the Office of the Secretary of State;

• Records regarding the successful completion of the Foreign Service Institute Course PK323, "Classified and Sensitive but Unclassified Information: Identification and Marking," by Huma Abedin. Such records include, but are not limited to, any records identifying the training requirements for Ms. Abedin, any reports from FSI indicating the completion of the course by Ms. Abedin, and any transcripts or certificate of completion for PK323 provided by Ms. Abedin to the designated bureau training official in the Office of the Secretary of State;

• Records of the successful completion of the Foreign Service Institute Course PK323, "Classified and Sensitive but Unclassified Information: Identification and Marking," by Cheryl Mills. Such records include, but are not limited to, any records identifying the training requirements for Ms. Mills, any reports from FSI indicating the completion of the course by Ms. Mills, and any transcripts or certificate of completion for PK323 provided by Ms. Mills to the designated bureau training official in the Office of the Secretary of State.

The requests are quite simple. Show us that Hillary Clinton and others at State completed the required training. Tell us if anyone had their access at the State Department suspended for not completing the required training. In short, tell us that Hillary Clinton didn't put the nation's security at risk.

On December 29, 2009, President Obama made the classified information training mandatory with "Executive Order 13526 - Classified National Security Information:"

All original classification authorities must receive training in proper classification (including the avoidance of over-classification) and declassification as provided in this order and its implementing directives at least once a calendar year. Such training must include instruction on the proper safeguarding of classified information and on the sanctions in section 5.5 of this order that may be brought against an individual who fails to classify information properly or protect classified information from unauthorized disclosure. Original classification authorities who do not receive such mandatory training at least once within a calendar year shall have their classification authority suspended by the agency head or the senior agency official designated under section 5.4(d) of this order until such training has taken place.

In October 2010, the training became a federal law under the "Reducing Over-Classification Act of 2010 (Public Law 111-258)." According to the U.S. Department of State Foreign Affairs Manual:

The training is mandatory:
On an annual basis for all employees who have original classification authority; and

On a biennial basis for all employees who classify information by using information already classified by another source or who classify based on a classification guide (derivative classification). Any employee with a security clearance may make a derivative classification decision. [Emphasis added]

Did Hillary Clinton and her top aides bother to take the training legally required for the handling of classified information? What training did Hillary Clinton take to allow her to make credible representations about classified information on her illicit email system?

The Obama State Department is illegally covering up the answers to these questions. And that's why we sued in federal court to get the truth. 

Hillary Mishandled Classified Benghazi Material


Thursday, November 5, 2015

Wednesday, November 4, 2015


Dan Joseph



Some Sweet Mexican Kids on Trump


Muslim America Should Host Next Draw Muhammed Day

Muslim America

Elvis Presley, My Happiness, 1953, Sun Studio


Hillary Supporters Pro-Sharia Law


Tuesday, November 3, 2015

Obama Stealing from Social Security


Israeli Reporter Harassed in Live Shot


Religion Down


Monday, November 2, 2015

Uber Mace


Body Armor Ban


1995 Clip Obama on Communist Frank Marshall Davis


Sunday, November 1, 2015

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy,, Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • Müller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

Radical Christian

My secure contact form

Choice Reviews Online

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science


Choice Reviews Online

SD Times: Software Development News


SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist

Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Musical support powered by:


Portrait of Thinking Hero

Portrait of Thinking Hero

Check out:

Check out:
Chicks dig readers.

Video Bar

@ Blog Smith. Powered by Blogger.