Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Friday, August 31, 2007

Germans Avoid Stepping On Terror Toes

Wolfgang Schaeuble, graphic source: BBC.


The Germans owe terrorists an apology for violating their privacy with spyware.


No, this is not a genuine headlline but Interior Minister Wolfgang Schaeuble faces strong opposition in plans to spy on terror suspects by deploying malicious emails.


The emails contain Trojans, software that furtively installs itself, allowing agents to search the hard drives.


I suppose the opposition Free Democrats, Gisela Piltz, would apologize to suspects since this is an unacceptable intrusion into privacy. Justice Minister Brigitte Zypries, of the Social Democrats (SPD), has also voiced concern about the possible infringement of privacy laws.


If privacy were a larger concern most Trojans would be eliminated from desktops: like that is going to happen. So many products on the web contain Trojans I hardly think terror suspects deserve that much consideration. And, for those of us who take pre-emptive measures, it really does not matter. There are those times I wish governments would stop looking out for us. This is one of those times.

Governments Hacked



Graphic source, CNN, 19 September 1996.


Computer Sweden reports today that hacks compromised embassy and government email accounts worldwide. The countries effected by this breach are the foreign ministry of Iran, the Kazakh and Indian embassies in the U.S., Uzbeki embassies and consulates worldwide, the Russian embassy in Sweden, and login details for email accounts at the U.K. visa office in Nepal.


The usernames and passwords for more than 100 email accounts were posted online.


Freelance security consultant Dan Egerstad posted the information.


Egerstad told Computer Sweden that he never used the information to log in to any of the compromised accounts in order not to break any laws.


The story indicates the sorry state of security by governments worldwide. As annoying as Egerstad may seem, this is an indication that greater vigilance is needed online. The range of countries hacked also indicates that there is little likelihood that there is an ulterior, financial, or political motive, to the hacks.

Thursday, August 30, 2007

"Cut & Run" Sadr Suspends Militia Violence

Graphic Source: AP


The bizarre Shiite cleric Moktada al-Sadr suspended violent attacks for six months. He is making this move to reign in the rogue elements of his Mahdi Army militia’s operations. The good news is that attacks on American troops are suspended. My hope here is that while this hiatus intervenes, American troops can perform their genuine mission in Iraq, counter-insurgency, and vigorously rooting out elements in Sadr's militia. The suspension by Sadr, is his bowing to pressure hours after his fighters waged running street battles with Iraqi government forces.


Karbala, holy to Shiites, was the scene of battles between Shiite factions which left 52 dead.

Retail Security Flaws

Retail point-of-sale (POS) systems present security flaws for consumer credit card data, according to Neal Krawetz, founder of Hacker Factor Solutions.


Krawetz outlined numerous relatively easily vulnerabilities in POS technologies.


In the last year, no company has responded to Krawetz' inquiry.


One of the most basic limitations of POS is need for standards at the payment level. The Payment Card Industry (PCI) data security standard required by all major credit card companies requires businesses to take several measures for protecting cardholder data. However, PCI standards are not available for POS devices or software.


POS terminals that read credit card information, perform card transactions, and receive the confirmation code are easy targets for hackers. According to Krawetz POS terminals often store a relatively high volume of easily accessible credit card data. Most systems purge the data automatically when power is turned off or when transactions are tallied at the end of the day, but this does not occur in every instance.


Krawetz recommends asking the vendor whether payment card data is purged when power is removed from the POS system, finding out how much data can be retained in the device's permanent storage, and how to manually purge the data. Also, companies need to find out whether the data on POS devices is encrypted, whether the permanent storage can be removed, and whether the POS system forces users to change default settings. In addition, companies should find out if the POS device allows back-door access to the data and whether it has any logging functions for tracking activity.


These are serious concerns and I applaud Krawetz for describing them. I would hope the financial industry would take note.

Wednesday, August 29, 2007

Vista SP1 Beta Only a Few Weeks Away

Graphic source: Odd-Magne Kristoffersen.


Microsoft Corp. confirmed reports that the first service pack for Windows Vista will be out sometime in the first quarter next year.


The first major update to Vista will contain a number of tweaks to speed up the operating system and fix nagging reliability problems, according to David Zipkin, a senior product manager for Windows Vista.


The SP1 beta will be released by the end of September, though it will be limited to no more than 15,000 Microsoft partners and customers. Another beta or release candidate will be distributed to a larger pool of testers before SP1's final release, which is slated for sometime before March 31.


Beta copies of SP1 have already leaked to pirate sites.


The Microsoft message here is to wait for Vista if you haven't implemented it yet; and, XP is still viable because Microsoft will update a Version 3 of XP at the same time.


SP1 will include 19 major changes. Among the most important is to downplay what many find annoying, the User Account Control (UAC) security feature, to be less intrusive. Copying and unzipping files in Vista should be much faster as should the ability of Vista PCs to wake up from standby or hibernate modes. The Bitlocker drive encryption, which formerly could only encrypt the C: drive, can now be used to encrypt other partitions and hard drives.


As for XP SP3, the main new feature is Network Access Protection (NAP), now available only in Vista. NAP reports the security status of a PC to a Windows Server, which can quarantine the PC and block any network traffic to and from the computer if it appears compromised.


SP1 will come in the form of a 50MB .exe file.


This is a mid-level update, not too adventurous, not unnecessary.

ICANN Whois No Privacy Reforms

The Internet Corporation for Assigned Names and Numbers (ICANN) has not setteled differences over proposed privacy changes to the WHOIS database. There has been no progress on how to reform the way WHOIS data is handled.


The WHOIS registry is the domain name systems' legacy database; it contains names and contact information of all those who register Internet domains. The contents of the database have been publicly accessible to anyone who wanted it.


Companies, intellectual property holders, and law enforcement authorities favor open access to the WHOIS database on the grounds that it helps them go after phishers, trademark infringers, copyright violators and others. Privacy advocates oppose unrestricted WHOIS access on the grounds that it could expose individual domain registrants to spam and unwanted surveillance.


One of the better proposals was one to shield the contact information of individual domain registrants while making that of commercial registrants publicly accessible. Also, access to shielded WHOIS information could be provided on a one-time basis or on an as-needed basis to those who could demonstrate a valid reason for access to the information. A warrant should reveal all if need be.


There are those who would avail themselves of a proxy, for good or for ill, and law enforcement will always need to be vigilant and perform their appointed tasks to discern the difference.

Tuesday, August 28, 2007

Chinese Wife Who Has the Aegis

Several Japanese homes of the Maritime Self Defense Force (JMSDF) and a destroyer were raided over a computer data leak. This leak may effect the Aegis missile defense system, the sea-based Standard Missile-3 interceptor system, and the reconnaissance satellite data exchange Link 16 system.


Police were alerted when conducting an immigration-related investigation into the Chinese wife of a JMSDF officer. During the search they came across the data, which included the radar and transmission frequencies of the Aegis system. The officer wasn't authorized to be in possession of the data so the investigation was begun.


He apparently came into possession of the data while swapping pornography with another JMSDF officer, according to a Japanese news source, the Yomiuri Shimbun newspaper.


Aegis is an American defense initiative.


Japan would like access to technical details of the F22A Raptor, one of the most technically advanced jets in the U.S. fleet. The U.S. has not accepted the request yet.


I guess this means you can't always trust a wife, or who you can swap pornography with.

Extra-Internetality

During the era of Colonialization, an accused person had the right to be returned to their home country, a British citizen would return to England, for trial: extraterritoriality.


The colonized country would have their laws and persons often violated as a result.


Currently, Yahoo Inc. asked in a 51-page defense filing in the Northern District of California, a federal court, to dismiss a human rights lawsuit. I believe Yahoo is wrong.


Yahoo's Hong Kong subsidiary, Yahoo Hong Kong Ltd., (YHKL), provided information about dissidents to the Chinese government and subsequently a lawsuit was filed against Yahoo by the World Organization for Human Rights USA.


What is clear is that the information supplied led to the persecution, torture and imprisonment of four Chinese dissidents.


Writer Wang Xiaoning was charged on incitement to subvert state power. Wang was sentenced to 10 years in prison in September 2003. Yahoo gave his e-mail account information and IP address to the Chinese government.


Yahoo's defense is that it doesn't condone the suppression of their rights and liberties by their government, it had no control over laws passed by the People's Republic of China (PRC) and the ways in which those laws were enforced.


I disagree. China does not adhere to international norms and standards and this position makes it more likely that information turned over to Chinese authorities, as opposed to information that might convict child-molesters, and others accused of heinous crimes in the West, might be misused. Yahoo's defense is disingenious.


Would anyone consider China to be a paragon of free speech?

Monday, August 27, 2007

Senator: Surge Is A Success

Senator Mitch McConnell stating the key August news story.

Good Enough for My Grandfather

Philadelphia could spend $47M over 20 years for water billing improvements. The latest of a two decades long effort to replace Philadelphia's aging water billing system could reach nearly $47 million.


Philadelphia Controller Alan Butkovitz released a 29-page report that detailed the costs since 1987 of replacing the city's 30-year-old proprietary Cobol mainframe billing system that still relies on punch cards.


Yes, punch cards, you read that correctly.


Costs have already exceeded $35 million and could reach $46.7 million, the controller's report stated.


Last January, an attempt began to replace the old water billing system with commercial off-the-shelf software for water billing called Basis2 from Prophecy International Pty. of Adelaide, Australia. Most of the previous plan to use Oracle Corp. applications was scrapped.


The Oracle applications cost $18.9 million, twice more than it initially expected to, without getting a working system.


Now, the Prophecy software and related costs will total $6.7 million, bringing the Prophecy and Oracle costs to $25.6 million.


The controller's total cost of $46.7 million includes years of work prior to 2002 when the Oracle work started. There was project creep between 1987 and 2002 which enlarged the initial costs.


I find this appallingly expensive, wasteful, and inefficient but typical of how money was wasted in dead-end projects. The non-innovative East attitude seems to be, if it was good enough for my grandfather, it is good enough for me.

Sunday, August 26, 2007

INDEX Prizes Awarded to $100 Laptop, Electric Car

The AP reported that an electric sports car, a prosthetic foot for land mine victims, and a potentially lifesaving device known as the "Tongue Sucker" won in an international award honoring innovative designs.


The INDEX prize also awarded the $100 laptop designed for Third World children.


The Danish award began in 2005 "to celebrate design that not only looks good but also improves lives of people all over the world," according to Kigge Hviid, manager of the award foundation.


"Great design is a way to tell people that you value them," said Yves Behar, a Swiss designer who was part of the team behind the "XO" portable computer.


The laptop is now estimated to now cost $175 which is still inexpensive.


Canadian Sebastien Dubois' prosthetic foot was designed for land mine victims.


The Tesla Roadster electric sports car is made by California-based Tesla Motors.


The Prize awards are available at the INDEX site.

Friday, August 24, 2007

China In the Right Direction

China's recent announcement that it will begin a four-month campaign on tainted food, drugs and exports is a step in the right direction. Unless China begins to play according to international rules and by international standards, it will lose all the good will it earned by offering cheaper products. Consumers have begun to question the "Made in China" label.


Chinese Vice Premier Wu Yi announced the "war" to focus on the troublesome products that have questioned China's commitment to quality.


The world's largest toymaker, Mattel, often thought of as an American company, recalled more than 18 million Chinese-made toys recently.


Chinese standards have been questioned in numerous products such as toothpaste, animal-food ingredients, tires, eels and seafood, and deadly chemicals in cough medicine.


Not long ago I commented on the execution of Zheng Xiaoyu, who was the former head of the national food and drug safety watchdog, and was executed in July for taking bribes.

Where Are the MRAPs?

The U.S. military needs more MRAP (Mine Resistant Ambush Protector) Vehicles since February 2005 and are only now beginning to receive a small number. I would like to document where the hold up is for these life-savers. Is it Congress, the companies themselves, or plain old bureacracy? Now that the military has given Iraq some breathing room, despite Maliki, our troops deserve the best.

Thursday, August 23, 2007

Iraq Intelligence Estimate

Released yesterday, "Prospects for Iraq's Stability," is not filled with light and joy. Iraq is in generally poor condition although it is a bit better in certain areas.


There have been measurable but uneven improvements in Iraq’s security situation since our last National Intelligence Estimate on Iraq in January 2007. The steep escalation of rates of violence has been checked for now, and overall attack levels across Iraq have fallen during seven of the last nine weeks. Coalition forces, working with Iraqi forces, tribal elements, and some Sunni insurgents, have reduced al-Qa’ida in Iraq’s (AQI) capabilities, restricted its freedom of movement, and denied it grassroots support in some areas. However, the level of overall violence, including attacks on and casualties among civilians, remains high; Iraq’s sectarian groups remain unreconciled; AQI retains the ability to conduct high-profile attacks; and to date, Iraqi political leaders remain unable to govern effectively. There have been modest improvements in economic output, budget execution, and government finances but fundamental structural problems continue to prevent sustained progress in economic growth and living conditions.


The conclusion is to stay the course:


We assess that changing the mission of Coalition forces from a primarily counterinsurgency and stabilization role to a primary combat support role for Iraqi forces and counterterrorist operations to prevent AQI from establishing a safehaven would erode security gains achieved thus far.


On this report, an interesting comment was made:


I . . . want to mention a common mentality I've noticed in Americans. They're angry at Bush, the administration, etc. and believe they're incompetent, liars and crooks. Without touching that subject, let me say that whatever you believe they may have done, you must not let it cloud your judgments of what's happening NOW. However sincerely angry you may be at their past actions (and inactions) you should be cautious in how much you let it effect your assessment of what they are doing now. During April I went home on leave and encountered countless people who wanted immediate pull-out of Iraq. Their most common reason for this decision seems to be their absolute disappointment in how the administration presented the war case and how they handled Iraq post-Saddam. And it always followed that their description of the "surge", along with anything else the president said, was cast in this light.


The "Surge" - strong military action and an altered (read: actual) battle plan - has shown genuine progress. There's no doubt that this battle plan should have been initiated immediately upon the fall of Saddam. The American people sat and watched years and American lives go by with no (actual) progress whatsoever. So it seems natural that the administration now seems as though it's merely spinning its wheels.


But they're not. Yes, it's late. Yes, people believe they were lied to. Yes, they question the competence and integrity of the administration. But you cannot let this override your judgment of what's currently happening. It's important not to forget it, certainly, but you cannot let knee-jerk disappointment rule your sense. How many people here have actually read the Iraqi benchmarks and which ones they've met? When they were established they hadn't met ANY of them, and already they're making progress. I must sound like an administration spin-machine, but my boots, right now, are in Iraq. I see it first-hand every day
.


Posted by: SPC Haight Aug 23, 2007 1:38:05 PM


I agree with Haight. I took my time and did not let my frustration with the Administration misguide me. The contemporary Iraq situation has been long in coming, but rather than conclude its hopeless, I actually began tracking deaths, goals met, and screened out the misinformation. Sure enough, there are prospects for hope in the morass. The military has accomplished the mission of the surge. They did what they were asked to do, at great sacrifice.

Alternative Ending to "The Invasion"

Graphic source: Wikipedia Public License.


If you plan to see The Invasion, then don't read the following because I'm going to spoil the ending for you. I caught this update from the classic B-movie original and I thought of a better way to end it.


Our heroine, in the update, looks fondly at her beloved while he is still sleeping as the morning news drones out grim statistics of people being killed while she forlornfully listens to the radio drinking her coffee. She is obviously troubled and we are left with the impression that maybe total peace is the path to follow after all.


The peace route, completely restraining people and repressing them though, was what the alien bug offered during the horror of the movie we just experienced.


On the other hand, a better ending is my version.


Our heroine, waking up from a dream filled with the alien special effects bug we saw throughout the film, awakens her. Now, we would be left to wonder, was it all a dream? Or, did what we just saw really happen? We would be left to wonder. And, this would lead to a possible sequel. What are those bugs in her head? Where did they come from? Will they emerge?


To sweeten the pot and add to the mystery, our protagonist's beloved, could be arising from slumber at the same time, but as he gets out of bed he limps. The limp could be from what we had experienced in the movie, our protagonist shot him during the film, or, he may just limp. We don't know.


In any case, this alternative ending would heighten the mystery and add to the tense moments we experienced in the film.


In case one still needs to see the classic original, here is a summary of Invasion of the Body Snatchers.


The theme of the cautionary, politicized film was open to varying interpretations, including paranoia toward the spread of a harmful ideology such as socialistic Communism, or the sweeping mass hysteria of McCarthyism in the 1950s and blacklisting of Hollywood, the spread of an unknown malignancy or virulent germ (read fear of annihilation by 'nuclear war'), or the numbing of our individuality and emotional psyches through conformity and group-think. Yet its main theme was the alien (read 'Communist') dehumanization and take-over of an entire community by large seed pods (found in basements, automobile trunks, a greenhouse, and on a pool table) that replicated and replaced human beings. And it told of the heroic struggle of one helpless but determined man of conscience, a small-town doctor (McCarthy), to vainly combat and quell the deadly, indestructible threat.


Tim Dirks

Wednesday, August 22, 2007

Tenet, Long Before Bush, Unprepared

The former head of the Central Intelligence Agency, George J. Tenet, failed to prepare the U.S. for the terrorist threat.


To Tenet’s shame he failed to prepare this country, the President--Clinton--for the terrorist threat. This fact, long before Bush, was clear from the 9/11 Commission report.


The recently released C.I.A. report merely, but importantly, confirms how not surprising Bush was ill informed regarding the terrorist threat upon becoming president. Clinton vacillates according to my reading of the 9/11 testimony. Therefore, it is not surprising that Bush inherited a vague policy against largely unknown actors.


According to the internal report, Tenet recognized the danger posed by Al Qaeda long before 11 September 2001, but he failed to adequately prepare the C.I.A. to meet the threat.


The document was completed in June 2005 but was kept classified until now.


Still, the report is old news and reminds me of the 9/11 Commission findings. That body concluded that “a failure of imagination” had made intelligence agencies unable to fully discern the growing peril of Al Qaeda, and that communication lapses within the C.I.A. and the Federal Bureau of Investigation and between those agencies had hobbled efforts to “connect the dots” of intelligence data and effectively pursue Al Qaeda terrorists, even after some of them had entered the United States.


The inspector general’s report stated that “it reaches the same overall conclusions on most of the important issues” as the Commission.


Clinton will not take the fall for this, as Bush has been pilloried over the issue, but Tenet was once in charge of all federal intelligence agencies and the report noted that he said as far back as 1998 that “we are at war” with Al Qaeda and Osama bin Laden.


However, Tenet failed to create “a documented, comprehensive plan to guide the counterterrorism effort at the intelligence community level.”


Clinton failed to grasp the urgency of the threat in 1998 since Tenet failed to follow up his understanding that terrorism was a critical threat. Not surprising, Bush never got this type of word as he entered the presidency.


Bush will continue to take the heat for the failings of others but he was not president in 1998 when the threat by America's leading intelligence authority grasped the critical nature of Osama's efforts.


Only a Summary of the report has been released in the de-classification.

G.ho.st Sorta' Spooky

Graphic source: G.ho.st.


G.ho.st, which stands for Global Hosted Operating SysTem, has not arrived. Ghost Inc.'s Ghost: bills itself as the "Everywhere OS" but having tried it I would not say it works seamlessly. The interface is a mish-mash of Windows and Mac, so this might turn off both adherents of their favorite OS.


I like the basic concept. The idea is that the Windows and Mac model of your operating system, including all your favorite applications and data, are sealed inside one physical computer, and this manner of working and storing files is obsolete. According to Ghost’s creator, Zvi Schreiber, this is their raison d' etre.


The point sounds good but Ghost is sluggish in execution. I found the interface cluttered, my keyboard strokes were not easily picked up by Ghost, and thus my first impression was not a seamless experience.


Ghost should be a Web-hosted image of your desktop or laptop: a virtual computer that can be accessed by any client device via a Web browser. Maybe.


The `Wow Factor' for the "The Everywhere OS" did not materialize.


You can't beat the price though: Ghost is free for users.


Schreiber says a revenue stream will arise from vendors who remit fees to the company when they sell products or services to Ghost users.


To be fair, it should be mentioned that Ghost is in an alpha, “open to the public” release at the Ghost site.


Ghost is built from OpenLaszlo, an open-source platform for the development and delivery of Web applications that have the appearance and functions of traditional desktop applications.


I'll look in from time to time but I was not thrilled by the first experience.


Ghost is my second review of the top ten cool tools. The first review and product of those chosen by Computerworld came off better than Ghost.

Tuesday, August 21, 2007

Twisted Mickey: Hamas Martyrs Micky Mouse as Children's TV Entertainment

Graphic source: MEMRI.


Transcript Source: The Middle East Media Research Institute (MEMRI).


June 29, 2007 Clip No. 1497


Farfour, Hamas' Mickey Mouse Character, Is 'Martyred' in the Final Episode of the "Pioneers of Tomorrow" Children Show on Hamas TV.


Following are excerpts from the final episode of "The Pioneers of Tomorrow," a children's TV show featuring Farfour, a Mickey Mouse character in a tuxedo, which aired on Al-Aqsa TV on June 29, 2007:


Farfour's grandfather: I want to give you something in trust before I die, and I want you to safeguard it, Farfour.


Farfour: What is it this trust I am supposed to safeguard, grandpa?


[...]


Farfour's grandfather: This land, which was [occupied] in 1948, is the land I inherited from my fathers and forefathers. I want you to protect it. It is a beautiful land, all covered in flowers and olive and palm trees. I want you to take care of it, Farfour.


Farfour: What is this land called, grandpa?


Farfour's grandfather: The land is called Tel Al-Rabi'. But unfortunately, the Jews called it "Tel Aviv" after they occupied it.


[...]


I want you to safeguard this, Farfour. Keep this key with you. When the land is regained, use this key, Farfour.


Farfour: This key, grandpa?


Farfour's grandfather: That's right. And these are the documents proving that the land is ours, Farfour. I am entrusting you with this, Farfour. Make sure you don't give up the land, Farfour.


Farfour: Don't worry, grandpa.


Farfour's grandfather: Farfour, I am very tired. I feel that I am about to die. I feel very close to the land of Tel Al-Rabi'. I hope you will protect it.


Farfour: Yes. Grandpa... Grandpa...


Farfour's grandfather: Grandpa entrusted me with this great trust, but I don't know how to liberate this land from the filth of the criminal, plundering Jews, who killed my grandpa and everybody.


"Farfour is interrogated"


Farfour: What do you want from me? Why have you brought me here?


Israeli interrogator: Sit down, my dear Farfour.


Farfour: I don't want to.


Interrogator: Sit down, Farfour.


Farfour: Okay, I will sit down.


Tell me what you want.


Interrogator: We've heard your grandfather gave you the keys and the documents of the land.


Farfour: Who told you?


Interrogator: It's none of your business who told us, Farfour. What we need...


Farfour: Well, what do you want from me?


Interrogator: Farfour, we want you to give us the land documents.


Farfour: These are the land documents which my grandpa entrusted to me, so that I would safeguard them and use them to liberate Jerusalem. When the lands are liberated, we will go and live there. Give them to you? My grandpa didn't tell me to give them to you.


Interrogator: You'll get lots of money, and we'll take the documents, and that't it.


Farfour: No, we're not the kind of peole who sell their land to terrorists.


Interrogator: Farfour, give us the documents we want.


Farfour: I'm not giving you the documents.


Interrogator: Farfour!


Farfour: I won't give you the documents.


Interrogator: Give us the documents, Farfour. Will you or will you not give us the documents, Farfour?


Farfour: I won't give them to criminal despicable terrorists.


Interrogator: You're calling us despicable terrorists, Farfour?


"Farfour in prison"


Host, Saraa, a young girl: Yes, my dear children, we have lost our dearest friend, Farfour. Farfour was martyred while defending his land, the land of his fathers and his forefathers. He was martyred at the hand of the criminals, the murderers, the murderers of innocent children, who killed Iman Hijo, Muhammad Al-Dura, and many others.


Cf. MEMRI

Raw Data for Petraeus

Petraeus and the U.S. military came through to provide an opportunity for the surge to work. What didn't work is the fledging government of Maliki and Iraq. The surge provided breathing room and is an impressive effort against all odds. The surge put more troops in harm's way than ever before; yet, American losses are down. The U.S. military provided space for Iraq to settle political differences.


If Iraq is to make it, it is up to the Iraqis to make it work. The U.S. military did its part; it is high time for Iraq to do the same. Despite recent talks with opposition leaders I would not be optimistic about Maliki's chances of success.


Deaths due to IED’s are down for the third month in a row.


Combat deaths due to causes other than IED’s are at one of the lowest points in the last twelve months.


Last statement: January 15 through May 31, 3,184 Enemy KIA, 6 IED cells dismantled; 17,946 detained.


This is a summary of what we know by tracking deaths in Iraq by: Period, US deaths, Total deaths, and Average number of deaths in the month:


8-2007, 49, 53, 2.52;


7-2007, 79, 88, 2.84;


6-2007, 101, 108, 3.6;


5-2007, 126, 131, 4.23;


4-2007, 104, 117, 3.9;


3-2007, 81, 82, 2.65;


2-2007, 81, 85, 3.04;


1-2007, 83, 86, 2.77;


12-2006, 112, 115, 3.71;


11-2006, 70, 78, 2.6;


10-2006, 106, 110, 3.55;


9-2006, 72, 77, 2.5.


The raw data is hard to read in this format and in the table below but the message and numbers are clear. The U.S. is experiencing fewer deaths and casualties in Iraq.


Period US UK Other* Total Avg Days
8-2007 49 4 0 53 2.52 21
7-2007 79 8 1 88 2.84 31
6-2007 101 7 0 108 3.6 30
5-2007 126 3 2 131 4.23 31
4-2007 104 12 1 117 3.9 30
3-2007 81 1 0 82 2.65 31
2-2007 81 3 1 85 3.04 28
1-2007 83 3 0 86 2.77 31
12-2006 112 1 2 115 3.71 31
11-2006 70 6 2 78 2.6 30
10-2006 106 2 2 110 3.55 31
9-2006 72 3 2 77 2.57 30

Gunplay Kills the Net

Computerworld explained why my Net was so slow yesterday. I wondered why. Apparently gunplay that damaged a network cable near Cleveland was blamed for an Internet slowdown.


Internet service providers in the U.S. experienced a service slowdown yesterday after fiber-optic cables near Cleveland were apparently sabotaged by gunfire.


TeliaSonera AB lost the northern leg of its U.S. network. Technicians pulled up the affected cable, it appeared to have been shot, according to Anders Olausson, a TeliaSonera spokesman.


If just anyone can shoot out a cable and down the Net then our infrastructure is not really very secure now is it?

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to StickyMinds.com;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • Müller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

SmileyCentral.com

Radical Christian

My secure contact form

Choice Reviews Online

techLEARNING.com

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science

CIO

Choice Reviews Online

SD Times: Software Development News

KMworld

SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist


Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Portrait of Thinking Hero

Portrait of Thinking Hero
1844-1900

Check out:

Check out:
Chicks dig readers.
@ Blog Smith. Powered by Blogger.