Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Saturday, September 8, 2007

Osama Ho Hum

Graphic source: Investigation by FBI, public domain graphic of Adam Yahiye Gadahn.


The world will little note nor long remember this message but for the time being he has the attention of the media. The far more important Osama bin Laden tape is the one where he got away.


Before Bush was President, and well before Iraq, the primary bin Laden hunter in America, Michael Scheuer claims that Clinton was given 8-10 chances by sound intelligence to take bin Laden out but Osama got away. Scheuer states that by late 1999, bin Laden could have been a "smoldering memory." Tennant and others in the intelligence community deferred to the law enforcement arm of the U.S. government. This was a mistake. The U.S. faced an international terrorist and a Clintonesque law enforcement strategy was not adequate.


Meanwhile, Osama drones on.


The new video message from bin Laden appeared on militant Islamist Web sites Saturday, a day after it was released by the U.S.-based SITE Institute, a terrorist monitoring organization. Television was the chosen medium although Web site posting had been the usual means used by bin Laden.


The video portrays bin Laden as a rather restrained preacher, he makes no overt threats, and he does not call for the spectacular type of attacks which seems to characterize al-Qaida. The message is more direct, addressing Americans and telling them the Iraq war has failed and urging them against capitalism, multinational corporations, globalization, democracy and finally, "I invite you to embrace Islam," he states. The message is: Islam is the answer to the evils of America.


American intelligence agencies are still studying the video for authenticity and hints about bin Laden's health.


There is a Marxist twist to the terrorist understanding of the West as bin Laden notes: "as you liberated yourselves before from the slavery of monks, kings and feudalism, you should liberate yourselves from the . . . capitalist system."


Bin Ladenism fails to appreciate liberal democracies which eliminated many of the worst abuses of untrammeled capitalism. In this regard, bin Laden seems trapped in an antiquated understanding of how capitalism works. He seems to still view capitalism as a pure Adam Smith variety of capitalism which no longer exists. The only rapacious form of capitalism still alive in the Middle East. With the discovery of oil, fabulous Middle Eastern wealth was created for the fortunate few with the resulting decline of any progressive and upwardly mobile lifestyle possible for the unfortunate.


This would also explain why bin Laden's appeal is to the most downtrodden in Iraq and Afghanistan who have little chance of improving their lives through education, a democratic political process, or equitable, liberal economic reform. Globalization has impacted the Middle East severely, as the Middle East suffers from repressive regimes, a lack of capital investment, low rate of education, and a non-innovative business climate. All of this makes bin Laden's violent appeals all that more dangerous. It is an expression of Middle Eastern backwardness and frustration.


Interestingly, some analysts believe an American, 28-year-old Adam Gadahn, may have authored at least part of the speech.


The intelligence considered reliable about Gadahn includes:


Adam Yahiye Gadahn, born Adam Pearlman, grew up in rural Southern California [near Riverside California] and had frequent contact with Muslims. He converted to Islam in the mid-1990s and moved to Pakistan to study a few years later. He was apparently radicalized there.


Between October 2004 and September 2006, Gadahn appeared in five videotapes in support of al-Qaeda.


U.S. officials labeled him as a propagandist for the organization. He is not charged with taking part in any terrorist operation.


The Rewards For Justice Program of the U.S. State Department, is offering a reward of up to $1 million for information leading to the arrest of Gadahn.


He speaks English and Arabic.


He is the first American to be charged with treason since the World War II era. The counter-terrorism site Global Security is the source of information about Gadahn.


Gadahn has been charged with treason as an al-Qaida propagandist, and while making insider American references, he has attacked capitalism and globalization while appearing in several al-Qaida-produced videos.


The age-old communist cabal against warmongering corporation reappears in a theistic Islamic cover.


On a fashion note, bin Laden's trimmed beard is shorter than in his last 2004 video, fully black and clearly dyed while having dark bags under his eyes, speaking softly, as he usually has.


This is the first video since 2004, and he had not put out an audiotape in more than a year, his longest period without a message. The message is pretty much outdated, absurd, the only real significance is that he is still alive.


The video must be recent since he mentions that "several days ago" Japan marked the 62nd anniversary of the 6 August 1945 atomic bomb attack on Hiroshima. He also refers to last year's Democratic Party congressional victory and to French President Nicolas Sarkozy, who was elected in May. If authentic then, the tape was apparently recorded in early August.

Friday, September 7, 2007

Petraeus: Progress, Redeploy in Spring

Petraeus favors a troop buildup until next spring. He stated: "Based on the progress our forces are achieving, I expect to be able to recommend that some of our forces will be redeployed without replacement," according to the Boston Globe.

Thursday, September 6, 2007

Survey of Globalization

The video summarizes some important points.


Sources: Karl Fisch, and modified by Scott McLeod: Globalization and The Information Age.


Music Credits: (1992) "The Last of the Mohicans" off the soundtrack the song is (Elk Hunt/The Kiss.

China, No to Wikipedia, Again

China has blocked access to Wikipedia after an almost uninterrupted two months. The Chinese government blocks sites deemed questionable but with no explanation.

Bush Mum On Chinese Hacks

Bush did not discuss recent allegations of the Chinese hacking Pentagon computers but The Financial Timesis still reporting additional hacks. Beijing is also suspected of hacking British government networks as well as earlier reporting that the Pentagon and German targets were also hit by China. China is engaged in hostile intelligence activities based not on Cold War methods but on hacking.


Recently, MI5--Britain's security service--warned that the biggest cyberattacks may arise from China and Russia.

Stonebraker Turns Over a New Rock

Relational database pioneer says his technology is a dinosaur but by chance he has a new product to offer.


Michael Stonebraker researched relational databases, or RDBMS,' at UC, Berkeley in the early 1970s but now with a new product he has more to offer.


Ingres and Postgres technology is the foundation for many leading relational databases such as SQL Server, Sybase Inc.'s Adaptive Server Enterprise, Ingres Corp.'s product, IBM's Informix, among others.


The new product is column-oriented databases which just happens to be built by Stonebraker's latest start-up, Vertica Systems Inc. which store data vertically in table columns rather than in successive rows.


Maybe he has a vested interest in the adoption of the new column-oriented databases.

Wednesday, September 5, 2007

Chinese Deny Hacks of Two Countries

China denies that the type of hacks it has been working on, military intrusions, is not what it has done to the Pentagon network.


Yesterday, China denied that in June it had attempted to access the Pentagon. This is not the first accusation.


Jiang Yu, a foreign ministry spokeswoman, denied the charges.


The Financial Times quoted American officials who said the People's Liberation Army (PLA) was behind the June hack. American officials interviewed clearly thought China was responsible.


The Pentagon network had been taken offline in response to the attacks.


The attack was against an unclassified email network in the Office of the Secretary of Defense.


A month previously, the Department of Defense claimed that the PLA maintains first-strike cyberwarfare units whose arsenals include computer viruses.


Although Jiang denied the charges, just last week, Angela Merkel, Germany's chancellor, accused China of the same type of hacks. Der Spiegel reported that government ministries as well as Merkel's office, had been infected with spyware planted by Chinese hackers.

Denmark Not Laughing Over Terror

According to the AP, Denmark arrested eight al-Qaida suspects planning an attack using explosives.


The suspects included six Danish citizens and two foreigners with residence permits who had been under surveillance for some time.


Denmark had participated in the U.S.-led coalition in Iraq.


The suspects ranged in age 19 to 29, and, although not identified by name, are of Afghan, Pakistani, Somali, and Turkish origin.

Germans Do Not Kowtow to New Threats

Graphic source: Michael Probst, AP.


Germany arrested three suspected Islamic militants on charges of alleged "imminent" acts and plotting "massive" attacks on U.S. military sites.


U.S. military installations, such as Ramstein Air Base, as well as "soft targets," such as nightclubs visited by American service personnel and German civilian targets were identified.


German federal prosecutor Monika Harms stated that the suspects had trained at terror camps in Pakistan and assembled 1,500 pounds of hydrogen peroxide for making explosives. The attacks could have been timed for anniversary of 9/11.


The potential to make bombs would have more explosive power than the ones used in the London and Madrid bombings, according to Joerg Ziercke, head of Germany’s Federal Crime Office.


The three suspects range in age from 22-29 and were considered suspicious by authorities since they had been observing a U.S. military facility. The trio included two German nationals and a Turk.


Their training at Pakistani camps were run by the Islamic Jihad Union, Sunni Muslims, arising from Central Asia and an offshoot of the Islamic Movement of Uzbekistan.


The band were drawing unemployment benefits since they had no gainful employment.


Germany’s elite GSG-9 anti-terrorist unit arrested the suspects in a large-scale investigation that included 300 agents.


Police had been monitoring their email for six months.


A pattern is emerging with these threats, as parliamentary debates were being undertaken in regards to continued involvement in Afhghanistan, this plot heated up, just as the Madrid bombings occurred to influence Spanish debates about Middle Eastern involvement.


Germany's attempt to stabilize Afghanistan against Islamic insurgents made it a target.


Germany is expected to keep troops in Afghanistan for several more years, despite the terrorist threats.

Tuesday, September 4, 2007

WeBWork, Web-based Interactive Homework Site

"WeBWorK is a web-based interactive system designed to make homework in mathematics and the sciences more effective and efficient."


I glanced at this which seemed worthwhile, although I am totally out of my bailiwick with the subject matter. It seems worth investigating though.

Video Glut

I read this recent report by a UC, San Diego professor who has warned that the U.S. economy may stall because of the massive upsurge in video posting. Unless the Net expands, according to the report, innovation may stall.


The report, "Point of Disconnect," by Profesoor Michael Kleeman a senior fellow at the USC Annenberg Center for Communication, seems counter-intuitive. Who is to say that videos do not add to efficiencies, and lead to more productivity. Many businesses are expanding into video and YouTube makes for an inexpensive video delivery mechanism.


Kleeman though seems to think that compression technology should be used more frequently, especially for video files, to reduce demands on the network.


The number of new videos uploaded daily to YouTube.com jumped from 20,000 at the beginning of 2006 to 65,000 daily at the beginning of this year.


But, if I were a SMB, I would employ YouTube for my training provider. I wanted to learn about Vista recently, and I found a number of handy Vista videos out there, all readily accessible on YouTube.


Its there, I'd use it.

Monday, September 3, 2007

Bush in Anbar

Graphic source: AFP


The fact that Bush visited Anbar province seemingly unconcerned about security and the insurgents is significant. Anbar is widely considered to be the heart of the Sunni insurgency but Bush came and went without incident. Petraeus must feel the U.S. has greatly reduced the threat from Sunni Arab militant groups such as al-Qaeda in Iraq.

Bank of India Hacked

The Bank of India site was hacked while displaying 22 malware exploits. Analogous to the January Super Bowl site hack, suspects are from a Russian group.


Sunbelt Software Inc. posted details of the hack once they found rogue code embedded in the site's HTML. The code, an IFRAME exploit, covertly redirected users to a hacker server with 22 pieces of malware installed then onto vulnerable PCs. By Sunbelt's tally, the malware included one worm, three rootkits, five Trojan downloaders, and several password stealers.


Roger Thompson, CTO of Exploit Prevention Labs Inc., posted a video of the hack (.wmv file download) that showed the massive infections and resulting system changes in a debugger window.


Alex Eckelberry, Sunbelt's CEO, thought this was the work of the Russian Business Network (RBN) gang. The RBN is characterized as "the baddest of the bad" by VeriSign iDefense.


The malware was installed through an exploit framework -- Webattacker, Mpack, Icepack -- as it was encrypted in the same way as Webattacker," Eckelberry stated.

Sunday, September 2, 2007

Time For the World to Step Up to the Plate

The American surge has provided breathing room for the Iraqi government which has been in the news of late.


What I have been thinking about of late though is the role of diplomacy. The Iraq Study Group Report recommended diplomatic efforts, and the Democratic contenders have been stressing diplomacy in their criticisms of Bush's handling of the conflict in Iraq.


What successes have the Democratics had in enlisting foreign governments to get involved?


Which countries have jumped into the breach?


The Group recommended the U.N.'s involvement with Iran and the nuclear issue. Are there any developments on that front?


The Security Council, plus Germany, was to be involved. Has there been any progress since 2006?


If you haven't guessed by now, these are rhetorical questions.


I, like you, have not heard the Democratic contenders address the issue and the U.N.'s response has been tepid.

Saturday, September 1, 2007

YouTube Emirate Founded

Graphic source: the Armoury of St. James. The unfolding emirate features a graphic of Saladin, who I picture here, but since the site does not credit a source I don't know if its borrowed or not.


Here is one of the ideas that can only happen in the wonderful, zany world of the Internet.


A hardy band of 'Netters, no, I didn't say nutters, announced that they are beginning a YouTube Emirate.


What is an emirate? This is the quality, dignity, office, or territorial competence of any Emir (prince, governor etc.). These folks think on a small scale apparently: the opposite of "if I were Emperor of the world," and then the person fills in the gaps of what they would do.


An emirate designates a political territory ruled by a dynastic Arab Monarch styled an emir. They are not too popular in the modern world as most emirates dissipated or were integrated into larger modern states. These are small time thinking folks.


The Arabic etymology suggests the term is generalized to indicate any province of a country that is administered by a member of the ruling class, e.g., a Sheikh of the royal family.


The basics of the idea then are to create a cyber small-time monarchical Arab state in YouTube-ville. Are you with me?


The group has gone so far as to write up a constitution, and by constitution they don't mean the French Revolution variety but an agreement to accept authority as Mohammed did some centuries ago.


Authority is a major point to this group: to wit, "There is to be one single leader of the Muslims on YouTube" (#2).


Sexism is important for this band as well since of that one leader it is stated to: "honor his authority" (#2).


The one authoritative leader has help though because there are two advisory committees. And what, pray tell, are the two top priorities that are needed to fill those committees? The "Disciplinary Committee" and the "Religious Consultants" are required (#3).


But perhaps the laws of the emirate are the high point of constitutional thinking here. From whence do laws of this mighty band arise? Of the laws governing the band it is stated: "All laws of the Qur'an and Islam must be followed and given precedence to this document. . . . The YouTube Terms of Service must be followed and given precedence to this document" (#5).


So let me get this straight: the Qur'an, and the YouTube Terms of Service, are held in equal regard as laws of this emirate?


Good thing this statement is still in draft form. I am no expert on statements like this but I suspect there are difficulties when any group maintains that a religious book and an American company's agreement with its customers are equal.


We do have a problem when folks are so inspired by past failures, Islamic Empires, but try to wed those notions to 21st century technology.


Is it just me or am I alone in appreciating the irony? Thanks to the U.S.A., and specifically an American company giving away free technology--based as it is on Western research in an open, free, scientific, and secular society--some people have allowed their fantasies to spiral exponentially.


I hope the emirate enjoys the blessings of the U.S.A.

Egyptian "Students" Nabbed

Mohamed with Megahed behind him in court. Graphic source: AP.


Most likely, this is another cell nabbed but they will have their day in court. The Egyptian "students" at the University of South Florida were indicted on explosives charges and carrying pipe bombs across state lines. One of the Egyptians also did some teaching to the other "student" apparently; he faces terrorism charges for allegedly teaching the use of explosives.


The pair was speeding 4 August in South Carolina when they were stopped near a Goose Creek, South Carolina Navy base. The men also possessed pipe bombs.


Youssef Samir Megahed, 21, is an engineering student; Ahmed Abdellatif Sherif Mohamed, 24, is an engineering graduate student and teaching assistant, he faces terrorism charges for teaching and demonstrating how to use the explosives.


The indictment alleges that Mohamed taught and demonstrated the making and use of an explosive and destructive device with the intent that such information be used for . . . an activity that constitutes a federal crime of violence, according to the written federal prosecution statement.


Enemy combatants had been held at the Navy base so the FBI is investigating whether there was a terrorism link.


Mohamed was charged with distributing information relating to explosives which seems like a non-offense to me. Information should be available, and is, to anyone who seeks it out. The possession of destructive devices and weapons of mass destruction, is something else, and rightfully is a terrorism-related statute. The crime carries a maximum of 20 years in prison.


Both indictees face with charges of transporting explosives in interstate commerce without permits, which carries a 10-year prison penalty.


Local authorities carried the ball here initially and their suspicions resulted in a more vigorous case.


The local sheriff in South Carolina said the explosives were "other than fireworks."
The four-week investigation resulted in charges that followed several searches in Tampa, including a storage facility, and a park where the explosives might have been tested.


Both Mohamed and Megahed are here legally on student visas. Neither of their names though appear on USF's engineering website for students.


This looks like astute local police enforcement if the indictments hold up in court.

Friday, August 31, 2007

Germans Avoid Stepping On Terror Toes

Wolfgang Schaeuble, graphic source: BBC.


The Germans owe terrorists an apology for violating their privacy with spyware.


No, this is not a genuine headlline but Interior Minister Wolfgang Schaeuble faces strong opposition in plans to spy on terror suspects by deploying malicious emails.


The emails contain Trojans, software that furtively installs itself, allowing agents to search the hard drives.


I suppose the opposition Free Democrats, Gisela Piltz, would apologize to suspects since this is an unacceptable intrusion into privacy. Justice Minister Brigitte Zypries, of the Social Democrats (SPD), has also voiced concern about the possible infringement of privacy laws.


If privacy were a larger concern most Trojans would be eliminated from desktops: like that is going to happen. So many products on the web contain Trojans I hardly think terror suspects deserve that much consideration. And, for those of us who take pre-emptive measures, it really does not matter. There are those times I wish governments would stop looking out for us. This is one of those times.

Governments Hacked



Graphic source, CNN, 19 September 1996.


Computer Sweden reports today that hacks compromised embassy and government email accounts worldwide. The countries effected by this breach are the foreign ministry of Iran, the Kazakh and Indian embassies in the U.S., Uzbeki embassies and consulates worldwide, the Russian embassy in Sweden, and login details for email accounts at the U.K. visa office in Nepal.


The usernames and passwords for more than 100 email accounts were posted online.


Freelance security consultant Dan Egerstad posted the information.


Egerstad told Computer Sweden that he never used the information to log in to any of the compromised accounts in order not to break any laws.


The story indicates the sorry state of security by governments worldwide. As annoying as Egerstad may seem, this is an indication that greater vigilance is needed online. The range of countries hacked also indicates that there is little likelihood that there is an ulterior, financial, or political motive, to the hacks.

Thursday, August 30, 2007

"Cut & Run" Sadr Suspends Militia Violence

Graphic Source: AP


The bizarre Shiite cleric Moktada al-Sadr suspended violent attacks for six months. He is making this move to reign in the rogue elements of his Mahdi Army militia’s operations. The good news is that attacks on American troops are suspended. My hope here is that while this hiatus intervenes, American troops can perform their genuine mission in Iraq, counter-insurgency, and vigorously rooting out elements in Sadr's militia. The suspension by Sadr, is his bowing to pressure hours after his fighters waged running street battles with Iraqi government forces.


Karbala, holy to Shiites, was the scene of battles between Shiite factions which left 52 dead.

Retail Security Flaws

Retail point-of-sale (POS) systems present security flaws for consumer credit card data, according to Neal Krawetz, founder of Hacker Factor Solutions.


Krawetz outlined numerous relatively easily vulnerabilities in POS technologies.


In the last year, no company has responded to Krawetz' inquiry.


One of the most basic limitations of POS is need for standards at the payment level. The Payment Card Industry (PCI) data security standard required by all major credit card companies requires businesses to take several measures for protecting cardholder data. However, PCI standards are not available for POS devices or software.


POS terminals that read credit card information, perform card transactions, and receive the confirmation code are easy targets for hackers. According to Krawetz POS terminals often store a relatively high volume of easily accessible credit card data. Most systems purge the data automatically when power is turned off or when transactions are tallied at the end of the day, but this does not occur in every instance.


Krawetz recommends asking the vendor whether payment card data is purged when power is removed from the POS system, finding out how much data can be retained in the device's permanent storage, and how to manually purge the data. Also, companies need to find out whether the data on POS devices is encrypted, whether the permanent storage can be removed, and whether the POS system forces users to change default settings. In addition, companies should find out if the POS device allows back-door access to the data and whether it has any logging functions for tracking activity.


These are serious concerns and I applaud Krawetz for describing them. I would hope the financial industry would take note.

Wednesday, August 29, 2007

Vista SP1 Beta Only a Few Weeks Away

Graphic source: Odd-Magne Kristoffersen.


Microsoft Corp. confirmed reports that the first service pack for Windows Vista will be out sometime in the first quarter next year.


The first major update to Vista will contain a number of tweaks to speed up the operating system and fix nagging reliability problems, according to David Zipkin, a senior product manager for Windows Vista.


The SP1 beta will be released by the end of September, though it will be limited to no more than 15,000 Microsoft partners and customers. Another beta or release candidate will be distributed to a larger pool of testers before SP1's final release, which is slated for sometime before March 31.


Beta copies of SP1 have already leaked to pirate sites.


The Microsoft message here is to wait for Vista if you haven't implemented it yet; and, XP is still viable because Microsoft will update a Version 3 of XP at the same time.


SP1 will include 19 major changes. Among the most important is to downplay what many find annoying, the User Account Control (UAC) security feature, to be less intrusive. Copying and unzipping files in Vista should be much faster as should the ability of Vista PCs to wake up from standby or hibernate modes. The Bitlocker drive encryption, which formerly could only encrypt the C: drive, can now be used to encrypt other partitions and hard drives.


As for XP SP3, the main new feature is Network Access Protection (NAP), now available only in Vista. NAP reports the security status of a PC to a Windows Server, which can quarantine the PC and block any network traffic to and from the computer if it appears compromised.


SP1 will come in the form of a 50MB .exe file.


This is a mid-level update, not too adventurous, not unnecessary.

ICANN Whois No Privacy Reforms

The Internet Corporation for Assigned Names and Numbers (ICANN) has not setteled differences over proposed privacy changes to the WHOIS database. There has been no progress on how to reform the way WHOIS data is handled.


The WHOIS registry is the domain name systems' legacy database; it contains names and contact information of all those who register Internet domains. The contents of the database have been publicly accessible to anyone who wanted it.


Companies, intellectual property holders, and law enforcement authorities favor open access to the WHOIS database on the grounds that it helps them go after phishers, trademark infringers, copyright violators and others. Privacy advocates oppose unrestricted WHOIS access on the grounds that it could expose individual domain registrants to spam and unwanted surveillance.


One of the better proposals was one to shield the contact information of individual domain registrants while making that of commercial registrants publicly accessible. Also, access to shielded WHOIS information could be provided on a one-time basis or on an as-needed basis to those who could demonstrate a valid reason for access to the information. A warrant should reveal all if need be.


There are those who would avail themselves of a proxy, for good or for ill, and law enforcement will always need to be vigilant and perform their appointed tasks to discern the difference.

Tuesday, August 28, 2007

Chinese Wife Who Has the Aegis

Several Japanese homes of the Maritime Self Defense Force (JMSDF) and a destroyer were raided over a computer data leak. This leak may effect the Aegis missile defense system, the sea-based Standard Missile-3 interceptor system, and the reconnaissance satellite data exchange Link 16 system.


Police were alerted when conducting an immigration-related investigation into the Chinese wife of a JMSDF officer. During the search they came across the data, which included the radar and transmission frequencies of the Aegis system. The officer wasn't authorized to be in possession of the data so the investigation was begun.


He apparently came into possession of the data while swapping pornography with another JMSDF officer, according to a Japanese news source, the Yomiuri Shimbun newspaper.


Aegis is an American defense initiative.


Japan would like access to technical details of the F22A Raptor, one of the most technically advanced jets in the U.S. fleet. The U.S. has not accepted the request yet.


I guess this means you can't always trust a wife, or who you can swap pornography with.

Extra-Internetality

During the era of Colonialization, an accused person had the right to be returned to their home country, a British citizen would return to England, for trial: extraterritoriality.


The colonized country would have their laws and persons often violated as a result.


Currently, Yahoo Inc. asked in a 51-page defense filing in the Northern District of California, a federal court, to dismiss a human rights lawsuit. I believe Yahoo is wrong.


Yahoo's Hong Kong subsidiary, Yahoo Hong Kong Ltd., (YHKL), provided information about dissidents to the Chinese government and subsequently a lawsuit was filed against Yahoo by the World Organization for Human Rights USA.


What is clear is that the information supplied led to the persecution, torture and imprisonment of four Chinese dissidents.


Writer Wang Xiaoning was charged on incitement to subvert state power. Wang was sentenced to 10 years in prison in September 2003. Yahoo gave his e-mail account information and IP address to the Chinese government.


Yahoo's defense is that it doesn't condone the suppression of their rights and liberties by their government, it had no control over laws passed by the People's Republic of China (PRC) and the ways in which those laws were enforced.


I disagree. China does not adhere to international norms and standards and this position makes it more likely that information turned over to Chinese authorities, as opposed to information that might convict child-molesters, and others accused of heinous crimes in the West, might be misused. Yahoo's defense is disingenious.


Would anyone consider China to be a paragon of free speech?

Monday, August 27, 2007

Senator: Surge Is A Success

Senator Mitch McConnell stating the key August news story.

Good Enough for My Grandfather

Philadelphia could spend $47M over 20 years for water billing improvements. The latest of a two decades long effort to replace Philadelphia's aging water billing system could reach nearly $47 million.


Philadelphia Controller Alan Butkovitz released a 29-page report that detailed the costs since 1987 of replacing the city's 30-year-old proprietary Cobol mainframe billing system that still relies on punch cards.


Yes, punch cards, you read that correctly.


Costs have already exceeded $35 million and could reach $46.7 million, the controller's report stated.


Last January, an attempt began to replace the old water billing system with commercial off-the-shelf software for water billing called Basis2 from Prophecy International Pty. of Adelaide, Australia. Most of the previous plan to use Oracle Corp. applications was scrapped.


The Oracle applications cost $18.9 million, twice more than it initially expected to, without getting a working system.


Now, the Prophecy software and related costs will total $6.7 million, bringing the Prophecy and Oracle costs to $25.6 million.


The controller's total cost of $46.7 million includes years of work prior to 2002 when the Oracle work started. There was project creep between 1987 and 2002 which enlarged the initial costs.


I find this appallingly expensive, wasteful, and inefficient but typical of how money was wasted in dead-end projects. The non-innovative East attitude seems to be, if it was good enough for my grandfather, it is good enough for me.

Sunday, August 26, 2007

INDEX Prizes Awarded to $100 Laptop, Electric Car

The AP reported that an electric sports car, a prosthetic foot for land mine victims, and a potentially lifesaving device known as the "Tongue Sucker" won in an international award honoring innovative designs.


The INDEX prize also awarded the $100 laptop designed for Third World children.


The Danish award began in 2005 "to celebrate design that not only looks good but also improves lives of people all over the world," according to Kigge Hviid, manager of the award foundation.


"Great design is a way to tell people that you value them," said Yves Behar, a Swiss designer who was part of the team behind the "XO" portable computer.


The laptop is now estimated to now cost $175 which is still inexpensive.


Canadian Sebastien Dubois' prosthetic foot was designed for land mine victims.


The Tesla Roadster electric sports car is made by California-based Tesla Motors.


The Prize awards are available at the INDEX site.

Friday, August 24, 2007

China In the Right Direction

China's recent announcement that it will begin a four-month campaign on tainted food, drugs and exports is a step in the right direction. Unless China begins to play according to international rules and by international standards, it will lose all the good will it earned by offering cheaper products. Consumers have begun to question the "Made in China" label.


Chinese Vice Premier Wu Yi announced the "war" to focus on the troublesome products that have questioned China's commitment to quality.


The world's largest toymaker, Mattel, often thought of as an American company, recalled more than 18 million Chinese-made toys recently.


Chinese standards have been questioned in numerous products such as toothpaste, animal-food ingredients, tires, eels and seafood, and deadly chemicals in cough medicine.


Not long ago I commented on the execution of Zheng Xiaoyu, who was the former head of the national food and drug safety watchdog, and was executed in July for taking bribes.

Where Are the MRAPs?

The U.S. military needs more MRAP (Mine Resistant Ambush Protector) Vehicles since February 2005 and are only now beginning to receive a small number. I would like to document where the hold up is for these life-savers. Is it Congress, the companies themselves, or plain old bureacracy? Now that the military has given Iraq some breathing room, despite Maliki, our troops deserve the best.

Thursday, August 23, 2007

Iraq Intelligence Estimate

Released yesterday, "Prospects for Iraq's Stability," is not filled with light and joy. Iraq is in generally poor condition although it is a bit better in certain areas.


There have been measurable but uneven improvements in Iraq’s security situation since our last National Intelligence Estimate on Iraq in January 2007. The steep escalation of rates of violence has been checked for now, and overall attack levels across Iraq have fallen during seven of the last nine weeks. Coalition forces, working with Iraqi forces, tribal elements, and some Sunni insurgents, have reduced al-Qa’ida in Iraq’s (AQI) capabilities, restricted its freedom of movement, and denied it grassroots support in some areas. However, the level of overall violence, including attacks on and casualties among civilians, remains high; Iraq’s sectarian groups remain unreconciled; AQI retains the ability to conduct high-profile attacks; and to date, Iraqi political leaders remain unable to govern effectively. There have been modest improvements in economic output, budget execution, and government finances but fundamental structural problems continue to prevent sustained progress in economic growth and living conditions.


The conclusion is to stay the course:


We assess that changing the mission of Coalition forces from a primarily counterinsurgency and stabilization role to a primary combat support role for Iraqi forces and counterterrorist operations to prevent AQI from establishing a safehaven would erode security gains achieved thus far.


On this report, an interesting comment was made:


I . . . want to mention a common mentality I've noticed in Americans. They're angry at Bush, the administration, etc. and believe they're incompetent, liars and crooks. Without touching that subject, let me say that whatever you believe they may have done, you must not let it cloud your judgments of what's happening NOW. However sincerely angry you may be at their past actions (and inactions) you should be cautious in how much you let it effect your assessment of what they are doing now. During April I went home on leave and encountered countless people who wanted immediate pull-out of Iraq. Their most common reason for this decision seems to be their absolute disappointment in how the administration presented the war case and how they handled Iraq post-Saddam. And it always followed that their description of the "surge", along with anything else the president said, was cast in this light.


The "Surge" - strong military action and an altered (read: actual) battle plan - has shown genuine progress. There's no doubt that this battle plan should have been initiated immediately upon the fall of Saddam. The American people sat and watched years and American lives go by with no (actual) progress whatsoever. So it seems natural that the administration now seems as though it's merely spinning its wheels.


But they're not. Yes, it's late. Yes, people believe they were lied to. Yes, they question the competence and integrity of the administration. But you cannot let this override your judgment of what's currently happening. It's important not to forget it, certainly, but you cannot let knee-jerk disappointment rule your sense. How many people here have actually read the Iraqi benchmarks and which ones they've met? When they were established they hadn't met ANY of them, and already they're making progress. I must sound like an administration spin-machine, but my boots, right now, are in Iraq. I see it first-hand every day
.


Posted by: SPC Haight Aug 23, 2007 1:38:05 PM


I agree with Haight. I took my time and did not let my frustration with the Administration misguide me. The contemporary Iraq situation has been long in coming, but rather than conclude its hopeless, I actually began tracking deaths, goals met, and screened out the misinformation. Sure enough, there are prospects for hope in the morass. The military has accomplished the mission of the surge. They did what they were asked to do, at great sacrifice.

Alternative Ending to "The Invasion"

Graphic source: Wikipedia Public License.


If you plan to see The Invasion, then don't read the following because I'm going to spoil the ending for you. I caught this update from the classic B-movie original and I thought of a better way to end it.


Our heroine, in the update, looks fondly at her beloved while he is still sleeping as the morning news drones out grim statistics of people being killed while she forlornfully listens to the radio drinking her coffee. She is obviously troubled and we are left with the impression that maybe total peace is the path to follow after all.


The peace route, completely restraining people and repressing them though, was what the alien bug offered during the horror of the movie we just experienced.


On the other hand, a better ending is my version.


Our heroine, waking up from a dream filled with the alien special effects bug we saw throughout the film, awakens her. Now, we would be left to wonder, was it all a dream? Or, did what we just saw really happen? We would be left to wonder. And, this would lead to a possible sequel. What are those bugs in her head? Where did they come from? Will they emerge?


To sweeten the pot and add to the mystery, our protagonist's beloved, could be arising from slumber at the same time, but as he gets out of bed he limps. The limp could be from what we had experienced in the movie, our protagonist shot him during the film, or, he may just limp. We don't know.


In any case, this alternative ending would heighten the mystery and add to the tense moments we experienced in the film.


In case one still needs to see the classic original, here is a summary of Invasion of the Body Snatchers.


The theme of the cautionary, politicized film was open to varying interpretations, including paranoia toward the spread of a harmful ideology such as socialistic Communism, or the sweeping mass hysteria of McCarthyism in the 1950s and blacklisting of Hollywood, the spread of an unknown malignancy or virulent germ (read fear of annihilation by 'nuclear war'), or the numbing of our individuality and emotional psyches through conformity and group-think. Yet its main theme was the alien (read 'Communist') dehumanization and take-over of an entire community by large seed pods (found in basements, automobile trunks, a greenhouse, and on a pool table) that replicated and replaced human beings. And it told of the heroic struggle of one helpless but determined man of conscience, a small-town doctor (McCarthy), to vainly combat and quell the deadly, indestructible threat.


Tim Dirks

Wednesday, August 22, 2007

Tenet, Long Before Bush, Unprepared

The former head of the Central Intelligence Agency, George J. Tenet, failed to prepare the U.S. for the terrorist threat.


To Tenet’s shame he failed to prepare this country, the President--Clinton--for the terrorist threat. This fact, long before Bush, was clear from the 9/11 Commission report.


The recently released C.I.A. report merely, but importantly, confirms how not surprising Bush was ill informed regarding the terrorist threat upon becoming president. Clinton vacillates according to my reading of the 9/11 testimony. Therefore, it is not surprising that Bush inherited a vague policy against largely unknown actors.


According to the internal report, Tenet recognized the danger posed by Al Qaeda long before 11 September 2001, but he failed to adequately prepare the C.I.A. to meet the threat.


The document was completed in June 2005 but was kept classified until now.


Still, the report is old news and reminds me of the 9/11 Commission findings. That body concluded that “a failure of imagination” had made intelligence agencies unable to fully discern the growing peril of Al Qaeda, and that communication lapses within the C.I.A. and the Federal Bureau of Investigation and between those agencies had hobbled efforts to “connect the dots” of intelligence data and effectively pursue Al Qaeda terrorists, even after some of them had entered the United States.


The inspector general’s report stated that “it reaches the same overall conclusions on most of the important issues” as the Commission.


Clinton will not take the fall for this, as Bush has been pilloried over the issue, but Tenet was once in charge of all federal intelligence agencies and the report noted that he said as far back as 1998 that “we are at war” with Al Qaeda and Osama bin Laden.


However, Tenet failed to create “a documented, comprehensive plan to guide the counterterrorism effort at the intelligence community level.”


Clinton failed to grasp the urgency of the threat in 1998 since Tenet failed to follow up his understanding that terrorism was a critical threat. Not surprising, Bush never got this type of word as he entered the presidency.


Bush will continue to take the heat for the failings of others but he was not president in 1998 when the threat by America's leading intelligence authority grasped the critical nature of Osama's efforts.


Only a Summary of the report has been released in the de-classification.

G.ho.st Sorta' Spooky

Graphic source: G.ho.st.


G.ho.st, which stands for Global Hosted Operating SysTem, has not arrived. Ghost Inc.'s Ghost: bills itself as the "Everywhere OS" but having tried it I would not say it works seamlessly. The interface is a mish-mash of Windows and Mac, so this might turn off both adherents of their favorite OS.


I like the basic concept. The idea is that the Windows and Mac model of your operating system, including all your favorite applications and data, are sealed inside one physical computer, and this manner of working and storing files is obsolete. According to Ghost’s creator, Zvi Schreiber, this is their raison d' etre.


The point sounds good but Ghost is sluggish in execution. I found the interface cluttered, my keyboard strokes were not easily picked up by Ghost, and thus my first impression was not a seamless experience.


Ghost should be a Web-hosted image of your desktop or laptop: a virtual computer that can be accessed by any client device via a Web browser. Maybe.


The `Wow Factor' for the "The Everywhere OS" did not materialize.


You can't beat the price though: Ghost is free for users.


Schreiber says a revenue stream will arise from vendors who remit fees to the company when they sell products or services to Ghost users.


To be fair, it should be mentioned that Ghost is in an alpha, “open to the public” release at the Ghost site.


Ghost is built from OpenLaszlo, an open-source platform for the development and delivery of Web applications that have the appearance and functions of traditional desktop applications.


I'll look in from time to time but I was not thrilled by the first experience.


Ghost is my second review of the top ten cool tools. The first review and product of those chosen by Computerworld came off better than Ghost.

Tuesday, August 21, 2007

Twisted Mickey: Hamas Martyrs Micky Mouse as Children's TV Entertainment

Graphic source: MEMRI.


Transcript Source: The Middle East Media Research Institute (MEMRI).


June 29, 2007 Clip No. 1497


Farfour, Hamas' Mickey Mouse Character, Is 'Martyred' in the Final Episode of the "Pioneers of Tomorrow" Children Show on Hamas TV.


Following are excerpts from the final episode of "The Pioneers of Tomorrow," a children's TV show featuring Farfour, a Mickey Mouse character in a tuxedo, which aired on Al-Aqsa TV on June 29, 2007:


Farfour's grandfather: I want to give you something in trust before I die, and I want you to safeguard it, Farfour.


Farfour: What is it this trust I am supposed to safeguard, grandpa?


[...]


Farfour's grandfather: This land, which was [occupied] in 1948, is the land I inherited from my fathers and forefathers. I want you to protect it. It is a beautiful land, all covered in flowers and olive and palm trees. I want you to take care of it, Farfour.


Farfour: What is this land called, grandpa?


Farfour's grandfather: The land is called Tel Al-Rabi'. But unfortunately, the Jews called it "Tel Aviv" after they occupied it.


[...]


I want you to safeguard this, Farfour. Keep this key with you. When the land is regained, use this key, Farfour.


Farfour: This key, grandpa?


Farfour's grandfather: That's right. And these are the documents proving that the land is ours, Farfour. I am entrusting you with this, Farfour. Make sure you don't give up the land, Farfour.


Farfour: Don't worry, grandpa.


Farfour's grandfather: Farfour, I am very tired. I feel that I am about to die. I feel very close to the land of Tel Al-Rabi'. I hope you will protect it.


Farfour: Yes. Grandpa... Grandpa...


Farfour's grandfather: Grandpa entrusted me with this great trust, but I don't know how to liberate this land from the filth of the criminal, plundering Jews, who killed my grandpa and everybody.


"Farfour is interrogated"


Farfour: What do you want from me? Why have you brought me here?


Israeli interrogator: Sit down, my dear Farfour.


Farfour: I don't want to.


Interrogator: Sit down, Farfour.


Farfour: Okay, I will sit down.


Tell me what you want.


Interrogator: We've heard your grandfather gave you the keys and the documents of the land.


Farfour: Who told you?


Interrogator: It's none of your business who told us, Farfour. What we need...


Farfour: Well, what do you want from me?


Interrogator: Farfour, we want you to give us the land documents.


Farfour: These are the land documents which my grandpa entrusted to me, so that I would safeguard them and use them to liberate Jerusalem. When the lands are liberated, we will go and live there. Give them to you? My grandpa didn't tell me to give them to you.


Interrogator: You'll get lots of money, and we'll take the documents, and that't it.


Farfour: No, we're not the kind of peole who sell their land to terrorists.


Interrogator: Farfour, give us the documents we want.


Farfour: I'm not giving you the documents.


Interrogator: Farfour!


Farfour: I won't give you the documents.


Interrogator: Give us the documents, Farfour. Will you or will you not give us the documents, Farfour?


Farfour: I won't give them to criminal despicable terrorists.


Interrogator: You're calling us despicable terrorists, Farfour?


"Farfour in prison"


Host, Saraa, a young girl: Yes, my dear children, we have lost our dearest friend, Farfour. Farfour was martyred while defending his land, the land of his fathers and his forefathers. He was martyred at the hand of the criminals, the murderers, the murderers of innocent children, who killed Iman Hijo, Muhammad Al-Dura, and many others.


Cf. MEMRI

Raw Data for Petraeus

Petraeus and the U.S. military came through to provide an opportunity for the surge to work. What didn't work is the fledging government of Maliki and Iraq. The surge provided breathing room and is an impressive effort against all odds. The surge put more troops in harm's way than ever before; yet, American losses are down. The U.S. military provided space for Iraq to settle political differences.


If Iraq is to make it, it is up to the Iraqis to make it work. The U.S. military did its part; it is high time for Iraq to do the same. Despite recent talks with opposition leaders I would not be optimistic about Maliki's chances of success.


Deaths due to IED’s are down for the third month in a row.


Combat deaths due to causes other than IED’s are at one of the lowest points in the last twelve months.


Last statement: January 15 through May 31, 3,184 Enemy KIA, 6 IED cells dismantled; 17,946 detained.


This is a summary of what we know by tracking deaths in Iraq by: Period, US deaths, Total deaths, and Average number of deaths in the month:


8-2007, 49, 53, 2.52;


7-2007, 79, 88, 2.84;


6-2007, 101, 108, 3.6;


5-2007, 126, 131, 4.23;


4-2007, 104, 117, 3.9;


3-2007, 81, 82, 2.65;


2-2007, 81, 85, 3.04;


1-2007, 83, 86, 2.77;


12-2006, 112, 115, 3.71;


11-2006, 70, 78, 2.6;


10-2006, 106, 110, 3.55;


9-2006, 72, 77, 2.5.


The raw data is hard to read in this format and in the table below but the message and numbers are clear. The U.S. is experiencing fewer deaths and casualties in Iraq.


Period US UK Other* Total Avg Days
8-2007 49 4 0 53 2.52 21
7-2007 79 8 1 88 2.84 31
6-2007 101 7 0 108 3.6 30
5-2007 126 3 2 131 4.23 31
4-2007 104 12 1 117 3.9 30
3-2007 81 1 0 82 2.65 31
2-2007 81 3 1 85 3.04 28
1-2007 83 3 0 86 2.77 31
12-2006 112 1 2 115 3.71 31
11-2006 70 6 2 78 2.6 30
10-2006 106 2 2 110 3.55 31
9-2006 72 3 2 77 2.57 30

Gunplay Kills the Net

Computerworld explained why my Net was so slow yesterday. I wondered why. Apparently gunplay that damaged a network cable near Cleveland was blamed for an Internet slowdown.


Internet service providers in the U.S. experienced a service slowdown yesterday after fiber-optic cables near Cleveland were apparently sabotaged by gunfire.


TeliaSonera AB lost the northern leg of its U.S. network. Technicians pulled up the affected cable, it appeared to have been shot, according to Anders Olausson, a TeliaSonera spokesman.


If just anyone can shoot out a cable and down the Net then our infrastructure is not really very secure now is it?

Iran's Abuse of Academic Freedom for Iranian-Americans

Graphic source: The Wilson Center.


The AP reported today that a detained Iranian-American academic accused of conspiring against the Iranian government was freed on bail. Haleh Esfandiari, director of the Middle East program at the Woodrow Wilson International Center for Scholars, had been in a Tehran prison since early May.


Iranian authorities investigated Esfandiari and Kian Tajbakhsh, another detained Iranian-American, who was also accused of conspiring against the country's security.


Esfandiari was broadcast on Iranian televsion on a video which also featured Tajbakhsh, an urban planning consultant with the Soros Foundation's Open Society Institute. Some have found the broadcast to have been coerced.


Two other Iranian-Americans face security-related charges: Parnaz Azima, a journalist for U.S.-funded Radio Farda, and Ali Shakeri, a founding board member of the Center for Citizen Peacebuilding at the University of California, Irvine. Shakeri is in prison, while Azima is free but barred from leaving Iran.


No developments were announced in the case of the other three Iranian-Americans.


The Wilson Center is a nonpartisan institution established by Congress in 1968 and funded through private and public funds. Its Middle East program focuses on several areas, including "analysis of internal domestic and social developments in Iran; the aspiration of the younger generation for reform and expansion of individual liberties."

Monday, August 20, 2007

Biden's Support of MRAPVs

Senator Joe Biden's press conference in Charleston, S.C. from July 23. Two local companies displayed Mine Resistant Ambush Protected Vehicles (MRAPVs). The Biden Amendment funding supplemental included funding for accelerated procurement and deployment of these vehicles. The vehicles are four to five times safer against IED attacks and account for 70% of our casualties in Iraq.


Previously, I've reviewed MRAPVs and how they are deployed effectively.

One of Ten Top Ten Cool Tools

Graphic source: Computerworld.


Computerworld reported on the top ten cool cutting-edge technologies. The Eleksen Group's wearable gadgetry is an idea whose time came some time back. One reason I detest laptops is that they are not handy enough, they are bulky, and they take so long to boot up.


The idea behind the Eleksen Group PLC Sideshow Wearable Display Module though makes it more handy, not bulky since you are actually wearing the display, and you don't really boot up.


The ElekTex is a fabric-based, pressure-sensitive control interface that can be integrated into jackets, bags and other textile products. The ElekTex fabric controls come with an LCD display to interact with Windows Vista’s Sideshow feature. The ElekTex exports information from a Vista laptop to a secondary display. Thereafter, mini-applications, or “gadgets,” written for Sideshow can then wirelessly deliver e-mail, alerts or other updates to the remote screen even if the laptop remains in its case and turned off. That is handy.


One reason I enjoy my HP Jornada is that it boots up quickly, is so much smaller, and as a mini-PC it is not bulky at all. The ElekTex combines these features in one.

Sunday, August 19, 2007

Out of the Mouths of Babes?

Children the world over learn what they are taught.

Food for Thought

I caught one of these videos before and this new one is just as thoughtful.

Disappointing Dennett



Ordinarily, Daniel C. Dennett is worthwhile reading but in Breaking he has written a disappointing book.


The "Roots of Religion" section is truly weak and does not make reference to leading thinkers on the origins of religion. No one can ask another to write the book they would like, but even with Dennett's caveats and how he notes his limitations, he fails to grasp important work in the roots of religion.


Dennett has a section entitled "Should Science Study Religion?" F. Max Mueller thought so: in the 1860s he began calling for a "science of religion" (William E. Paden, Interpreting the Sacred: Ways of Viewing Religion, p. 67). Independent of confessional agendas, Mueller called for objective, scientific studies of religion just as inquiries into natural things such as geology were conducted.


How could someone discuss the origins of religion and yet have no reference to such leading lights as F. Max Mueller, Edward Burnett Tylor, or Andrew Lang? Dennett does not even mention the leading lights in the origins of religion, who worked deliberately in the nineteenth century as a result of Darwin's insights, and in contradiction to Dennett's assertion that his Darwinian approach to natural religion is something new.


Dennett implies that students of religion have worked in a vacuum and without reference to Darwin. This is not true.


He notes that there have been natural histories of religion but that these efforts have been marred by either deference or hostility to religion(pp. 31-32). Dennett's dismissal of natural historians is a gross overstatement.


By the 1880s Mueller knew that Darwinism was too powerful of a force to ignore. Religion, due to Darwin, was viewed as a natural organism. At the turn of the 20th century, the Oxford anthropologist R. R. Marett was to declare that "anthropology is the child of Darwin" (Eric Sharpe, Comparative Religion: A History, p. 48). Andrew Lang's study of folklore was motivated with the understanding that folklore preserved anthropological data and is therefore worthy of study. Tylor, since he was a Quaker, well neither ill-disposed towards religion, nor did he have a penchent for Christian orthodoxy.


Dennett blithefully dismisses truly important historians of religion who viewed religion worth of study as a natural, organic, phenomenon.


Dennett seems to equate ordinary religious practitioners with the most serious scholar of religion which is a serious gaffe.


Two reviewers made trenchent remarks:


The most striking gap in Breaking the Spell is its lack of humanistic commentary from anthropology, aesthetics, and confessional literature. (...) Breaking the Spell is an insidious book; not because it breaks taboos by asking uncomfortable questions of religion, nor because its author is an ardent atheist, but because it is written by a brilliant philosopher who betrays his academic standards by proceeding from emotive, ill-informed prejudice.
- John Cornwell, Sunday Times


Breaking the Spell , however, not only differs in tone from Dennett's earlier work in being amicable and almost meek, but is also largely bereft of critical analysis. (...) In the end, its 400-page analysis yields little more than platitudes.
- Jerry A. Coyne, Times Literary Supplement

Saturday, August 18, 2007

Sobering NYC Intelligence on Radicalization



Radicalization in the West: The Homegrown Threat by Mitchell D. Silber and Arvin Bhatt, Senior Intelligence Analysts at the NYPD Intelligence Division, provides sobering reading.


The authors state: "There is no useful profile to assist law enforcement or intelligence to predict who will follow this trajectory of radicalization. Rather, the individuals who take this course begin as `unremarkable' from various walks of life."


A radical is not born with horns on their head but the authors conclude, based on foreign and U.S. examples that a process of radicalization takes place for the eventual jihadists. Although Europe has been hit, and homegrown U.S. radicals have largetly been thwarted, the danger remains. They state:


Despite the economic opportunities in the United States, the powerful gravitational pull of individuals’ religious roots and identity sometimes supersedes ghe assimilating nature of American society which includes pursuit of a professional career, financial stability and material comforts.



The implications for homegrown radicalization make the efforts of law enforcement extremely difficult.


They conclude:


The global jihadi-Salafi movement poses a significant challenge to law enforcement and intelligence since the radicalization phenomenon that drives it is spontaneous, indiscriminate, and its indicators are subtle. Identifying whether an individual is being radicalized is hard to detect, especially in the early stages.



How is law enforcement to determine when and if simply radical talk is just that, talk? But this stage is when an individual may be stopped before they actually commit any violence.


•The individuals are not on the law enforcement radar. Most have never been arrested or involved in any kind of legal trouble. Other than some commonalities in age and religion, individuals undergoing radicalization appear as `ordinary' citizens, who look, act, talk, and walk like everyone around them. In fact, in the United Kingdom, it is precisely those `ordinary' middle class university students who are sought after by local extremists because they are `clean skins'.



None of these types of people would attract any attention. They look like any other pod.


The authors continue:


•In the early stages of their radicalization, these individuals rarely travel, are not participating in any kind of militant activity, yet they are slowly building the mindset, intention, and commitment to conduct jihad.


As evidenced by all eleven case studies these groups, or clusters of extremists:


"Act autonomously, can radicalize quickly, and often are made up of individuals, who on the surface, appear to be well-integrated into society."


They may be spontaneous which makes detection difficult. Silber and Bhatt state that the jihadists:
Are not “name brand” terrorists or part of any known terrorist group. For the most part, they have little or no links to known militant groups or actors. Rather they are like-minded individuals who spend time together in clusters organized, originally, by previously established social network links.



They are not engaged in activities which would get them noticed because they "Are not crime syndicates and therefore, applying organized crime strategies will fail."


Finally, the authors conclude:


The challenge to intelligence and law enforcement agencies in the West in general, and the United States in particular, is how to identify, pre-empt and thus prevent homegrown terrorist attacks given the non-criminal element of its indicators, the high growth rate of the process that underpins it and the increasing numbers of its citizens that are exposed to it.



These are sobering words. Americans have to be vigilant but respectful of privacy and American liberties. This is a difficult path to follow when the threat is real, it is here, and it is covert.


As the Middle East has gone, so has Europe, as Europe has gone, so has New York City, as NYC goes, so goes the U.S. The threat is real; the threat is here.

Friday, August 17, 2007

Wave of the Future?

Jose Padilla, a U.S. citizen and former gang member, convicted. He was a star Al-Qaida recruit. Padilla sought to kill, and sought to obtain material support for terrorism. However, I see this as a more to come scenario with additional cells coming to light over time.

Egypt, Kuwait, and Asia to Profit In Iraq

Despite the title in this post I don't imagine many will object to Egypt, Kuwait, or some in Asia profiting from Iraq. Many would object and sloganeer phrases such as "No Blood for Oil" but as some countries profit from Iraq no one bats an eye.


Yesterday Iraq begain auctioning off $300 million as the minimum bid price for mobile licenses in that country. An Egyptian, Kuwaiti, or an Asian company are the leading bidders. The next highest bidders come from Turkey.


Apparently war is good for business.


The $300 million starting price is for three 15-year mobile licenses moderated by Communications Minister Mohammed Allawi.


These lucrative 15-year licenses replace three short-term contracts awarded soon after the U.S.-led invasion of Iraq in 2003.


The leading bidders are Cairo-based Orascom Telecom Holdings, Kuwait's Mobile Telecommunications Co. MTC, and AsiaCell, said Siyamend Othman, head of the National Communications and Media Commission.

Linux Still Not Working Like a Lion

A solid review which identified the major problem many of us still have with Linux, although I for one am ready to get on board ASAP, is the problem of "dealing with text in varied forms" as Sharon Machlisas notes in Computerworld. Her review of nine Linux text editors reveals that no single editor does the job. Like her, I need an application that handles plain ASCII text and rudimentary HTML. We also share an enthusiasm, not for me the Windows environment, but in an inexpensive and useful tool like NoteTab Pro. Neither is available on Linux. NoteTab has no plans to migrate to Linux.


Alas, Machlisas found no single killer text editor workable. I know some have the leisure of using several applications but this seems terribly inefficient to me.


She does report that an UltraEdit version for Linux is on the way and perhaps I would try again at that point, till then, I'm married to Windows unfortunately.

Thursday, August 16, 2007

Truth and Honesty on Wikipedia

A beginning graduate student at the California Institute of Technology, Virgil Griffith, invented Wikipedia Scanner, a tool that exposes the anonymous edits in Wikipedia. The tool can trace the IP address of those who make edits which does not exactly specify who did the edits but it obviously reveals the person at least had access to the respective IP addresses: close enough most of us would say to reveal who is responsible for the shenanigans.


While there are meticulous records of changes on Wikipedia, a person can make changes without identifying themselves, but the changes often create digital fingerprints that provide information about the user, such as the location of the computer used to make the edit.


Many of the changes are innocuous, but the scanner also traced entries to people at several large companies who appear to have altered potentially damaging content for concerns such as Wal-Mart Stores Inc., and Diebold Inc. Someone at the BBC poked fun at George Bush, Al-Jazeera's edits were fairly extensive, and someone at the CIA changed some wording as has the Vatican in one instance.


The Mormons changed a couple things, the Episcopals didn't like some of the word on them, and numerous Christian groups and colleges revised as they saw fit as well.


Wired collected an extensive list of the edits which is handy to see who wants what changed and we can figure out the embarrassing whys in most instances.


As an example, someone at the Vatican edited the Wikipedia entry on Gerry Adams.


Source: Wikipedia


Gerry Adams
From Wikipedia, the free encyclopedia
(Difference between revisions)
Jump to: navigation, search
Revision as of 12:54, 17 October 2006 (edit)
217.59.51.67 (Talk)
(→Moving into mainstream politics)
← Older edit Revision as of 12:55, 17 October 2006 (edit) (undo)
217.59.51.67 (Talk)
(→Fresh murder question raised)
Newer edit →
Line 92: Line 92:
==Fresh murder question raised== ==Fresh murder question raised==

- In October 2006, it was alleged that Adams's finger- and hand-prints were found on a car used during a double murder in 1971.[http://www.timesonline.co.uk/article/0,,2091-2383263,00.html Paisley, Brady in historic meeting] by Christopher Morgan and Liam Clarke, ''The Times'', 1 October 2006[http://www.unison.ie/irish_independent/stories.php3?ca=9&si=1698223&issue_id=14715 Adams Prints Murder Link] by Alan Murray, ''The Sunday Independent'', 1 October 2006 However, no link between Adams and the killings has been shown. + In October 2006, it was alleged that Adams's finger- and hand-prints were found on

==References== ==References==

NSA Scrutinized

The post-911 National Security Agency (NSA) spying program has been argued at a U.S. appeals court hearing. The Electronic Frontier Foundation (EFF) questioned AT&T's no-warrant monitoring of citizens' communications. The court agreed on Wednesday to weigh a government motion to dismiss a lawsuit alleging the NSA monitored phone lines and e-mails without a warrant. The EFF filed a class action lawsuit against AT&T Inc. claiming the company violated the privacy rights of its customers when it cooperated with an NSA program of monitoring AT&T customer phone calls and e-mail traffic without warrants.

Wednesday, August 15, 2007

Liberal Says War Can Be Won



"A War We Just Might Win"

That is what liberal commentators Michael O'Hanlon and Kenneth Pollack of the Brookings Institution stated in the New York Times following their recent visit to Iraq.



Here is the most important thing Americans need to understand: We are finally getting somewhere in Iraq, at least in military terms.***
After the furnace-like heat, the first thing you notice when you land in Baghdad is the morale of our troops. In previous trips to Iraq we often found American troops angry and frustrated — many sensed they had the wrong strategy, were using the wrong tactics and were risking their lives in pursuit of an approach that could not work.


Today, morale is high. The soldiers and marines told us they feel that they now have a superb commander in Gen. David Petraeus; they are confident in his strategy, they see real results, and they feel now they have the numbers needed to make a real difference.


Everywhere, Army and Marine units were focused on securing the Iraqi population, working with Iraqi security units, creating new political and economic arrangements at the local level and providing basic services — electricity, fuel, clean water and sanitation — to the people. Yet in each place, operations had been appropriately tailored to the specific needs of the community. As a result, civilian fatality rates are down roughly a third since the surge began — though they remain very high, underscoring how much more still needs to be done.

Open source Alternative to Project

Graphic source: Projity Inc.


Projity Inc. released its OpenProj software as an Open source project. This alternative to Microsoft may take market share away from their Project product. OpenProj is compatible with Microsoft Project though and seems to have most of the same features. OpenProj plays with Linux (in fact it is bundled with various Linux distributions) and Macs as well as Windows. The final version will be released in Q4.

Tuesday, August 14, 2007

Too Much Face (book)

The popular social networking site Facebook showed a bit too much face recently. The source code that drives the site was leaked to the Internet due to a misconfigured Web server. I guess there is such a thing as too much face.

Positive Middle East Trend

A report on Defensenews.com related how India seeks Israeli assistance to fill their need for an unmanned combat helicopter. The story outlined how the Indian Navy is exploring collaboration between local and Israeli defense companies. Admiral Sureesh Mehta, chief of the Indian Navy, and Vice Admiral David Ben Bashat discussed the possible joint development and other defense programs Bashat’s visit to India, the first official visit to India by an Israel Navy chief.


The Indian Navy projects 30 to 50 unmanned combat helicopters reflecting a greater cooperation between India and Israel since 1999. Israel is working on a the co-production of nuclear-capable cruise missiles, air defense systems and anti-ballistic missile systems. The country is the largest supplier of UAVs for the Indian Defence Forces.


In terms of great Middle Eastern security this is a positive development in that Israel is not isolated in the region by reaching across the Middle East to India, India is stepping up its greater regional role which as the world's largest democracy it should be doing. Two democratic regional powers flanking the Middle East is a good thing.

Life Almost as Real as the Gaming World


Screenshot Source: Morteza Nikoubazl, Reuters.


A screen shot from the Iranian-made computer game shows an Iranian commander (unseen) killing a U.S. soldier.


Designed by the Union of Islamic Students a game released in July, Rescue the Nuke Scientist, is sure to be jihadically correct. Once an American game company released Kuma\War's Assault on Iran, the students responded with a game of their own. Rescue's basic premise is that U.S. troops capture a husband-and-wife team of nuclear engineers during a pilgrimage to Karbala, a holy site for Shiite Muslims, in central Iraq. Game players take on the role of Iranian security forces carrying out a mission code-named "The Special Operation," which involves penetrating fortified locations to free the nuclear scientists, who are moved from Iraq to Israel. In this way both the U.S. and Israel can be attacked by Iranians.


All this from a country whose president has already denied the reality of the Holocaust.

College Hijinks?

Campus Technology today ran a story about Professors building an Open-Source educational gaming engine. Washington State University Vancouver professor Scott Wallace and University of Puget Sound computer science professor Andrew Nierman were awarded a grant from the National Science Foundation to build a gaming engine designed to make learning computer science more absorbing for students. If only this were available across the board to make all education more involving.

Monday, August 13, 2007

Turkish Trio Hacks UN

Photo source: Giorgio Maone screenshot from his blog.


Hackers formerly associated with Turkey defaced a UN site with anti-U.S. and anti-Israeli messages. The attack was chronicled by an Italian software developer Giorgio Maone on his blog and later reported by the BBC. The hacker trio, "Kerem125," "m0sted" and "gsy," claimed responsibility for the defacement which forced the UN site down and the site was still unavailable by Sunday evening. According to Maone the incident is a SQL injection exploit, which let the attackers add their own HTML code to the site. SQL injection attacks are a common tactic by defacers. Maone expressed surprise because "this is a very well known kind of vulnerability, fairly easy to avoid and very surprising to find in such a high-profile site."


In the past, "Kerem125," "m0sted" and "gsy," are names that have been used by would-be hackers claiming to be from Turkey,

Secure Flight Not all that Safe

Today's IDG News Service ran a story about the Department of Homeland Security air passenger screening program which is changing procedures.


The DHS announced plans for an overhaul of its Secure Flight program, with the agency no longer no longer assigning risk scores to passengers or using predictive behavior technology, DHS Secretary Michael Chertoff stated. The Transportation Security Administration, part of DHS, will check domestic passenger lists against terrorist watch lists, instead of the airlines.


I appreciate an advance on privacy issues, but in contrast to Marc Rotenberg, executive director of privacy advocacy group the Electronic Privacy Information Center (EPIC), I don't think the DHS is correct in its focus on matching passenger names to terrorist watch lists instead of trying to predict behavior.


The terror in terrorism is that it is unpredictable. by focusing on previously drawn up lists, the terrorist in the making will slip through.


Rotenberg states: "Instead of open-ended profiling ... the revamped Secure Flight focuses on the problem at hand," which is precisely the problem. The problem of today surely will not catch the innovative would-be terrorist. Another effective screening process is needed, profile based I would imagine.


As difficult as the task is, I believe we precisely need to develop tools that predict behavior.


Notwithstanding the Secure Flight program suspension in February 2006 due to two government reports that outlined security and privacy problems the revised program does not address the security concerns of behavior profiling.

It's All Greek to Me

The new translation tools are being implemented with some sucess in business applications although I have previously expressed my skepticism with the effort. A Computerworld story online today illustrates how the new efforts are going. Most results to the present have been sketchy requiring human translators.


Ford Motor Co. has used “machine translation” software since 1998 and has translated 5 million automobile assembly instructions.


Ford uses Enterprise Global Server from Systran Software Inc. but this is just the beginning. English instructions are written by engineers and then parsed by a homegrown AI program into unambiguous detailed directions, such as, “Attach bracket No. 423 using six half-inch bolts.” Each instruction is then stored as a record in a translation database.


Systran’s tool uses a reliable translation technique called rules-based translation. Such systems use bilingual dictionaries combined with electronic style guides containing usage and grammar rules. The commercial translators are then supplemented with assembly line application-specific glossaries from Ford.


The glossaries are cumulative in that they are combined with “translation memories,” databases of previously translated text in the form of source and target sentence pairs. These memories are usually compiled over time by users. If the translation system (or a human) finds an exact match for the sentence it’s trying to translate, it just retrieves the corresponding sentence in the target language from the database. Near matches or “fuzzy,” matches are flagged for review by a human translator.


Statistical machine translation is a newer technique. It uses collections of documents and their translations to “train” software. Over time, these data-driven systems “learn” what makes a good translation and what doesn’t and then use probability and statistics to decide which of several possible translations of a given word or phrase is most likely correct based on context.


The systems as a result develop their own rules and fine-tune them over time.


Google Inc. uses Systran’s rules-based software but is also developing its own statistical-based systems to translate to and from the more difficult and non-Western Romance languages due to their significant differences from Western languages.


Sites may include a link to Google’s system at Google translation for free.


Other large companies are in need of translations and use them such as Microsoft Corp. which incorporates a rules-based natural-language parser in its Word software.


FedEx Corp. rolled out Trados GXT, a product of Maidenhead, England-based SDL International. It consists of translation memories integrated with an enterprise translation workflow system but has not obviated the need for human-based translation services.


A new development and increasingly sophisticated translation systems combine multiple methods. A statistical machine translation product from Language Weaver Inc. in Marina del Rey, Calif., can now be used with translation management software called WorldServer from Idiom Technologies Inc. Customers can tap into WorldServer to retrieve previously translated content in a translation memory or generate new translations — through Language Weaver’s algorithms — when no matches are found.


At SRI International in Menlo Park, Calif. researchers are working with the U.S. Department of Defense to automate the translation of Arabic and Mandarin Chinese — structured and unstructured text as well as real-time speech — into English.


It's all Greek to me; but, actually I do know Greek so if I can learn perhaps machines can as well.

Sunday, August 12, 2007

Democracy Is Not Built in a Day



Peter Kenney of Denver relates his experience of building local democracy in Baghdad.


Do you think freedom is free?

China Not "Red" Anymore

The adventure with the Chinese-made lamp looks like it has taken China out of the red and into the black. So far, the replacement lamp is doing fine. The low cost is the attraction and the website, Made in China, demonstrates the wide variety of goods available. Differences between manufacturing standards predominates, but the Food and Drug Administration is working with Chinese officials to address issues of quality. The consumer activist, Ralph Nader, weighs in with his opinion.

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to StickyMinds.com;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • Müller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

SmileyCentral.com

Radical Christian

My secure contact form

Choice Reviews Online

techLEARNING.com

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science

CIO

Choice Reviews Online

SD Times: Software Development News

KMworld

SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist


Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Portrait of Thinking Hero

Portrait of Thinking Hero
1844-1900

Check out:

Check out:
Chicks dig readers.
@ Blog Smith. Powered by Blogger.