Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.
Less than 3,800 Americans have died in Iraq. Every death is a tragedy but this is a reflection on the numbers of American deaths in past conflicts.
The bleak summary of numbers illustrates a point of clarity.
Civil War - At least 618,000.
WW II - 405,399
Since the Iraq conflict began, around 170,000 Americans died in automobile accidents.
WW I - 116,516
Vietnam - 58,209
Korea - 36,574
Mexican War - 13,283
Philippine-American War - 4,324
War of 1812 - 2,260
Spanish-American War - 2,446
In the latter two wars, the involved military forces were less than a tenth of the size of our current military. Likewise, American deaths might be expected to have more of an impact given the smaller population of the country at the time.
Since the Iraq conflict began, around 170,000 Americans died in automobile accidents. Yet, no one is outraged with automobile deaths and no one is seriously calling for an end to driving.
Whatever one feels about the misguided notions and wrongful thinking of how the U.S. entered the war, simply citing combat deaths as a reason to withdraw seems misplaced. Relatively speaking, the numbers are significantly less than most American conflicts.
If you throw out the in many ways non-comparable internal Civil War, and WW II, automobile deaths are a huge tragedy that few are outraged about, and the fact is the U.S. has been relatively unscathed. Our deaths are low relative to the size of our population.
Graphic source: Investigation by FBI, public domain graphic of Adam Yahiye Gadahn.
The world will little note nor long remember this message but for the time being he has the attention of the media. The far more important Osama bin Laden tape is the one where he got away.
Before Bush was President, and well before Iraq, the primary bin Laden hunter in America, Michael Scheuer claims that Clinton was given 8-10 chances by sound intelligence to take bin Laden out but Osama got away. Scheuer states that by late 1999, bin Laden could have been a "smoldering memory." Tennant and others in the intelligence community deferred to the law enforcement arm of the U.S. government. This was a mistake. The U.S. faced an international terrorist and a Clintonesque law enforcement strategy was not adequate.
Meanwhile, Osama drones on.
The new video message from bin Laden appeared on militant Islamist Web sites Saturday, a day after it was released by the U.S.-based SITE Institute, a terrorist monitoring organization. Television was the chosen medium although Web site posting had been the usual means used by bin Laden.
The video portrays bin Laden as a rather restrained preacher, he makes no overt threats, and he does not call for the spectacular type of attacks which seems to characterize al-Qaida. The message is more direct, addressing Americans and telling them the Iraq war has failed and urging them against capitalism, multinational corporations, globalization, democracy and finally, "I invite you to embrace Islam," he states. The message is: Islam is the answer to the evils of America.
American intelligence agencies are still studying the video for authenticity and hints about bin Laden's health.
There is a Marxist twist to the terrorist understanding of the West as bin Laden notes: "as you liberated yourselves before from the slavery of monks, kings and feudalism, you should liberate yourselves from the . . . capitalist system."
Bin Ladenism fails to appreciate liberal democracies which eliminated many of the worst abuses of untrammeled capitalism. In this regard, bin Laden seems trapped in an antiquated understanding of how capitalism works. He seems to still view capitalism as a pure Adam Smith variety of capitalism which no longer exists. The only rapacious form of capitalism still alive in the Middle East. With the discovery of oil, fabulous Middle Eastern wealth was created for the fortunate few with the resulting decline of any progressive and upwardly mobile lifestyle possible for the unfortunate.
This would also explain why bin Laden's appeal is to the most downtrodden in Iraq and Afghanistan who have little chance of improving their lives through education, a democratic political process, or equitable, liberal economic reform. Globalization has impacted the Middle East severely, as the Middle East suffers from repressive regimes, a lack of capital investment, low rate of education, and a non-innovative business climate. All of this makes bin Laden's violent appeals all that more dangerous. It is an expression of Middle Eastern backwardness and frustration.
Interestingly, some analysts believe an American, 28-year-old Adam Gadahn, may have authored at least part of the speech.
The intelligence considered reliable about Gadahn includes:
Adam Yahiye Gadahn, born Adam Pearlman, grew up in rural Southern California [near Riverside California] and had frequent contact with Muslims. He converted to Islam in the mid-1990s and moved to Pakistan to study a few years later. He was apparently radicalized there.
Between October 2004 and September 2006, Gadahn appeared in five videotapes in support of al-Qaeda.
U.S. officials labeled him as a propagandist for the organization. He is not charged with taking part in any terrorist operation.
The Rewards For Justice Program of the U.S. State Department, is offering a reward of up to $1 million for information leading to the arrest of Gadahn.
He speaks English and Arabic.
He is the first American to be charged with treason since the World War II era. The counter-terrorism site Global Security is the source of information about Gadahn.
Gadahn has been charged with treason as an al-Qaida propagandist, and while making insider American references, he has attacked capitalism and globalization while appearing in several al-Qaida-produced videos.
The age-old communist cabal against warmongering corporation reappears in a theistic Islamic cover.
On a fashion note, bin Laden's trimmed beard is shorter than in his last 2004 video, fully black and clearly dyed while having dark bags under his eyes, speaking softly, as he usually has.
This is the first video since 2004, and he had not put out an audiotape in more than a year, his longest period without a message. The message is pretty much outdated, absurd, the only real significance is that he is still alive.
The video must be recent since he mentions that "several days ago" Japan marked the 62nd anniversary of the 6 August 1945 atomic bomb attack on Hiroshima. He also refers to last year's Democratic Party congressional victory and to French President Nicolas Sarkozy, who was elected in May. If authentic then, the tape was apparently recorded in early August.
Petraeus favors a troop buildup until next spring. He stated: "Based on the progress our forces are achieving, I expect to be able to recommend that some of our forces will be redeployed without replacement," according to the Boston Globe.
China has blocked access to Wikipedia after an almost uninterrupted two months. The Chinese government blocks sites deemed questionable but with no explanation.
Bush did not discuss recent allegations of the Chinese hacking Pentagon computers but The Financial Timesis still reporting additional hacks. Beijing is also suspected of hacking British government networks as well as earlier reporting that the Pentagon and German targets were also hit by China. China is engaged in hostile intelligence activities based not on Cold War methods but on hacking.
Recently, MI5--Britain's security service--warned that the biggest cyberattacks may arise from China and Russia.
Relational database pioneer says his technology is a dinosaur but by chance he has a new product to offer.
Michael Stonebraker researched relational databases, or RDBMS,' at UC, Berkeley in the early 1970s but now with a new product he has more to offer.
Ingres and Postgres technology is the foundation for many leading relational databases such as SQL Server, Sybase Inc.'s Adaptive Server Enterprise, Ingres Corp.'s product, IBM's Informix, among others.
The new product is column-oriented databases which just happens to be built by Stonebraker's latest start-up, Vertica Systems Inc. which store data vertically in table columns rather than in successive rows.
Maybe he has a vested interest in the adoption of the new column-oriented databases.
China denies that the type of hacks it has been working on, military intrusions, is not what it has done to the Pentagon network.
Yesterday, China denied that in June it had attempted to access the Pentagon. This is not the first accusation.
Jiang Yu, a foreign ministry spokeswoman, denied the charges.
The Financial Times quoted American officials who said the People's Liberation Army (PLA) was behind the June hack. American officials interviewed clearly thought China was responsible.
The Pentagon network had been taken offline in response to the attacks.
The attack was against an unclassified email network in the Office of the Secretary of Defense.
A month previously, the Department of Defense claimed that the PLA maintains first-strike cyberwarfare units whose arsenals include computer viruses.
Although Jiang denied the charges, just last week, Angela Merkel, Germany's chancellor, accused China of the same type of hacks. Der Spiegel reported that government ministries as well as Merkel's office, had been infected with spyware planted by Chinese hackers.
Germany arrested three suspected Islamic militants on charges of alleged "imminent" acts and plotting "massive" attacks on U.S. military sites.
U.S. military installations, such as Ramstein Air Base, as well as "soft targets," such as nightclubs visited by American service personnel and German civilian targets were identified.
German federal prosecutor Monika Harms stated that the suspects had trained at terror camps in Pakistan and assembled 1,500 pounds of hydrogen peroxide for making explosives. The attacks could have been timed for anniversary of 9/11.
The potential to make bombs would have more explosive power than the ones used in the London and Madrid bombings, according to Joerg Ziercke, head of Germany’s Federal Crime Office.
The three suspects range in age from 22-29 and were considered suspicious by authorities since they had been observing a U.S. military facility. The trio included two German nationals and a Turk.
Their training at Pakistani camps were run by the Islamic Jihad Union, Sunni Muslims, arising from Central Asia and an offshoot of the Islamic Movement of Uzbekistan.
The band were drawing unemployment benefits since they had no gainful employment.
Germany’s elite GSG-9 anti-terrorist unit arrested the suspects in a large-scale investigation that included 300 agents.
Police had been monitoring their email for six months.
A pattern is emerging with these threats, as parliamentary debates were being undertaken in regards to continued involvement in Afhghanistan, this plot heated up, just as the Madrid bombings occurred to influence Spanish debates about Middle Eastern involvement.
Germany's attempt to stabilize Afghanistan against Islamic insurgents made it a target.
Germany is expected to keep troops in Afghanistan for several more years, despite the terrorist threats.
I read this recent report by a UC, San Diego professor who has warned that the U.S. economy may stall because of the massive upsurge in video posting. Unless the Net expands, according to the report, innovation may stall.
The report, "Point of Disconnect," by Profesoor Michael Kleeman a senior fellow at the USC Annenberg Center for Communication, seems counter-intuitive. Who is to say that videos do not add to efficiencies, and lead to more productivity. Many businesses are expanding into video and YouTube makes for an inexpensive video delivery mechanism.
Kleeman though seems to think that compression technology should be used more frequently, especially for video files, to reduce demands on the network.
The number of new videos uploaded daily to YouTube.com jumped from 20,000 at the beginning of 2006 to 65,000 daily at the beginning of this year.
But, if I were a SMB, I would employ YouTube for my training provider. I wanted to learn about Vista recently, and I found a number of handy Vista videos out there, all readily accessible on YouTube.
The fact that Bush visited Anbar province seemingly unconcerned about security and the insurgents is significant. Anbar is widely considered to be the heart of the Sunni insurgency but Bush came and went without incident. Petraeus must feel the U.S. has greatly reduced the threat from Sunni Arab militant groups such as al-Qaeda in Iraq.
The Bank of India site was hacked while displaying 22 malware exploits. Analogous to the January Super Bowl site hack, suspects are from a Russian group.
Sunbelt Software Inc. posted details of the hack once they found rogue code embedded in the site's HTML. The code, an IFRAME exploit, covertly redirected users to a hacker server with 22 pieces of malware installed then onto vulnerable PCs. By Sunbelt's tally, the malware included one worm, three rootkits, five Trojan downloaders, and several password stealers.
Roger Thompson, CTO of Exploit Prevention Labs Inc., posted a video of the hack (.wmv file download) that showed the massive infections and resulting system changes in a debugger window.
Alex Eckelberry, Sunbelt's CEO, thought this was the work of the Russian Business Network (RBN) gang. The RBN is characterized as "the baddest of the bad" by VeriSign iDefense.
The malware was installed through an exploit framework -- Webattacker, Mpack, Icepack -- as it was encrypted in the same way as Webattacker," Eckelberry stated.
The American surge has provided breathing room for the Iraqi government which has been in the news of late.
What I have been thinking about of late though is the role of diplomacy. The Iraq Study Group Report recommended diplomatic efforts, and the Democratic contenders have been stressing diplomacy in their criticisms of Bush's handling of the conflict in Iraq.
What successes have the Democratics had in enlisting foreign governments to get involved?
Which countries have jumped into the breach?
The Group recommended the U.N.'s involvement with Iran and the nuclear issue. Are there any developments on that front?
The Security Council, plus Germany, was to be involved. Has there been any progress since 2006?
If you haven't guessed by now, these are rhetorical questions.
I, like you, have not heard the Democratic contenders address the issue and the U.N.'s response has been tepid.
Graphic source: the Armoury of St. James. The unfolding emirate features a graphic of Saladin, who I picture here, but since the site does not credit a source I don't know if its borrowed or not.
Here is one of the ideas that can only happen in the wonderful, zany world of the Internet.
A hardy band of 'Netters, no, I didn't say nutters, announced that they are beginning a YouTube Emirate.
What is an emirate? This is the quality, dignity, office, or territorial competence of any Emir (prince, governor etc.). These folks think on a small scale apparently: the opposite of "if I were Emperor of the world," and then the person fills in the gaps of what they would do.
An emirate designates a political territory ruled by a dynastic Arab Monarch styled an emir. They are not too popular in the modern world as most emirates dissipated or were integrated into larger modern states. These are small time thinking folks.
The Arabic etymology suggests the term is generalized to indicate any province of a country that is administered by a member of the ruling class, e.g., a Sheikh of the royal family.
The basics of the idea then are to create a cyber small-time monarchical Arab state in YouTube-ville. Are you with me?
The group has gone so far as to write up a constitution, and by constitution they don't mean the French Revolution variety but an agreement to accept authority as Mohammed did some centuries ago.
Authority is a major point to this group: to wit, "There is to be one single leader of the Muslims on YouTube" (#2).
Sexism is important for this band as well since of that one leader it is stated to: "honor his authority" (#2).
The one authoritative leader has help though because there are two advisory committees. And what, pray tell, are the two top priorities that are needed to fill those committees? The "Disciplinary Committee" and the "Religious Consultants" are required (#3).
But perhaps the laws of the emirate are the high point of constitutional thinking here. From whence do laws of this mighty band arise? Of the laws governing the band it is stated: "All laws of the Qur'an and Islam must be followed and given precedence to this document. . . . The YouTube Terms of Service must be followed and given precedence to this document" (#5).
So let me get this straight: the Qur'an, and the YouTube Terms of Service, are held in equal regard as laws of this emirate?
Good thing this statement is still in draft form. I am no expert on statements like this but I suspect there are difficulties when any group maintains that a religious book and an American company's agreement with its customers are equal.
We do have a problem when folks are so inspired by past failures, Islamic Empires, but try to wed those notions to 21st century technology.
Is it just me or am I alone in appreciating the irony? Thanks to the U.S.A., and specifically an American company giving away free technology--based as it is on Western research in an open, free, scientific, and secular society--some people have allowed their fantasies to spiral exponentially.
I hope the emirate enjoys the blessings of the U.S.A.
Mohamed with Megahed behind him in court. Graphic source: AP.
Most likely, this is another cell nabbed but they will have their day in court. The Egyptian "students" at the University of South Florida were indicted on explosives charges and carrying pipe bombs across state lines. One of the Egyptians also did some teaching to the other "student" apparently; he faces terrorism charges for allegedly teaching the use of explosives.
The pair was speeding 4 August in South Carolina when they were stopped near a Goose Creek, South Carolina Navy base. The men also possessed pipe bombs.
Youssef Samir Megahed, 21, is an engineering student; Ahmed Abdellatif Sherif Mohamed, 24, is an engineering graduate student and teaching assistant, he faces terrorism charges for teaching and demonstrating how to use the explosives.
The indictment alleges that Mohamed taught and demonstrated the making and use of an explosive and destructive device with the intent that such information be used for . . . an activity that constitutes a federal crime of violence, according to the written federal prosecution statement.
Enemy combatants had been held at the Navy base so the FBI is investigating whether there was a terrorism link.
Mohamed was charged with distributing information relating to explosives which seems like a non-offense to me. Information should be available, and is, to anyone who seeks it out. The possession of destructive devices and weapons of mass destruction, is something else, and rightfully is a terrorism-related statute. The crime carries a maximum of 20 years in prison.
Both indictees face with charges of transporting explosives in interstate commerce without permits, which carries a 10-year prison penalty.
Local authorities carried the ball here initially and their suspicions resulted in a more vigorous case.
The local sheriff in South Carolina said the explosives were "other than fireworks." The four-week investigation resulted in charges that followed several searches in Tampa, including a storage facility, and a park where the explosives might have been tested.
Both Mohamed and Megahed are here legally on student visas. Neither of their names though appear on USF's engineering website for students.
This looks like astute local police enforcement if the indictments hold up in court.
The Germans owe terrorists an apology for violating their privacy with spyware.
No, this is not a genuine headlline but Interior Minister Wolfgang Schaeuble faces strong opposition in plans to spy on terror suspects by deploying malicious emails.
The emails contain Trojans, software that furtively installs itself, allowing agents to search the hard drives.
I suppose the opposition Free Democrats, Gisela Piltz, would apologize to suspects since this is an unacceptable intrusion into privacy. Justice Minister Brigitte Zypries, of the Social Democrats (SPD), has also voiced concern about the possible infringement of privacy laws.
If privacy were a larger concern most Trojans would be eliminated from desktops: like that is going to happen. So many products on the web contain Trojans I hardly think terror suspects deserve that much consideration. And, for those of us who take pre-emptive measures, it really does not matter. There are those times I wish governments would stop looking out for us. This is one of those times.
Computer Sweden reports today that hacks compromised embassy and government email accounts worldwide. The countries effected by this breach are the foreign ministry of Iran, the Kazakh and Indian embassies in the U.S., Uzbeki embassies and consulates worldwide, the Russian embassy in Sweden, and login details for email accounts at the U.K. visa office in Nepal.
The usernames and passwords for more than 100 email accounts were posted online.
Freelance security consultant Dan Egerstad posted the information.
Egerstad told Computer Sweden that he never used the information to log in to any of the compromised accounts in order not to break any laws.
The story indicates the sorry state of security by governments worldwide. As annoying as Egerstad may seem, this is an indication that greater vigilance is needed online. The range of countries hacked also indicates that there is little likelihood that there is an ulterior, financial, or political motive, to the hacks.
Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
Info World: Information Technology News, Computer Networking & Security;
Information Week: Business Innovation Powered by Technology:
Infostor: The Leading Source for Enterprise Storage Professionals;
Infrastructure Insite: Bringing IT Together;
Insurance Technology: Business Innovation Powered by Technology;
Integrated Solutions: For Enterprise Content Management;
Intel Premier IT: Sharing Best Practices with the Information Technology Community;
Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
Journal, The: Transforming Education Through Technology;
Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
Kagan, Donald, The Peloponnesian War;
Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
Karsh, Efraim, Islamic Imperialism: A History;
Kasser, Rodolphe, The Gospel of Judas;
Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
Kepel, Gilles, Jihad: The Trail of Political Islam;
Kiplinger's: Personal Finance;
Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
KM World: Content, Document, and Knowledge Management;
Koestler, Arthur, Darkness at Noon: A Novel;
Kostova, Elizabeth, The Historian;
Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
Lake, Kirsopp, The Text of the New Testament, Sony Reader;
Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
Lenin, V. I., Imperialism the Highest Stage of Capitalism;
Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
Lifton, Robert J., Greg Mitchell, Hiroshima in America;
Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
Mackay, Christopher S., Ancient Rome: A Military and Political History;
Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
Marshall-Cornwall, James, Napoleon as Military Commander;
Maughm, W. Somerset, Of Human Bondage;
McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
McCullough, David, 1776;
McCullough, David, John Adams;
McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
McLynn, Frank, Marcus Aurelius: A Life;
McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
Meacham, Jon, American Lion: Andrew Jackson in the White House;
Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
Meier, Christian, Caesar: A Biography;
Menzies, Gaven, 1421: The Year China Discovered America;
Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
Peters, Ralph, New Glory: Expanding America's Global Supremacy;
Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
Pimlott, John, The Elite: The Special Forces of the World Volume 1;
Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
Pouesi, Daniel, Akua;
Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
Profit: The Executive's Guide to Oracle Applications;
Public CIO: Technology Leadership in the Public Sector;
Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
Quintus of Smyrna, The Fall of Troy;
Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
Red Herring: The Business of Technology;
Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
Redmond Magazine: The Independent Voice of the Microsoft IT Community;
Renan, Ernest, The life of Jesus (Sony eReader);
Richler, Mordecai (editor), Writers on World War II: An Anthology;
Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
Rocca, Samuel, The Army of Herod the Great;
Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
Rodoreda, Merce, Death in Spring: A Novel;
Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
SC Magazine: For IT Security Professionals;
Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
Scheuer, Michael, Osama Bin Laden;
Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
Scholastic Instructor
Scholastic Parent & Child: The Joy of Family Living and Learning;
Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
Schug-Wille, Art of the Byzantine World;
Schulze, Hagen, Germany: A New History;
Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
Scott, Sir Walter, Ivanhoe;
Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
Seibel, Peter, Coders at Work;
Sekunda N., & S. Northwood, Early Roman Armies;
Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
Simkins, Michael, The Roman Army from Caesar to Trajan;
Sinchak, Steve, Hacking Windows Vista;
Smith, RJ, The One: The Life and Music of James Brown;
Software Development Times: The Industry Newspaper for Software Development Managers;
Software Test Performance;
Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
Sophocles, The Three Theban Plays, tr. Robert Fagles;
Sound & Vision: The Consumer Electronics Authority;
Southern, Pat, The Roman Army: A Social and Institutional History;
Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
Steyn, Mark, America Alone: The End of the World As We Know It;
Strassler, Robert B., The Landmark Herodotus: The Histories;
Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
Strassler, Robert B., The Landmark Xenophon's Hellenika;
Strategy + Business;
Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
Sumner, Graham, Roman Military Clothing (2) AD 200-400;
Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
Swanston, Malcolm, Mapping History Battles and Campaigns;
Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
Swift, Jonathan, Gulliver's Travels;
Syme, Ronald, The Roman Revolution;
Talley, Colin L., A History of Multiple Sclerosis;
Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
Tech Briefs: Engineering Solutions for Design & Manufacturing;
Tech Net: The Microsoft Journal for IT Professionals;
Tech Partner: Gain a Competitive Edge Through Solutions Providers;
Technology & Learning: Ideas and Tools for Ed Tech Leaders;
Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
Thackeray, W. M., Vanity Fair;
Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
Tolstoy, Leo, Anna Karenina;
Trento, Joseph J., The Secret History of the CIA;
Twain, Mark, The Gilded Age: a Tale of Today;
Ungar, Craig, House of Bush House of Saud;
Unterberger, Richie, The Unreleased Beatles Music & Film;
VAR Business: Strategic Insight for Technology Integrators:
Virgil, The Aeneid
Virtualization Review: Powering the New IT Generation;
Visual Studio: Enterprise Solutions for .Net Development;
VON Magazine: Voice, Video & Vision;
Wall Street Technology: Business Innovation Powered by Technology;
Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
Ward-Perkins, The Fall of Rome and the End of Civilization;
Warren, Robert Penn, All the King's Men;
Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
Weber, Karl, Editor, Lincoln: A President for the Ages;
Website Magazine: The Magazine for Website Success;
Weiner, Tim, Enemies: A History of the FBI;
Weiner, Tim, Legacy of Ashes: The History of the CIA;
West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
Wharton, Edith, The Age of Innocence;
Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
Wissner-Gross, What High Schools Don't Tell You;
Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
Woodward, Bob, Plan of Attack;
Woodward, Bob, The Agenda: Inside the Clinton White House;
Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
Wright-Porto, Heather, Beginning Google Blogger;
Xenophon, The Anabasis of Cyrus;
Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;
Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you.
A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.