Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Thursday, January 31, 2013

MUSLIM GROUPS CALL COKE SUPER BOWL AD "RACIST"

One of the things the whiners most complained about is that you could not vote for whom they assume are Arabs, the doofus' on the camels.

Senator to DefSec Nominee: Why Have the Iranians Endorsed You?



"Given that Iran, the people — I’m quoting right now from Iran — people of the Middle East, the Muslim region and North Africa, people of these regions hate America from the bottom of their heart," said Inhofe. "It further said Israel is a cancerous tumor in the heart of the Islamic world. They further said Iran’s warriors are ready and willing to wipe Israel off the map. The question I’d like to ask you, and you can answer for the record if you’d like, why do you think the Iranian foreign ministry so strongly supports your nomination to be the Secretary of Defense?"

Hagel responded, "I have a difficult enough time with American politics, Senator. I have no idea, but thank you. And I’ll be glad to respond further for the record."

LEGAL IMMIGRANT’S TESTIMONY AGAINST GUN CONTROL: ‘FEW SAW THE THIRD REICH COMING UNTIL IT WAS TOO LATE’



During a public hearing on gun violence in Hartford, Conn. on Monday, a legal immigrant by the name of Henson Ong issued a passionate defense of the Second Amendment and argued that gun control simply “does not work.” The video of Ong’s testimony has already surpassed 130,000 views on YouTube.
“Forgive me, English is not my first language. I am a legal immigrant and I am an American by choice,” he began, prompting applause from the audience.
“Thank you for giving me this opportunity to express my opinion and give my testimony in opposition to the majority of the proposed bills, which do nothing to deter future crimes,” he added. “Gun control doesn’t work.”
Ong then launched into a impassioned diatribe about what he considers to be the real problem fueling gun gun violence — “societal decay.”
“Your own history is replete with high school rifle teams, boy scout marksmanship merit badges,” he explained. “You could buy rifles at hardware stores, you could order them… your country was awash in readily available firearms and ammunition, and yet in your past you did not have mass school shootings*.”
“What changed?” he asked. “It was not that the availability of guns suddenly exploded or increased, it actually was decreased. What changed was societal decay,” he added, resulting in more applause.
Ong pointed to the Washington, D.C. and Chicago as two cities with some of the strictest gun laws but also “the highest crime and murder rates.”
“If gun control actually did work, Washington, D.C. and Chicago would be the safest cities in your nation. But [they are] not, they have the toughest gun laws and the highest crime and murder rates,” he said.
Ong also defended Americans’ right to own so-called “assault rifles,” which are really just semi-automatic rifles. Citing a recent purchase of 7,000 5.56x45mm NATO “personal defense weapons”by the Department of Homeland Security, he noted how the agency described the weapons as “suitable for personal defense use in close quarters.”
He went on: “Had the Koreans in the LA riots not had AR-15s and AK-47s with 30-round magazines — and Ruger 30s — their businesses would have burnt to the ground like all the other businesses in their neighborhoods. Theirs stood because they stood their ground.”
Driving a point home that many U.S. lawmakers don’t even seem to fully understand, the legal immigrant stated definitively that the Second Amendment’s purpose was not for hunting.
In closing, Ong quoted a famous statement by Judge Alex Kozinski in his dissent on the case of Silveira v. Lockye in 2002.
“My excellent colleagues have forgotten these bitter lessons of history. The prospect of tyranny may not grab the headlines the way vivid stories of gun crime usually do. But few saw the Third Reich coming until it was too late. The Second Amendment is a doomsday provision, one designed only for those exceptionally rare circumstances when all other rights have failed. A free people can only afford to make this mistake once.”
Ong ended his testimony to applause from the audience.

Wednesday, January 30, 2013

1,100 GREEN BERETS SIGNED FOR PROTECTION OF THE 2ND AMENDMENT


Protecting the Second Amendment – Why all Americans Should Be Concerned
We are current or former Army Reserve, National Guard, and active duty US Army Special Forces soldiers (Green Berets). We have all taken an oath to “…support and defend the Constitution of the United States against all enemies foreign and domestic; that I will bear true faith and allegiance to the same.…” The Constitution of the United States is without a doubt the single greatest document in the history of mankind, codifying the fundamental principle of governmental power and authority being derived from and granted through the consent of the governed. Our Constitution established a system of governance that preserves, protects, and holds sacrosanct the individual rights and primacy of the governed as well as providing for the explicit protection of the governed from governmental tyranny and/or oppression. We have witnessed the insidious and iniquitous effects of tyranny and oppression on people all over the world. We and our forebears have embodied and personified our organizational motto, De Oppresso Liber [To Free the Oppressed], for more than a half century as we have fought, shed blood, and died in the pursuit of freedom for the oppressed.
Like you, we are also loving and caring fathers and grandfathers. Like you, we have been stunned, horrified, and angered by the tragedies of Columbine, Virginia Tech, Aurora, Fort Hood, and Sandy Hook; and like you, we are searching for solutions to the problem of gun-related crimes in our society. Many of us are educators in our second careers and have a special interest to find a solution to this problem. However, unlike much of the current vox populi reactions to this tragedy, we offer a different perspective.
First, we need to set the record straight on a few things. The current debate is over so-called “assault weapons” and high capacity magazines. The terms “assault weapon” and “assault rifle” are often confused. According to Bruce H. Kobayashi and Joseph E. Olson, writing in the Stanford Law and Policy Review, “Prior to 1989, the term ‘assault weapon’ did not exist in the lexicon of firearms. It is a political term [underline added for emphasis], developed by anti-gun publicists to expand the category of assault rifles.”
The M4A1 carbine is a U.S. military service rifle – it is an assault rifle. The AR-15 is not an assault rifle. The “AR” in its name does not stand for “Assault Rifle” – it is the designation from the first two letters of the manufacturer’s name – ArmaLite Corporation. The AR-15 is designed so that it cosmetically looks like the M4A1 carbine assault rifle, but it is impossible to configure the AR-15 to be a fully automatic assault rifle. It is a single shot semi-automatic rifle that can fire between 45 and 60 rounds per minute depending on the skill of the operator. The M4A1 can fire up to 950 rounds per minute. In 1986, the federal government banned the import or manufacture of new fully automatic firearms for sale to civilians. Therefore, the sale of assault rifles are already banned or heavily restricted!
The second part of the current debate is over “high capacity magazines” capable of holding more than 10 rounds in the magazine. As experts in military weapons of all types, it is our considered opinion that reducing magazine capacity from 30 rounds to 10 rounds will only require an additional 6 -8 seconds to change two empty 10 round magazines with full magazines. Would an increase of 6 –8 seconds make any real difference to the outcome in a mass shooting incident? In our opinion it would not. Outlawing such “high capacity magazines” would, however, outlaw a class of firearms that are “in common use”. As such this would be in contravention to the opinion expressed by the U.S. Supreme Court recent decisions.
Moreover, when the Federal Assault Weapons Ban became law in 1994, manufacturers began retooling to produce firearms and magazines that were compliant. One of those ban-compliant firearms was the Hi-Point 995, which was sold with ten-round magazines. In 1999, five years into the Federal Assault Weapons Ban, the Columbine High School massacre occurred. One of the perpetrators, Eric Harris, was armed with a Hi-Point 995. Undeterred by the ten-round capacity of his magazines, Harris simply brought more of them: thirteen magazines would be found in the massacre’s aftermath. Harris fired 96 rounds before killing himself.
Now that we have those facts straight, in our opinion, it is too easy to conclude that the problem is guns and that the solution to the problem is more and stricter gun control laws. For politicians, it is politically expedient to take that position and pass more gun control laws and then claim to constituents that they have done the right thing in the interest of protecting our children. Who can argue with that? Of course we all want to find a solution. But, is the problem really guns? Would increasing gun regulation solve the problem? Did we outlaw cars to combat drunk driving?
What can we learn from experiences with this issue elsewhere? We cite the experience in Great Britain. Despite the absence of a “gun culture”, Great Britain, with one-fifth the population of the U.S., has experienced mass shootings that are eerily similar to those we have experienced in recent years. In 1987 a lone gunman killed 18 people in Hungerford. What followed was the Firearms Act of 1988 making registration mandatory and banning semi-automatic guns and pump-action shotguns. Despite this ban, on March 13, 1996 a disturbed 43-year old former scout leader, Thomas Hamilton, murdered 16 school children aged five and six and a teacher at a primary school in Dunblane, Scotland. Within a year and a half the Firearms Act was amended to ban all private ownership of hand guns. After both shootings there were amnesty periods resulting in the surrender of thousands of firearms and ammunition. Despite having the toughest gun control laws in the world, gun related crimes increased in 2003 by 35% over the previous year with firearms used in 9,974 recorded crimes in the preceding 12 months. Gun related homicides were up 32% over the same period. Overall, gun related crime had increased 65% since the Dunblane massacre and implementation of the toughest gun control laws in the developed world.
In contrast, in 2009 (5 years after the Federal Assault Weapons Ban expired) total firearm related homicides in the U.S. declined by 9% from the 2005 high (Source: “FBI Uniform Crime Reporting Master File, Table 310, Murder Victims – Circumstances and Weapons Used or Cause of Death: 2000-2009”).
Are there unintended consequences to stricter gun control laws and the politically expedient path that we have started down?
In a recent op-ed piece in the San Francisco Chronicle, Brett Joshpe stated that “Gun advocates will be hard-pressed to explain why the average American citizen needs an assault weapon with a high-capacity magazine other than for recreational purposes.”We agree with Kevin D. Williamson (National Review Online, December 28, 2012): “The problem with this argument is that there is no legitimate exception to the Second Amendment right that excludes military-style weapons, because military-style weapons are precisely what the Second Amendment guarantees our right to keep and bear.”
“The purpose of the Second Amendment is to secure our ability to oppose enemies foreign and domestic, a guarantee against disorder and tyranny. Consider the words of Supreme Court Justice Joseph Story”: ‘The importance of this article will scarcely be doubted by any persons, who have duly reflected upon the subject. The militia is the natural defense of a free country against sudden foreign invasions, domestic insurrections, and domestic usurpations of power by rulers. It is against sound policy for a free people to keep up large military establishments and standing armies in time of peace, both from the enormous expenses, with which they are attended, and the facile means, which they afford to ambitious and unprincipled rulers, to subvert the government, or trample upon the rights of the people. The right of the citizens to keep and bear arms has justly been considered, as the palladium of the liberties of a republic; since it offers a strong moral check against the usurpation and arbitrary power of rulers; and will generally, even if these are successful in the first instance, enable the people to resist and triumph over them.’
The Second Amendment has been ruled to specifically extend to firearms “in common use” by the military by the U.S. Supreme Court ruling in U.S. v Miller (1939). In Printz v U.S. (1997) Justice Thomas wrote: “In Miller we determined that the Second Amendment did not guarantee a citizen’s right to possess a sawed-off shot gun because that weapon had not been shown to be “ordinary military equipment” that could “could contribute to the common defense”.
A citizen’s right to keep and bear arms for personal defense unconnected with service in a militia has been reaffirmed in the U.S. Supreme Court decision (District of Columbia, et al. v Heller, 2008). The Court Justice Scalia wrote in the majority opinion: “The Second Amendment protects an individual right to possess a firearm unconnected with service in a militia, and to use that arm for traditionally lawful purposes, such as self-defense within the home.“. Justice Scalia went on to define a militia as “… comprised all males physically capable of acting in concert for the common defense ….” “The Anti-Federalists feared that the Federal Government would disarm the people in order to disable this citizens’ militia, enabling a politicized standing army or a select militia to rule. The response was to deny Congress power to abridge the ancient right of individuals to keep and bear arms, so that the ideal of a citizens’ militia would be preserved.” he explained.
On September 13, 1994, the Federal Assault Weapons Ban went into effect. A Washington Post editorial published two days later was candid about the ban’s real purpose:“[N]o one should have any illusions about what was accomplished [by the ban]. Assault weapons play a part in only a small percentage of crime. The provision is mainly symbolic; its virtue will be if it turns out to be, as hoped, a stepping stone to broader gun control.”
In a challenge to the authority of the Federal government to require State and Local Law Enforcement to enforce Federal Law (Printz v United States) the U.S. Supreme Court rendered a decision in 1997. For the majority opinion Justice Scalia wrote: “…. this Court never has sanctioned explicitly a federal command to the States to promulgate and enforce laws and regulations When we were at last confronted squarely with a federal statute that unambiguously required the States to enact or administer a federal regulatory program, our decision should have come as no surprise….. It is an essential attribute of the States’ retained sovereignty that they remain independent and autonomous within their proper sphere of authority.”
So why should non-gun owners, a majority of Americans, care about maintaining the 2nd Amendment right for citizens to bear arms of any kind? The answer is “The Battle of Athens, TN”. The Cantrell family
had controlled the economy and politics of McMinn County, Tennessee since the 1930s. Paul Cantrell had been Sheriff from 1936 -1940 and in 1942 was elected to the State Senate. His chief deputy, Paul Mansfield, was subsequently elected to two terms as Sheriff. In 1946 returning WWII veterans put up a popular candidate for Sheriff. On August 1 Sheriff Mansfield and 200 “deputies” stormed the post office polling place to take control of the ballot boxes wounding an objecting observer in the process. The veterans bearing military style weapons, laid siege to the Sheriff’s office demanding return of the ballot boxes for public counting of the votes as prescribed in Tennessee law. After exchange of gun fire and blowing open the locked doors, the veterans secured the ballot boxes thereby protecting the integrity of the election. And this is precisely why all Americans should be concerned about protecting all of our right to keep and bear arms as guaranteed by the Second Amendment!
Throughout history, disarming the populace has always preceded tyrants’ accession of power. Hitler, Stalin, and Mao all disarmed their citizens prior to installing their murderous regimes. At the beginning of our own nation’s revolution, one of the first moves made by the British government was an attempt to disarm our citizens. When our Founding Fathers ensured that the 2nd Amendment was made a part of our Constitution, they were not just wasting ink. They were acting to ensure our present security was never forcibly endangered by tyrants, foreign or domestic.
If there is a staggering legal precedent to protect our 2nd Amendment right to keep and bear arms and if stricter gun control laws are not likely to reduce gun related crime, why are we having this debate? Other than making us and our elected representatives feel better because we think that we are doing something to protect our children, these actions will have no effect and will only provide us with a false sense of security.
So, what do we believe will be effective? First, it is important that we recognize that this is not a gun control problem; it is a complex sociological problem. No single course of action will solve the problem. Therefore, it is our recommendation that a series of diverse steps be undertaken, the implementation of which will require patience and diligence to realize an effect. These are as follows:
1. First and foremost we support our Second Amendment right in that “A well regulated militia being necessary to the security of a free state, the right of the people to keep and bear arms shall not be infringed”.
2. We support State and Local School Boards in their efforts to establish security protocols in whatever manner and form that they deem necessary and adequate. One of the great strengths of our Republic is that State and Local governments can be creative in solving problems. Things that work can be shared. Our point is that no one knows what will work and there is no one single solution, so let’s allow the State and Local governments with the input of the citizens to make the decisions. Most recently the Cleburne Independent School District will become the first district in North Texas to consider allowing some teachers to carry concealed guns. We do not opine as to the appropriateness of this decision, but we do support their right to make this decision for themselves.
3. We recommend that Assisted Outpatient Treatment (AOT) laws be passed in every State. AOT is formerly known as Involuntary Outpatient Commitment (IOC) and allows the courts to order certain individuals with mental disorders to comply with treatment while living in the community. In each of the mass shooting incidents the perpetrator was mentally unstable. We also believe that people who have been adjudicated as incompetent should be simultaneously examined to determine whether they should be allowed the right to retain/purchase firearms.
4. We support the return of firearm safety programs to schools along the lines of the successful “Eddie the Eagle” program, which can be taught in schools by Peace Officers or other trained professionals.
5. Recent social psychology research clearly indicates that there is a direct relationship between gratuitously violent movies/video games and desensitization to real violence and increased aggressive behavior particularly in children and young adults (See Nicholas L. Carnagey, et al. 2007. “The effect of video game violence on physiological desensitization to real-life violence” and the references therein. Journal of Experimental Social Psychology 43:489-496). Therefore, we strongly recommend that gratuitous violence in movies and video games be discouraged. War and war-like behavior should not be glorified. Hollywood and video game producers are exploiting something they know nothing about. General Sherman famously said “War is Hell!” Leave war to the Professionals. War is not a game and should not be “sold” as entertainment to our children.
6. We support repeal of the Gun-Free School Zones Act of 1990. This may sound counter-intuitive, but it obviously isn’t working. It is our opinion that “Gun-Free Zones” anywhere are too tempting of an environment for the mentally disturbed individual to inflict their brand of horror with little fear of interference. While governmental and non-governmental organizations, businesses, and individuals should be free to implement a Gun-Free Zone if they so choose, they should also assume Tort liability for that decision.
7. We believe that border states should take responsibility for implementation of border control laws to prevent illegal shipments of firearms and drugs. Drugs have been illegal in this country for a long, long time yet the Federal Government manages to seize only an estimated 10% of this contraband at our borders. Given this dismal performance record that is misguided and inept (“Fast and Furious”), we believe that border States will be far more competent at this mission.
8. This is our country, these are our rights. We believe that it is time that we take personal responsibility for our choices and actions rather than abdicate that responsibility to someone else under the illusion that we have done something that will make us all safer. We have a responsibility to stand by our principles and act in accordance with them. Our children are watching and they will follow the example we set.
The undersigned Quiet Professionals hereby humbly stand ever present, ever ready, and ever vigilant.

MSNBC Distorts Sandy Hook Victim Remarks

MSNBC on Monday aired a misleading and incomplete clip of testimony given by the father of a Sandy Hook victim at a hearing before the Connecticut Legislature. The edited version of his remarks, aired on Martin Bashir’s show, make it appear as if pro-gun advocates maliciously interrupted (or “heckled” as many have said) the dad for no reason as he calmly argued against civilians owning semi-automatic rifles and high-capacity magazines.

Visit NBCNews.com for breaking news, world news, and news about the economy

Full clip

Tuesday, January 29, 2013

What Are You Wearing? Drone Sees From 17,500 Feet

The Defense Advanced Research Projects Agency’s (DARPA’s) Autonomous Real-Time Ground Ubiquitous Surveillance Imaging System (ARGUS) has 1.8 billion pixels (1.8 gigapixels), making it the world’ highest resolution camera. The sensors on the camera are so precise, PBS stated it is the equivalent to the capabilities of 100 Predator drones in a medium city.

Clip from PBS’s NOVA special:

The entire episode:

Watch Rise of the Drones on PBS. See more from NOVA.

Unsecured Security Cameras

Go to Gibson Research Corporation (GRC), a leader in computer security, and run (free) “Shields Up” to see if your computer has any unsecured open ports.

Services tab / “Shields Up” / Proceed / All Service Ports – wait for the scan to complete. All green is what you want to see.

Now go check to see if your Unplug and Play is on or off.

Go to GRC’s freeware tab / security / Unplug and Pray and run it. – Turn off your Unplug and Play.

The Ray Sharp DVR platform is particularly prone to the vulnerability. Other products included for such a potential exploit are: Swann, Lorex, URMET, KGuard, Defender, DEAPA/DSP Cop, SVAT, Zmodo, BCS, Bolide, EyeForce, Atlantis, Protectron, Greatek, Soyo, Hi-View, Cosmos and J2000. A temporary work-around someLuser presents is to disable the universal plug and play (UPNP) on routers to prevent outside devices from using the Internet to access the system remotely.

Military Training to Take Over America

Following reports of a military exercise occurring in Miami this week, KTRK-TV shot video of military-style helicopters roaming the skies in Houston, Texas.

Sotomayor's Anti-White, Radical Leftist Days at College

THE SURPRISING DETAILS ABOUT SONIA SOTOMAYOR’S COLLEGE PAST THAT YOU WON’T FIND IN HER NEW BOOK

Monday, January 28, 2013

The Medium is the Massage Marshall McLuhan, Quentin Fiore & Jerome Agel 1967

Part 1

Part 2

Latest Educational Insight: No Testing

Anti-testing movement’ grows among American teachers

Sunday, January 27, 2013

Ian Hunter Interview: WBAI Radio Show

Morning Dew Sunday, January 27, 2013 1:00 am, the show can only be archived for two weeks due to copyright restrictions.

Did God Exalt Obama to the Presidency?

Did God Exalt Obama to the Presidency? By James Arlandson

Was Jesus a Libertarian?

Jesus Libertarian?

"Whenever the legislators endeavor to take away and destroy the property of the people, or to reduce them to slavery under arbitrary power, they put themselves into a state of war with the people, who are thereupon absolved from any further obedience."

John Locke

"Personality can only be developed in the realm of individual choice. And that realm, in the modern state, is being slowly but steadily eradicated."

J. Gresham Machen

Immigration: National Security Threats Should Be Denaturalized

Upholding the Value of Our Citizenship National Security Threats Should Be Denaturalized


Key findings include:

In the past decade, dozens of naturalized U.S. citizens have been arrested and charged with a variety of serious national security-related offenses involving terrorism, spying, and theft of sensitive information and technology.

The federal government almost never revokes the citizenship of these naturalized citizens, even when it is clear that they concealed material facts regarding their extreme ideas or associations with terrorist groups or foreign intelligence organizations at the time they naturalized.

There is no central government repository of information about naturalized citizens who engage in serious national-security offenses.

The Department of Homeland Security (DHS) has no systematic method for collecting the information nor efforts in place to review such cases, either for the purpose of instituting denaturalization or in order to discern whether there are steps it can and should take to better vet applicants during the naturalization process.

Administrative naturalization continues unabated with hundreds of thousands being granted citizenship each year (over 6.5 million in the last decade).

The consequence of these actions is to place all Americans at greater risk, as shown by the kinds of crimes for which many naturalized citizens have already been arrested, charged, convicted, and sentenced.

The now-defunct INS, a predecessor agency to DHS's U.S. Citizenship & Immigration Services (USCIS), had created a parallel regulatory structure to administratively denaturalize individuals when facts came to light revealing that an applicant had been ineligible at the time of naturalization.

In July 2000, the federal Ninth Circuit Court of Appeals ruled that the regulation exceeded the INS's authority and issued an injunction against its use.

As a result of the Ninth Circuit decision, presently the only way naturalized citizens can be stripped of citizenship is through criminal prosecution or civil suits in the already overburdened federal district courts.

Congress has within its power the ability to pass legislation re-instituting the capability to administratively denaturalize individuals granted citizenship in error or as a result of misrepresentations, concealment of materials facts, or other forms of fraud. Doing so would help protect the American people and enable the government to better ensure the integrity of the administrative naturalization process.
An appendix at the end of this document lists dozens of recent examples of naturalized cit

Saturday, January 26, 2013

$317,000 in “stimulus” spending, only one job had been created or saved

The last public figures available state that only one job was saved or created for every $317,000 spent. Moreover, Section 1513 of the “stimulus” legislation, which Obama spearheaded and signed into law, requires the executive branch to submit a new report every three months, and yet, this has not done since 2011. Obama is breaking his own signature piece of legislation.

Anonymous: U.S. Government Can Not Protect Its Own Networks

Anonymous hacks US Sentencing Commission, distributes files



Citizens of the world,

Anonymous has observed for some time now the trajectory of justice in the United States with growing concern. We have marked the departure of this system from the noble ideals in which it was born and enshrined. We have seen the erosion of due process, the dilution of constitutional rights, the usurpation of the rightful authority of courts by the “discretion” of prosecutors. We have seen how the law is wielded less and less to uphold justice, and more and more to exercise control, authority and power in the interests of oppression or personal gain.

We have been watching, and waiting.

Two weeks ago today, a line was crossed. Two weeks ago today, Aaron Swartz was killed. Killed because he faced an impossible choice. Killed because he was forced into playing a game he could not win — a twisted and distorted perversion of justice — a game where the only winning move was not to play.

Anonymous immediately convened an emergency council to discuss our response to this tragedy. After much heavy-hearted discussion, the decision was upheld to engage the United States Department of Justice and its associated executive branches in a game of a similar nature, a game in which the only winning move is not to play.

Last year the Federal Bureau of Investigation revelled in porcine glee at its successful infiltration of certain elements of Anonymous. This infiltration was achieved through the use of the *same tactics which lead to Aaron Swartz’ death. It would not have been possible were it not for the power of federal prosecutors to thoroughly destroy the lives of any hacktivists they apprehend through the very real threat of highly disproportionate sentencing.

As a result of the FBI’s infiltration and entrapment tactics, several more of our brethren now face similar disproportionate persecution, the balance of their lives hanging on the severely skewed scales of a broken justice system.

We have felt within our hearts a burning rage in reaction to these events, but we have not allowed ourselves to be drawn into a foolish and premature response. We have bidden our time, operating in the shadows, adapting our tactics and honing our abilities. We have allowed the FBI and its masters in government — both the puppet and the shadow government that controls it — to believe they had struck a crippling blow to our infrastructure, that they had demoralized us, paralyzed us with paranoia and fear. We have held our tongue and waited.

With Aaron’s death we can wait no longer. The time has come to show the United States Department of Justice and its affiliates the true meaning of infiltration. The time has come to give this system a taste of its own medicine. The time has come for them to feel the helplessness and fear that comes with being forced into a game where the odds are stacked against them.

This website was chosen due to the symbolic nature of its purpose — the federal sentencing guidelines which enable prosecutors to cheat citizens of their constitutionally-guaranteed right to a fair trial, by a jury of their peers — the federal sentencing guidelines which are in clear violation of the 8th amendment protection against cruel and unusual punishments. This website was also chosen due to the nature of its visitors. It is far from the only government asset we control, and we have exercised such control for quite some time…

There has been a lot of fuss recently in the technological media regarding such operations as Red October, the widespread use of vulnerable browsers and the availability of zero-day exploits for these browsers and their plugins. None of this comes of course as any surprise to us, but it is perhaps good that those within the information security industry are making the extent of these threats more widely understood.

Still there is nothing quite as educational as a well-conducted demonstration…

Through this websites and various others that will remain unnamed, we have been conducting our own infiltration. We did not restrict ourselves like the FBI to one high-profile compromise. We are far more ambitious, and far more capable. Over the last two weeks we have wound down this operation, removed all traces of leakware from the compromised systems, and taken down the injection apparatus used to detect and exploit vulnerable machines.

We have enough fissile material for multiple warheads. Today we are launching the first of these. Operation Last Resort has begun…

Warhead – U S – D O J – L E A – 2013 . A E E 256 is primed and armed. It has been quietly distributed to numerous mirrors over the last few days and is available for download from this website now. We encourage all Anonymous to syndicate this file as widely as possible.

The contents are various and we won’t ruin the speculation by revealing them. Suffice it to say, everyone has secrets, and some things are not meant to be public. At a regular interval commencing today, we will choose one media outlet and supply them with heavily redacted partial contents of the file. Any media outlets wishing to be eligible for this program must include within their reporting a means of secure communications.

We have not taken this action lightly, nor without consideration of the possible consequences. Should we be forced to reveal the trigger-key to this warhead, we understand that there will be collateral damage. We appreciate that many who work within the justice system believe in those principles that it has lost, corrupted, or abandoned, that they do not bear the full responsibility for the damages caused by their occupation.

It is our hope that this warhead need never be detonated.

However, in order for there to be a peaceful resolution to this crisis, certain things need to happen. There must be reform of outdated and poorly-envisioned legislation, written to be so broadly applied as to make a felony crime out of violation of terms of service, creating in effect vast swathes of crimes, and allowing for selective punishment. There must be reform of mandatory minimum sentencing. There must be a return to proportionality of punishment with respect to actual harm caused, and consideration of motive and mens rea. The inalienable right to a presumption of innocence and the recourse to trial and possibility of exoneration must be returned to its sacred status, and not gambled away by pre-trial bargaining in the face of overwhelming sentences, unaffordable justice and disfavourable odds. Laws must be upheld unselectively, and not used as a weapon of government to make examples of those it deems threatening to its power.

For good reason the statue of lady justice is blindfolded. No more should her innocence be besmirked, her scales tipped, nor her swordhand guided. Furthermore there must be a solemn commitment to freedom of the internet, this last great common space of humanity, and to the common ownership of information to further the common good.

We make this statement do not expect to be negotiated with; we do not desire to be negotiated with. We understand that due to the actions we take we exclude ourselves from the system within which solutions are found. There are others who serve that purpose, people far more respectable than us, people whose voices emerge from the light, and not the shadows. These voices are already making clear the reforms that have been necessary for some time, and are outright required now.

It is these people that the justice system, the government, and law enforcement must engage with. Their voices are already ringing strong with a chorus of determined resolution. We demand only that this chorus is not ignored. We demand the government does not make the mistake of hoping that time will dampen its ringing, that they can ride out this wave of determination, that business as usual can continue after a sufficient period of lip-service and back-patting.

Not this time. This time there will be change, or there will be chaos…

-Anonymous

Friday, January 25, 2013

EGYPT: 'OBAMA YOU JERK

SIGN IN TAHRIR SQUARE: 'OBAMA YOU JERK, MUSLIM BROTHERHOODS ARE KILLING THE EGYPTIANS'...

Ian Hunter, The Cutting Room, NYC, 25 January 2013

Once Bitten, Twice Shy

All The Young Dudes

Mark Stein, keyboards, Kasim Sultan, bass

Mark Bosch, guitar, Ian, and Ricky Byrd, guitar

Ian, solo shot

Ian waves good bye, Steve Holley, drums, and Ricky Byrd, guitar

The Cutting Room Fri, January 25, 2013 8:00 PM
44 EAST 32ND STREET, NEW YORK CITY, NY



Sponsored by: American Addiction Centers and our friend Andrew Kowalczyk

Your Hosts -Lynn Hoffman (A&E Private Sessions) &
DJ Ken Dashow (Q104.3 - New York's Classic Rock)

Featuring: The Rockers In Recovery All Star Band

Musical Director Ricky Byrd - Lead Guitar/ Vocals (Joan Jett and the Blackhearts)
Liberty Devitto - Drums (Billy Joel Band)
Richie Supa- Guitar/Vocals (Aerosmith)
Kasim Sulton - Bass/Vocals (Blue Oyster Cult)
Christine Ohlman - Lead Vocals (SNL Band)
Mark Stein-Keys/Vocals (Vanilla Fudge)


Featuring: Special Guest Rockers

Ian Hunter

Ian played Once Bitten, Twice Shy, and All The Young Dudes with Steve Holley on drums and Mark Bosch on guitar.

Bosch was onstage for a good portion of the evening playing with the Recovery Rockers.

Gary US Bonds
Simon Kirke (Free and Bad Co.)
Michael Des Barres
Billy J Kramer
LaLa Brooks (The Crystals)
Handsome Dick Manitoba (The Dictators, Little Steven's Underground Garage)
Gene Cornish (The Rascals)
Peppy Castro (Blues Magoos)
Mark Bosch (Ian Hunter Rant Band,Garland Jeffries)
Ross The Boss (The Dictators)
and others to be announced.

Opening The Night: The Capris (There's a moon out tonight)

Come Bid On The Following Auction Items:
*Chuck Berry Autographed Guitar
*Aerosmith Autographed Memorabilia Piece
*AC/DC Autographed Guitar
*Lynyrd Skynyrd Autographed Guitar
*Allman Brothers Autographed Guitar
Items Donated By: Andrew Kowalczyk

100% of all Tickets, RIR Merchandise and Auction will be donated to:

The Graybeards, West Hamilton Beach Volunteer Fire Department, and The Broad Channel Volunteer Fire Department

Obama Breaks Law

A federal appeals court overturned Obama’s controversial recess appointments from last year, ruling he abused his powers and acted when the Senate was not actually in a recess.

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to StickyMinds.com;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • Müller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

SmileyCentral.com

Radical Christian

My secure contact form

Choice Reviews Online

techLEARNING.com

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science

CIO

Choice Reviews Online

SD Times: Software Development News

KMworld

SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist


Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Portrait of Thinking Hero

Portrait of Thinking Hero
1844-1900

Check out:

Check out:
Chicks dig readers.
@ Blog Smith. Powered by Blogger.