Link Spasm

I haven’t done one of these in awhile. Each link interesting, but I don’t want to make a separate post about each.

The Futurist – “A Future Timeline for Economics

NASA Turns 50 — Now What?

Sound Bites of the 1908 Presidential Candidates

Music: “Funeral March by Beruit” via Stephen Pampinella

Information Security-ish – “Why Risk Management Doesn’t Work

New Killer Drones Could be Piloted by Teenagers

Techdirt: The Grand Unified Theory On The Economics Of Free

TechDirt: Books Are The Souvenir Edition For Your Idea

Market-place gods had it right

Quicken Online Drops Subscription Fee, Now Free

The Apex Fallacy: An Interview with Dr. Helen Smith

HotAir: Video: French archive releases footage of McCain POW interview

Weekend Links – 18 May 2008

These may or may not be of interest to you:

Pricings For Underground Markets In Computer Crime

http://news.bbc.co.uk/2/hi/science/nature/7358868.stm
:

Ancient humans started down the path of evolving into two separate species before merging back into a single population, a genetic study suggests. The genetic split in Africa resulted in distinct populations that lived in isolation for as much as 100,000 years, the scientists say.
[…]

Very Cool idea for a blog – http://althouse3.blogspot.com/ :

The Time That Blog Forgot. If only I could have blogged in the century before blogging! I will imperfectly satisfy my longing by using a random number generator to pick the year and the NYT archive to scan the news stories for today’s date in that year

Unqualified Reservations’ Open Letter To Open-Minded Progressives Parts 1, 2, 3 and 4

http://stephenpampinella.wordpress.com/2008/05/11/thinking-about-xgw/ :

And as per the above quote, each strategic paradigm has been around forever, so each Generation does not evolve to displace each other, but instead merely adds to a belligerent’s repetoire of strategic paradigm. That being said, given one’s place in the social structure of the international political system, employing certain strategic paradigms is politically self-destructive (and irrational) or alternatively can lead to political success (and thus, rational). Thus, most states aren’t supposed to kill civilians, but some do and get away with it as well as the non-state actors they are fighting. These actors can fight one type of war without losing legitimacy, unlike more established states who are deeply embedded in a normative culture that prohibits ‘collateral damage’. Each Generation is a repetoire and has existed throughout time, but just because an actor has learned a repetoire doesn’t mean it can always use it and expect to win. That’s why history is important. It conditions which Generations/repetoires/strategic paradigms will be most successful to achieving one’s policy goals.

http://gatesofvienna.blogspot.com/2008/05/distributed-emergence-networking.html :

The mission of the Counterjihad is to organize action to resist sharia and roll back Islamization in the nations of the West. This purpose will be accomplished via a number of strategies that can operate together or separately, consecutively or concurrently. They may include some or all of the following…
[…]
The most important characteristic of an effective anti-Islamization network is that it be international. The enemy’s networks are very international, and radical Islam coordinates effortlessly across national boundaries. We must do the same thing.

http://www.steynonline.com/content/view/1217/ :

I’m not sure why Michelle would stick “pastor of a church” in that list of downscale occupations: Her pastor drives a Mercedes and lives in a gated community. But, insofar as I understand Mrs. O, she feels that many Harvard and Princeton graduates have to give up their life’s dream of being a minimum-wage “community organizer” (whatever that is) and are forced to become corporate lawyers, investment bankers and multinational CEOs just to pay off their college loans. I’m sure the waitresses and checkout clerks nodded sympathetically.

http://frontpagemagazine.com/Articles/Read.aspx?GUID=43EB6031-8C4B-42DB-AB4B-E8BD78132710 :

With its heavily funded proxies marching through an Arab democracy’s ruins, Iran has arrived on the Mediterranean, outflanking Israel.

http://shrinkwrapped.blogs.com/blog/2008/05/sometimes-a-thi.html :

The neocons, especially President Bush, were convinced that if only the jackboot of fascism were removed from their necks, the Iraqi people would eagerly adopt democracy and freedom. Our painful experiences in Iraq have shown how naive such a hope was.

http://www.sinodefence.com/

So, Obama was a Muslim? Here and Here.

Rachel Lucas is a Firefly Fan. Shiny!

http://www.tdaxp.com/archive/2008/05/13/former-head-of-iraqi-anti-corruption-agency-now-an-undocumented-immigrant.html :

The Department of Homeland Security and the Department of State may two the two worst-run agencies in the federal government. When they work together, things get truly bad

http://hotair.com/archives/2008/05/13/suspected-fbi-hezbollah-spy-sentenced-to-no-jail-time/ :

She was here illegally, pursuant to a sham marriage she arranged with a U.S. citizen. She illegally accessed FBI records about herself and her brother-in-law not once but twice while working for the Bureau, a breach that warranted debriefings at the “highest levels of government.” Best of all, she was actually assigned to Baghdad for a time, where she spent her days interrogating Al Qaeda. Total penalty for her various crimes: A $750 fine and off scot free.

Political Satire: “Yes We Shall”

Video of a GR watching Air Bud

There has been a lot of recent activity on this old post of mine – Found on Wikipedia: “The Dulles Plan”

Podcast: This American Life on The Mortgage Crises – “The Giant Pool of Money”

The Singularity & the 12th Imam

New Year’s Eve Links [Updated]

BTW, I am listening to The Pipettes while I type this.

Top 10 Businesspundit Posts of 2006

TDAXP describes the differences between Shia and Sunni Islam; [update] Catholicgauze has the maps to go with it.

5GW: “Exploring what comes next is cooler than what’s maturing now

In “The empires of the future are the empires of the mind” EnigmaFoundry writes:

So the Bush administrations policy has a fundamental conceptual flaw: It is fighting an ad hoc network by trying to kill those it believes are part of the network. But this ad hoc network is feed by a fundamental belief, which is: The US is evil, it is out to kill Muslims, and it is therefore the duty of good people to destroy this evil killing machine. Now, to defeat this network we need to fight this fundamental belief, not to kill those who hold it, because this would just demonstrate that the belief is correct. Every time we win, we lose.

My thought on the aboive: 4GW (and 5GW) is as much about memes as about tangible things.

Old Lawfare links: here and here. A newer one here. [Update] And here.

Hezbollah’s Christian Allies

When Sysadmins Ruled the Earth by Cory Doctorow

“…One of its main ideas is that mandatory schooling begin at age 3 and end after 10th-grade. After that, going on to colleges and universities would be one of several choices available. Another choice, equally typical and just as well-funded, would be vocational training.”

Weekend Information Security Links, Part 1

So many links, so little time.

Continue reading

Sunday Links

Incentives for breeding? “Babies Are Kew-el”

How about a 5GW campaign against birth control quality?
Personally, I am a bit hesitant around small children (they seem fragile and I don’t want them to break around me. Once they turn three-ish and can talk. Then they become interesting (amusing + programmable).

Hot Air outtakes! Note to freaks: It does not included an extended version of her “Jump” vepisode.

“John Stamos is here, and he is pissed”

On the Doolittle Raiders

Continue reading

Sunday Information Security Links

Jeff Hayes has Lock Picking Analogy:

In the world of locks, the same premise holds true. Some locks are designed and tested much better than others. The lock picking hobbyist — the lock hackers — do us all, including the manufacturers, a service in assessing the security of these products. If the manufacturer demonstrates a weak design and QA process, then society at large is fully in its rights to bring those flaws to light.

He also has a post on the principle of Least Privilege:

The principle of least privilege requires that a user be given no more privilege than necessary to perform a job. This is done to enhance protection of data and functionality from faults and malicious behavior.

Some things make me want to change fields: Security Focus on Quantum Computer Security:

In the weird world of quantum computing, the state of computer systems networked together is so fragile that a read access to a single quantum bit, or qubit, on one machine would require a network-wide reset. It’s no wonder, then, that two researchers who are working on ways of defending against the future possibility of malicious attack assume that any unauthorized access to a quantum computer constitutes a catastrophic failure.

Quantum computers make use of quantum physics, the rules of subatomic particles and light, to create a computing system. Where a classical computers uses binary values of 0 and 1, a quantum system can be in a state that represents either 0 or 1, or a probabilistic blend of both states, known as a “superposition,” so that it has the potential to be either 0 or 1 with its value only be determined at time of measurement. These quantum bits of information, or qubits, essentially take on all possibilities until measured, when the state of the qubits collapse to an actual value.

The science behind quantum computing gets even weirder…

There is no telling what such an attack might look like. Destroying data or circumventing a calculation on a quantum computer is the easiest course. Attackers could operate a rogue computer on the quantum network or coopt the communications line, he said.

“We deliberately stay away from specifics of malware, such as Trojan horses, et cetera,” Lidar said. “So, quantum malware to us just looks like any malicious instruction set sent to an attacker.”

Yikes.

Multiple Sources for Boarding Passes And Bad Security: Here, here, here, and here:

Last week Christopher Soghoian created a Fake Boarding Pass Generator website, allowing anyone to create a fake Northwest Airlines boarding pass: any name, airport, date, flight. This action got him visited by the FBI, who later came back, smashed open his front door, and seized his computers and other belongings. It resulted in calls for his arrest

WatchYourEnd has USB Flash Drives Contain Evidence of a North Korean Spy Ring:

A pro-North Korean group is under increased suspicion in South Korea, of providing a significant amount of information, including state secrets, to Pyongyang recently after large amounts of evidence were found on USB flash drives in their offices.

Dark Reading on Strategic Security:

Most C-level executives still view security as an operational issue, not a strategic issue, according to “Navigating Risk: The Business Case for Security.” The study, which researched the attitudes of some 213 top-level corporate, non-security executives, found that most security organizations are still operating in silos that are far removed from their highest-ranking decision makers.

Despite frequent news about security breaches, most C-level executives report that they still have little direct responsibility for most aspects of security. And the few executives who do understand the issues often do not have the influence needed to do something about it.

Dark Reading: Increasing Spam With New Malware Techniques:

Unlike traditional methods of spamming, where each botnet sends out spam emails one at a time, SpamThru uses templates that lets them send millions of emails from a single bot-infected computer, MessageLabs’ Wood says. “The template approach is the equivalent to a mail merge.”

What can be done:

  • Corporate firewalls should only allow mail servers to send email out along with desktop firewalls controlling applications and traffic.
  • ISPs should require residential accounts to only relay email through them (with authentication).
  • Shared Distributed Blackholes of IP space that can dropped at perimeters
  • InfoSec Lawfare against enablers of bots.

Security Focus on Employee Privacy, Employer Policy:

Mark Rasch looks at two recent court cases where an employee’s reasonable expectation of privacy was more important than the employer’s ability to read any employee’s e-mail – despite a privacy policy that clearly stated any company e-mail can, and will, be monitored.

A book review of Identity Crisis (something that has been on my to-do list.

A reminder about the importance of power from SANS.

More on Botnets from SecurIT.

Weekend Information Security Links

(ht Dark Reading) Anti-Phishing.org has an excellent PDF –> The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond:

“Crimeware” is software that performs illegal actions unanticipated by a user running the software, which are intended to yield financial benefits to the distributor of the software.

SecuritTeam: Money Mule Recruitment Over IM:

Today was the first time we observed a money mule recruitment happening on instant messaging.

Dark Reading: New Email Malware:

There is less hard data about Haxdoor, which uses a rootkit to hide from the user and from most antivirus applications that might be running on the PC. Once installed, it hunts for passwords for popular Internet services — such as eBay, PayPal, or Web Money — and for popular email clients such as Outlook Express. The attacker can then use the passwords to carry out online fraud or identity theft, Panda says.


Dark Reading: People Aspects of Information Security:

Interestingly, however, organizations are finding it difficult to locate skilled security staff to work on the problem. While the number of security professionals increased 8.1 percent worldwide in the past year, “you can look at any jobs site and see that there are a lot of open positions out there,” Carey noted. As a result, many organizations are giving more responsibility to junior-level staffers and security outsourcing organizations, the report says.

Well duh. Supply and Demand. Pay more for people who have the the skills and more people will get the skills.

Financial Cryptography: E-Tradecraft:

Someone’s paying attention to the tracking ability of mobile phones. Darrent points to Spyblog who suggests some tips to whistleblowers (those who sacrifice their careers and sometimes their liberty to reveal crimes in government and other places)…

Bruce Schneier.com: Chemical Residue Detectors

Schneier on Security and Botnets:

The trick here is to not let the computer’s legitimate owner know that someone else is controlling it. It’s an arms race between attacker and defender.

Botnets are hard to shutdown once established. The best thing, is to have proper controls in place to begin with to prevent takeover and to start forcing infoSec Lawfare (economic incentives) against those who allow their networks to be used.

Security Focus: An Information Security Lawfare Example:

Federal prosecutors charged on Tuesday a 32-year-old Florida man with computer trespass in connection with the creation of a bot network and the targeting of Internet service provider Akamai with a denial-of-service attack more than two years ago.


WatchYourEnd: Los Alamos Nuclear Weapons Data Found on Three USB Flash Drives During Drug Raid

…police found classified nuclear data on three USB flash drives during a search of the trailer she shares with another man who was being investigated for drug charges. The information is believed to be classified as Secret Restricted Data which indicates it involves nuclear weapons data and…

WatchYourEnd on Homeland Security and EndPoint Security: here and here:

…Federal Homeland Security officials in Portland, Oregon are trying to find a lost USB thumb drive that may have held personal information on more than 900 current and former employees. This information included your standard “destroy a person’s life” data…

and

…the Port of Seattle is reporting that six computer disks containing personal information for almost 7,000 people who work at the Seattle-Tacoma Airport are now missing. At this time they do not know if the disks were “misplace” or if they have been removed from Port property. No mention of encryption or other endpoint security measures and/or policies.

Security Focus: Fraud Costs

Two American brokerage houses have written off $22 million in fraud losses on their third quarter financials, citing spyware, stolen identities and hacker fraud as the cause.

Security Focus: Spammers continue Lawfare against spam-fighter Spamhause

e360 is going after Spamhaus again, this time trying to use the US Marshall service to seize http://www.spamhaus.org from Tucows, Inc.

Schneier on Security: Links to Paleo-Security Article:

Prehistoric evidence indicates that people have always been concerned with detecting whether others have tampered with their belongings. Early human beings may have swept the ground in front of their dwellings to detect trespassers’ footprints. At least 7,000 years ago, intricate stone carvings were…

Security Humour Spotted by Securiteam:

FLUNKY: Well, he says it’s bad security to create a privileged low-security channel for a lucky few.
CEO: He isn’t a socialist, is he?

CEO: Not interested. Let’s cut to the chase. What does he want my password changed to?
FLUNKY: dF3#(~!pk40%L/sD:@
CEO: This is a prank, right?

Securiteam: A Wormboy’s Story

When I came to work the next morning, all you could hear around the office was the sound of mutley, you would hear that laugh at least 3 times once every half hour. There were about 50 computers in the office. The Jig was up. The IT dept. had no clue what was going on, because norton didn’t detect it. Honestly they never had a clue.

Jeff Hayes: Network Access Control:

NAC is a very powerful tool. It allows a network to follow a predefined set of policies. It is policy-based networking at its finest. However, deploying it properly requires some detailed networking and security skills and knowledge.

Sunday Information Security Links

Prevent Identity Theft (ht Network Security Blog):

So what are the best ways to prevent identity theft? Firstly, you must understand what personal information of yours should be kept private. While some personal information is inevitably going to be made public, there are some items with high sensitivity that should never be made public…

Dark Reading: Cross-Site Request Forgery (CSRF):

“If you think Cross-Site Scripting (XSS) is scary and prolific, just wait for the next big Website threat: Cross-Site Request Forgery (CSRF). The CSRF vulnerability lies in most every Website…”

MyCEOSolutions: Five Steps to Safer Email:

I am just summarizing their key points or step that SMBs might consider as they assess the security of their email system.

Bruce Schneier: Architecture and Security:

“You’ve seen them: those large concrete blocks in front of skyscrapers, monuments and government buildings, designed to protect against car and truck bombs. They sprang up like weeds in the months after 9/11, but the idea is much older. The prettier ones doubled as planters; the uglier ones just stood there.[…]”

Bruce Schneier: Security and Class:

“I don’t think I’ve ever read anyone talking about class issues as they relate to security…”

This sounds like social engineering to me.

Saturday Night Links

Superman is a Dick

REDDIT link to Soviet Space Shuttle current photos

An Coca-Cola print add that must be seen to be believed

Dolphins: tricky or sinister?

Come on, Does this look sinister?
Dolphin

Meme/Trend tracking from Google

War Insurance

Neat Breakdancing Video (Yes, A break dancing video)

USS Clueless (redux) Sighting

Nanotechnology Run Amok: Grey Goo melting online world Second Life

The Letter L: Not Safe for Work or Sesame Street

Thomas Barnett on the New COIN Strategy

Peter Falk as Fashion Designer

More Sidewalk Art

This Beautiful Face is a computer Generated Composite:
Composite From 15 Images

Anti-Anti-Islamfascism: Here and Here

Marine Nominee for Medal of Honor

Experimental-ism (Federalism) Good

Islamic Weirdness

Investigating Eurabia

“I do think a retreat from literalism is the only hope for the creation of any genuinely and lastingly moderate Islam.”

Mafia And Islam In America

Pictures Of The Enemy

Journey of a Libertarian

Age of Democracy

Chester’s Combination Warfare idea is a big part of my 4GW as Full Spectrum thinking (which remains for Future Purpleslog to Publish)

Sunday Night Linkspasm

Hell in a Handbasket is back.

FDNF on Dafur: Here and here

DIY Credit Reports

Eurabia Rising – Future 4GW – 7 Examples: 1, 2, 3, 4, 5, 6, 7

…and examples of CAIR‘s 4GW/5GW against the US: here and here

Science at Home: Finding the Speed of Light with Marshmallows and a Microwave Oven

Ann Althouse’s photo of a Madison Chalk Artist

A photo of a Halloween costume concept I am not thinking about.

Para Pundit: Stephen Browne: 12 Lessons About Arab Muslims. Also, consider reading the Arab Mind by Raphael Patai.

From Shrinkwrapped, a post on the Utopian Press, The End Of The World, and Maybe The Singularity.
Check out this comment: “Yet I wonder, have we, in effect, already reached a kind of Singularity? Has the accelerating rate of change in our world already out-paced our National and International Institutions’ ability to adapt? If so, chaotic change is likely and that favors regression, not progression.”

Dr. Sanity on Rhetoric and War

An extreme tattooed face

A USB Hamster Wheel and a USB Powered BBQ

From ParaPundit: Chinese live testing of Anti-Satelite Lasers

Rudolph Valentino: Dancing the Tango (clip from The Four Horsemen of the Apocalypse). Also, vintage photos from the crowds for his memorial service.

Anti-Anti-Islamofascist CNN Media Warfare

HP’s Troubles. The Chief Ethics Officer (among others) is going to be indited.

Khameini has ejaculated this wisdom and much more all over his…“. Yikes. I guess this is Reason #754,234 why Sharia sucks. More from the link: “Deliberate masturbation during the month of Ramadan renders a fast invalid, Iranian Supreme Leader Sayyid Ali Khameini has ruled.”

Moderate Islam in China

Nanotech Assembler (from YouTube)

North Korean Anti-American Propaganda (from REDDIT)

New Knowledge Workers

Media Fifth Column examples: here and here.

LGF‘s “Palestinian” history lesson (response to victimization framing) –> “The intifada didn’t just “break out.” It was a politically calculated terror war launched against Jewish civilians by Yasser Arafat and the surrounding Arab states, with the full support of the Palestinian people. And when that terror war failed to break Israel’s will, the Palestinians overwhelmingly elected the genocidal terrorist gang Hamas to be their “government,” running on a platform to destroy Israel. Recently, they had another chance to create the beginning of a functioning society, when Israel withdrew from Gaza. International investors purchased the numerous high-tech greenhouses Israel had built and operated at great profit (giving employment to numerous Palestinian families), and presented them to the PA as a gift. The response: the greenhouses were burned and looted by marauding mobs, and the no man’s land where Gaza meets the Israeli border is now used mostly for firing rockets into Israel, in attempts to murder more Jewish men, women, and children. At random.”

PostModernism: here, here, and here

Patterico’s Exclusive Interview with a Man Who Has Spoken to the Terrorists at Guantánamo

LGF: Wafa Sultan on Changing Islam

The Dutch SuperBus (hat tip EdgeWise)

Zenpundit: Meme War Tactics

Lastly, TDAXP has a roundup of his posts from August and September.

Sunday Information Security Linkspasm

Spot the Security Problems

The importance of Egress Filtering on Routers and Firewalls

Pretexting

Virus Reporting (compare against multiple vendors)

Records Retention

Phishing Resources: Here, here, and here.

WatchYourEnd: USBDumper Endpoint Security Hack Video Demonstration and more USB security stuff

IDS/IPS

Security Education

Closing The Barn Door

Security Ethics Survey (the results are not good)

ZERT & Third Party Patches (I think this is a good idea)

Economic Espionage

Rainy Saturday Links

The Importance of Birth Order Debunked at Econlog

The Shana Hiatt Blooper Reel

Althouse: A fantasy scenario of trying Bin Laden A bullet to the head by the capturing American Infantryman works for me.

Is the Thai Coup…a prelude to Islamization of Thailand?

IEEE Spectrum Special Report: Unlocking the Terrorist Mind

Peace Through Commerce at the FlowProject

Muslim Brotherhood controls Al-Jizera? The Muslim Brotherhood is the best candidate for a large proto-5GW organization.

Old 5GW posts at ChumpFish here and here.

Possible 5GW Tactics: Culture Jamming and Memetic Engineering

AmendmentNine on Moral War

Live USB Hacking

TV Zone: Five essential lessons from Grover

MindStream: CyberIntel

Bank Machine Hacking

Marginal Revolution on the The phantom Tyler Cowen. Sounds a bit like the abstract OODA part of Phatic Communions Revised OODA.

Here is the only link to something related to Paris Hilton I will every make (it is really about marketing and networking).

TDAXP on Corporate Espionage One side effect of the blowback from the HP affair is that organization will get smarter about doing this sort of thing. I would see you will see hybrid enterprise consisting of Law Firms, and skilled intelligence folks. The doing it all through an outside law firm coordinated by the internal counsels gives legal cover. Also lots of money are at stake, so I see where corporate officers, accustomed to being told how smart they are will report to this.

Shrinkwrapped on the UN

Voting Machines Security

Data Theft And Executives

Top 20 Japanese Commercials (My favorite was the Cockroach vs the Samurai!)

LGF: Another 9/11 Memorial Hijacked By Leftists

We Don’t Need No Welfare State

Offshoring Lawyers. Great – Lawfare will become cheaper. Not good.

Lastly: Chapelle Show’s Jedi Knight Sex Scandal

Wednesday Night Links

Shining City has: Fetal Shark Attacks

Arnold Kling’s Suggested Ed Reform

TV Squad investigators are all over the Lost video clues

ISC Incident Handler on Information Security Standards

Islam Is The Problem?

Alt-History links

On the War: Reasons for Optimism (5 part series) by guest Owen Johnson at Swinkwrapped. I have read them; FuturePurpleSlog needs to write a post on it.

Why Do They Hate Walmart? I don’t shop there, but I like the idea of Walmart efficiency being added to banking and other services. The whole point is innovation of product (different,needs,style) and process (faster,cheaper,better). Competition (for the rewards = profit) foster creativity (incentives for progress) and Entrepreneurs. Better product,processes give people more life options (less misery, more happiness, human potential used).

Culture Jamming. Hmm… 4GW/5GW/InfoWarfare technique?

Lastly: Star Wars Burlesque – Not Safe for Work –>

Continue reading

Sunday Afternoon LinkSpasm

These are interesting things you might like to read. It is a long post though…

Continue reading

Information Security Links

ISC: PHP Security Hints

ISC: File System Mounting Security Tips

Network Security Blog: Who send plain text passwords?

SANS Malware Detectives (here and here)

SANS Tip for Better Monitoring

Encryption Types Usage Stats

Via SecurIT: KevinMitnick.com and MitnickSecurity.com hacked

I should not grin…but I don’t know what to make of this guy. Everybody has a write to make an honest living, but I am not comfortable with criminal hackers going legit and making money. Signals future incentives to potential hackers (increase likelihood of hacking). Then again, maybe the criminal hacker world has moved past where Mitnick was, so it is not a big deal. At some point I will read his social engineering book, but I don’t want to pay for it. My current boss has a copy on her bookshelf. Maybe I will borrow it over labour day weekend.

Tuesday Night Link Spasm

Zenpundit: Proactive Natural Resources Warfare, in a good way

LGF: Ben Stein Article – Will as a 4GW Component

LGF: Inside Islam Undercover

Tick Tock

LGF: Eurabia Watch – Fifth Column in Waiting

Moon Landing Tapes Missing: Hopefully they will show up on YouTube by user BuzzShouldHaveGoneFirst42.

Libertarians and Science Fiction

Winds of Change: A Hollow IDF?

TDAXP’s Brave Free Speech Move

Josephnadir.Wordpress.Com: Robert Spencer on C-Span – There are Moderate Muslims there is no Moderate Islam

USAv3 Thinking

More Monday Night Links

I am a bit behind on blogging…

From WatchYourEnd: More ways for Sensitive Info to Leak Out: USB Jewelry

Web Video Charts

From vivekshah: How Rumors start in the Office (funny pix)

From: Gates Of Vienna: Doctrinal Similarities between Communism and Islam/Islamofascism

Catchup Visually to TDAXP and Phatic Communion: Drawing Tools for The Web

HomeLand Security Watch: Book review: ‘Unconquerable Nation’:

The federal government’s decision to tell citizens to go on living their lives, offering only the vague admonition to be vigilant, has “encouraged dependency,” rather than “promoting self-reliance,” Jenkins says. He argues that there needs to be a much strong commitment to public education on homeland security, and that doesn’t mean websites and pamphlets. Instead, he says:
We need to aggressively educate the public through all media, in the classrooms, at town halls, in civic meetings, through professional organizations, and in volunteer groups. This means more than speeches in front of the American flag. The basic course should include how to deal with the spectrum of threats we face, from “dirty bombs” to natural epidemics, with the emphasis on sound, easy-to-understand science aimed at dispelling mythology and inoculating the community against alarming rumors and panic.

Capitalism Vs Communism Cartoon Short

Gates of Vienna: Muslim-free Corsica

Gates of Vienna: Jihadi-front PSC

LGF: Something More Then Petions Would Be Nice How about a single heroic movie about as use action against islamofascists since 9/11?
The only one I can think of was “The Cell”

9/11 Hero’s story

Saturday Night Linkspasm 2

The PurpleSister has returned from summer vacation

New Socialist Utopian Philosophy Disguised as Economics. Hasn’t humanity suffered enough from “Utopians”?

…apparently not

60’s Retro Picture

Maybe The US Navy’a Dolphin program should be expanded?

Green Helmet Guy Identified

The Original 5GW post

Tattoos Of Liberty

More Tattoos from flickr, because I am a guy: here and here

Modern Humans vs. Neanderthals

New meme/Word Mashup from LGF: Fauxtography

History Break:Attila the Hun

The ocean is de-evolving

US SysAdmin Activity in History: The Marshall Plan

Spoiler Alert: 2006 Poker World Series Champ

NanoBacteria: Newly Discovered Life Form?

Kicking Roman Ass

Atheism Defined

Gorilla Tool Use

History Break: Charlemagne

Ugly/Weird Earth Mammal

Rudy Giuliani for War President in 2008? Maybe…

…and he can have Newt as Senior White House Counselor (aka Idea man)

Aztlan Rising

Saturday Night Linkspasm 1

Does Lind sort of call for Military Coup by US Generals? I think so. Read all the way to the end. Is Pro-Monarchy Lind on the verge of outing himself as a Nutjob? I hope not, since that will discredit the xGW framework big time (rightly or wrongly).

ZenPundit: COIN roundup

Spammers Harvesting from social Networks?

Richard Clarke is a putz

…apparently, so is Mike Wallace

“You Say tomato, and I say tomato, Durka, Durka, Jihad, Jihad…”

Failed Coup In Egypt?

Industrial Espionage Warfare

Coming Anarchyy presents The Terro Tree – Now with Pretty graphics!

Confessions of a Dumb-Ass Computer Systems Administrator

“Bugs Bunny Democrats – All Carrot, No Stick”

Energy Entrepreneurs

Althouse and Wright talk it up

Interesting Juxtaposition of Good and Evil Photo

“These formidable people think freedom is so valuable that it is worth dying for.”

Big Russian Hole Picture

“Mega Jesus Angry!”

Doggies!

The Only part of Marx I find Interesting: Marx’s Theory of Alienation

Economic Costs of 9/11

Virgins? Raisins? Funny stuff!

A World twisted and turned

PurpleSlog’s Ancestral Homelands: Croatia, Austria, and Germany