-
Recent Posts
Archives
Categories
Blogroll
- 3 Quarks Daily
- AlterNet
- AMERICAblog
- Armed and Dangerous
- Bad Astronomy
- cantankerous
- Cosmic Variance
- Crooks and Liars
- Daily Kos
- Dan Froomkin
- David Frum
- DeepCapture
- Digby
- E. J. Dionne
- Edge.org
- Egberto Willies
- Eugene Robinson
- Frank Bruni
- Glenn Greenwald
- Hightower Lowdown
- Hullabaloo
- Improbable Research
- Jeremy Scahill
- Kevin Drum
- Matt Taibbi
- Media Matters for America
- Moneybox
- naked capitalism
- Paul Krugman
- Peter Maass
- Sam Harris
- Scott Adams
- ShadowProof
- Shadowproof
- Skeptic
- skepticblog
- Stonekettle Station
- Stuff That Needs To Be Said
- Swampland
- Tenable Blog
- The BRAD BLOG
- The Dish
- The Dissenter
- The Great Artistic Whatever
- The Maddow Blog
- The Raw Story
- The WAWG Blog
- TomDispatch
- Wall of Separation
- War Room – Salon
- What There Is and Why There Is Anything
- Why Evolution Is True
- Wonkblog
- Wonkette
News and Commentary
- ALEC Exposed
- BBC News
- Center for Inquiry
- Chilling Effects Clearinghouse
- Democracy Now!
- Financial Times
- Foreign Affairs
- Foreign Policy
- McClatchy
- Mother Jones
- National Affairs
- New Statesman
- New York Times
- Open Secrets
- Point of Inquiry
- Politico
- PR Watch
- Project Reason
- ProPublica
- Religion Dispatches
- Reuters
- Science Progress
- Slate
- Talking Points Memo
- Tampa Bay Times PolitiFact
- Techdirt
- The Atlantic
- The Christian Science Monitor
- The Cultural Cognition Project
- The Daily Beast
- The Economist
- The Guardian
- The Intercept_
- The Moderate Voice
- The Nation
- The New Atlantis
- The New Republic
- The New Statesman
- The Pew Forum on Religion & Public Life
- ThinkProgress
- truthout
- Washington Post
Security (National and Information), Privacy and Civil Liberties blogs and sites
- Archives of Risks Digest
- Cryptome
- CSIRT
- Curmudgeonly Ways
- Danger Room
- Dark Reading
- Dragon News
- emptywheel
- FireEye Threat Research Blog
- Freedom to Tinker
- Gene Spafford
- Just Security
- Krebs on Security
- LeakSource
- Light Blue Touchpaper
- Marcus Ranum
- Naked Security
- Schneier on Security
- Shadowserver blog
- Steve Bellovin
- Threat Level
Author Archives: George Capehart
Advanced Issues: Compassion verses Opposition
Advanced Issues: Compassion verses Opposition.
Posted in Uncategorized
Leave a comment
Readers’ beefs of the week
Jerry Coyne’s latest collection of rants from crazies . . . Hilarious! Why Evolution Is True The usual array of curmudgeons and loons have weighed in this week, and here’s a small selection of comments from those who will never post … Continue reading
Posted in Uncategorized
Leave a comment
Bush’s Legacy is more than Iraq . . . *facedesk*
Yesterday, Kathleen Parker had posted on the Washington Post web site an article titled: “Bush’s legacy is more than Iraq.” In it she argues that W was . . . more than a composite of swagger and smirk. He was … Continue reading
Authoritarians At the Gate
“Political tags – such as royalist, communist, democrat, populist, fascist, liberal, conservative, and so forth – are never basic criteria. The human race divides politically into those who want people to be controlled and those who have no such desire.” … Continue reading
Posted in Authoritarianism, Neurophysiology, Politics, Psychology
Tagged Authoritarianism, Authoritarians, Double High, GOP, Republican Party, RWA, SDO
Leave a comment
Molly Ivins did not exaggerate . . .
From TPMMuckraker: Texas GOP’s 2012 Platform Opposes Teaching Of ‘Critical Thinking Skills’ Actually, the title is a bit sensationalist . . . but not by much. And from my perspective, the author missed one of the most juicy parts . … Continue reading
The Wikileaks Brouhaha: Shooting the Messengers and Ignoring the Elephants, Part 5
In this series, we looked at the incompetence and negligence in the Departments of Defense and State that provided an operating environment that enabled Bradley Manning to copy hundreds of thousands of documents without ever being detected. The intent was … Continue reading
The Wikileaks Brouhaha: Shooting the Messengers and Ignoring the Elephants, Part 4
So far in our story, we have focused on the role of the Department of Defense in facilitating Bradley Manning’s opportunity to acquire and export so much classified information. In Part 4, we will shift focus to the Department of … Continue reading
The Wikileaks Brouhaha: Shooting the Messengers and Ignoring the Elephants, Part 3
In Part 2, we looked at the security environment at FOB Hammer and discovered that there was effectively none. That was the first component of the “perfect storm” that enabled Pfc. Manning to collect the video and documents that were … Continue reading
The WikiLeaks Brouhaha: Shooting the Messengers and Ignoring the Elephants, Part 2
Part 1 of this series revisited Pfc. Manning’s activities at Forward Operating Base Hammer with a focus on indicators that provided information about the level of oversight and risk management with respect to protecting Secret and Top Secret-level data. In … Continue reading
The WikiLeaks Brouhaha: Shooting the Messengers and Ignoring the Elephants, Part 1
Introduction Amidst the Sturm und Drang following WikiLeaks’ publication of the State Department cables, Chelsea Manning and Julian Assange drew fire from the DoD, the State Department, the DoJ, Congress and the mainstream media. But with the exception of a few … Continue reading