03.30.13

Doug Roth, LV rock n roll guitarist

Posted in Rock 'n' Roll at 1:17 pm by George Smith


Doug Roth and the Blissters, the Allentown Parkway, 1985.

Doug Roth, aka D Smash of the Lehigh Valley rock n roll band, The Blissters, died this week.

Roth, who was 50, was the Lehigh Valley’s pre-eminent electric guitarist. As a member of the Blissters, his local popularity and career in that band spanned decades. Put another way, Dougie Smash was the very definition of rock and roll.

A brief history of the Blissters was published at DD blog years ago here.

The YouTube film is from a free Summer Sunday festival on the Allentown Parkway in 1985. I was living on Cumberland Street at the time, a hundred or so yards away, and walked to it with my ex-wife.

It was one of the type of late summer outdoor rock affairs notorious for large numbers of partying young men and women, often with their shirts off, more remarkable because it was purely a local affair of significant size and enthusiasm.

The first clip features Roth performing Nazareth’s “Woke Up This Morning.”

The second clip, below, has an engaging poor man’s D. A. Pennebaker feel. The cameraman shows you just what it was like on the Allentown green that joyful warm afternoon.

It’s a good way to be remembered in eternity. RIP, Doug Roth (1962-2013).


Another old review of Doug Roth and the Blissters, opening for Steppenwolf, in Allentown.

The revenging fists of Chinese, Iranian and NK cyberwar

Posted in Cyberterrorism, Shoeshine at 12:32 pm by George Smith

“In my opinion, it’s the greatest transfer of wealth in history,” said general Keith Alexander, he of the National Security Agency, on cyberattacks launched at our great country. — SITREP


See the greatest transfer of wealth in history? Blue is what Americans earn. Red is profits in non-financial corporate America.

Krugman:

I should give a shout-out to Larry Mishel’s note showing that the share of corporate-sector income going to profits has soared to levels not seen in more than 40 years …

There doesn’t seem to be much trickle-down going on.

03.29.13

Cyberwar shoeshine overdrive

Posted in Cyberterrorism, Shoeshine at 4:34 pm by George Smith

Fresh from the cyberattack that just about took down the Internet earlier in the week, Nicole Perlroth of the New York Times, along with David Sanger, who uncovered the administration’s deployment of the Stuxnet virus into Iranian networks, serve up still more fearmongering on Iranian and North Korean cyberwar capabilities.

From the Times:

The difficulty of deterring such [Iranian] attacks was also the focus of a White House meeting this month with Mr. Obama and business leaders, including the chief executives Jamie Dimon of JPMorgan Chase; Brian T. Moynihan of Bank of America; Rex W. Tillerson of Exxon Mobil; Randall L. Stephenson of AT&T and others.

Mr. Obama’s goal was to erode the business community’s intense opposition to federal legislation that would give the government oversight of how companies protect “critical infrastructure,” like banking systems and energy and cellphone networks. That opposition killed a bill last year, prompting Mr. Obama to sign an executive order promoting increased information-sharing with businesses.

“But I think we heard a new tone at this latest meeting,” an Obama aide said later. “Six months of unrelenting attacks have changed some views.”

Keep in mind that Obama administration and the US Cult of Cyberwar have been fingering Iran in attacks that make US banking websites run slow for months. (Secondarily, for a virus that crashed hard drives belonging to Saudi oil company, Aramco.)

The recent history, free of propaganda, is that the Obama administration, defense contractors and leaders of the cyberwar lobby in the intelligence agencies took out a vigorous public relations campaign to get cyber-information sharing legislation passed last year.

In that campaign they established the narrative that continuing attacks on the United States, by China, Iran and others, have — in one famous quote issued by the head of the National Security Agency — constituted the greatest loss of wealth in history.

That very public dose of fear-mongering failed in its aim — which was to get the information sharing cyber-legislation passed.

The Obama administration then spent some time preparing an executive order recommending information sharing on cyberthreats.

It has no force of law.

This has been followed by a rising second and identical spin effort to identify cyberattacks on the United States as a catastrophic threat, one capable of more harm to the nation than natural disasters, and more costly than 9/11, and possibly the subsequent wars.

All this has played out methodically over the last couple of months. And all of it has been touched on at DD blog.

It’s a continuing effort to get bad legislation passed, law that would immunize corporate America from any legal retaliation that might result from malfeasance revealed in information sharing. Secondarily, it is to beat the drum regularly for more spending in cyber-defense. None of this is of any social value. The US of A will not now or soon fall to cyber-attackers. It is a ludicrous scenario to entertain.

Citing from a day or so ago:

[The] US is in a lousy position to make arguments, or even recommendations, on proper conduct in cyberspace. This is because it is an untrustworthy international partner, one which will not be held to standards of conduct it publicly demands from others. (The majority in American power find this of no consequence under the rationale that as the preeminent and transcendent world power, the United States can always act any way it wants and that hypocrisy or an establishment of untrustworthiness does not apply.)

Ours is a country that routinely uses feeble actors in cyberspace — like Iran — as bogeymen in public statements on the dangers of cyberwar without including in the narrative the fact that we provoked them …

This means anything to 99 percent of Americans. Nor should it. Pasadena, or the town where you live, will not cease to function in your lifetime because of cyberwar.

Mega US bank websites that run slow because they’re being hit by denial-of-service attacks are of no consequence in the astronomically bigger picture of the American economy.

The US government and the national security megaplex, which includes large private computer security players and arms manufacturers with expanding, grasping wings devoted to the same business, relentlessly peddle the script that cyber-attacks on the US financial system could bring the country to its knees.

Americans have experienced the opposite. The average family now earns seven percent less than it did at the start of the Great Recession, an economic downturn brought on by this country’s financial system.

And today, pointed to be Krugman, an essay by economist Brad DeLong that the United States is now on its way to matching the monetary consequences of the Great Depression.

This is not because of cyberwar, near cyberwar, Chinese cyber-espionage, or Iranian attacks on banking websites and corporate America.

The President cannot get the minimum wage raised. He cannot do anything to reverse the austerity policies the Republican Party, from its minority position, has imposed on the country. He cannot or will not enact any measures as chief executive that might begin to make economic life in the country better for the majority of its citizens.

So what is he doing? Partially busying himself meeting with Wall Street’s master bankers and ginning up news on the daggers of cyberwar, attributed to China, Iran and North Korea, aimed at America’s heart.

It is maddening and pathetic.


One of the named sources for the Times’ piece is James Lewis of the Center for Strategic and International Studies, one of the major “think tanks,” the function of which is to furnish national enemies lists, affirmations that named enemies are up to no good, and what, in the way of war, ought to be done about them at once.

Lewis has always been a member of the Cult of Cyberwarand you can check the public record easily in DD blog’s inimitable archives.


The shoeshine of cyberwar — from the archives.


Good heavens! Can’t you see where Iran has attacked banking websites and threatened the very financial systems of our great country!?

The Duchy of Grand Fenwick attacks

Posted in Culture of Lickspittle, Cyberterrorism, Shoeshine at 1:26 pm by George Smith

The Duchy of Grand Fenwick, aka the Republic of CyberBunker, was said to have attacked SpamHaus and the Internet this week. And most people missed it except for the New York Times and Ars Technica.

I’ve repeated it countless times. Ten years ago the mainstream press just unilaterally quit doing its job on security matters. Serious journalism and critical thinking, as opposed to propagandizing and stenography, simply blew away and was never replaced.

It’s a theme I’ve carped on for years, going all the way back to anti-virus king John McAfee’s manipulations on the Michelangelo virus in 1992.

From the Guardian, on the great cyberwar everyone missed, which I only saw because of Frank at Pine View Farm:

This is the danger of the “dark age of journalism”, as it has been called. The training of the old Reuters reporter is replaced by one of political and corporate collusion. The separation between newsrooms and public relations agencies growing ever thinner as reporters rush to fill space at all costs, regardless of truth.

Even after she’d written the piece in the New York Times, tech reporter Nicole Perlroth tweeted how she was still getting targeted by corporate PRs to cover the “story”: “Hi Nicole, News is just breaking on the biggest cyber-attack in history. Are you planning on covering?”

The collapse of journalism combined with complex, fast-changing technology offers a wealth of opportunity for propagandists. In the soil of ignorance, fear can easily be sown. So it is with cyberwarfare.

The writer, Heather Brooke, probably didn’t have the space to get deep into the rise of web shoeshine news publishing, the fact that sensation, exaggeration and corporate tech fictions and trivialities are about all they exist for.

From the Daily Mail, on the Republic of CyberBunker in the Netherlands, my favorite grafs of the day, particularly with the photo of the guy and his purple flag:

In charge at CyberBunker is Sven Olaf Kamphuis, who styles himself the ‘Minister of Telecommunications and Foreign Affairs’ of the ‘Republic CyberBunker’ …

Within its 15ft reinforced concrete walls are 175,000 cubic feet of office space, airlocks, a 750KW diesel generator, fuel reserves and a 2,500-gallon freshwater tank.

Its inhabitants can allegedly survive for ten years without assistance from the outside world.

CyberBunker’s website claims: ‘Dutch authorities and the police have made several attempts to enter the bunker by force. None of these attempts were successful.’

03.28.13

Chronicles of Annoying Geeks

Posted in Culture of Lickspittle at 4:09 pm by George Smith

A must read from the London Review of Books:

The Google Bus means so many things. It means that the minions of the non-petroleum company most bent on world domination can live in San Francisco but work in Silicon Valley without going through a hair-raising commute by car – I overheard someone note recently that the buses shortened her daily commute to 3.5 hours from 4.5. It means that unlike gigantic employers in other times and places, the corporations of Silicon Valley aren’t much interested in improving public transport, and in fact the many corporations providing private transport are undermining the financial basis for the commuter train. It means that San Francisco, capital of the west from the Gold Rush to some point in the 20th century when Los Angeles overshadowed it, is now a bedroom community for the tech capital of the world at the other end of the peninsula.

There are advantages to being an edge, as California long was, but Silicon Valley has made us the centre. Five of the six most-visited websites in the world are here, in ranked order: Facebook, Google, YouTube (which Google owns), Yahoo! and Wikipedia …

Note, not a word on any of the digital wonders actually transforming life in the area, except by accumulation of wealth. Our tech overlords are not developing the next indoor plumbing or even the polio vaccine.

After 20 years on the net it is a culture I have come to viscerally dislike.

The article makes a good read after news of Yahoo paying 17 million to a teenager for the Summly app. His is a business that employs ten people, for a product that makes news available on smartphones.

Yahoo’s news arm is already terrible, as are those of many web portals.

Compacting crap so it shows nicely as an abstract in even less space on a smartphone screen does not advance anyone although 17 million may have been what the US “market” would pay for it.

Smartphones are not transformative and you can test this by going to where the underclass lives. In Pasadena, where they live, where I live, the effective storefront businesses are Target, cheap eateries and smartphone suppliers. The poor all have smartphones on budget plans. They cannot afford desktop computing or the additional broadband access and their only point of contact with the net on a big screen is institutionally, school or work. Their lives are not transformed by having Android-equipped mobile devices with unlimited music and data. Poverty is not ameliorated by any powers granted through mass possession of mobile phones that take pictures or the ability to socially network.

So what exactly is so great about the culture that pays 17-mil to the dweeb who made Summly? Or any other of the hundreds of valley firms covered daily by TechCrunch?

They make apps — ephemeral stuff — that fit the growing divide, conveniences for the very wealthy, minor diversions for those who have nothing, people who have given up land line telephony.


Proven by the dismal science, inequality in the US is not driven by a skills gap.

The alleged innate genius of Stanford dweebs and the tech valley’s trillion dollar value is not now changing our world for the better. They do not address the big problems of the time any more than a shale oil mining boom in the Dakotas does.

It’s easy to go on and on with big examples, not all in the Silicon Valley, but of the culture.

Malaria has not yielded to Bill Gates or Silicon Valley venture capitalists bankrolling synthetic biology firms.

Also Consider Elon Musk, who made his fortune with PayPal, now ubiquitous.

What if you have nothing or the US economy pays so poorly that your line of labor is either nonexistent or not viable without foodstamps and the earned income tax credit? Then of what use is PayPal? There is still a Western Union send-cash station at both supermarkets near me.

Now Musk is haled for new businesses, making an electric car of indeterminate quality for the very top slice of US auto-drivers. And SpaceX, a business that of course will rely on taxpayer-funded contracts for NASA resupply.

Is near space being exploited to the benefit for a majority of Americans? Well, it was.

The infrastructure for global telecommunications and navigation were paid for by the US taxpayer but Elon Musk and SpaceX add nothing to this, they just exploit it for the very top, relatively minor vestigial interests. The US military which has a very big and clandestine space program, also funded by the taxpayer, doesn’t give a fig about SpaceX. It doesn’t need it.

Jeff Bezos of Amazon may have used his vast wealth from digital Wal-martization and sweat-shopping to recover pieces of the Saturn V boosters but all that was paid for by the US middle class and made by Wernher von Braun and his colleagues decades ago.

What does Jeff Bezos bring to it? It’s obvious part of the idea is as a publicity stunt, a tech billionaire’s personal spectacle and vanity thing.

03.27.13

Told you so — the US as untrustworthy international partner

Posted in Cyberterrorism, Shoeshine at 2:09 pm by George Smith

Excerpted from yesterday, on the bind the US government — by its actions and statements — has put itself in with regard to cyberwar:

[The] US is in a lousy position to make arguments, or even recommendations, on proper conduct in cyberspace. This is because it is an untrustworthy international partner, one which will not be held to standards of conduct it publicly demands from others. (The majority in American power find this of no consequence under the rationale that as the preeminent and transcendent world power, the United States can always act any way it wants and that hypocrisy or an establishment of untrustworthiness does not apply.)

Ours is a country that routinely uses feeble actors in cyberspace — like Iran — as bogeymen in public statements on the dangers of cyberwar without including in the narrative the fact that we provoked them …

From an article in the Reg, on the “NATO manual on cyberwar,” one that argues that acts of force in cyberspace are [likely] illegal (primary author “Michael Schmitt, professor of international law at the US Naval War College in Rhode Island):”

Schmitt said the legal experts who drew up the manual agreed that Stuxnet was an act of force but were divided on whether the malware constituted an armed attack. And even if it was an armed attack it might still be justified as self defense in the form of striking back at the aggressor in the face of imminent attack, as a paragraph on page 58 of the manual explains:

“In light of the damage they caused to Iranian centrifuges, some members of the international group of experts were of the view that the attack had reached the armed attack threshold (unless justifiable on the basis of anticipatory self defence) [our emphasis].”

In other words, Stuxnet was not illegal because it was by the United States (and/for Israel), the preeminent world military and economic power, against Iran — because they’re bad, small, don’t like us and have a nuclear program.

Such legalisms in any manual thus rendered meaningless because the precedent is to claim the US is the special nation among all, always able to determine itself to be striking from a position of self-defense.

Taken to one logical conclusion, it renders all US participation in the establishment of international codes of conduct as easily abrogated as changing underwear, using the order and procedure established as the result of 9/11.

03.26.13

One official dissenter

Posted in Cyberterrorism, Shoeshine at 3:54 pm by George Smith

If there’s a Congressional hearing on cyberwar always view it as a scripted exercise, one in which the “experts” are carefully chosen to throw a scare into laymen.

Such was the case with House meetings on the matter last week.

An Albany Tribune piece on one meeting collects the fear-mongering:

Computer attacks on South Korea underscore the growing threat of cyber warfare that starts with the flip of a switch, computer security experts told federal lawmakers Wednesday.

North Korea is a “wild card” when it comes to computer attacks because the country has the desire to launch attacks and a growing capability, said Frank J. Cilluffo, co-director of the Cyber Center for National and Economic Security at George Washington University.

Although North Korea is certainly a suspect behind attacks that shut down some South Korean banks and TV stations, President Obama and South Korean officials have not officially indicated that North Korea, China or any other nation is responsible.

Hacking by China and Russia is “brazen, wholesale and significant,” and Iran poses a growing threat, Cilluffo said.

“Both our national security and our nation’s economic security are at risk,” Cilluffo told the Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies. “It’s literally as easy as flipping a switch to attack.”

Note the use of the “flip the switch” meme twice, the idea that the US can be turned off, or at least parts of it, like a light bulb, from afar.

Iran’s cyberwar capabilities keep Texas Republican Michael McCaul “up at night,” the story adds. Iran, claims the politician, is “testing us,” seeing just how far it can go before we respond.

It’s outright lying by omission, a feature common to cyberwar discussions.

Iran has been the target of a US cyber-sabotage and espionage operations aimed at its nuclear program, one in which malware specifically written for the purpose has been put into its networks.

As I’ve written previously, the US is in a lousy position to make arguments, or even recommendations, on proper conduct in cyberspace. This is because it is an untrustworthy international partner, one which will not be held to standards of conduct it publicly demands from others. (The majority in American power find this of no consequence under the rationale that as the preeminent and transcendent world power, the United States can always act any way it wants and that hypocrisy or an establishment of untrustworthiness does not apply.)

Ours is a country that routinely uses feeble actors in cyberspace — like Iran — as bogeymen in public statements on the dangers of cyberwar without including in the narrative the fact that we provoked them.

Summarizing, I put it this way (it’s necessary to repeat stuff as part of any public information service):

However, in cyberspace the US government, in developing and unleashing malware on its enemies in the Middle East, has made a world environment where vulnerabilities are commodities and capabilities, information not to be shared because of applications in cyber-weaponry …

Paradoxically, the US government has contributed to the creation of a global Internet security environment where information is not to be shared because there is value in [hoarding and secrecy]. Critical vulnerabilities have great worth in cyber-weapons development. This has created a gray market in which the vulnerabilities, information of zero social value, are sold at good profit.

As with [any] discussions [going forward on] cyberwar and the creation of cyber-weapons, the American government, by its actions, has cut the ground from under its feet on being in position to take the high [position], right from the start. . .

Congressional hearings call panels usually top-heavy with “experts” who are merely there to mine and spread fear.

Frank Cilluffo, for example, goes way back to the time when the propagandizing fell under the phrase “electronic Pearl Harbor.”

Here’s Cilluffo, from the old Crypt Newsletter’s timeline on the official propaganda on “electronic Pearl Harbor,” dating from the Nineties:

December 15, 1999: “Future War in Cyberspace” was the title of a special broadcast on the Voice of America US government radio station. Disclosure: Crypt News made an appearance in it.

“At least twice this year, [the Pentagon’s] Dr. John Hamre has said the United States was in the middle of a cyber war — and the pace of attacks on US Military computers has increased since then,” read the announcer

John Hamre said: “We are in a day to day, virtual cold war. In that sense that we have people trying to disrupt the Department of Defense’s computers on a daily basis. So far, we are staying ahead of the problem. But just barely.”

Frank Cilluffo, of the Center for Strategic and International Studies think tank said the danger of cyberterror “is real and constant.”

“The myth persists that the United States hasn’t been invaded since 1812. I’d like to inform you otherwise. And that is the fact that invasion through cyberspace is now a daily occurrence,” Cilluffo said for Voice of America.

” . . . George Smith is skeptical that offensive military operations will work very well in cyberspace.”

“For years, Mr. Smith has been writing a newsletter on computer break-ins . . . He says Pentagon officials are overstating the danger from computer hackers and intruders.”

“Nevertheless, [Smith] expects the United States and many other nations to try to create ‘cyber-attack’ forces: ‘I think it is likely that people will try, I think it is unlikely they will have any impact.'”

“Mr. Smith says armies in Bosnia and the Gulf War faced computer problems, including viruses. He says they coped with them in much the same way they coped with flat tires on vehicles, or worn out parts on aircraft.

“[Smith] said] the idea that small groups of people, armed only with keyboards, could seriously hurt a powerful military force belongs in Hollywood — not the battlefield.”

Take time to review the entire archive. It’s the only one like it on the Internet, the only record of US (and western) cant on the then emerging subjects of cyberterrorism and cyberwar. You’ll see how the arguments have remained fantastic, self-serving and delivered for maximum scare.

There was one dissident in a House hearing entitled Cyber Attacks: An Unprecedented Threat to U.S. National Security, convened by the House subcommittee Europe, Eurasia and Emerging Threats, Martin Libicki of the RAND Corporation.

Reporter Andrew Conte of the Albany newspaper mentions him not at all although, mysteriously, he is included in the photograph accompanying the piece cited above.

This is standard behavior in US press stories on alleged, emerging or immediate threats. Critics, even the mildest, are edited completely out of the discussion in favor of direst claims. This is the way it has been for the past decade. Occasionally someone who goes against the assembled received wisdom of calamity is brought in. But the overall trend has been to stamp out anything like that.

In the House hearing, Libicki essentially testified that government ought to be careful with the fear-mongering talk of cyberwar.

From RT:

Earlier this week Martin Libicki, a senior management scientist at the RAND Corporation, warned the House Homeland Security Committee to be wary of the line between realistic projections regarding cybersecurity and fear-mongering.

“The more emphasis on the pain from a cyberattack, the greater the temptation to others to induce such pain — either to put fear into this country or goad it into a reaction that rebounds to their benefit,” he said. “Conversely, fostering the impression that a great country can bear the pain of cyberattacks, keep calm and carry on reduces such temptation.”

Libicki argued, very briefly (he was the last to testify), for the House hearing on the “unprecedented threat” — that if a “cyber-9/11” were to occur, because it is a cyberattack the US doesn’t have to rush off and do something rash. The inference, here, being baldly obvious. It was a worthwhile issue to take up, he said.

In doing so he cited the cost of the actual 9/11 attacks, in excess of 250 billion dollars, and a further trillion in the Iraq war.

In a cyberattack is is possible to “take the time to think things through,” Libicki told the committee. “Even though a computer is taken out, another may be close at hand…”

We should not back ourselves into a corner where we always have to respond, he continued.

“In some cases the narrative must allow the attacker to back down gracefully.”

“What are the norms of conduct?” he asked.

Substantively, in creating a public impression that cyberattacks have the most extreme consequences, an expectation has been created in which the country may be compelled to respond out of proportion to the actual impact. (The House page is here. However, the reader will find that the links to the text copies of the testimony are, conveniently, 404s. The video record is more difficult sledding.)

The fear-mongers of cyberwar have now latched onto the stratagem of using monetary figures to describe the losses to Chinese espionage. Currently, their story is that such espionage has cost the United States more than the 9/11 attacks.

This left the committee in a quandary. California Republican member, Dana Rohrabacher, who took the opportunity to give a little speech [1] on the perfidy of Chinese “elites,” was discomfited by it at the end.

Rohrabacher seemed unable to completely endorse the idea that Chinese cyberwar against the United States was more damaging to the country than 9/11.

However, Greg Autry, Senior Economist for the Coalition for a Prosperous America, used the committee to launch a full frontal attack on China. (The organization has a footprint of virtually zero in the news media. And its organizational website “about” page sheds no particular light on who funds or is behind it.)

Excerpted (all errors in transcription, mine):

“[China sees] us as weak and foolish, to be controlled …

“[We] need to make sure the internet is not debased by hoodlums or nations who do not appreciate the rule of law. The Chinese government cannot think of enough things to do from the money they are earning
from the economic warfare they have been executing against the United States …

“[Their] cyberattacks against the United States are in the same financial class as the 9/11 attacks. They are costing clearly billions
and, I believe, hundreds of billions of dollars … This results in loss of life of Americans as well …

I believe that if the [Chinese military cyberwar building, PLA Unit 61398] was a segment of the Iranian Republican Guard located in Tehran, that building would be a smoldering pile of rubble before I could testify…”

Near the end of the hearing RAND’s Libicki had this to say about the financial figures.

Digested:

“I think we need a better understanding of the impact of Chinese economically-motivated espionage on the US economy. We hear a lot of numbers being thrown around. We don’t really know how they’re derived or how consistent they are with how economics works.

We are fairly confidant that terabytes of data go from the United States to China …”

“I would suggest it’s an important issue. If it’s a trillion dollar issue, we treat it one way. If it’s a billion dollar issue, we treat it another.”


Excerpts of Dana Rohrabacher’s brief speech, given to the Chinese people from the floor of the House subcommittee meeting on Cyber Attacks: An Unprecedented Threat to U.S. National Security:

“If the Chinese people are listening and to the Chinese intelligence personnel:

“What differs from what governments did in the past [with espionage]
and what is being done now … is that they are using the intelligence apparatus to enrich themselves … They are using the cyber-intelligence to enrich themselves, they have a personal motivation …

“The people of China are being cheated in that the apparatus has been set up to protect them is being used to enrich the elite and at the
same time put China into a hostile relationship with the United States … On top of that, the elite in China are using this, not to protect China,
not to make it more prosperous, but to repress their own people …

“The elite in China, their vanity and desire for more wealth and power has led China down a wrong path. I would urge those people in China …
the people of good will, to push the elite who are putting us on a path of conflict, out.”

Good boy

Posted in Culture of Lickspittle at 12:41 pm by George Smith

Old tune, in honor of the mainstream media and its celebrities.

More appropriate. Nothing changes, entropy only increases.

Worst president ever

Posted in Culture of Lickspittle at 10:29 am by George Smith

Tough competition, too.

Consolation prize: No more Jeb Bush.

03.25.13

Our Tumbledown world

Posted in Culture of Lickspittle at 3:33 pm by George Smith

Tom Tomorrow making the now obvious point that being wrong about everything means nothing. In fact, is good for the career if you’re in the top bracket.

Bigger.


Another rundown: Irrationality and fraud were career builders and not one suffered for it.

And, once again, my pieces condensed at GlobalSecurity.Org.

« Previous entries Next Page » Next Page »