When the persecuted become the persecutors

Social Organization and Change Racism and Ethnic Prejudice As I would not be a slave, so I would not be a master. Lincoln What defines our race? Are you biased? Take the test: Project Implicit?  in general: when the persecuted become the persecutors: Forever Pure >  World Since 1920 | documentary: I Am Not Your Negro Baldwin | ku klux klan: The Clansman Dixon | south africa: Born a Crime Noah | solidarity: Blacks and Palestinians | escape to free states: Underground Railroad | movements: Black Lives Matter | anti-Islamization: Pegida | dialogue: The Welcome Table | hate crimes: Not in Our Town | uprising: The Birth of a Nation, Original Silent Version | the will to be free: The Underground Railroad Whitehead | slave trade: Homegoing Gyasi | belonging & identity: Invisible Man Ellison | white america: Coming Apart Murray | british abolitionist: Amazing Grace Metaxas | memoir: The Violent Education of a Christian Racist Parrish | A Class Divided | anti-slavery: Uncle Tom's Cabin Stowe | Australia: Rabbit-Proof Fence | Autobiography of a Recovering Skinhead Meeink | bias: Blindspot Banaji | Black Planet Shields | The Aryans Asumang | To Kill a Mockingbird Lee

when the persecuted become the persecutors

[ t h i n k ]

Protect yourself.

War Cyberspace, Cybersecurity, Cyber Warfare Protect yourself. Protect yourself.  McAfee 2017 Total Protection - 5 Devices [Online Code] $24.99$79.99  (245)  Webroot Internet Security Complete + Antivirus 2017 |… $36.00  (1060)  Norton Security Deluxe 5 Device PC/Mac $39.99$79.99  (2900)  SOFTWARE to block RANSOMWARE -- VEEDogTM… $29.95$69.95  (11) All Search Amazon  Go Ads by Amazon   How do we stop Russia’s and China’s cyber-meddling in our affairs?  Should this be considered an act of war? > Big Questions Do you have nothing to hide?  Are you sure? Should the NSA be broken up? big ideas  Are we moving towards a surveillance state? in general: anti-surveillance: Electronic Frontier Foundation | russian cyber espionage: Fancy Bear | you’ve been hacked: Peace | ransomware: KeRanger | conferences & training: blackhat | critical infrastructure: carmaggedon | cyber armies | education & awareness: esetfoundation, Natonal Cyber Security Hall of Fame | news & analysis: Schneier on Security | Amnesia Carey | Cybersecurity and Cyberwar Singer | Cyber War Clarke | Intelligence Gathering and the Unowned Internet Berkman | The Director Ignatius

Inside Hillary Clinton’s Doomed Campaign

Human Society Politics & Government Why does socialism look good in the beginning but eventually collapses? > Sustainability Our Two-Party System is a Poisoned Institution: The two-party system has devolved into a poisoned institution.  The campaigns backed by enormous capital have become killing machines that are not past doing anything to scuttle a candidate and the other party's ship.  They mirror the overall problems we have with BIG bureaucracy in general with too much unchecked wealth and power, and when and where that happens, waste, cronyism, corruption, and fraud fester and grow below the surface. sp subsidiarity: Nothing should be done by a larger and more complex organization which can be done as well by a smaller and simpler organization. big idea The conflict between justice and tyranny occurs in every political order because it occurs in every human soul. Marini Power concedes nothing without a demand. Douglass in general: Hillary Clinton: Shattered Allen > Trump | gerrymandering (REDMAP) Trump: Ratf**ked Daley | fascism: On Tyranny Snyder, Fourteen Defining Characteristics Of Fascism Britt | strategy: The Art Of War Sun Tzu | entrepreneurs vs. bureaucrats: Bureaucracy von Mises | lobbying: Miss Sloane | power and knowledge: Michel Foucault | conservatism: Imprimis | watchdogs: Judicial Watch | socialism: The History and Danger of Administrative Law Hamburger | compromise: Three Kinds of Compromise Cobb | Death of the Liberal Class Hedges | The Communist Manifesto Marx | The Political Economy of Grand Strategy Narizny | The Problem of Big DeMint | The Road to Serfdom Hayek | United States: occupations | minimum government, maximum freedom: Libertarian Party | cold war: A Most Wanted Man le Carre | trust: Politicians are Consummate Performers sp | impeachment: A Just Cause | libertarian: The Libertarian Mind Boaz | cold war: Bridge of Spies, The Billion Dollar Spy Hoffman | pro-government: Leviathan Hobbes | The Prince Machiavelli | Zero Dark Thirty

Should Flag Burners Burn?

Human Rights Constitution of the United States (1787) Is refusing to stand for the National Anthem an appropriate protest? Judicial Mandates •     Words and meaning of the law should be understood as they were understood by the people when the law was enacted. •     Activist judges should not invent new law, but they should respect the constitutional prerogative of the people to pass laws through their representative legislatures. Preamble Articles I - VII Amendments I – XXVII Amendment I: freedom of religion, speech, press, assembly, petition in general: justices: The Next Supreme Court Justice > Law | about | Center for Constitutional Studies & Citizenship | Amendments: Amendments 1-10 Bill of Rights | Amendments 11-27 books/films: freedom of the press: Rosewater Stewart | interpretation: America's Unwritten Constitution Amar

by scott pickard

Should burning the flag be a protected form of free speech? Consider this:

  • Was the flag burner trespassing?
  • Did the flag burner hurt anyone?
  • Did the flag burner catch anything else on fire?
  • Did the flag burner burn a public flag that they did not own?
  • Was it an act of treason, in and of itself?

If the answer is “no” for all five questions, then the flag burner is not a criminal. They were just someone that took their own flag onto public property where they are entitled to go, and they burned it (unfortunately they don’t have a flag anymore) but didn’t hurt anybody or anything in the process. If we’re going to send a person to jail for this, then we will have to reevaluate thousands of actions that people perform every day that should be equivalently considered obnoxious, disturbing, anti-patriotic, or criminal.  There will be social accountability enough from family, friends, neighbors, and colleagues that the flag burner will have to face, and possibly realize that “I will never do that again!”

Come on, we’ve got to get a grip on ourselves, take a step back and get some perspective, and not be so mentally and spiritually brittle! This is America. We are tough, flexible, resilient, and open-minded, so we can absorb the actions of a flag burner. We can’t rule-make a person into being civil and/or patriotic – it’s either in their heart, or it’s not.

What do you think?

sp

Crime


Ponemon Research Institute

Development of Technology Trustworthiness How do you measure/validate trust in the cybersecurity of the enterprise? > Cybersecurity How can big-city police (e.g. Baltimore) and neighborhoods-at-risk rebuild trust in each other? How do you know if someone is trying to win, or lose? Parameters of trust Trust is built over a marriage, a career, a lifetime, but can be lost in a second. sp Confidence Reliability Integrity: trustworthiness over time Privacy Resiliency: Antifragile: Things That Gain from Disorder Taleb Skepticism and Conspiracy Theory Terms of Service: monitoring: docracy | ratings: crowd ratings Truth (correctness) photos: A bullet can kill a man, but a lying camera can kill a nation. lying: There is no defense against lying. sp | white lies vs black lies Technologies of trust big data: cyber-physical systems: terraechos certifications: kikscore drug testing federations: InCommon passwords: keepersecurity products & services relationship mining: intersecting people sp | Relationship Science scoring trust: TrustCloud Fields of Application human-machine relationships marketing: celebrity DBI DBI= 0.6*(Awareness) + 0.4*((Appeal+ Breakthrough+Trend-Setter +Influence + Trust + Endorsement + Aspiration)/7) Societal Risk Management (SRM): graduate program Software: Top 25 Most Dangerous Software Errors in general: advertising: evidon, doubleverify | medical devices: Open Medical Device Research Library omdrl.org | electronic voting: Do electronic voting machines improve the voting process? | Failed States Index: fundforpeace | financial institutions: credit cards, financialtrustindex | internet |sports: Lance Armstrong, research | wellness: Dr. Oz, Food Babe untrustworthy: corporations: Volkswagen | government: NSA | nonprofits: FIFA, Red Cross | politicians: Chris Christie, Hillary Clinton articles, books: ubiquitous: Trust is the glue that holds us together sp | Dare: Accepting the Challenge of Trusting Leadership Weiss | Extreme Trust: Honesty as a Competitive Advantage Peppers | Just How Fragile Are America’s Bridges? Sofge | Likeonomics Bhargava | The Fix: Soccer and Organized Crime Hill Crime

How do you validate trust in the cybersecurity of the enterprise?



Break the Chain

by scott pickard

Political Concepts Human Rights If we rationalize torture in the name of war and saving American lives, then we become the barbarians and in so doing, we write a blank check to our enemies to reflect the same barbaric behavior. Like child abuse which propagates from generation to generation, this vicious cycle of abuse and violence will only stop when someone has the courage and leadership to break the chain, and that should be us. sp Historical development 1215 Magna Carter 1787 Constitution Definition of human rights Freedom Liberty: The Miracle of Freedom Cruz United Nations: Universal Declaration of Human Rights International human rights dictatorships: Kim Jong-un North Korea globalization: impact on children migrant workers: Cesar Chavez torture: about | CIA: Senate Report 2014 > War in general: www.amnesty.org | darfur: http://eyesondarfur.org/ | gay, lesbian, bisexual, transgender: www.hrc.org | Geneva Conventions | Human Rights Watch: hrw | oral histories: Voice of Witness | UN Global Compact films: Harvest of Shame Murrow

If we rationalize torture in the name of war and saving American lives, then we become the barbarians and in so doing, we write a blank check to our enemies to reflect the same barbaric behavior. Like child abuse which propagates from generation to generation, this vicious cycle of abuse and violence will only stop when someone has the courage and leadership to break the chain of torture, and that should be us.

- sp -