He teaches courses in constitutional law and creative writing ...
Here.
All hope abandon hope ye who enter here!
Irregular meanderings on security and law, with occasional swearing (and politics - with regular swearing).
Mr Sheridan told Miss Kane:
- "You made that up"
- "You have lied throughout your testimony."
But Ms Kane told him: "I never lied then and I'm not lying now."
Ms Curran to Mr Sheridan - "Liar, liar pants on fire? Is that your defence in the whole of this?"
Vanessa Feltz told me that when listeners send e-mails to vanessa@bbc.co.uk her team has to print them out for her to read. So maybe they can now print out this blog post for her.
Starlight from the most distant galaxy can reach earth on the fourth day of the Creation Week when the correct relativistic synchrony convention is employed.
We, the Senate and Faculty of Robert Gordon's Hospital (1) (but definitely not Mrs Forbes, Prof Kennedy or Councillor Ford), do, in the hope that you will shower us with millions of your beneficent and most deserved spondulicks (2), endow you with the degree of Doctor of Planning Laws (And How to Get Around Them) and, not being one of those heathen southern universities, will not disturb thy exalted wigginess by bopping you on the bonce with a pair of Knox's shabby chinos.
1. Well, yes, but we are a university now.
2. Or, if you can't quite manage that, a corporate membership at the Club would be quite nice.
Like Steve Vladeck and unlike some of the human rights groups, in other words, David acknowledges that there is a legitimate role for non-criminal detention in the current conflict.I would suggest that the missing phrase should be along the lines of "subject to the controls and limitations contained in the 3rd Geneva Convention of 1949 on the Treatment of Prisoners of War". Something notably missing at Gitmo.
Civilian Infrastructure Attacks
Declaration: "A direct attack on a civilian infrastructure that caused damage, even loss of life of civilians, would, I think, be a war crime." - Professor Daniel Ryan, National Defense University
Response: Didn't the United States blow up electrical plants, television and radio stations, bridges, roads, runways, and water treatment plants during the two Iraq Wars? Were those war crimes, too? Professor Ryan? We have to use a consistent definition. If its not a war crime to attack civilian infrastructure kinetically, why is it a war crime to do so electronically
Ninety-Five Percent?
Declaration: "Computers don't always have signs over them that say, 'I'm a military target' [or] 'I'm a civilian target,' " says Harvard's Goldsmith. "Also, the two things are intermixed. Ninety to 95 percent of U.S. military and intelligence communications travel over private networks."
Response: The Department of Defense has more than 7 million computers. I don't know how Army works, but I know the Navy Marine Corps Internet was at one time the largest private Intranet on the entire planet. The US Army has maintained a stand-alone Intranet since at least 2001, and has repeatedly had headlines about it being the largest stand-alone network in the world. Soldiers don't call down an airstrike and then update their Facebook pages and do a little online banking as the implication seems to infer.
Balls: 62%
Millielder: 58%
Milliyounger: 46%
Token Commie: 38%
The Transport Control Pixies and the Internet Pixies system the Internet currently uses can be abused, as the recent DoS attacks illustrate, especially with the fat pipes to which many people now have access.
These pipes allow many malicious Pixies to be sent to a target, completely overwhelming the targets ability to process them.
The large numbers of Pixies that can traverse these fat pipes is the main problem as I see it. A good short-term solution would be the replacement of the fat pipes with bundles of thin pipes. At the targets end, each thin pipe would have a small tap - when a DoS attack is detected, simply open the taps in turn to allow the unwanted Pixies to drain out into a bucket. Alternatively, a manned barrier could be set up at the end of each thin pipe, and any swarthy looking, suspiciously odious, black hatted, or otherwise dubious Pixies can be turned away. This doesn't aid tracing the source, but will allow the force of the attack to be diminished such that the target can remain relatively unscathed.
Tracing an attack to the immediate source can easily be accomplished by having a little valve in the thin pipe that when turned will shut off the Pixie flow. Subsequent Pixes entering the pipe will cause it to bulge gradually as the backlog builds up. By repeating this procedure back from each machine the source will eventually be found. To save having to walk all that way, the valves could have long pieces of string attached to them so they can be turned on and off remotely.
Finding the perpetrator of the DoS is more problematic. These days, the normal breadcrumb back trail can be easily garbled by the less than savoury element on the internet. The new Internet Pixie v6 implements the Taut String from End to End system to tie the source to destination - any severing of the string to re-route it can be instantly detected by loss of tension. However, this does us no good currently.
It only takes a single Pixie to start a DoS attack, and finding it may not always be possible. An amateur will often leave the initial Pixie unharmed. If a suspicious one is found, sieze it immediately (ensure to keep its hands away from any magic pouches/flowers/musical instruments that it may have on its person). A poorly cast Mind Erasure spell can easily be undone by any one of a number of Re_Mind perl scripts. A properly cast Mind Erasure can be tricky to undo and will require a special Module be used - if you're not at ease with compiling programs, pop the Pixie in a Jiffy Bag and post it to hemos@slashdot.org (you may need to flatten the packet a little to get it into the floppy disk orifice) - hemos will de-spell it and send the results back by return).
A professional won't allow such evidence to remain - a common method is the Pixie On A Bungee technique. The perpetrator fires said Pixie into the attack machine with a long rubber band attached. With skill, the Pixie shoots in, pushes the Start lever and gets yanked back out at very high speed. A telltale clue of this is often fingernail scratches - sometimes a misjudgement as to bungee length can leave fingers embedded in the lever handle. Unfortunately, unless the Pixie drops his ID card, the chances of tracking back further are very small, and really best left to the authorities.
Look at the world of Noah. In his day there were 12 to 16 billion people on Earth, and only eight got out of that flood alive. The world is going to be devoured by fire.
Is there anything you want to say to her?
No. Except that she should repent.
But her husband wasn't a homosexual.
So then why are they upset? If he wasn't a sinner, he doesn't need to worry. If he was, then it's too late for him. There's time for her though.
Celestial Paws specialise in astrology for pets. Pets are loyal, loving and a part of the family. Like us, they too have their own individual characteristics. Celestial paws can offer you a personality profile for your pet.
COCKTHROPPLED: Having an unusually large Adam's apple.
(c) 'Surreptitious Evil' 2006 - 2017.