At the Wired News
defense blog Danger Room, a mea culpa of sorts by Spencer Ackerman
, who realizes in hindsight that he helped perpetuate a myth of sorts about the recently-disgraced retired general and outgoing CIA chief.
Like many in the press, nearly every national politician, and lots of members of Petraeus’ brain trust over the years, I played a role in the creation of the legend around David Petraeus. Yes, Paula Broadwell wrote the ultimate Petraeus hagiography, the now-unfortunately titled All In. But she was hardly alone. (Except maybe for the sleeping-with-Petraeus part.) The biggest irony surrounding Petraeus’ unexpected downfall is that he became a casualty of the very publicity machine he cultivated to portray him as superhuman. I have some insight into how that machine worked.
Read the rest
The Washington Post reports that the U.S. Army is recommending retired general David H. Petraeus not face further punishment for screwing his biographer and leaking top-secret materials to her.
The Petraeus/Broadwell email dragnet, which hasn’t yielded evidence of any crime, has brought our attention to the FBI’s sweeping powers to surveil email. But as ProPublica’s Peter Maas writes, “It’s not just email.” In July, Rep. Edward Markey, a Democrat from Massachusetts, cajoled major cellphone carriers into disclosing the number of requests for data that […]
The FBI’s dumpster-dive into Paula Broadwell’s email archive has not yet revealed evidence of any crime, but it has revealed to America the extent to which our government is capable of collecting and surveilling our electronic communications. Greg Miller and Ellen Nakashima in the Washington Post : Many details surrounding the case remain unclear. The […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]