Writing is not a thing of the past, with several technological advancements happening in this arena too. The latest development corresponds to Lernstift, a company destined to create smart-products for a better living and they have just rolled out a pen of the same name as them.
For a long time the Linux gaming scene was stagnating, relegated to a limited number of open source games and a few popular but very old closed source games such as Doom 3, Quake 4, Unreal Tournament 2004 and whatever game you could force to run using WINE, an open source software for running Windows applications on Linux. Let’s face it, most gamers who have attempted to run games on Linux in the past probably spent more time wrestling with installers and searching for the right drivers than actually playing the game on their specific Linux configuration.
Should companies that produce mostly proprietary software invest in Linux development? In one sense, that seems as illogical as the artisanal-organic bread guy from the local farmers’ market buying shares in Wonder Bread. But in a move that reveals the growing influence of open source beyond its traditional space, Perforce has joined the Linux Foundation and is very committed to supporting and protecting open-source code. Here’s what Don Marti, technical marketing manager, had to say.
"The computer came back two days later. The computer started up in less than a minute in Ubuntu where it used to take up to five minutes in Windows Vista. It had all the software we needed - word processor, spreadsheet and more and it is all legal without licence payments," said Mr Mullen.
My wife needs a new PC. Her old machine is quite competent, if dated -- a 1 GHz Athlon 64, with 1 GB of RAM. Running Debian Linux with LXDE it is quite fast, and indeed she has no problem with OpenOffice or Thunderbird or any application save one: web browsing with Firefox. And I don't think it's Firefox's fault. The problem is, for her work she needs to visit a lot of websites, and as I've commented before, too many websites are now larded up with the crappiest Javascript code you can imagine. Sure, she has NoScript installed, but she needs to enable Javascript to view these sites, and they're sites she can't avoid. (Like CNN.com, and several other news sites.)
So about a month ago we decided she needs a computer fast enough to run CNN's pig-awful Javascript. I missed a great post-Christmas deal at Staples, but I found the same deal at Newegg.ca: a refurbished HP DC5850 desktop for $209. It has a dual-core 2.3 GHz Athlon 64, and 4 GB of RAM -- I always like to upgrade by a factor of 4 when I can -- and a monster 750 GB hard drive. It's capable of running Windows 7, so it should fly under Linux.
I don’t know about your environment, but in mine, keeping up to date with available patches is hard. It is tempting to just ignore the patches and keep the server up for as long as possible, but doing so might leave your system open to attacks, or cumulative bugs in the running daemons. On the other hand, patching means an interruption in service, and introducing a change into the environment, which further means that the patches need to be tested before production. But, test for too long, and by the time the patches are applied to production, they might be an entirely new batch of patches.
Kernel developer Greg Kroah-Hartman has reported on his plans to extend the Linux kernel to include a system for inter-process communication (IPC) that will be reliable, quick and secure and will allow for both direct point-to-point and multicast communications. According to Kroah-Hartman's blog post, the goals include providing a "libdbus" interface, which will allow existing D-Bus applications to work with the kernel implementation without modification.
Email still is, and will remain for a while, THE standard for many forms of non-real-time, online communications. Even if it has big issues like spam and no built-in security, we are all sure we can exchange email with anybody with any computer, tablet, or smartphone, worldwide.
One obvious downside of its ubiquity is that (even ignoring spam) email floods our Inboxes. Search “email overload” online, and you’ll find plenty of complaints about people “spending a quarter of their day on email-related tasks”, or because the average response time to email would have grown 13% in 2012.
Aaron Seigo tried to break into the tablet space with the KDE powered 'Sparks' tablet, which due to trademark issues was re-christened as Vivaldi. When he announced the tablet, there as a huge demand for the devices but the devices never saw the light of the day due to problems with supply chain.
The OEM changed some hardware which made it impossible for the OS to run on those device. There was a long silence and Seigo has started talking about it. He gave me hints about some big announcement around Vivaldi when I asked him about meeting at FOSDEM and he said that he was canceling the FOSDEM trip due to Vivaldi.
It's been a silly busy week for me, and I'll be working into the night to get reasonably through my "must be done by today" list .. but I finally got to this one: blog about tomorrows Luminosity of Free Software Google Hangout. This will be the third one and hopefully the best yet.
A few months ago GNOME announced that they would be dropping the fallback mode, but met with a bit of resistance. To appease the peasants, developers said they would start supporting extensions that mimicked classic GNOME 2 features. Well, Matthias Clasen announced the early results of their efforts.
As you probably know, the fallback mode will be dropped with GNOME 3.8 and instead, users will be able to use a set of GNOME Shell extensions that provide a GNOME2-like layout. Recently, these changes have landed in the GNOME Testing PPA for Ubuntu 12.10 and 13.04.
The latest release of Chakra Linux brings the recently released KDE 4.10 to the users of the Arch Linux based distribution. Chakra Linux 2013.02, code-named "Benz", also includes updates to the distribution's own tools such as its installation assistant and its theme. Chakra was originally aimed at providing a live CD that allowed for easy uptake by new users but still maintained the powerful roots and extensive package selection of Arch. The distribution can be installed and provides a modern Linux desktop; although it is still based on Arch Linux, it now uses its own repositories.
Snowlinux 4 Cinnamon & E17 non-PAE are based upon Debian GNU/Linux 7.0 "Wheezy". There are two ISO images available, one with Cinnamon, the other with E17 non-PAE. While the Cinnamon edition is using Linux 3.5, the E17 edition is using Linux 3.2 non-PAE to support older PCs, too. The Cinnamon edition is using Cinnamon 1.6.7 and the E17 edition is using E17.1. There were introduced much new features like snowMount, the Snowlinux mount tool for drives. We changed the default color of our Snowlinux-Metal-Theme from green to blue and updated our Icon set.
Traditionally, original versions of ROSA Desktop operating system are provided with KDE desktop environment which includes a lot of design modifications and functionality enhancements. A nice-looking ROSA theme and a set of brand-name applications highly integrated with KDE (TimeFrame, StackFolder, RocketBar, KLook, KDM) have already become recognizable ROSA features and made ROSA familiar to Linux users.
If you are running a rolling-release distribution, this short article will likely be of no use to you, but if you are running an installation of Mageia 2, you’ll learn that is brings good tidings, when it comes to upgrading an existing installation of Mageia.
In today’s post in my prep for my yearly weekend at the Southern California Linux Expo (SCALE) I’m going to cover the subject of Arch Linux.
I’m going to have to admit to a little bias on this one. I’ve never really cared for Arch Linux. I gave it a try when I used to listen to a popular Linux podcast I liked called the Linux Link Tech Show. They loved this Linux distribution and I felt exactly the opposite. I discussed in an earlier blog post what a package manager is. Well, this one uses one called pacman. I can not show how much I don’t like this package manager. I had to struggle with a media system I had hooked to my computer that I absolutely loved. Mythtv (well actually a MythTV variant call Linhes). Don’t get me wrong. I really liked that system a lot HOWEVER, whenever I tried to go deep into the guts and update stuff it would either make it crash or break. I hated that. I had to backup often. I ended up just not trying to add features to it because I was scared to touch it. I’m not one to be scared of touching any technology.
Chrome, the browser in question here, is based on the open source project Chromium. Chromium developers seems to prefer the new C++11 for the obvious security reasons and ease of maintenance but it also means adopting a new toolchain and upgrading to GCC 4.6. This makes it hard to support those operating systems that ship with older C++ standard libraries. RHEL 6, among many others, is one such operating system.
That's the reason why such operating systems won't be supported by the newer versions of Chrome. Chrome will continue to work on such distributions but it won't get any updates for the above mentioned reasons. So, the notification WildeBoer saw was Google telling such users that their OS won't be supported unless they are upgraded to newer toolchains and GCC.
I think Google and Red Hat can work together to solve this issue.
Red Hat and its top officials have recently come out with some technology predictions that are worth taking note of. To begin with, the company has released its Top 10 IT Predictions for 2013, including some big possible shifts in cloud computing norms and data storage practices. And, CEO Jim Whitehurst is quoted in a widely read story predicting that Big Data won't just transform how we yield meaningful results from data but will also shake up the way that upper management structures at many companies work.
Google generated quite a lot of heat recently when its Chrome started showing "Google Chrome is no longer updating because your operating system is obsolete." message on those GNU/Linux based systems which were using older C++ standard libraries. We covered the story in detail here.
Speaking for myself, I believe it's a serious possibility.
The developers from Ubuntu have been busy lately building an all new Ubuntu Phone OS that aims to take Android and other smartphones to a new level. Their entire UI is completely different full of gesture-based on screen actions. We’ve covered it plenty in the past and even got some hands-on time with their new OS. For those that don’t want to wait, read on for more details on this new 3rd party app mimicking the OS.
Raspberry Pi users have another reason to rejoice; the popular game Minecraft is now available for Raspberry Pi. Good news is this game is available for free to download.
It may not come as a surprise to anyone who regularly reads my column that I tried to be first in line to order the Raspberry Pi. I mean, what's not to like in a $35, 700MHz, 256MB of RAM computer with HDMI out that runs Linux? In the end, I didn't make the first batch of 10,000, but I wasn't too far behind either. So, now that I've had a Raspberry Pi for a week, I've already found a number of interesting uses for it. You can expect more Raspberry Pi columns from me in the future (possibly including an update to my beer fridge article), but to start, in this article, I talk about a combination of two of my favorite pocket-size Linux computers: the Raspberry Pi and my Nokia N900.
At first you may wonder why combine the two computers. After all, both are around the same size and have similar initial hardware specs. Each computer has its own strengths, such as cellular networking and a touchscreen on the N900 and an Ethernet port and HDMI video output on the Raspberry Pi. In this article, I explain how to connect the N900 to the Raspberry Pi in a private USB network, share the N900's cellular connection, and even use the N900 as a pocket-size display. In all of the examples, I use the default Debian Squeeze Raspberry Pi image linked off the main http://www.raspberrypi.org page.
Before our sun collapses and goes supernova, Minecraft developer Mojang will probably release its brick-building games on all available platforms — and then some that aren’t available, like toasters and cats.
The main Raspberry Pi rival that was announced last year is now available! It's called Odroid U2, and it's powered by a 1.7GHz Exynos4412 Prime quad-core CPU and an also quad-core Mali-400 GPU that clocks at 440MHz! And the price for this baby is $89, worldwide shipping being available (so about $110 with the shipping).
LG is staying true to its rich design heritage at this year’s Mobile World Congress (MWC) with the introduction of the Optimus L SeriesII. The widely successful L Series has evolved to include contemporary design aesthetics and innovations that improve on the original. With more than 10 million Optimus L Series phones sold in the first 10 months, L SeriesII looks to continue this momentum with its sophisticated style and differentiated features.
Android captured a reported 70 percent of the global smartphone share in the last quarter of 2012, solidifying its position as a popular and solid Apple iOS alternative.
Though Apple and its iOS devices get most of the press, Android and its partners have turned their alternative ecosystem into a serious competitor. Android devices span almost every form factor and tablet/smartphone market, from branded devices such as the Kindle Fire and Barnes & Noble Nook to the open, tinker-friendly tablets such as the Nexus 7 and 10.
Owners of Nexus-branded Android devices can expect a system update to hit their tablet or smartphone in the near future. Owners of the Nexus 10 and Nexus 7 tablets, as well as the GSM variant of the Galaxy Nexus are already reporting that Android 4.2.2 is being made available as an over-the-air update.
Google has not officially released any details about Android 4.2.2, but screenshots from users show the update to include performance enhancements and bug fixes befitting of its x.x.1 version jump.
Setting up Amazon's consumption device as a productive Android tablet isn't for the faint of heart.
The kernel of the two stories is: "Software is not a manufacturing industry" and therefore, "software is not a product." As Eric Raymond rightly pointed out a long time ago in his book, The Cathedral and the Bazaar: "Software is a service industry" and to be more precise, software itself is only a platform for delivering services. Just like highways, waterways, the power grid, the phone network, and the piping of the water supply.
Once we understand that what matters in the software industry is simply to have robust software that supports the delivery of the services that flow through it, then it becomes clear that the economics of software cannot possibly be based on one-time payments for licenses, nor "selling software by the unit."
Software is built and maintained through a very labor intensive process. Therefore, to properly account for its cost, we must use an approach based on the hourly cost of professional services that developers dedicate to building and maintaining such service.
This is nothing new. Charging an hourly rate for professional services is how lawyers, doctors, accountants, mechanics, pilots, and nurses have operated in the economic system for many decades (and some for centuries).
The majority of robotic latex tentacle users have, up until this point, had to make do with locked in proprietary software code to power their mechanical rubber appendages.
Users have had no other option than to opt for a pre-boxed heavily corporate-registered code base.
Many who want to be able to operate a potentially mentally disturbing rubber arm on either their workplace desk... or, alternatively, as some part of a decorative piece and talking point inside a home dwelling have had to go proprietary when it comes to management code.
Today, we announced that Opera has reached 300 million active users. At the same time, we made the official announcement that Opera will move from Presto to WebKit as the engine at the core of the browser.
With this, Opera will be the first major browser to switch to a completely new rendering engine.
Today, Opera has announced that its browser has reached 300 million active users, but perhaps the biggest news is that the browser will be dropping the longstanding Presto rendering engine and moving to WebKit.This means that the number of browsing rendering engines to take seriously moves down to only three players, and WebKit--already legendary in the open source world--gets even more momentum and community involvement.
For several weeks now, Mozilla has been aggressively sponsoring events--including a series of hack days--to woo app developers to its emerging Firefox OS for mobile devices. Called “Firefox OS App Days,” hack day events took place in more than 25 locations around the world, starting on 19 January in Mountain View, California and ending on 2 February in Berlin, Germany.
Brandon Burton of Mozilla will be speaking on Simple Patterns for Scaling Websites: Some lessons learned at Mozilla with Chris Turra on Friday, Feb. 22, at 4:30 p.m. in the La Jolla room. Here is a Q-and-A from a member of the SCALE Publicity Team:
I have yet to meet a sysadmin who is happy about the proliferation of the marketing term known as “The Cloud”. Perhaps it is because we are too close to the metal, because we see how the sausage is made. Maybe it is because we share a common dislike for non-descriptive marketing terminology. Whatever the cause, and if we are happy about it or not, the cloud is here, and it is important to understand its implications.
Apache OpenOffice is a project within the Apache Software Foundation, a non-profit organization. We don't charge for Apache OpenOffice; we make it available to all for free. We don't pay developers; we rely on volunteers.
People need office productivity software. Among our users are students, teachers, doctors, lawyers, ministers, public servants, and business people from all industries. Perhaps 20 years ago it was only businesses that needed this kind of software. In 1992 the price of a spreadsheet application alone, not even a complete suite, was $595. Only business could afford it at that price. But today almost everyone with a computer needs a word processor, a spreadsheet and/or a presentation editor. Office productivity applications are used in the home, at school and in the office.
This guest article was authored by Prosper Chikomo, an internet entrepreneur and author of Turning Iron into Gold: Golden Opportunities: How to Spot Them, Create Them, Make Money from Them, and How Not to Miss Them (Available on Amazon.com)
On February 14th Free Software Foundation Europe asks all Free Software users to show their appreciation for Free Software.
Several unsuccessful attempts at rebooting just make you want to give your computer the boot? ZE Rescue Disk can save the day. It not only bypasses the fault preventing a successful boot, but it resets GRUB menus so computers don't need the equivalent of hospital defibrillation kits to bring them back to life.
NASA’s shift to open-source content management is back on after the incumbent contractor withdrew a bid protest on Feb. 4.
The withdrawal of the protest, filed by e-Touch Federal Systems on Dec. 28 after NASA awarded Rockville-Md.-based InfoZen a $40 million blanket purchase agreement, allows InfoZen to begin replacing NASA’s existing content management system with open source architecture to run its 140 websites and 1,600 web assets and applications.
Modern copyright law grants copyright automatically to any creative work, including simple things like blog posts – and small pieces of code on github. This default copyright creates an assumption that for someone to do anything further with someone else's creative work requires permission from the author—what Lawrence Lessig calls "the permission culture." The open license ecosystem often takes this permission culture for granted, rather than fighting back—and that may be contributing to the proliferation of unlicensed code.
Open source software -- code that’s free for anyone to use, as long as they share what they’re doing with it -- plays a small, but growing, role in the smart grid. Examples include OpenADR, a Berkeley Labs-California Energy Commission-backed standard for automating demand response, and OpenPDC, a Tennessee Valley Authority’s Hadoop-based data management tool for transmission grid synchrophasor data.
Another victory for ill-intentioned hackers and a blow for the security of open source systems: OpenX, the online and mobile advertising company that announced a $22.5 million fund raising just last month, says that it is closing down its OnRamp open source ad serving platform, after the service was hacked on February 9, and the company determined that it would be too risky and costly to continue using it securely.
With the cost of software programs such as Photoshop and antivirus suites rising, many people turn to alternative software they can legally download from the Internet for free.
But penny-pinching students are not the only people turning to Free and Open Source Software (FOSS). Many software developers use these programs to study and improve their peers’ programs, which cannot be done with licensed software.
One of the more benighted moves by the European Union was the introduction of a special kind of copyright for databases in 1996: not for their contents, but for their compilation. This means that even if the contents are in the public domain, the database may not be. Thanks to a recent court judgment in France, this "database right" now threatens to become a real danger for the burgeoning open data movement in Europe (original in French).
Over the weekend, a petition on Whitehouse.gov calling for the dismissal of Heymann reached 25,000 signatures, the threshold that requires a response from the administration under the rules outlined on the site. The outcry follows the suicide of activist Aaron Swartz last month, who was being prosecuted by Heymann for allegedly violating computer crime laws in his downloading of millions of academic papers from the website JSTOR.
The annual Google Summer of Code (GSoC) is now preparing for the 2013 cycle of the program which sees Google offer student developers stipends to write code for a wide range of open source projects. Google is assisted by a number of mentoring organisations around the world who help the students achieve their goal of completing enhancements and improvements to open source projects. This will be the ninth year that GSoC has run; over the past eight years, six thousand students have completed the program.
Anyone who reads eBooks is aware that a number of content vendors are using proprietary platforms in an effort to lock you into their content libraries: most obviously, Amazon, with its Kindle line, Barnes & Noble with its Nook devices, and Apple with its iPads and iPhones. But there are many non-content vendors that would love to sell you an eReader as well, such as Kobo, and Pocketbook, not to mention the smartphone vendors that would be happy to have you use their devices as eReaders, too.
“MERITOCRACY” tends to be spoken of approvingly these days. Its ascendancy is seen as a measure of progress. In the dark ages, the dumb scions of the aristocracy inherited their seats on cabinets and on the boards of great companies. These days, people succeed through brains and hard work.
For at least the next 36 hours, the political media will be talking about President Barack Obama's State of the Union address (SOTU) as if it's a meaningful event. Will Obama go bold or timid into this good night, will he make the case for more taxes and fewer guns, for engaging North Korea or ignoring the Hermit Kingdom, for stuffing versus potatoes? - that sort of thing. As my colleague Matt Welch pointed out yesterday, SOTUs are equal parts WTF and completely forgettable, so it'll all be over soon except for the ardent declarations that we can make lifesaving machines more quickly in a zero-gravity environment.
Is the PC market collapsing or is that not true at all and the ARM hype is on the retreat? In either case, the PC manufacturers have to reorientate themselves – Dell, for instance, went public 25 years ago and now intends to go private again – lots of movement in the IT scene.
Lucky13 SSL exploit reveals hidden risk in the pervasive security technology.
Barrett Brown, a self-proclaimed spokesman for Anonymous, has been hit with new charges by authorities in Texas for concealing evidence.
Inside a federal courtroom packed to beyond capacity, lawyers for President Obama argued that their boss has the right to deploy the U.S. armed forces to apprehend and indefinitely detain American citizens that he alone suspects of somehow supporting groups threatening national security.
Last Wednesday, judges of the Second Circuit Court of Appeals heard the government’s arguments in their appeal of an earlier ruling blocking the enforcement of this controversial provision of the National Defense Authorization Act for 2012.
Society runs on trust. Over the millennia, we've developed a variety of mechanisms to induce trustworthy behavior in society. These range from a sense of guilt when we cheat, to societal disapproval when we lie, to laws that arrest fraudsters, to door locks and burglar alarms that keep thieves out of our homes. They're complicated and interrelated, but they tend to keep society humming along. The information age is transforming our society. We're shifting from evolved social systems to deliberately created socio-technical systems. Instead of having conversations in offices, we use Facebook. Instead of meeting friends, we IM. We shop online. We let various companies and governments collect comprehensive dossiers on our movements, our friendships, and our interests. We let others censor what we see and read. I could go on for pages.
We live at a time in the United States when the notion of political enemies has become a euphemism for dismantling prohibitions against targeted assassinations, torture, abductions and indefinite detention. Under the elastic notion of permanent war and the use of Orwellian labels like terrorists, enemy combatants, enemies of the state or the all-encompassing "evil-doers," the United States has tortured prisoners in Iraq and Guantanamo for more than a decade. It also kidnapped suspected terrorists, held them in CIA "black sites," and subjected them to extraordinary rendition - "the practice [of] taking detainees to and from US custody without a legal process ... and often ... handing [them] over to countries that practiced torture."
Despite the protesters’ dogged attempts to disrupt John Brennan’s nomination hearings on Thursday, the would-be CIA director, now chief White House counterterrrorism advisor, made it plain that the U.S government is institutionalizing, rather than rethinking its use of drone strikes in the wake of some 424 CIA attacks and upwards of 4,750 people killed in Pakistan, Yemen and Somalia since 2002..
During his first term in office, President Barack Obama often pledged to honor American 'values'—especially transparency—in the war on terror. During the first State Of The Union address of his second term, Obama returned to that theme, promising to "enlist our values" while killing suspected terrorists.
IN THE EVOLVING tactics of battling terrorists, drones — unmanned, remotely controlled aircraft — morphed from useful surveillance tools into uniquely effective weapons.
Al-Qaida and its associated groups proved a particularly elusive enemy for conventional war fighting. The insurgents traveled fast, in small groups, tried to blend with the population and when not on operations holed up in inaccessible areas.
The Times told of a Muslim cleric in Yemen named Salem Ahmed bin Ali Jaber, standing in a village mosque denouncing al Qaeda. It was a brave thing to do -- a respected tribal figure, arguing against terrorism. But two days later, when he and a police officer cousin agreed to meet with three al Qaeda members to continue the argument, all five men -- friend and foe -- were incinerated by an American drone attack. The killings infuriated the village and prompted rumors of an upwelling of support in the town for al Qaeda, because, the Times reported, "such a move is seen as the only way to retaliate against the United States."
In his Feb. 5 Op-Ed article, "The case for drone strikes," Michael W. Lewis presents a distorted picture of the methodology and conclusions of a report I coauthored, “Living Under Drones: Death, Injury, and Trauma to Civilians from U.S. Drone Practices in Pakistan.”
The incoming head of the CIA converted to Islam while working as a station chief in Saudi Arabia in the 1990s, a former FBI agent has claimed.
A disgraced former FBI agent claims that CIA director-nominee John Brennan is a convert to Islam. That's false -- and it doesn't matter anyway.
It sounded like a throwaway line. Toward the end of a four-hour Senate hearing on gun violence last week, Wayne LaPierre, the National Rifle Association’s executive vice president of over two decades, took a break from extolling the virtues of assault rifles and waded briefly into new territory: criminal justice reform. "We've supported prison building," LaPierre said. Then he hammered California for releasing tens of thousands of nonviolent offenders per a Supreme Court order—what he'd previously termed "the largest prison break in American history."
But is that the real takeaway from the survey?
For long-time critics of Obama's handling of numerous policies left over from his predecessor George W. Bush, that assessment won't be especially shocking. From his failure to close the detention center in Guantanamo Bay, to his signing of the controversial National Defense Authorization Act (NDAA) and the recent alarm caused by a leaked "white paper" summarizing aspects of key Office of Legal Council memos that describe the legal basis for targeting individuals for assassination by drone (both foreign nationals and U.S. citizens), the Obama administration has little to boast about regarding its record on civil liberties.
Is the targeted killing program moral, legal or efficacious? What's driving the overwhelming domestic support for the president's policy, particularly from liberals who criticized the Bush administration for lesser executive overreach? Is there any way in which such a program could be executed in a manner that comports with the constitutional right to due process?
After the US corporations' victory in the European Parliament's “Consumer” committee (IMCO) in late January, more committees will cast their opinion votes on the data protection regulation next week1. As lobbying pressure from industrial actors intensifies, La Quadrature du Net publishes the “compromise amendments” currently negotiated in the “Industry” (ITRE) Committee to illustrate how the protection of our privacy is under attack. Citizens must react by urging Members of the Parliament to impose tough safeguards against the commercialization of our private lives and behaviour online.
Those defending the language on imminence in the white paper released last week are right on one count: it is not new language. Below the fold, I’ve excerpted the language on imminence from three different formulations on imminence –Brennan’s speech at Harvard, the white paper, and Holder’s Northwestern speech — to show the consistency (and also, with John Brennan’s September 16, 2011 speech, exactly two weeks to Anwar al-Awlaki notice that this was now US policy).
Obama has spoken out against impending cuts to the defense budget, saying that our national defense would be put at risk if the upcoming sequester is not avoided. The same sentiment has also been expressed by outgoing defense secretary Leon Panetta, who said that defense cuts are the greatest risk to our national security.
A militarized State Department is more than a repudiation of the Department’s basic charter of 1789, for the then-named Department of Foreign Affairs, which envisioned diplomacy as its mission. Secretary Clinton reveled in tough, belligerent talk and action on her many trips to more than a hundred countries. She would warn or threaten “consequences” on a regular basis. She supported soldiers in Afghanistan, the use of secret Special Forces in other places and “force projection” in East Asia to contain China. She aggressively supported or attacked resistance movements in dictatorships, depending on whether a regime played to Washington’s tune.
Like a villain in a horror movie, the widely debunked concept of terrorist "radicalization" is once again raised from the grave by the Congressional Research Service (CRS) in its 2013 report, "American Jihadist Terrorism: Combating a Complex Threat." CRS is an influential legislative branch agency charged with providing objective policy analysis for members of Congress, which makes its continued reliance on the "radicalization" model promoted in a now-discredited 2007 New York Police Department report, "Radicalization in the West," particularly troublesome.
The Bush regime’s response to 9/11 and the Obama regime’s validation of this response have destroyed accountable democratic government in the United States. So much unaccountable power has been concentrated in the executive branch that the US Constitution is no longer an operable document. Whether a person believes the official story of 9/11 which rests on unproven government assertions or believes the documented evidence provided by a large number of scientists, first responders, and structural engineers and architects, the result is the same. 9/11 was used to create an open-ended “war on terror” and a police state. It is extraordinary that so many Americans believe that “it can’t happen here” when it already has.
If the world is just, only the guilty are tortured. So believers in a just world are more likely to think that the people who are tortured are guilty. Perhaps especially so if they experience the torture closely and so feel a greater need to overcome cognitive dissonance. On the other hand, those farther away from the experience of torture may feel less need to justify it and they may be more likely to identify the tortured as victims. The theory of moral typecasting suggests that victims are also more likely to be seen as innocents (a la Jesus).
Extrajudicial killing is official US policy. Doing so violates fundamental international, constitutional, and US statute laws. Article 3 of the Universal Declaration of Human Rights states: “Everyone has the right to life, liberty and security of person.” Article 6 of the International Covenant on Civil and Political Rights states: “Every human being has the inherent right to life. This right shall be protected by law. No one shall be arbitrarily deprived of his life.”
Even as it announces a review and reduction of its solitary confinement practices, the US Bureau of Prisons has confirmed that a newly acquired prison in Illinois will hold federal prisoners in supermax conditions. "Thomson will be a high security prison holding inmates with various security needs, including SMU and ADX type inmates," BOP spokesperson Chris Burke said via email.
This past week has been a strangely clarifying political moment. It was caused by two related events: the leak of the Justice Department's "white paper" justifying Obama's claimed power to execute Americans without charges, followed by John Brennan's alarming confirmation hearing (as Charles Pierce wrote: "the man whom the administration has put up to head the CIA would not say whether or not the president of the United States has the power to order the extrajudicial killing of a United States citizen within the borders of the United States"). I describe last week's process as "strange" because, for some reason, those events caused large numbers of people for the first time to recognize, accept and begin to confront truths that have long been readily apparent.
Yesterday, I attended the Senate Intelligence Committee’s hearing on the nomination of John Brennan to lead the CIA. More accurately, I attended five minutes of the hearing, before Senator Dianne Feinstein (D-CA) kicked out the public after repeated criticism of Brennan’s record on torture, human rights, and extrajudicial assassination and executive fiat.
Is the position of God subject to the confirmation process?
Does the Lord Almighty require the advice and consent of the Senate?
These are no longer abstract questions.
In one of President Barack Obama first acts in the White House, he ordered the closure of the CIA’s so-called “black-site” prisons, where terror suspects had been held and, sometimes, tortured. The CIA says it is “out of the detention business,” as John Brennan, Obama’s pick to head the agency, recently put it.
But the CIA’s prisons left some unfinished business. In 2009, ProPublica’s Dafna Linzer listed more than thirty people who had been held in CIA prisons and were still missing.
The Senate intelligence committee is delaying a vote to confirm John Brennan as director of the CIA as it demands more details from the White House about lethal drone strikes and last year's attack in Benghazi, Libya, that left the U.S. ambassador and three Americans dead.
...enator understated civilian casualties from drones...
...track down these rogues and serve them with subpoenas to appear in court...
Defense Secretary Leon Panetta has announced a new medal for troops who fight from behind a screen. According to unnamed officials, the "Distinguished Warfare Medal" will honor members of the military who have performed an accomplishment "so exceptional and outstanding as to clearly set the individual apart from comrades or from other persons in similar situations." Unlike other medals of its level, though, it doesn't require an "act of valor" that would put one's life in danger during combat. That means it can be given to drone pilots or members of military cyberwarfare operations.
Although heavily implied, one thing Obama didn't directly mention in his State of the Union speech was drones.
...our lives are not of the same value as yours?
President Obama took office convinced that his predecessor had adopted immoral national security policies. He was determined not to make the same mistakes.
WikiLeaks may have faded from the headlines, but in a corner of Eastern Europe, a copycat is playing out the secret-spilling site’s saga again. And it’s learned all of its predecessor’s tricks.
Male : Former Maldives president Mohamed Nasheed, who once held a cabinet meeting under water to highlight global warming, took refuge at the Indian High Commission here Tuesday after a court issued an arrest order for his failing to attend a hearing in the illegal detention of a judge.
Ahead of a hearing against him, former Maldives president Mohamed Nasheed on Wednesday took refuge at the Indian high commission in Malé where, sources said, he will be given shelter for as long as he wants.
Even as New Delhi worked the phones with the Maldivian government to defuse the crisis, sources said India has decided to let Nasheed stay at the high commission.
London: Maldives opposition leader Mohamed Nasheed has "done a Julian Assange", said WikiLeaks on Twitter after the former president took refuge at the Indian High Commission in Male.
The governments of the United States and Sweden are conniving directly with an extreme-right wing network in Latin America in a move to sabotage the summit meeting in Santiago de Chile of Heads of State from the European Union (EU) and the Community of Latin American and Caribbean States (CELAC). To do so they are working with the CIA and the most reactionary elements of the anti-Cuban mafia in Miami.
A Leaked ‘Confidential’ US diplomatic cable, dated June 13, 2006, updated the Secretary of State regarding and a meeting Ambassador Jeffrey J. Lunstead had with Foreign Secretary H. M. G. S. Palihakkara. The Colombo Telegraph found the related leaked cable from the WikiLeaks database. The cable is signed by the US Ambassador to Colombo Jeffrey J. Lunstead.
Foreign Minister Bob Carr's office has revealed an Australian diplomat was aware Melbourne man Ben Zygier had been detained in an Israeli prison before his death in 2010.
Fresh questions have been raised about what the Australia government knew about the case after Mr Zygier was identified in a news report on Tuesday night as Israel's ''Prisoner X'' - a former Mossad spy jailed without an open trial.
A spokesman for Senator Carr on Wednesday corrected previous statements by the government that it knew nothing of the Zygier case until the prisoner died and his relatives - a prominent Jewish family in Melbourne - asked for his body to be repatriated.
Investigations by the ABC's Foreign Correspondent program have revealed Ben Zygier, who used the name Ben Alon in Israel, was found hanged in a high-security cell at a prison near Tel Aviv in late 2010.
Senator Carr has shown little sympathy for his fellow-countryman and Wikileaks founder, Julian Assange. On the other hand he has been happy to entertain and encourage the Swedish ambassador with whom he planted a mixture of pines and maples on the campus of Canberra University in November 2012.[5] At this event, he unveiled a plaque in memory of Raoul Wallenberg. Ironically he used an epithet ascribed to Edmund Burke, which incidentally Burke never actually said or wrote, but many think he did:
Wikileaks founder Julian Assange took the first step toward becoming a senator on Tuesday when supporters handed his electoral enrollment application to the Australian Electoral Commission in Melbourne, reported Australian daily The Age.
We already knew he wanted to run and we already knew it was going to be hard for him to even be considered eligible, let alone win the seat. But now we know he's indeed going to try.
A group of supporters, including his father and John Shipton, a Sydney architect who's been actively involved with the newly formed Wikileaks Party, filed the paperwork. Shipton noted that this is just "a first step."
A leading human rights lawyer yesterday hit out at a decision banning a West Papua independence activist from speaking at Parliament.
Jennifer Robinson, a member of Julian Assange's defence team, is in New Zealand briefly with Benny Wenda, a leader of the self-determination campaign for West Papua, which is under Indonesian control.
Several MPs wanted Mr Wenda, who lives in exile in London, to speak at Parliament but the new Speaker, David Carter, refused the request.
So says paranoid, stoner gumshoe Doc Sportello to the protohacker Fritz in Thomas Pynchon's stem-winding psychedelic noir novel Inherent Vice. Doc’s referring to ARPANET, an early form of the internet. Pynchon may just have been playing to countercultural nostalgia, but then again, as any Pynchon nut will tell you, the hermetic author has always been on the side of misfits, running his subversive types through a gauntlet of endless Menippean carnivals.
Why are Swedish political parties and MSM altogether hostile against WikiLeaks and Assange?
What could end Sweden’s prestige-bound deadlock of the case Assange? Analysing important developments in Latin-America
By his own admission, Mr. Sven-Olof Petersson, Sweden’s Ambassador to Australia, has revealed that he was fully aware of the pending CIA rendition flight which took place on 18th December 2001 from Stockholm to Egypt. This flight ended in two Egyptian nationals, Ahmed Agiza and Muhammad al-Zery, being illegally rendered and tortured. His admission comes from a statement to the Swedish Parliament’s Constitutional Committee which confirms his presence at a briefing on 17th December 2001, a briefing at which the rendition process was being finalised. However, the Constitution Committee report shows that he knew about the renditions at the end of November and probably even in mid-November. In fact, it was he who kept the Minister of Foreign Affairs, Anna Lindh, updated with progress about deportation arrangements with the CIA in November 2001.[i] At the time Petersson was Sweden’s Director-General for Political Affairs at the Ministry for Foreign Affairs
Nor will it. There is no record of a dying civilization reassessing its values (or lack of values, in our case) and altering its trajectory. Whether the type of moral order that Professor Barber has in mind actually exists, or might someday exist somewhere on the planet, is certainly worth debating. But what is not worth debating is whether such a moral order might make an appearance on American soil. History is about many things, but one thing it is not about is miracles.
A university graduate has won a legal challenge on appeal, claiming that a government scheme forces people to work without pay.
Cait Reilly, 24, claimed that requiring her to work for free at a Poundland store breached laws banning slavery and forced labour.
The University of Birmingham geology graduate lost her original case at the High Court, but has now won on appeal.
The argument for an increase in the minimum wage ought not to rely on or focus on economics. The political, ethical, and social reasons for higher minimum wages make the case better, more clearly and more definitively.
Economists have accumulated a vast literature on the minimum wage. That literature is divided into two opposing schools. The first, comprised of paid spokespersons for business and their various allies in politics, media and the academy, strives to establish the following sort of argument. Raising minimum wages will reduce the number of jobs available to those earning the pre-rise minimum wage. This is because of the "law" of supply and demand which holds that demand for anything fall as its price rises. Raise the price of labor power, less will be demanded. In short, raising the minimum wage will push more workers out of jobs into unemployment. It is thus bad for just those in whose name the minimum wage is to be raised.
Just off of Country Road 518 in Hopewell, New Jersey, sits Double Brook Farm. It’s run by a self-exiled New Yorker but it’s not one of those now-standard upstart farms, with roving bands of earnest college kids tending rocket and a hearty couple of ex-Brooklynites overseeing the whole grass-fed operation. Double Brook’s turn-of-the-century-barn, its grazing cattle, and its hundreds of Rhode Island Reds clucking and strutting about all belong to Jon McConaughy, a 46-year-old with an all-American face, a football player’s build, money to blow, and a beautiful wife. Last year, McConaughy exchanged a two-decade long career as a commodities trader on Wall Street for these two hundred acres.
Double Brook, a small farm specializing in grass-fed meat, free range poultry, and various vegetables symbolizes one of the most unexpected turns the American economy has taken in recent years. For decades, banks have shied away from granting loans to farmers because, like restaurants, farms are considered risky investments. But the tides might be turning as the price of nearly every commodity on the face of the earth is on the rise.
The government's employment strategy lies in tatters after judges declared that almost all work-for-your-benefit schemes were unlawful due to a lack of basic information given to the unemployed.
Scantily dressed male students from Kasetsart University gathered at the entrance to parliament on Wednesday to protest against a privatisation plan, demanding all parties involved first be consulted.
Some of the students were clad in only boxer shorts, with protest banners wrapped around the lower half of their body. They also held up written messages opposing the privatisation of their university.
It's important to step back and figure out what "divisive" means here. As Annie Lowrey reports, Republicans and corporate interests are opposed to this idea, and there is some research that suggests that raising the wage floor might hurt more than it helps (as well as research that says the opposite; I guess we call it a tie?).
We've noted many times that when it comes to corporate media coverage of the so-called budget "sequester"–the immediate cuts to military and social spending set to hit in a matter of weeks–what matters most is what will happen to the military. The Washington Post had a whole piece (2/13/13) devoted to yet another round of complaints from military leaders–without a single comment from anyone who might take the view that cutting military spending would not be such a disaster.
It's becoming clear that the lobbying around the proposed EU directive on Data Protection is some of the most intense ever seen - some activists have said it's even worse than during ACTA, while on the US side there's mutterings about starting a "trade war" if it's passed in its present form.
Given that pressure to water down protection for our privacy, a key issue is: who is fighting our corner? The obvious answer would be the MEPs, since they are our elected representatives in the European Parliament. Their job is exactly that: to represent and defend us in just these circumstances. And some, like the Green MEP Jan Albrecht, are certainly doing their best, as I noted in a previous column. But what about the rest - what exactly are they up to?
President Obama announced plans for a nonpartisan commission to "improve the Election Day experience" in his State of the Union address, a response to the long lines and heavy burdens that states imposed on voters during the 2012 elections. But his proposal -- which some have called "the policy equivalent of a sock drawer" -- falls short of what many had hoped.
Prominent artists touring in China may be stuck between a rock critic and a hard place: between censure from China for making “disrespectful” political gestures, and Western condemnation for failing to. Bob Dylan faced harsh criticism in 2011 for alleged self-censorship at Chinese concerts, which according to Maureen Dowd at The New York Times was “a whole new kind of sellout — even worse than […] Elton John raking in a fortune to serenade gay-bashers at Rush Limbaugh’s fourth wedding.”
Journalists under the Human Rights Network for Journalists Uganda - Chapter (HRNJ-U) have gone to Court to block the planned switching off of unregistered sim cards by the Uganda Communications Commission (UCC).
Through Web Advocates and Legal Brain Trust (LBT), HRNJ-U on Thursday filed a civil suit seeking, among other things, a declaration that the UCC order to switch off unregistered SIM-cards by March 1, 2013 or any other deadline set without obtaining parliamentary approval is inoperative, null and void.
Albuquerque radio station KOB-FM’s “Morning Mayhem” crew interviewed him in August. The last time the Wall Street Journal did so was in 2009.
America’s newspapers have trouble enough these days, what with shrinking ad revenue and straying readers. But the daily print-and-pixel press also hasn’t gotten much love lately from the biggest newsmaker in the business: President Obama.
Until last week, the Obama administration's official position was that it had never technically acknowledged the existence of a memo from the Office of Legal Counsel laying out the legal framework for the targeted killing of an American citizen.
"The very fact of the existence or nonexistence of such documents is itself classified," the Justice Department wrote in a previous letter, despite wide discussion from members of the administration on the general principles of the targeted killing program.
Even a broader document -- a so-called "white paper" -- that spelled out the less-specific legal basis for targeted killings was "protected by the deliberative process privilege" though it was turned over to select members of Congress, a Justice Department official wrote late last month to a reporter from The New York Times who had requested that document.
But once the white paper was disclosed by Michael Isikoff of NBC News, the government had a change of heart. Jason Leopold, a reporter for Truthout who had submitted a Freedom of Information Act request for the white paper in August, contacted DOJ after the leak, reminding them he was granted expedited processing. An official called to tell him it would take three months to disclose the already-public paper but wound up turning over the document in an email to Leopold late Friday as a matter of "agency discretion." Other requestors got the same document on Friday.
A few months ago, EFF warned of a secretive new surveillance tool being used by the FBI in cases around the country commonly referred to as a “Stingray.” Recently, more information on the device has come to light and it makes us even more concerned than before.
The US intelligence community is obsessed with data. The NSA wants it all, and is prepared to keep it for as long as 100 years. The National Counter Terrorism Center (NCTC) last year told us it’s now dipping into or collating every bit of information we give to federal government agencies under one roof, to mine it for 'suspicious' information that may be linked to terrorism. State and local law enforcement, with help from the Department of Homeland Security, have established so-called intelligence "fusion centers" in most states nationwide -- little spy centers of their own, where they can view surveillance camera feeds and access intelligence databases. United States surveillance drones at home and abroad collect impossibly enormous quantities of data. Satellites do, too.
The House cybersecurity bill that allows the National Security Agency (NSA) and the military to collect your private internet records is scheduled for an encore appearance on Wednesday. House Intelligence Committee Chairman Mike Rogers (R-MI) and Ranking Member Dutch Ruppersberger (D-MD) will reintroduce the Cyber Intelligence Sharing and Protection Act (CISPA), which news reports say will be the same bill that passed the House of Representatives last year.
Unable to reach a deal with Congress, President Obama plans to use his power to exert executive actions against the will of lawmakers. The president will issue orders addressing controversial topics including cybersecurity.
Although President Obama has issued fewer executive orders than any president in over 100 years, he is making extensive plans to change that, Washington Post reports quoting people outside the White House involved in discussions on the issues. Due to conflicts with a Congress that too often disagrees on proposed legislation, Obama plans to act alone and is likely "to rely heavily" on his executive powers in future, according to the newspaper.
Federal Justice Minister Rob Nicholson says the controversial Bill C-30, known as the online surveillance or warrantless wiretapping bill, won't go ahead due to opposition from the public.
The bill, which was known as the Protecting Children from Internet Predators Act, was designed to help police combat child pornography. But civil liberties and privacy groups — even the federal privacy commissioner — said the bill violated the rights of Canadians.
Opponents lobbied strenuously against C-30, saying it was an overly broad, "Big Brother" piece of legislation that would strip all Canadians of the right to privacy.
Every new computing technology seems to bring with it a privacy flap. Cloud computing is going through that phase right now, at least outside the United States. Canadian and European elites fear that putting data in the cloud will somehow let the US government paw through it at will, a fear that usually centers on Section 215 of the USA PATRIOT Act.
Multi-national defense company Raytheon is getting ready to ship a big data social networking spy system. But they are far from the only ones tracking you.
A military lawyer at Guantanamo Bay, Cuba, acknowledged Tuesday that microphones are hidden inside devices that look like smoke detectors in the rooms where defense lawyers meet detainees, but he said the government does not listen in on attorney-client communications.
Both civilian and military defense lawyers at Guantanamo Bay meet their clients at a facility known as Echo 2, a camp that has about eight meeting huts.
A poll by the The Hill has found that a majority of “likely voters” think President Barack Obama has been the same or worse than Bush when it comes to “balancing national security with protecting civil liberties.”
Implicit in this statement, and in pretty much all of what we do at Sunlight, is an understanding that openness and transparency, enabled by technology, lead to more democratic accountability, and that, on balance, this leads to better governance. It’s an understanding that we share with a growing global community.
Shortly before 4:20 p.m. Tuesday, the White House emailed reporters that President Obama had signed a highly anticipated Executive Order aimed at protecting cyber security. The order — setting up new programs aimed at stopping online espionage and terrorism — was already the law of the land, signed by the president. But it was also secret.
Aiming to determine the impact of border searches on Americans’ civil liberties, the Department of Homeland Security has produced a report on its policy of combing through and sometimes confiscating travelers’ laptops, cell phones, and other electronic devices—even when there is no suspicion of wrongdoing. The report was completed sometime between October 2011 and September 2012, and last week DHS quietly posted only the executive summary on its website, without many people noticing.
The report draws the highly questionable conclusion that the border search policy does not violate our Fourth Amendment right to privacy, chill our First Amendment rights to freedom of speech and association, or even result in discriminatory search practices.
The White House is poised to release an executive order aimed at thwarting cyberattacks against critical infrastructure on Wednesday, two people familiar with the matter told The Hill.
The leaders of the House Intelligence Committee plan to re-introduce on Wednesday a controversial cybersecurity bill that has faced pushback from the White House.
House Intelligence Committee Chairman Mike Rogers (R-Mich.) and ranking member Rep. Dutch Ruppersberger (D-Md.) said Friday that they plan to re-introduce the Cyber Intelligence Sharing and Protection Act (CISPA) next week during a speech at the Center for Strategic and International Studies in Washington. The bill is aimed at improving information-sharing about cyber threats between government and industry so cyberattacks can be thwarted in real time.
President Obama invoked the pageantry of his State of the Union address this evening to announce a long-anticipated executive order on cybersecurity, a move that caps months of discussions with technology companies and could reduce pressure on Congress to move forward with controversial new legislation.
Internet scholar Susan Crawford explains how media conglomerates put profit ahead of the public interest, and author Nick Turse shares what we never knew about the Vietnam War.
The Government claims the bill is necessary to address three data types: Reconcile IP addresses, capture weblogs and to deal with third party data.
In practice, what would this mean? Well, the first data type is required to give the police “the ability to reconcile an Internet Protocol (IP) address to an individual”
Brazil's Institute of Industrial Property has decided that Apple cannot hold exclusive rights to the "iPhone" trademark in the country. Apple lost the trademark after a long fight with Gradiente, the company that registered the iPhone trademark seven years before the Apple device came out.
Following in the steps of other courts around Europe, Finland’s Court of Appeal has now confirmed that two ISPs previously ordered to block The Pirate Bay must continue doing so. With another ISP’s appeal to the Supreme Court just rejected it now seems likely that anti-piracy company CIAPC has succeeding in its quest to deny 80% of the country direct access to the world’s most infamous torrent site. But still the downloading continues.
The already controversial Bill C-30, that's actually more known as the Protecting Children from Internet Predators Act, didn't passed because of the public opposition. The bill, as its known name says, was designed to aid in solving the child pornography problem, but at what cost?
The Obama Administration has stepped into a long-running file-sharing lawsuit in Minnesota, urging the United States Supreme Court not to get involved in a six-figure verdict against a young mother from Northern Minnesota. The feds don't buy the woman's argument that the massive size of the award makes it unconstitutional.
Rumors of CISPA’s demise were apparently greatly exaggerated, according to various privacy rights advocates and organizations today.
CISPA, or the Cyber Intelligence Sharing and Protection Act, initially sought to give American companies more legal breathing room (protection against lawsuits) when collecting and sharing consumer/user data for the purpose of preventing massive Internet security threats. It passed a House vote with few guarantees that it wouldn’t grossly violate a person’s privacy rights (even in the face of a presidential veto threat). The White House eventually put a stamp of approval on the bill, pending certain amendments. But the Senate vote failed, and the president resorted to other methods for the time being.
Five erroneous assertions have kept appearing in the public debate since 1990 about file-sharing vs. the copyright monopoly. These assertions have persisted for 25 years, despite being obviously false. This is a reference article to link to and point at whenever one of them pops up the next time.
In so many areas, I see digital tools disrupt longstanding practices. That disruption brings challenges – but many opportunities, too, with new innovative ways suddenly available to meet specialised consumer needs. The overall effect is a benefit for consumers, for our economy, and our society – as long as you can adapt properly to digital developments.
The film sector is a very good example. Currently some rules and practices in that sector restrict flexibility – like rigid ‘release windows’. (‘Release windows’ set out when films can be released in cinemas, on DVD, online and so on – so that, for example, a film can’t be shown online until a certain number of weeks after the cinema release. Such “windows” can be based on regulation, public funding conditions, industry practice or individual negotiations). For me, while such “exclusive” periods may be important to finance some films, or get the most out of them, rigid and uniform rules can make it harder for the sector to capture digital benefits.
As many know, copyright had its origins in censorship and control. But over the last few hundred years, that fact has been obscured by the rise of the powerful publishing industry and the great works it has helped bring to the public. More recently, though, laws and treaties like SOPA and ACTA have represented a return to the roots of copyright, posing very real threats to what can be said online. That's not because their intent was necessarily to crimp freedom of expression, but as a knock-on effect of turning risk-averse ISPs into the copyright industry's private police force.