EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.22.13

In the Age of Software Patents Nullification, CAFC Strikes Again, Promoting Those Patents

Posted in Law, Patents at 11:28 am by Dr. Roy Schestowitz

Strike three. Time to strike against the ‘legal’ system?

London strike
London strike

Summary: Silly judgment from the source of many of today’s software patents is harming what looked like progress

In the land of software patents the lawyers seem concerned that patents on software are being invalidated and one firm (patent lawyers in the US) says “The PTAB decision [invalidating software patents] was issued nine months after the PGR petition was filed and was, therefore, relatively expedient, especially compared to the district court litigation that preceded it. Versata had sued SAP in federal district court in 2007, Versata prevailed at trial, and SAP appealed to the United States Court of Appeals for the Federal Circuit in 2011. The Federal Circuit upheld the jury’s infringement verdict—and its more than $300 million damages award—with respect to the same patent just last month. Versata Software, Inc. v. SAP America, Inc., Nos. 2012-1029, -1049, slip op. at 2 (Fed. Cir. May 1, 2013).”

They try to belittle the importance of this decision. They are also missing the point that in much of the world this decision would not required the court to even get involved. Meanwhile, reveals the EFF, CAFC is up to no good again, validating software patents:

The tortured history of Ultramercial v. Hulu continues, with a new ruling from the Federal Circuit upholding one of our favorite, most absurd patents: one that claims a process for doing no more than viewing ads online before accessing copyrighted content. How could that be patentable, you might ask. To which we might answer, good question.

[...]

First, in Mayo v. Prometheus, the Supreme Court invalidated a patent covering a medical diagnostic test. There, the Court held that a method cannot be patented where it adds “nothing specific to the laws of nature other than what is well-understood, routine, conventional activity, previously engaged in by those in the field.” More recently, in AMP v. Myriad, the Supreme Court stuck with this theme, holding that Myriad could not patent genes that occur in nature and stating that “Myriad did not create anything. To be sure, it found an important and useful gene, but separating that gene from its surrounding genetic material is not an act of invention.”

This CAFC decision is very serious an event and one pundit said about it that:

Opponents of software patents suffered a setback as the Federal Circuit today said a patent for displaying content before a video should not be considered an abstract idea.

Read about CAFC in our previous posts. We really need to set up a Wiki index about CAFC pretty soon.

Microsoft Was Lying About Skype, It’s More or Less an NSA Honeypot

Posted in Microsoft at 11:19 am by Dr. Roy Schestowitz

National Skype Agency

National Security Agency

Summary: Microsoft is very much in bed with the NSA (and by extension DHS and CIA) and there is more evidence to show this now

Skype is a good pal of the NSA and they have been almost twins ever since Microsoft bought it, under mysterious financial circumstances that we covered at the time of the acquisition. We wrote about it a long time ago, naming the NSA agenda too (almost exactly one year ago).

Skype is a spy. Deal with it. I don’t use Skype myself, but the network effect makes it hard for many to quit the addiction. The network effect is what makes it so powerful a spying apparatus.

According to this report from The Guardian:

Skype, the web-based communications company, reportedly set up a secret programme to make it easier for US surveillance agencies to access customers’ information.

The programme, called Project Chess and first revealed by the New York Times on Thursday, was said to have been established before Skype was bought by Microsoft in 2011. Microsoft’s links with US security are under intense scrutiny following the Guardian’s revelation of Prism, a surveillance program run by the National Security Agency (NSA), that claimed “direct” access to its servers and those of rivals including Apple, Facebook and Google.

Project Chess was set up to explore the legal and technical issues involved in making Skype’s communications more readily available to law enforcement and security officials, according to the Times. Only a handful of executives were aware of the plan. The company did not immediately return a call for comment.

Last year Skype denied reports that it had changed its software following the Microsoft acquisition in order to allow law enforcement easier access to communications. “Nothing could be more contrary to the Skype philosophy,” Mark Gillett, vice president of Microsoft’s Skype division, said in a blog post.

According to the Prism documents, Skype had been co-operating with the NSA’s scheme since February 2011, eight months before the software giant took it over. The document gives little detail on the technical nature of that cooperation. Microsoft declined to comment.

Interesting. Now we have more facts verified. We should call out Skype like we call out Windows. It has a back door, at the server side and probably several at the client side too. Bruce Schneier, a security guru, says:

Reread that Skype denial from last July, knowing that at the time the company knew that they were giving the NSA access to customer communications. Notice how it is precisely worded to be technically accurate, yet leave the reader with the wrong conclusion. This is where we are with all the tech companies right now; we can’t trust their denials, just as we can’t trust the NSA — or the FBI — when it denies programs, capabilities, or practices.

He is being too polite. He should just say that Microsoft deceived and lied. A lot of companies choose their words very carefully these days.

Speaking of spying with microphone and camera at the edge points, Xbox spying is getting even worse and there is a Web site dedicated to the subject. It says: “Tell Microsoft: I won’t buy an XBOX ONE because I don’t want the NSA in my living room.” Check out their posts, preceded by:

Always on and listening. Infrared camera. Facial and voice recognition. Heart monitor. In your living room.

Is Microsoft’s XBOX ONE the future of the NSA’s PRISM program?

Microsoft was first to join PRISM (see the slides leaked by Snowden/Greenwald), essentially colluding with the NSA, so we should assume that the NSA can effortlessly access all this data. We know that the special relationship Microsoft has with the NSA enables even espionage in non-US counties and Stuxnet is a good example of the outcome.

John Dvorak Complains About Microsoft AstroTurfing Intended to Shape Vista 8 Perceptions

Posted in Marketing, Microsoft, Vista 8 at 11:05 am by Dr. Roy Schestowitz

Rigging debates

Children

Summary: Comment AstroTurf alleged by an industry veteran who has observed and studied this phenomenon for decades

A long time ago, about half a decade into the past, Mr. Dvorak wrote about so-called “Munchkins” and we cited/quoted him on it. He saw these tactics going back to the days of OS/2 and "Barkto". Now that Reddit-planted Xbox AstroTurfing comes to light we should point out a Dvorak article from the end of 2012, around the time of the release of Vista 8 John Dvorak suspected Microsoft was “planting” comments in support of Vista 8:

While following the recent hirings and firings at Microsoft, the presence of Microsoft Munchkins is more obvious than ever to me. I cannot prove their existence, however, unless someone finally steps forward and admits everything. If you are one, please do so!

Munchkins are commenters who I believe work directly for Microsoft or for its public relations agency. They scour the comment boards and rebuke with high authority all criticisms of specific Microsoft products. The reality of these people was well-documented during the Windows versus OS/2 days and I can only suspect that the practice continues to this day.

Once in a while, one of these characters shows up on my blog with a long and seemingly thoughtful post about some Microsoft product. The piece manages to condemn everyone who is critical of something Microsoft did. When you go back into the admin section of the blog where you can look at all postings by that person, the IP address, and other details, you always find that this person has not been on the blog before, and has never posted any prior comments. I can assure that anyone who is long-winded in the comment section posts a lot of comments.

Microsoft and crime are almost synonymous, so it would not be shocking if many or most pro-Vista 8 comments were indirectly funded by the company of crimes as ‘norm’.

Thanks to the reader who showed us the article above; somehow we missed it (we are no longer watching Microsoft closely).

Links 22/6/2013: Linux Caixa Mágica 20, Syria Proxy War Brewing

Posted in News Roundup at 8:24 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • 23 Pictures That Prove Society Is Doomed
  • Health/Nutrition

    • Follow the money: Monsanto and the World Food Prize

      Although genetic engineering has been widely adopted in a few major crops—mainly soybeans, corn, cotton and canola—only two general types of engineered genes, for resistance to herbicides and for killing certain insects, have been widely commercially successful after 30 years of trying.

      These have provided some benefits, such as a reduction of chemical insecticide use on some of these crops, and some relatively small yield increases. Most of the yield increases for small farmers are from cotton, a low value crop, which is unlikely to pull these farmers out of poverty.

      At the same time, in the countries that have used these technologies the longest, big problems are emerging. Weeds resistant to the herbicide used on Monsanto’s crops have reached epidemic proportions in the U.S., reportedly infesting about 60 million acres and increasing rapidly. This has increased herbicide use by hundreds of millions of pounds above where it probably would have been had these crops not existed.

      And now insects resistant to Bt are emerging around the world. I was at the University of Illinois recently, where I heard a respected corn entomologist bemoaning the intention of corn farmers toreturn to the use of chemical insecticides to control rootworms that have developed resistance to Monsanto’s Bt gene for controlling that important pest.

    • Genetically engineered sugar beets destroyed in southern Oregon
    • Chipotle Is The First U.S. Fast Food Chain To Identify Products With GMO Ingredients

      Sure, you probably know the basic ingredients in your fast food lunch — chicken or beef, lettuce and tomato, whathaveyou — after all, you’re the one who ordered it. But if you, like many consumers, care whether or not those ingredients include genetically modified organisms (GMOs), the ingredient list usually is no help. Chipotle announced that it will now mark those ingredients on its website for discerning consumers.

  • Defence/Police/Secrecy/Aggression

    • What Cop T-Shirts Tell Us About Police Culture

      Earlier this week, an anonymous public defender sent Gothamist this photo of an NYPD warrant squad officer wearing a t-shirt with a pretty disturbing quote from Ernest Hemingway

    • Noam Chomsky: Obama Is ‘Running Biggest Terrorist Operation That Exists’

      June 21, 2013 “Information Clearing House – Continuing his streak of fiercely criticizing President Obama’s foreign policy and civil liberties record, pre-eminent left-wing scholar Noam Chomsky told GRITtv that this administration is “dedicated to increasing terrorism” throughout the world via its own “terrorist” drone strikes in foreign lands.

    • CIA secretly providing training for Syrian rebels
    • CIA Training Syria Rebels: Report
    • REPORT: The CIA Has Been Secretly Training Syrian Rebels For Months
    • CIA and the US military operatives train rebels in Turkey and Jordan – report

      The CIA and US special operational troops and have been secretly training Syrian rebels at bases in Jordan and Turkey since November 2012. Up to 100 from all over Syria have gone through courses in the last month alone, according to US media reports.

    • CIA secretly providing training for Syrian rebels: Report

      The CIA and US special operations forces have been training Syrian rebels for months, since long before President Barack Obama announced plans to arm the opposition, the Los Angeles Times has reported.

    • US Leaves 700 troops in Jordan as CIA Trained Militants Fighting in Syria

      US President Barack Obama said the United States left around 700 combat-ready troops in Jordan after a training exercise in the country.

    • US special forces and CIA training Syrian rebels – Report

      The CIA and US special forces have been secretly training Syrian rebels since last year at bases in Jordan and Turkey, the Los Angeles Times reported Friday.

    • Unwinding “Unwitting”

      For around fifteen years, this arrangement “worked.” Those who knew about it accepted it—sometimes queasily, more often eagerly. It made them feel important, adventurous, grown up. It meant that they weren’t just playing in a student-government sandbox. Anyway, promoting liberal-democratic ideas among Third World students, opposing Communist and Soviet influence, and helping anti-apartheid student groups in South Africa did not present problems of conscience. Moreover, while the C.I.A. money was earmarked for overseas activities, it freed up funds derived from other sources to be used for the N.S.A.’s domestic purposes, which included campaigning for academic freedom, demanding the abolition of the House Un-American Activities Committee, and supporting the civil-rights movement. (For example, the N.S.A. helped found the Student Nonviolent Coordinating Committee and provided it with crucial political and financial assistance.) For these reasons, it’s too simple, and not truly correct, to dismiss the N.S.A. as nothing but a C.I.A. front. It was better than that. But it was deeply compromised. The secrecy and deception inherent in the arrangement amounted to a kind of moral corruption.

    • Iran: Sixty Years After The 1953 CIA Coup That Toppled Democracy

      The election of a moderate new president in Iran, Hassan Rouhani, who has promised to enact reforms, including the release of political prisoners, comes almost exactly 60 years after a cataclysmic episode that continues to define geopolitical relations in the Middle East and profoundly influence the image of the United States in the region.

    • CIA head paid a visit to Moscow secretly – sources

      CIA Director John Brennan paid an unannounced visit to Moscow on Wednesday and Thursday, sources told Interfax on Friday.

      Russian Foreign Intelligence Service declined to confirm or deny that Brennan had been to Moscow, but senior Kremlin aide Yury Ushakov told reporters in mid-May that “a contact with the director of CIA is being planned.”

    • Libertarians Claim James Gandolfini Killed By CIA

      In the wake of The Sopranos star James Gandolfini’s sudden death,libertarians everywhere are saying the actor was assassinated by the Central Intelligence Agency.

    • CIA deputy director, Cuyahoga Falls native retires
  • Cablegate

    • Edward Snowden Asylum: Olafur Vignir Sigurvinsson Readies Private Plane To Iceland

      An Icelandic businessman linked to WikiLeaks said he has readied a private plane to take Edward Snowden, the former National Security Agency contractor who exposed secret U.S. surveillance programmes, to Iceland if the government grants him asylum.

      “We have made everything ready at our end now we only have to wait for confirmation from the (Icelandic) Interior Ministry,” Olafur Vignir Sigurvinsson told Reuters. He is a director of DataCell, a company which processed payments for WikiLeaks.

    • Julian Assange Emerges As Central Figure In Bradley Manning Trial

      Bradley Manning is at the defense table. Casting a long shadow over his trial, however, is the figure of someone else the government would apparently like to put on trial: Julian Assange.

      On Tuesday, government prosecutors sparred with defense lawyers for Manning, the Army private first class who has admitted to leaking a massive cache of documents to the transparency organization that Assange founded. At issue was whether the judge should accept as evidence two WikiLeaks tweets and a crowdsourced document called “The Most Wanted Leaks of 2009.”

    • In WikiLeaks Probe, Feds Used a Secret Search Warrant to Get Volunteer’s Gmail

      The Justice Department used a secret search warrant to obtain the entire contents of a Gmail account used by a former WikiLeaks volunteer in Iceland, according to court records released to the volunteer this week.

      The search warrant was issued under seal on October 14, 2011 by the Alexandria, Virginia federal judge overseeing the WikiLeaks grand jury investigation there. The warrant ordered Google to turn over “the contents of all e-mails associated with the account, including stored or preserved copies of e-mails sent to and from the account, draft e-mails, deleted e-mails [...] the source and destination addresses associated with each e-mail, the date and time at which each e-mail was sent, and the size and length of each e-mail.” The warrant also ordered Google not to disclose the search to anyone.

  • Environment/Energy/Wildlife

    • Houston to buy half its power from renewable sources

      The city of Houston has agreed to purchase half its electricity from renewable sources.

      That will make Houston the largest municipal purchaser of renewable energy in the nation, according to the city, which cited estimates from the Environmental Protection Agency.

      “Houston is already known as the energy capital of the world, but we are committed to becoming the alternative energy capital of the world as well,” Mayor Annise Parker said in a written statement Thursday.

    • Billionaire U.S. activist kicks off campaign to turn Obama against Keystone

      Billionaire anti-Keystone XL activist Tom Steyer wants to rally legions of digital-savvy Obama supporters to persuade the President that Canadian oil sands crude poses a threat to the United States.

      The wealthy Californian upped the ante Thursday in the high-stakes political showdown over Keystone XL by launching a social media campaign aimed at re-awakening the fervent hordes of mostly, young Obama supporters.

    • During Record Drought, Frackers Outcompete Farmers for Water Supplies

      The impacts of 2013′s severe drought are apparent across the nation in forests, on farms and on once snowy peaks. Meanwhile, the oil and gas industry is demanding unprecedented amounts of water for hydraulic fracturing, better known as fracking.

  • Finance

    • No admission of guilt. No denial. No justice.

      Financial adviser Chauncey Mayfield allegedly stole $3.1 million from the pension funds of Detroit police officers and firefighters so he could buy shopping centers in California, according to the Securities and Exchange Commission.

      Did he do it? Who knows? Mayfield and several of his associates settled the case last week without admitting or denying guilt. All they had to do to make the SEC go away was agree to give the money back.

    • Ex-Enron CEO Jeff Skilling to leave prison early

      U.S. District Judge Sim Lake of the Southern District of Texas announced at a hearing in Houston today that Skilling will serve 14 years. His original conviction called for him to serve 24 years in connection with the collapse of the once high-flying energy trading firm. Under the agreement with federal prosecutors, Skilling could be released as early as 2017.

    • Bless the Borrowers

      Robert Kuttner’s title refers, first, to the “medieval institution” that was the fate of improvident souls in England who could not repay their debts, including Daniel Defoe. In 1692, Defoe was committed to King’s Bench Prison in London, where he began to agitate for a change in the legal system. Forcing debtors to rot, Defoe not disinterestedly pointed out, was injurious to both parties, since “after a debtor was confined in prison both he and the creditor lost through his prolonged distress.” Society responded, eventually, with bankruptcy laws, but it is very much Kuttner’s point in “Debtors’ Prison” that we — America and Europe in the age of the financial crisis — have yet to absorb the principal lesson of Defoe’s “bitter experience.”

  • Privacy

    • The Dragnet at the Edge of Forever

      Amidst the havoc surrounding the earth-shattering revelations being made about the massive catch-all surveillance being conducted by the US government against virtually everybody with an Internet connection, a set of relatively unremarkable letters arrived in our GMail inboxes on Tuesday evening, containing a series of attachments.

      These attachments were scanned court orders, sealed and later unsealed, issued to Google by the United States District Court for the eastern district of Virginia. These orders demanded that Google hand over to the United States (yes, they were that specific), various information relating to accounts we hold with Google, including whom we communicated with, when, from where, and for how long.

      The court orders were almost certainly related to the Grand Jury investigation of the unauthorized public disclosure of information showing considerable misconduct, including a number of probable cases of war crimes, by US military forces in Iraq and Afghanistan during their wars in these countries, a list of people being held without trial or legal recourse in Guantanamo Bay, and a trove of diplomatic cables detailing the ways the US government have conducted themselves – both good and bad – over many years.

    • Mastering the internet: how GCHQ set out to spy on the world wide web

      Project Tempora – the evolution of a secret programme to capture vast amounts of web and phone data

    • GCHQ taps fibre-optic cables for secret access to world’s communications

      Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal

    • NSA: If Your Data Is Encrypted, You Might Be Evil, So We’ll Keep It Until We’re Sure

      There’s been plenty of commentary concerning the latest NSA leak concerning its FISA court-approved “rules” for when it can keep data, and when it needs to delete it. As many of you pointed out in the comments to that piece — and many others are now exploring — the rules seem to clearly say that if your data is encrypted, the NSA can keep it. Specifically, the minimization procedures say that the NSA has to destroy the communication it receives once it’s determined as domestic unless they can demonstrate a few facts about it.

    • U.S. charges Snowden with espionage
    • Ex-Contractor Is Charged in Leaks on N.S.A. Surveillance

      Edward J. Snowden, the former National Security Agency contractor whose leak of agency documents has set off a national debate over the proper limits of government surveillance, has been charged with violating the Espionage Act and stealing government property for disclosing classified information to The Guardian and The Washington Post, the Justice Department said on Friday.

    • Latest NSA Leak Shows How Obama Misled Public on Surveillance of Americans

      Last week, President Obama claimed in an interview that the National Security Agency could not listen to Americans’ phone calls or read their emails. But newly revealed secret government documents—the latest in the series of high-profile leaks about classified surveillance—outline how the NSA can sweep up and store Americans’ communications.

      The documents, published by the Guardian late Thursday, are signed by Attorney General Eric Holder and stamped with the date July 29, 2009. They were submitted to the secret Foreign Intelligence Surveillance Court and outline the so-called “minimization procedures” the NSA is supposed to follow to limit any “incidental” spying it does on the communications of Americans or permanent U.S. residents. The disclosure sheds light on highly significant surveillance procedures the government has until now managed to keep beyond public scrutiny.

    • Wired/John Hodgman animated series about NSA spooks

      Wired’s kicked off a new animated webcomedy starring John Hodgman as a crusty old NSA agent and Nicole Winters as his young protege. It’s pretty promising stuff!

    • Reassured by NSA’s Internal Procedures? Don’t Be. They Still Don’t Tell the Whole Story.

      Yesterday, the Guardian released two previously-classified documents describing the internal “minimization” and “targeting” procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA’s vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren’t reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant.

    • The NSA Can Hold Onto Americans’ Communications for Years, Leaked Docs Say
    • Evil in a Haystack
    • WikiLeaks plane ‘ready’ to bring Snowden to Iceland
    • U.K. Spy Agency Secretly Taps Over 200 Fiber-Optic Cables, Shares Data With the NSA

      The British spy agency GCHQ has secretly tapped more than 200 fiber-optic cables carrying phone and internet traffic and has been sharing data with the U.S. National Security Agency, according to a news report.

    • Facebook Accidentally Exposed Contact Info for Six Million Users

      According to a post on Facebook’s security blog, a bug in the company’s friend recommendation system exposed the contact information of some six million users to others. The bug has been present for about a year, but the company only found out about it in the last 24 hours. The affected users will be notified by email. The company says there’s no evidence the bug was exploited maliciously.

    • Ellsberg Says: Put A Stop To Indiscriminate Spying On Americans

      To Daniel Ellsberg, the well-known whistleblower and lifelong advocate for freedom who leaked the “Pentagon Papers” 40 years ago, “there has not been in American history a more important leak than Edward Snowden’s release of NSA material.”

    • Timeline of NSA Domestic Spying
    • Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004

      Russ Tice, a former intelligence analyst who in 2005 blew the whistle on what he alleged was massive unconstitutional domestic spying across multiple agencies, claimed Wednesday that the NSA had ordered wiretaps on phones connected to then-Senate candidate Barack Obama in 2004.

      Speaking on “The Boiling Frogs Show,” Tice claimed the intelligence community had ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats.

    • Mastering the Internet and GCHQ

      Nick Pickles, director of Big Brother Watch, said: “This appears to be dangerously close to, if not exactly, the centralised database of all our internet communications, including some content, that successive Governments have ruled out and Parliament has never legislated for.

      “Britain has a clear legal process in place to govern the interception of the content of communications and blanket interception is not a part of that system. If GCHQ have been intercepting huge numbers of innocent people’s communications as part of a massive sweeping exercise then I struggle to see how that squares with a process that requires a warrant for each individual intercept. This question must be urgently be addressed in Parliament.

      “The fact GCHQ staff have been discussing how light the UK’s oversight regime is compared to the US highlights why we need a wholesale review of surveillance law, including the fact that there is absolutely no judicial process within the current system and the people making these decisions are able to hide in the shadows rather than face public scrutiny.”

    • EE Dragging its Feet on Mobile Data Transparency

      Mobile company EE has been quite open in explaining the sale of data analytics based on their customers data in partnership with Ipsos MORI. But we are concerned that they think the storm is over and can return to business as usual. We may need your support to make them listen.

      EE has already met with ORG to explain how their data services work, how they aggregate data and what general legal framework they operate. For this, we commend EE on their openness and hope that it continues.

    • Police State Canada: Communications Security Establishment Canada (CSEC) Runs Massive Domestic Spying Program

      Communications Security Establishment Canada (CSEC), the NSA’s Canadian counterpart and longstanding partner, has been scrutinizing the metadata of Canadians’ electronic communications since at least 2005.

      Moreover, the NSA routinely provides Canada’s security agencies with intelligence on Canadians and CSEC reciprocates by providing U.S. intelligence officials with information about people living in the U.S. This arrangement allows both agencies to circumvent legal bans on warrantless surveillance of their own citizenry’s communications.

      It was “common” for NSA “to pass on information about Canadians,” Wayne Easter, Canada’s Solicitor-General in 2002-3, told the Toronto Star this week. As Solicitor-General, Easter was responsible for overseeing the operations of the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP).

    • Google told to delete Street View payload data or face UK prosecution

      Information commissioner’s office says it will launch contempt of court proceedings if data is not deleted within 35 days

    • In Depth Review: New NSA Documents Expose How Americans Can Be Spied on Without A Warrant

      The Guardian published a new batch of secret leaked FISA court and NSA documents yesterday, which detail the particulars of how government has been accessing Americans’ emails without a warrant, in violation of the Constitution. The documents lay bare fundamental problems with the ineffectual attempts to place meaningful limitations on the NSA’s massive surveillance program.

      Essentially, the new documents, dated July 2009 and approved in August 2010, detail how the NSA deals with the huge streams of information it receives during the collection program that gathers the content of email and telephone calls, allowing it to keep vast quantities of content it could never get with a warrant. They may not be the current procedures – more on that in another blog post shortly.

    • Spying on the World From Domestic Soil

      The world is still reeling from the series of revelations about NSA and FBI surveillance. Over the past two weeks the emerging details paint a picture of pervasive, crossborder spying programs of unprecedented reach and scope: the U.S. has now admitted using domestic networks to spy on Internet users both domestically and worldwide. The people now know that foreign intelligence can spy on their communications if they travel through U.S. networks or are stored in U.S. servers.

    • Edward Snowden is a true patriot

      A million people marched in London to stop Blair going to war.

    • US Surveillance: Doubts Over FBI And NSA Claims

      Terrorism analysts and specialist journalists say claims of thwarted terror plots from phone and data mining do not stand up.

    • Government-tech ties: Ex-Facebook exec moved to NSA, Amazon’s CIA deal, more

      • Where did Facebook chief security officer Max Kelly go after he left the social network in 2010? To the NSA, according to the New York Times, which says it’s the first to report that tidbit. Also previously unreported, says the NYT, is that Internet-call provider Skype developed a program to make it easier to cooperate with law enforcement and the government.

  • Civil Rights

  • Intellectual Monopolies

    • Copyrights

      • Opening Pandora’s Box

        I first placed music online in 1996, a WAV file recorded through a microphone to promote the sale of an album I had under license on my indie BeanBag label featuring Georgie Fame and Van Morrison. I cheered for other music industry executives like Larry Rosen of GRP Records when he launched Music Boulevard online around 1997. I licensed songs by Jesse Colin Young (founder of The Youngbloods) to music publishing expert Bob Kohn’s eMusic.com for a cash advance against future royalties that had us partying like it was 1999.

        But by the year 2000, any hope of that engagement between legal music and the Internet leading to a new future was pretty much dashed by an online startup corporation named Napster that provided free music downloads. Though a Federal court would find Napster guilty in 2001 of providing illegal copying similar to a counterfeiting operation, the business model known as “DMCA ‘Safe Harbor’ corporations” was launched.

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts