EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

11.26.13

Another Reason to Boycott Amazon and Dell

Posted in Dell at 12:28 pm by Dr. Roy Schestowitz

Summary: Amazon and Dell abuse people who work for them, Nestle just kills them

IT HAS BEEN quite a while since we first called for a boycott of Amazon and the Microsoft-connected Dell. We explained the reasons and expanded the list. But [1] and [2] help show that even employees of those companies should boycott their employer, which sometimes may pretend to like GNU/Linux in pursuit of profit [3-8]. well, at least unlike Coca Cola and Nestle [9], Amazon and Dell don’t murder their employees… yet.

Related/contextual items from the news:

  1. Amazon workers face ‘increased risk of mental illness’

    A BBC investigation into a UK-based Amazon warehouse has found conditions that a stress expert said could cause “mental and physical illness”.

  2. Dell’s Production Line Exposed: 74-Hour Weeks, Forced Overtime and Squalid Mass Dorms
  3. Dell Staff Show Ubuntu Linux Some Love
  4. Dell Expands Project Sputnik, Open Source Linux Laptop
  5. Have you read about Dell’s Sputnik 3 touchscreen laptop ?
  6. Dell Launches its Third “Sputnik” Ubuntu Ultrabook
  7. Dell’s Sputnik 3 might be the best Linux laptop yet

    Sadly, Sputnik 3 is just the codename of the device. If you go to buy the Linux machine from Dell, you’ll see that it’s more properly known as the XPS 13 Developer Edition. The machine comes in two configurations with the base model starting at $1,249. That hefty price gets you a dual-core Intel Core i5-4200U CPU, 8GB of RAM, a 128GB SSD, and a 13.3-inch 1080p touchscreen LCD.

  8. Dell aims for cloudy orbit with Sputnik Ubuntu developer project

    Dell is taking another stab at making the Sputnik Ultrabook it converted from Windows to Ubuntu even cloudier for developers.

  9. Striking Nestle worker murdered by right wing paramilitaries

    Striking Nestle worker and trade union organiser, Oscar lopez, was shot four times by multiple gunmen in a local bar. ‘Sinaltrainal’, his trade union had been locked in a bitter dispute with Nestle over union recognition and report receiving several death threats via text message from a right-wing paramilitary group, ‘Urabenos’- the day before Lopez was murdered. The messages read, “We are going to chop you up” and “Death to all Communists”.

The Age of Banning Protests Against Corruption

Posted in Finance, Fraud at 12:23 pm by Dr. Roy Schestowitz

Summary: Protesting against financial fraud is now a crime, punishable as though it’s worse than the fraud

I GENERALLY don’t believe in borrowing from the future (or speculations regarding the future). A lot of society now treats going into debt as a normal thing (sometimes inevitability), but we should remember that calling oneself a “house owner” when it’s actually a bank the owns the house while the so-called “house owner” is just a “mortgage payer”, i.e. debt slave, is a form of brainwash for the impatient — a shortcut to cushion an illusion of ownership.

In recent years adolescent were pushed into the debt treadmill. It weakens or even paralyses tomorrow’s adults. The tuition fees were increased rapidly and price hikes like that just make education a luxury of debt takers or rich children, not a human right (in some nations higher education is still free). In the US, this has turned into a federal business [1] and in the UK it is now being privatised [2] (essentially corruption). This is one among many injustices, induced by lobbying from the financial pseudo-industry.

Those who speak out against financial injustices have mostly enjoyed their freedom of speech… until now. Based on [3], protest now leads to prison. Sad times. So the criminals (of the most expensive form) don’t go to jail; those who protest against the criminals go to jail. Wall Street (institutions of wealth) has useful alliances with institutions of power and it shows.

Related/contextual items from the news:

  1. US government “profits” from student loans in 2013 surpassed $41 billion
  2. UK Govt Has Sold Your Student Loans to Debt Collectors: Corruption, Plain and Simple
  3. Reverend Billy faces year in prison for JP Morgan Chase toad protest

    Billy Talen to stand trial for preaching on bank’s environmental record accompanied by choir members wearing toad hats

Killing the Poor With Climate

Posted in Action at 12:09 pm by Dr. Roy Schestowitz

Death not by stoning but by burning

Anthracite coal

Summary: How oil and coal (as shown above) contribute to the death of poor people who are hardly a factor in the agenda of oil and coal profiteers

SOME of the world’s poorest people are needlessly dying and based on what governments in developed nations are doing, “radical” action might be needed [1] (of course those governments will try to lock up those who do something about it). Victims of the climatic changes [2] are getting glued to a corner and in low GDP nations, where infrastructure for energy is poor (by design, for economic reasons), it should not be shocking to encounter many more violent deaths [3]. There actually are viable alternatives to it all. But those who profit from oil and coal won’t allow them to be embraced; they use governments to suppress clean energy.

Related/contextual items from the news:

  1. The Government Scandal That Shows the People Have to Take Radical Action to Prevent Climate Change

    The world has been rapidly approaching a crossroads not only on climate change but also on mass extinction, destruction of the oceans, poisoning of the air, land and water and deteriorating food quality and security. A global revolt has been building and after this week in Poland, another reason to explode against the world’s richest governments has been provided. It is time for a world-wide environmental justice revolt.

  2. As Poor Countries Walk Out of Climate Talks, Venezuela Calls on Industrial Nations to Take Action

    A group of 133 developing nations have walked out of a key part of the climate talks in Warsaw, Poland, amidst a conflict over how countries who have historically emitted the most greenhouse gases should be held financially responsible for some of the damage caused by extreme weather in nations with low carbon emissions. The United States, Australia, Canada and other industrialized countries are pushing for the issue — known as loss and damage — to be put off until after the 2015 climate talks in Paris.

  3. Oil Pipeline Explodes In China, Killing 35 And Setting The Ocean On Fire

Privacy Watch: Almost 100 New Links About Privacy

Posted in Action at 11:38 am by Dr. Roy Schestowitz

Summary: A roundup of news about privacy and the NSA in particular

  1. Symantec Reveals that Cybercriminals Employ New Linux Trojan to Embezzle Data

    [Symantec does not have a good record on Linux]

    Security researchers of well-known security firm ‘Symantec’ have identified a cyber-criminal operation which relies on a new-fangled Linux backdoor, nicknamed Linux.Fokirtor, to embezzle data without being discovered.

  2. Encrypted Email and Communications with CryptoHeaven
  3. NTRU public key crypto released to open source community
  4. Security Innovation Releases NTRU Public Key Cryptography to Open-Source Community to help fend off looming “Cryptopocalypse”
  5. Summary of Westminster Hall surveillance debate

    [ORG at the start of the month]

  6. Tom Watson MP: “The surveillance state is running amok and Parliament has absolutely failed.”

    [And from September, too]

  7. Exclusive: Inside America’s Plan to Kill Online Privacy Rights Everywhere

    The United States and its key intelligence allies are quietly working behind the scenes to kneecap a mounting movement in the United Nations to promote a universal human right to online privacy, according to diplomatic sources and an internal American government document obtained by The Cable.

  8. Six ways that NSA and GCHQ spying violated your rights, and six things you can do about it

    Ruth from the Open Rights Group sez, “With the huge amount of evidence leaked by Edward Snowden on surveillance by the NSA and the GCHQ, the Open Rights Group has compiled a list of the top 6 points that everyone should know about how their rights have been violated. To combat this tide of privacy-invasions ORG also list the 6 key things that they want to do in response, and how you can help the biggest year of campaigning against mass surveillance. We believe that if enough people speak up we can change how surveillance is done.”

  9. Senators Call NSA Snooping Unnecessary to Security

    Mark Udall (D-Colorado), Martin Heinrich (D-New Mexico) and Ron Wyden (D-Oregon) collectively filed an amicus curae brief for a lawsuit filed against the NSA, claiming that its record collection violated the Fourth Amendment.

  10. Report: Corporations use professional spies-for-hire to monitor and undermine nonprofits

    [Espionage and corporate interests served, as many feared]

    A newly released report from the watchdog group Essential Information alleges that powerful corporations spy on and sabotage the very nonprofit groups dedicated to keeping them in check.

  11. Smart TV, Spy TV. Is that LG Smart TV spying on you?

    They are called smart TVs, but they could be doing more than being that smart and intelligent TV in your living room or game room.

    A report published on DoctorBeet’s Blog, revealed that the author’s new LG Smart TV was calling home, sending detailed information about the author’s viewing habits to a (remote) LG server and using that information to display targeted ads on the Smart TV’s Smart Landing Screen. LG calls the program Smart Ads.

  12. LG Looking Into Claim Smart TVs Grab User Data
  13. LG Smart TVs logging USB filenames and viewing info to LG servers
  14. LG smart TV snooping extends to home networks, second blogger says
  15. NSA Spying Scandal Dents US Business Prospects in China

    The US National Security Agency’s (NSA) spying scandal could have a deep impact on US business prospects in China, where security concerns threaten to weigh down on the demand for American products.

  16. NSA spying accomplishes little beyond alienating allies

    Early in November of this year, The New York Times quoted an agency boast that when Ban Ki-moon, the U.N. secretary general, visited President Barack Obama at the White House last April, the president found before him a secretly intercepted copy of the U.N. head’s talking points (as if Obama might not have guessed what they would be). The agency on its internal broadsheet listed this as the week’s “operational highlight.”

    Unlike in 2001, the NSA now has an estimated 30,000 to 40,000 employees worldwide (its assistant director, John C. Inglis, jokingly estimated in 2012 that the number of current employees was “between 37,000 and 1 billion.”)

    But the question to be asked of any bureaucracy is what it actually does. We know now that the NSA purloins (presumably electronically, but who knows?) other people’s mail. It undoubtedly, with its billions, can employ some second-story men, as well as those who service its giant antennae — or read your e-mails or copy out your Facebook page. But why do they bother? That is the fascinating question.

  17. Mark Zuckerberg counsels US government on snooping
  18. Zuckerberg Says U.S. ‘Really Blew It’ on Surveillance

    The U.S. government “really blew it” on conducting surveillance programs that riled foreign leaders and domestic skeptics, Facebook Inc. (FB) Chief Executive Officer Mark Zuckerberg said in a television interview.

  19. Skype, Microsoft cleared in Luxembourg NSA investigation

    [Well, because everyone knows that Skype is a spy anyway]

    Luxembourg’s data protection authority cleared Microsoft and its subsidiary Skype of data protection violations related to the U.S. National Security Agency’s Prism spying program, the agency said Monday.

  20. Luxembourg is happy with Microsoft’s data protection
  21. Five takeaways from the NSA and Internet surveillance disclosures

    [Clearly not very factual and generally not a good article overall]

  22. Judge: “NSA exceeded the scope of authorized acquisition continuously”

    New declassifed documents show legal arguments over bulk metadata collection.

  23. Twitter tightens security against NSA snooping

    Twitter has implemented new security measures that should make it much more difficult for anyone to eavesdrop on communications between its servers and users, and is calling on other Internet companies to follow its lead.

    The company has implemented “perfect forward secrecy” on its Web and mobile platforms, it said Friday. The technology should make it impossible for an organization to eavesdrop on encrypted traffic today and decrypt it at some point in the future.

  24. Private Sector Beefs Up Security to Fend Off NSA
  25. ACLU seeks termination of NSA’s call-records program

    Civil liberties advocates on Friday asked a federal court in New York to end the National Security Agency counterterrorism program that collects data on billions of phone calls by Americans, arguing that it violates the Constitution and was not authorized by Congress.

  26. Judge Appears Receptive to Critics of NSA’s Collection of Phone Data

    A federal judge on Friday appeared receptive to the idea that Americans enjoy some level of privacy in their phone records, in the first court challenge to the National Security Agency’s bulk collection of data from telecommunications companies.

  27. Supreme Court can’t find barge pole long enough to touch NSA lawsuit
  28. Supreme Court Refuses to Consider EPIC Challenge to NSA Surveillance
  29. Supreme Court Rejects NSA Phone Surveillance Challenge
  30. Supreme Court Declines to Stop NSA Surveillance

    The U.S. Supreme Court will not intervene to stop the National Security Agency’s domestic telephone surveillance program — for now.

  31. U.S. justices won’t review intelligence court action on phone records

    The U.S. Supreme Court said on Monday it would not review a ruling by the secretive intelligence court that gave the government access to records kept by Verizon Communications Inc on millions of telephone calls.

    The long-shot case was brought to the high court by the Electronic Privacy Information Center (EPIC), a public interest research organization. It was the first time the high-profile issue has come before the justices since former National Security Agency contractor Edward Snowden began in June to leak secret documents detailing American surveillance programs.

  32. Chomsky: Fight back against NSA spying or be ‘complicit’

    Now that the extent of the US National Security Agency’s surveillance programs has been exposed by former NSA contractor Edward Snowden, it’s beholden on the public to fight back or else find themselves “complicit” in the activities, according to Massachusetts Institute of Technology linguistics professor and philosopher Noam Chomsky.

  33. Schneier tells Washington NSA broke Internet’s security for everyone

    To say that there are a lot of people who are angry with the National Security Agency right now would be an understatement. But the things that are getting the most political attention right now—such as the invasion of the privacy of American citizens and spying on the leaders of American allies—are just a fraction of the problem, according to cryptographer and Harvard University Berkman Center for Internet and Society fellow Bruce Schneier.

  34. NSA net-security sabotage means the end of US Internet “stewardship”

    Speaking at a presentation in DC, Bruce Schneier nailed the strategic cost of allowing the NSA to sabotage Internet security through BULLRUN: it has cost the US government all credibility as a contributor to Internet governance.

  35. The NSA scandal has detonated in Australia – we can no longer look away

    [The progressive Australian politicians speak out]

    “We don’t discuss intelligence matters,” Australia’s bewildered prime minister told the media again this morning, making him the only person left on earth not discussing intelligence matters. Seven months after the fuse was lit, the scandal of the US National Security Agency surveillance state has finally detonated in Australia.

  36. New NSA revelations claim Australia spied on Indonesia president
  37. Edward Snowden NSA Scandal: Indonesia Recalls Ambassador over Australia’s Spying on President and Wife

    Indonesia has recalled its envoy to Canberra over reports that Australia spied on phone conversations of the Indonesian president, his wife and other high-ranked government officials.

  38. In Indonesia, not even the NSA is listening

    A double blow for Indonesia’s President Susilo Bambang Yudhoyono this week. First it emerged his personal cell phone was being tapped by a foreign spy agency.

  39. Resisting Surveillance on a Unprecedented Scale I
  40. Google: We’re bombarded by gov’t requests on user data

    Requests from governments worldwide for user information have more than doubled since three years ago. Worse still, says Google, is what the US won’t let us tell you.

  41. Threat from NSA leaks may have been overstated by UK, says Lord Falconer

    Ex-lord chancellor defends Guardian reporting of Snowden files and says he’s sceptical of warnings from spy agency chiefs

  42. EU welcomes ‘constructive’ NSA surveillance talks

    European and US justice officials have agreed to work towards “restoring trust” after the NSA scandal. The EU’s Viviane Reding told DW she saw signs of an “absolutely new” attitude to Europeans’ privacy.

  43. Here’s how to stop the gov’t, NSA, FBI, and everyone else from spying on you

    Today, I do not use Instagram, Facebook, Twitter, Google+, LinkedIn, Pinterest, or any other social network. I didn’t delete my accounts (impersonators really suck), but I’m logged out and radio silent across the board.

  44. The NSA’s Global Threat to Free Speech

    Following months of Snowden disclosures, the extent to which the National Security Agency’s extraordinary surveillance infringes on the privacy of our communications and other vast areas of our lives has become widely apparent. Far less appreciated, however, is the global threat that the NSA’s spying poses to freedom of expression over the Internet.

    The NSA’s seemingly limitless prying into our personal electronic data is predicated on a cramped vision of our right to privacy. As I have described in this space these intrusions are facilitated by various shortcomings in current US law. For instance, the law recognizes a privacy interest in the contents of our communications, but not in what is known as our metadata, the electronic details about whom we communicate with, what we search for online, and where we go. The rationale, stated in a 1979 US Supreme Court ruling, is that we have no privacy interest in the phone numbers we dial because we share them with the phone company, even though the court could just as easily have ruled that the phone company has a fiduciary duty to respect the privacy of its customers.

  45. Fisa court order that allowed NSA surveillance is revealed for first time

    Fisa court judge who authorised massive tapping of metadata was hesitant but felt she could not stand in the way

  46. NSA spying will ultimately benefit us all

    The relentless migration to the cloud requires strong encryption. Customers will demand it — and snooping will be deterred

  47. Here’s what we know about European collaboration with the NSA

    Norway’s intelligence services have admitted collecting details of over 33 million phone calls involving the country’s citizens during a month-long period between December 2012 and January this year. The data was shared with the U.S. signals intelligence agency, the NSA.

  48. Declassified Opinion On Bulk Email Collection Details More Abuse By The NSA

    As more NSA-related documents are forced out into the public eye, the narrative contained within the court opinions is at odds with the NSA’s continuous declarations that utmost care has been taken to prevent violating the privacy of Americans.

  49. Watch out spooks: STANDARDS GROUPS are COMING AFTER YOU

    [From weeks ago]

    The Internet Engineering Task Force (IETF) has vowed that the NSA won’t be allowed to get away with its nefarious surveillance of the internet any more … as soon as 1,100 boffins can agree on a PRISM-proofing plan.

  50. Frankfurt: An American Military-Intel Metropolis

    It’s understandable that the guards standing outside the U.S. Consulate General in Frankfurt are a little nervous. The building used to house the U.S.’s largest military hospital. Now it looks more like a fortress with its high walls, barbwire, antitank barriers, security cameras and guards with machineguns. But is it really an offense to stand in front of the building here, on the sidewalk? Or, better put, does a dawdling passer-by really necessitate two police cars and American security officers? Really?

  51. Lavabit founder: Feds ORDERED email providers to stay open

    Lavabit’s founder has claimed other secure webmail providers who threatened to shut themselves down in the wake of the NSA spying revelations had received court orders forcing them to stay up.

  52. Supercomputing startup PiCloud joins Dropbox, but its service will live on as an open source project
  53. Dropbox Acquires PiCloud, But Service Will Continue As Open Source Project

    It has been announced this week by PiCloud and Dropbox that it is has acquired PiCloud the platform which specialises in high performance computing, as well as batch processing and scientific computing applications from the cloud.

  54. A cloud safe from the NSA’s prying eyes: Europe begins work on its EU-wide system

    A new project seeks to lay down some ground rules for what could become a cloud for the continent.

  55. Tell The Government That It Needs To Get A Warrant If It Wants To Read Your Email

    While there’s been so much attention lately on the NSA’s surveillance tactics and its legality, for years there’s been a separate issue that we’ve been covering: the outdated ECPA (Electronic Communications Privacy Act) rules (written in the ’80s) that cover law enforcement’s ability to get access to your data, such as emails. The laws make almost no sense today, as they were written in a time when the internet was much more limited. The idea of everyone storing pretty much all of their information and communications online wasn’t even a concept at the time — and that creates bizarre and nonsensical rules, like arguing that emails that have been on a server for more than 180 days are considered “abandoned” and no warrant is needed to view them.

  56. NSA Memo Shows Unlimited Access To Bulk Records Unnecessary To Keep US Safe From Terrorists

    The DNI’s recent document dump has sprung loose an April 2009 “notification memorandum” from the NSA, which provides updates on its “end-to-end” reviews of both the Section 215 (phone metadata) and the Section 402 (email metadata) bulk records collections. As was noted in earlier posts, both programs were suspended by the FISA court because of the NSA’s routine abuse FISA Act limitations.

    The declassified document is addressed to the Senate Select Committee on Intelligence (SSCI). There’s no indication this information was also disseminated to the House Intelligence Committee, but perhaps that will surface in the future. The memo spends a few introductory paragraphs detailing the efforts the NSA has made to clean up its act before delving into more interesting details — including the limitations placed on the Section 215 collection by the Judge Walton, as well as a new problem it uncovered during its 60-day “end-to-end” reviews.

  57. US ‘Intelligence’ Boss Reveals ‘Redacted’ Date In The URL Of The File

    We’ve written a few times about the latest document dump by James Clapper and the Office of the Director of National Intelligence this week, in which they declassified a large pile of documents (after being told to by the courts — though they don’t mention that part). But, one of the odder parts was that the dates were redacted on certain legal filings, such as the FISA Court order by judge Reggie Walton smacking the NSA around a bit for not complying with the law.

  58. FISA Court Tells The DOJ That It Needs To Explain Why It’s Ignoring Order To Declassify Surveillance Opinion

    Yesterday, we wrote about the DOJ responding to a FISA Court order that it declassify a FISA Court ruling on the interpretation of Section 215 of the PATRIOT Act (related to the bulk collection of metadata), in which the DOJ effectively told the court that it wasn’t going to obey.

  59. Watchdog demands GCHQ report on NSA’s UK data storage

    Intelligence and security committee chair Sir Malcolm Rifkind seeks explanation of deal that allowed US to ‘unmask’ Britons

  60. Edward Snowden leaks: UK ‘let NSA store email addresses’
  61. Edward Snowden leaks: UK officials let NSA access British citizens’ personal data

    American intelligence agencies were given permission to track phone calls, emails and internet records of British citizens in a secret deal struck with UK officials, it has been claimed.

  62. NSA leaks: UK ‘allowed US officials to keep phone numbers and email addresses of ordinary Britons’

    Ordinary Britons may have had their phone and email records monitored by US surveillance teams, it has been claimed.

    British intelligence officials reportedly paved the way for the National Security Agency (NSA) to spy on unwitting and innocent citizens, a memo leaked by whistleblower Edward Snowden has suggested.

    It is believed that in 2007 a deal was reached to give the green light to the NSA to hold and analyse information about British citizens that it previously did not have access to.

  63. We are becoming police states. Everyone OK with that?

    On Wednesday, The Guardian and the UK’s Channel 4 News revealed what most suspected by this point: the monitoring of vast swathes of the British populace. In 2007, then-prime minister Tony Blair allowed a change in the intelligence agreement between the U.K. and the U.S., permitting the Americans to record British citizens’ phone and fax numbers, emails and IP addresses, so as to map who communicates with whom. It is extremely unlikely that this data is not shared with the British authorities.

  64. Information ‘stored by NSA’ a ‘sell out’ of privacy

    Approved plans made by British intelligence officials reportedly allowing the phone, internet and email records of ordinary UK citizens to be analysed and stored by the US National Security Agency is a “sell out” of privacy, according to Big Brother Watch.

  65. The NSA overreach poses a serious threat to our economy
  66. Watchdog demands GCHQ report on NSA’s UK data storage

    Intelligence and security committee chair Sir Malcolm Rifkind seeks explanation of deal that allowed US to ‘unmask’ Britons

  67. How did we let the NSA spying get this bad?

    A secret court’s backwards logic opened the floodgates for the NSA to gather metadata. We’re still feeling the repercussions

  68. NSA files live – UK deputy PM Nick Clegg says it is right to examine security services
  69. Mail.ru seeks to avoid prying NSA eyes in US expansion

    Russia’s largest internet company is expanding into the US, trying to lure customers by keeping the data from its services offshore.

  70. Verizon, AT&T Challenged on NSA Spying

    Shareholders urge the telecom giants to be more transparent about U.S. data demands

  71. Verizon, AT&T shareholders want more details on NSA data access — but don’t hold your breath
  72. Investors Tell AT&T, Verizon to Come Clean on NSA Snooping

    Some shareholders in Verizon Communications and AT&T are pushing to know what the telecom companies have told U.S. or foreign agencies about their customers, the American Civil Liberties Union of Northern California said Wednesday.

  73. NSA surveillance hinders Iceland’s attempts to be a haven for free speech

    Iceland’s attempts to become a free-speech haven risk floundering in the wake of revelations regarding the extent of internet monitoring by the US and UK intelligence agencies.

    The Icelandic Modern Media Initiative (IMMI) has spent the last three years working protections for whistleblowers and investigative journalists into the country’s constitution. But the knowledge that monitoring of digital communications is far more widespread than previously thought makes it difficult to promise safety to sources who might have hoped otherwise.

    “When we were making IMMI, even if we were aware that there had been spying going on, on all our devices, I don’t think any of us at the time – late 2009, early 2010 – anticipated that it was so invasive,” says Icelandic MP Birgitta Jónsdóttir, one of the driving forces behind the initiative.

  74. Reagan’s role in NSA’s Hack of Google and Yahoo

    Back when Yahoo was something hollered at a rodeo and no one could conceive of Googling anything, President Ronald Reagan signed an executive order that extended the power of US intelligence agencies overseas, allowing broader surveillance of non-US suspects. At the time, no one imagined he was granting authority to spy on what became known as Silicon Valley.

  75. USA Patriot Act abused by NSA, lawyer argues

    But Jameel Jaffer, of the American Civil Liberties Union, told a judge in federal court: “If you accept the government’s theory here, you are creating a dramatic expansion of the government’s investigative power.”

    US District Court Judge William Pauley reserved decision on an ACLU request to halt the National Security Agency surveillance programmes pending the outcome of its lawsuit against President Barack Obama’s administration.

  76. New Documents Show Links between DHS, CIA, and Booz Allen

    DHS I&A DSAC Records Illuminate Aspects of Federal Public-Private Intelligence Partnership: Wikileaks, Anonymous, Booz Allen Hamilton, Career CIA Officers at DHS Domestic Intelligence Office

  77. Is The Hague making a mockery of justice so the CIA and MI6 can save face?

    There’s a spot of skulduggery going on in the International Criminal Court (ICC) at The Hague. Not to put too fine a point upon it, a lot of questions are being asked about why the worshipful judges have, at least publicly, demanded a trial in Europe for Saif el-Islam al-Gaddafi – son of the late Muammar – but have blithely accepted that the dictator’s ruthless security boss, Abdullah al-Senussi, should be tried in the militia-haunted chaos of Libya.

    Was this because the court didn’t want to upset Libya’s anarchic authorities by insisting that it try both men at The Hague? Or is there an ulterior, far more sinister purpose: to prevent Senussi blurting out details in The Hague of his cosy relationship with Western security services when he was handling relations between Gaddafi, the CIA and MI6?

  78. CIA drone strikes outside Pakistan’s tribal regions

    Mansur Mahsud of the FATA Research Center told the Bureau: ‘Yesterday Nawaz Sharif’s foreign minister gave a statement saying it would not carry out drone strikes during talks between militants and the government, and the very next day a drone strike took place in the settled area. It will increase tension and anger in Pakistan against America.’

  79. ‘Retract Peace Prize’: Russian NGOs blast Obama over ‘killing people’ confession

    Two major military-related groups, Officers of Russia and Soldiers’ Mothers, have addressed the Nobel Committee with a request to evaluate the inhumane statements made by the US president about drone warfare.

  80. Drone attacks ‘create more enemies with every innocent person killed’

    Drones are in effect terrorist tools that impose terror on the people that they are fired against, creating more enemies for the United States with every innocent person that is killed, Leah Bolger, president of Veterans for Peace, told RT.

  81. The CIA Hemorrhages Spies To Top Wall Street Firms

    The revolving door goes both ways, according to Newsweek, since most corporate executives “love hanging out” with the agency’s top spies, seeking to maintain influence in Capitol Hill.

  82. Are Web service providers encrypting their data?

    The Electronic Frontier Foundation has published an infographic list showing the Web service providers that encrypt or don’t encrypt their users data as it traverses the Internet.

    The list derives from the foundation’s Who Has Your Back Program, which surveys Web service providers to find out if they are implementing the foundation’s best practices for encryption.

  83. Snowden and the Future of our Communication Architecture

    Snowden revelations shed light on facts that force us to ask ourselves important questions and to take action that might be essential for the future of our online societies and for the very structure of our political systems.

  84. Pressure Mounts Against Telcos To ‘Fess Up About Their Involvement In NSA Surveillance

    Ever since the Snowden leaks began, there’s been a clear dichotomy in terms of how different industries have reacted. The various big internet companies, which were named early on as participants in the PRISM program, have been quite vocal (sometimes to profane levels) that they were not willing participants in most of these programs, and are currently involved in an important lawsuit arguing that they have a First Amendment right to reveal how much info they actually share with the government. While those eventual revelations (and they almost certainly will come out, either legally or through leaks) may reveal certain companies were more complicit than others, by all indications, the various internet companies have been very willing to fight the government over this.

  85. Report: NSA Infected More Than 50,000 Networks by Mid-2012

    [Amsterdam has top secret NSA documents]

    According to new documents provided by the National Security Agency’s favorite foe, former employee-turned-whistleblower Edward Snowden, Dutch newspaper NRC Handelsblad is reporting that the NSA has infected more than 50,000 computer networks with malware in a process known as “Computer Network Exploitation.”

  86. Hacked by the NSA
  87. NSA slapped malware on 50,000+ networks, says report

    The US National Security Agency placed malicious software on more than 50,000 computer networks around the world, says a report based on documents leaked by Edward Snowden.

  88. NSA hired IT specialists to hack sensitive info: Report

    The US National Security Agency has employed more than a thousand IT specialists to hack into 50,000 computer systems worldwide and to install malicious software designed to steal sensitive information, a media report has said.

    In addition to its massive monitoring and collection of telephone and Internet data, the US intelligence agency has been extensively infiltrating computer systems around the world and planted malware, Dutch newspaper NRC Handelsblad reported on Saturday.

  89. In the City the NSA wasn’t a problem… until now

    Since the revelations of NSA snooping started to emerge this summer, they have gotten a lot of mileage in the media and across the internet, but I think it is fair to say that life in the City barely missed a step.

    There were some suggestions of qualitatively negative consequences, but when you work in the finance industry you get used to unspecific bluster.

    [...]

    Get the IOC – IBM, Oracle, Cisco – out of China, we heard several times.

  90. US National Security Agency wanted to increase snooping powers
  91. New York Times: N.S.A. report outlined goals for more power

    Officials at the National Security Agency, intent on maintaining its dominance in intelligence collection, pledged last year to push to expand its surveillance powers, according to a top-secret strategy document.

  92. NSA deputy director skeptical on sharing data with FBI and others

    The deputy director of the National Security Agency on Friday sounded skeptical about permitting the FBI, DEA or other law enforcement agencies to directly search through the NSA’s vast data troves, as a new bill would appear to permit.

  93. Google challenges legality of NSA spying
  94. NSA TreasureMap

    TreasureMap is not a document but viewing software — very similar to MindMeister, see below — that draws (and updates) network diagrams according to what is currently carried in an associated database. The key feature is scalability: vector graphics that zoom in and out to any level of resolution. Sort of like Google Earth, only using lines and nodes.

  95. Google mulled ditching US after NSA scandal

    Google, the giant of the Internet, thought about moving its servers out of the U.S. after the NSA debacle, said Eric Schmidt, the company’s chairman, on Friday at the Paley International Council Summit in New York.

  96. Cybersecurity Bill Offered Up as Amendment to NDAA

    As the Senate Armed Forces Committee works on the latest iteration of the National Defense Authorization Act, Senator Jay Rockefeller (D-W. Va) sees it as a good opportunity to try again to pass cybersecurity legislation. He has submitted the Cybersecurity Act of 2013, legislation passed in the Senate Commerce Committee this summer after the failure of CISPA to gain momentum.

  97. Your View: NDAA sections threaten freedom

    The Department of Defense’s budget is funded with the annual passage of The National Defense Authorization Act. With each year’s passing Congress adds more provisions to the law, compounding the already controversial nature of its intent. In 2012, Congress added Sections 1021 and 1022 to the bill, which codified the indefinite military detention without charge or trial of citizens for the first time in American history.

  98. Facebook Investigating How Bulgarian Man Bought 1.1 Million Users’ Email Addresses For Five Dollars

People’s Voice in the Linux Foundation

Posted in GNU/Linux, Kernel at 11:25 am by Dr. Roy Schestowitz

Funding still provided in exchange less benign agenda than easy printing (e.g. restricted boot, TPM, Tivoization)

CUPS

Summary: The Linux Foundation is starting another “Membership Drive”, which seeks to collect money from people rather than from massive corporations

AS we have pointed out on numerous occasions before, the weakness of the Linux Foundation is that it’s very open to businesses, which also makes it vulnerable to entryism, even by Microsoft and companies it takes over. Just watch this latest Microsoft marketing/revisionism from Mary Jo Foley at ZDNet/CBS, trying hard to matchmake FOSS and Microsoft.

In order for the Linux Foundation not to merely serve agencies like the NSA through Intel, IBM and other NSA collaborators (some of which receive money from the CIA to do this) we need to hope for a people-run Linux Foundation. This requires changing the financial strings. Community influence (people, not corporations) can only ever come through money, as sad as it may seem, and to the Linux Foundation’s credit, it does come out with an appeal for people’s money [1,2,3] (original post in [4]). Whether a donation would be wise to give is rather hard to tell; the FSF, for example, is already people-leaning, whereas with the Linux Foundation it’s doubtful and it may be too late for the attached strings to be undone. Just watch how OIN, for instance (another corporations-funded front), welcomes surveillance companies into its ranks. A serious privacy violator, Dropbox, is now in there too. As a Microsoft booster put it: “The Open Invention Network (OIN) has revealed Dropbox is its latest licensee, potentially shielding the cloud document-sharing service from patent attackers.”

When it comes to defending the voice of people, “Linux Voice” should be a good choice [5]. It’s about service, not just profits. If “Linux Voice” is like independent press, then think of the Linux Foundation as the corporate press, appeasing and appealing to businesses in order for them to provide financial support (with strings attached of course, as businesses are not charities).

The Linux Foundation is a good organisation, but if it becomes increasingly dependent on funding from companies with weak/no ethics, then we have a real problem in our hands.

Related/contextual items from the news:

  1. Honor Thy Tux: Linux Membership Drive Is for the Birds

    In honor of the open-source operating system’s longtime penguin mascot, the Linux Foundation is taking a conservation-friendly approach to its latest membership drive.

  2. Linux Foundation’s Holiday Individual Membership Drive
  3. Of penguins and Tuxes: The Linux Foundation’s holiday membership drive

    You can help two birds with one donation this holiday season. The Linux Foundation, the non-profit organization dedicated to accelerating the growth of Linux and other open-source collaborative development projects such as OpenDaylight, announced its 2013 Holiday Individual Membership Drive. In it, the group will donate $25 to the World Wildlife Fund for emperor penguins for every new member who joins, today through 11:59 PM. PT on December 10, 2013.

  4. Join Linux Foundation, Advance Linux and Help a Penguin

    The Linux Foundation today is kicking off its Holiday Individual Membership Drive. We will be donating $25 to the World Wildlife Fund for the emperor penguin for each individual member who joins The Linux Foundation today through December 10, 2013.

  5. Giving profits back: where and how

    Our plan to give 50% of our profits back to the community has got a lot of people talking. Everyone likes the idea, but some people are wondering how it’s going to work. It’s important to note that this plan isn’t just a short term gimmick — no, it’s a crucial part of what Linux Voice will be about over the years. A thriving Linux and Free Software community is good for all of us!

Links 26/11/2013: Games

Posted in News Roundup at 4:16 am by Dr. Roy Schestowitz

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts