Today Recently in Linux news, Jack Wallen asks, "Will Linux ever be able to give consumers what they want?" Mark Gibbs relates his experience installing Ubuntu on an older netbook. Linux.com has a complete beginner's guide to Linux and Rob Zwetsloot looks at four popular download managers. And finally, Reiser4 has made a comeback and systemd is wreaking havoc again for some.
Mesa developers continue making headway in supporting more of the Khronos OpenGL 4.x specifications... OpenGL 4.0~4.2 is hopefully not too far out, at least for the Intel Linux driver.
These 3 months was an awesome experience for me. Working with my mentor David King was a hell lot of learning experience. Also, the experience at GNOME Foundation was great.
With a little hunting, you can find some fantastic games on Fedora if you look. Recently, I unearthed OpenTTD and have been having a great time playing it!
I haven’t been playing games regularly for a few years now – specifically since I moved completely off Windows. Back then I used to dual boot my laptop to play popular games like Counterstrike and AOE with my friends. Since I destroyed my Windows partition, not only have I gotten busier, I’ve also been too lazy to find good games on Linux.
Nordic Games are the new owners of the Darksiders franchise and the publisher decided to release both games in the series, Darksiders and Darksiders 2, on the Linux platform.
Linux is about to get a pretty deep and serious city builder courtesy of Paradox and Colossal Order named Cities Skylines. Check out the trailer and be amazed.
Today in Linux news Mageia 5 Alpha 2 was released "for the brave." Jack Germain has a review of OpenMandriva Lx 2014. Sanctum 2 is out for Linux and GamingOnLinux posted new Unreal Tournament footage. And finally today, Dedoimedo.com has a review of PC-BSD's new desktop Lumina.
This new version includes:
EFL (enlightenment libraries) are updated to the beta version 1.11 Darktable and librecad applications included by default Nightingale is now available from the repositories Right-clicking on a PDF in the File Manager will now give you the option to shrink it Interactive git shortcuts for the Shell
Canonical has won Cisco Systems' (CSCO) stamp of approval for deploying Hadoop as a service on Ubuntu OpenStack, the open source, Linux-based cloud server platform. Now, enterprises can access detailed documentation provided by Cisco for configuring Hadoop and other Big Data software on Ubuntu.
Turning your Raspberry Pi into a mobile phone is a lot simpler than you’d think, albeit a little chunky. Linux User talks to Dave Hunt about one of his many pet projects.
According to IDC, the total combined market share of Android and iOS swelled to 96.4 percent during the second quarter, up from 92.6 percent a year ago. That left just 2.5 percent of the market to Windows Phone, down from 3.4 percent in a year’s time.
How times have changed from the days when Microsoft was feared by all within the technology industry. Over the years it has tried desperately to recreate its desktop monopoly in the mobile market, only to to be stopped at every turn by Android and iOS. PC World reports that Android and iOS both increased market share in the second quarter while Microsoft's Windows Phone has declined.
Dented Linux mobile OS Sailfish has taken a new route to market as Three in Hong Kong prepares to start selling the smartphone-that-could-have-been from Jolla.
The Linux-based OS has had a tortuous history. The open source OS, based on the MeeGo operating system, was first developed, and then dropped, by Nokia. Since then it has been picked up by a crew of ex-Nokians and seen limited distribution.
Samsung is acquiring home automation firm SmartThings, setting up the potential integration with Tizen inside an upcoming Linux version of the SmartThings hub.
As TechCrunch predicted a month ago, Samsung announced an agreement to acquire SmartThings. In July, TechCrunch pegged the sale at $200 million, which if true would be a steal compared to the $3.2 billion Google paid for home automation vendor Nest Labs — and that was before Nest acquired Dropcam. In any case, Samsung is not revealing the cost.
On a global basis, Android devices far outsell those that use other operating systems. But it’s been a much different story in government, where Apple has become a preferred mobile device supplier in many cases and where Blackberry still has a strong presence.
After a series of torture tests, I have decided the Brigadier is like the Terminator of smartphones. It looks durable and virtually indestructible. But what's a smartphone if you can't use it? I put it through one final test to see if it could still make calls.
The Brigadier is heavy -- weighing in at 6.6 ounces. It runs on Android 4.4 KitKat -- however it remained unclear what the future holds for operating system updates.
It doesn't stand out from other smartphones in terms of user experience, however if you're looking for a crazy tough smartphone, this may be it.
The excitement after Android 4.4 KitKat's release barely died down when Google announced its most ambitious release ever: Android L. Packed with brand-new features and a massive UI overhaul, this is Android at its very best.
If you are dying to know what comes with this latest installment, read on as we discuss some of the best features in it.
This can be hard for developers new to a project, because "many would-be devs are intimidated by the perception of an existing 'in-crowd' dev group, even though it may not really be true," ActiveState vice president Bernard Golden told me. Developer Tony Li echoes this, suggesting, "There is often a intimidation factor when thinking about submitting code to the maintainers (even though it is not on purpose)."
It's certainly not news. We've talked before about how learning OpenStack is a great way to kickstart an IT career. But just how valuable is it? And if you want to make the transition from doing traditional IT infrastructure administration to becoming a cloud architect, how do you get there?
For a while there, working with Big Data--sorting and sifting large data sets with new tools in pursuit of surfacing meaningful angles on stored information--meant leveraging the open source Hadoop platform in on-premise fashion. Typically, enterprises deployed Hadoop in-house as a platform tool.
"I often stand in front of audiences filled with people who use storage servers. I ask them if they still name their servers. Inevitably, two-thirds of the people raise their hands. Their servers have names. ... It is definitely a mindset. ... You are not yet building quality applications. All of the innovation in the world is not going to solve that from an infrastructure perspective."
Balkan claims he is working to create independent technologies that protect our fundamental freedoms & democracy.
Trust in the cloud forms the cornerstone of the Summit agenda with topics covered including:
● the surveillance state, ● the encryption economy, ● honest business models and, ● keeping trust amongst customers.
There's been a lot of AMD APU tests this week on Phoronix with having the newest Kaveri APUs. Our latest APU adventure is seeing how well the GCC performance compares between GCC 4.9 and GCC 4.10, what's expected to become GCC 5.0.
The team set out its preference for open source in a blog published on 29 July. When asked by FutureGov whether open source is harder to use than proprietary software, Eric Mill, Software Engineer at 18F responded: “Not at all. It’s typically just the opposite, especially with larger open source projects.”
Oh, yes, creation of human organs no longer requires divine oration, just a walk to the laboratory.
Sam Castro, spokesperson for the Melbourne Palestine Activist Group, claims drones produced in the factory are being used in the current conflict in Gaza.
She said: "By importing and exporting arms to Israel and facilitating the development of Israeli military technology, governments are effectively sending a clear message of approval for Israel's military aggression, including its war crimes and possible crimes against humanity."
The U.S. decision to arm Iraqi Kurds shows a dangerous and deplorable disregard for the lessons of history. The move is understandably tempting, given the threat Islamist extremists pose to civilians and the integrity of the Iraqi state, especially when the redeployment of U.S. troops is all but off the table.
Fresh airstrikes have been launched by US drones against Isis forces close to a village where there were reports that dozens of civilians had been massacred.
There have been other disquieting trends too in recent times. Osama bin Laden was, of course, a Saudi and 15 of the 19 9/11 hijackers were Saudis. We have it on testimony by ex-CIA director James Woolsey that Saudi Wahabism is “the soil in which Al Qaeda and its sister terrorist organisations are flourishing”.
On 12th June 2011 Ahmed Wali Karzai (AWK), a key ally of the North Atlantic Treaty Organisation’s mission in Afghanistan was assassinated. His fate was sealed by his own security chief of many years Mohmad Sardar, who shot him at point-blank range in his own home. Recent years in the conflict have seen a rise in such attacks by inside men, usually members of the Afghan National Army and police forces. It is rarer that that such a high level figure is killed at the behest of the Taliban in this way, since these attacks are usually carried out to create fear in the ranks of these forces. It is rarer still that the victim is none other than the President’s half brother. As if to add insult to injury, the Taliban detonated a suicide bomb at AWK’s funeral.
The president’s authorization was confined to protecting American personnel and preventing the genocide of the Yazidis religious group. But it also suggested increased military involvement if the Iraqi government replaced Prime Minister Nouri Al-Maliki, a Shiite widely seen as responsible for implementing sectarian policies that have severely alienated Sunni Iraqis. Al-Maliki resigned this week in favor of another Shiite, and Americans can expect to see an escalation of the airstrikes.
The men included Green Berets from the 10th Special Forces Group headquartered at Fort Carson, Colo., and an unidentified Navy crew who are training together for a classified mission somewhere in Africa.
NATO claimed that its intervention in Libya was a historic success. But three years later, Libya is in complete chaos. Some 1700 militias have a combined total of 250,000 men under arms. Another external intervention seems necessary to stabilize the country. But the US and NATO must never be involved
If you vote and you live in the USA, you should try to become educated about the multiple recent and ongoing misdeeds of the Clintons in Haiti.
So far, they’ve managed to hide their hands cleverly using the puppets (Martelly, Duvalier, Lamothe…) they have imposed upon the people of Haiti.
Since 2006, due to the traitors' regime, Nepalese society is suffering due to inflation, shortage, insecurity and indefinite pain. The leaders of Nepal only listen to foreign powers and do what they are told. That is why Nepal is facing such dire consequences. Anarchy prevailed in the country after Hindu status and royal institution were removed forcibly. The leaders of NC and UML are hostage to indecision. Most of the intellectuals of the country can be bought for money. Maoist leader Mohan Vaidya led group have not abandoned Leninism that is 88 years old date expired formula. A man unable to swim will drown. We must show commitment for progress of Nepal. To save our nation we must get rid of prejudice and support constitutional monarchy and Hindu and Buddhist status of the country.
By analyzing CIA documents from earlier days, we can understand the programs of the Agency and its government cousins.
Given the fact that the CIA’s umbrella research program, MKULTRA, went completely dark in 1962, and given the technological advances that have been made in the intervening years, we can draw inferences about present-day covert ops.
One of these claims was that the United States was behind the 2011 Egyptian revolution which overthrew Hosni Mubarak. The other, however, was that the Egyptian intelligence agencies and Interior Ministry received information regarding a developing terrorist operation against the United States in September, 2001 and that the Egyptians warned the United States twice ahead of time. According to El-Adly, these warnings were completely ignored.
A new book, to be released Sept. 2, discloses a previously unknown connection between Presidents Richard Nixon, Gerald Ford, John F. Kennedy and the CIA. In fact, author Roger Stone, a former Nixon aide, asserts that Nixon “knew the CIA was involved in JFK’s assassination” and was so pesky in his attempts to get them to disclose all their records that the CIA contemplated the assassination of Nixon as well. Nixon believed CIA involved in Kennedy assassination
Cuba celebrated Castro’s 88th birthday yesterday and he famously survived 638 assassination attempts – the Americans tried so many ways that they had to get creative. Here are his top 10 assassination attempts
The most recent leaks about Cuba reveal the hiring of young Costa Ricans, Peruvians, and Venezuelans whose goals were to recruit possible dissidents in Cuban universities. These activists would later play the role of organizers of a “velvet” revolution. The AP has released the names of their top agents. When this project is linked to the mission of USAID contractor Alan Gross, currently serving a prison sentence in Cuba, and the so-called Zunzuneo, and Piramideo —Twitter-like social networks to unite thousands of Cuban people to carry out destabilization actions— it takes shape a very-well orchestrated plan to boost up a future rebellion in Cuba.
Tripura Chief Minister Manik Sarkar has alleged that Pakistani intelligence agency ISI and America’s CIA are in constant touch with anti-India militants, a section of whom are still using Bangladesh to operate.
The United States and other countries in the Americas and Asia are involved in secretly negotiating a Free Trade Agreement called the Trans-Pacific Partnership, much of the news about the deal comes from leaks as none of the details are publicly published. In the latest leak, activists reveal Certification which allows the US to withhold the the final steps that are necessary to bring a trade and investment treaty into force until the other party has changed it’s relevant laws to meet US expectations.
The Wall Street Journal (WSJ) gets respect from the mainstream because it speaks for the money interests.
How far can government go in forcing people to reveal their identities, or protecting people from being forced to reveal their identities? The issues of anonymity, free speech, and privacy are once again central topics of debate, made so by the refusal of the police department in Ferguson, Missouri to reveal the identity of the police officer who fatally shot Michael Brown, an unarmed African-American teenager Saturday night, based on fears for the officer's safety. The decision to keep his identity secret has been a factor in the violent protests in the St. Louis suburb.
You may have heard of the DA-Notice. This is a formal request, from the government of the day to the editors of newspapers such as this, to kill a story on the grounds of national security. The DA-Notice system is voluntary, and it works because it is not deployed as a method of censorship. Tiny numbers of DA-Notices are issued. Tiny numbers of stories are killed. But, in our internet age, in which communication is supposed to be easier, and freer, than ever before, that is changing, and not for the better. Welcome to the world of the G-notice.
When it comes to social media, and the Internet in general, censorship is a sensitive topic. You probably didn't read the small print when you signed up to Facebook or Twitter but all your favourite sites have rules, and with so many users posting so much content daily it can be difficult to police them – especially without pissing people off. Free speech is pretty popular after all.
The EU’s so-called “right to be forgotten” laws have not gone far enough to protect citizens’ privacy, according to Dan Geer, one of the world’s best-known security experts.
Upon exiting the room he was immediately surrounded by four to six armed police officers in uniform, two of whom identified themselves as members of the Huntsville Police Department.
Bulgarian journalists covering the financial beat can breathe freely as the most controversial parts of the so-called “bank censorship” amendment to the criminal code have been removed by the legal committee of the national assembly.
The British government established the War Office Press Bureau 100 years ago this month to censor reports from the British Army before they were issued to the press. Colonel Ernest Swinton, the first man to be appointed the Army’s official journalist, wrote later: “The principle which guided me in my work was above all to avoid helping the enemy… I essayed to tell as much of the truth as was compatible with safety, to guard against depression and pessimism, and to check unjustified optimism which might lead to a relaxation of effort.”
Prime Minister Recep Tayyip Erdoßan, who is preparing to assume the office of president on Aug. 28 following his election to the state's top post on Aug. 10, has left a legacy on journalism which is filled with confrontation and rebuke of journalists, attempts at censorship, prosecution and even deportation of critical journalists.
Hillary Clinton's phone was hacked during her time as US Secretary of State, German media reports. Allegations are set to question US-German relations just months after Merkel hacking scandal.
Morgan Marquis-Boire, a celebrated hacker turned security researcher, just published a lengthy and rather scary paper on so-called “network injection appliances”. The NSA-calibre hacking tool is sold by companies like Hacking Team and FinFisher for as little as $US1 million and can crack into your hard drive any time unencrypted data is exchanged with a server. YouTube videos, by the way, are not encrypted.
Former National Security Agency director Michael Hayden says a picture of him with NSA whistleblower Edward Snowden in the September issue of Wired magazine wasn’t a memorable experience because he doesn’t remember taking the photo.
Researchers just found yet another reason to be paranoid: Even if hackers or the NSA are locked out of your cellphone's microphone, camera and data, they might still be able to snoop on you through the tiny chip that tracks the device's orientation. Gyroscopes in modern phones, unlike the spinning gyroscopes of old, work by a method that also allows it to detect vibrations in the air at certain frequencies — including some that overlap with the human voice. And worse still, Android apps don't have to alert the user that they're accessing the gyro, meaning practically any game or website could be listening in on you (neither do iPhone apps, but the technique doesn't work as well on iOS).
When Congress returns from its August recess, surveillance reform will be high on the agenda. In May, the House passed the USA Freedom Act, a measure aimed at ending bulk collection of Americans' phone records under the Patriot Act. And in July, a much stronger version of the bill was introduced in the Senate.
Documents leaked to the press over the past year by former NSA contractor Edward Snowden reveal that the US government is sweeping up vast amounts of private data and communications, including confidential information related to ongoing legal matters and privileged communications between attorneys and their clients.
Data breach disclosure is a legal necessity in the US and will soon be in the EU too, what with the EU General Data Protection Regulation (still awaiting legislative approval) stipulating that breaches must be reported within 72 hours of the initial incident.
This is – by and large – being actively encouraged in an era of escalating data breaches and post-NSA transparency. Simply hiding the bad news can no longer be tolerated and has too many business repercussions (legal fines, brand damage) anyway.
Such a mindset no doubt serves the interests of an entrepreneur like Pierre Omidyar, a billionaire who plans to generate income by peddling security products. Products that will address the very scandals that his new media venture unearths.4 Isn’t that convenient? To be able to present a problem with one hand and then proffer a solution with the other? Problem-Reaction-Solution; also known as the Hegelian dialectic. By the way this tactic has also been employed, to the hilt, by a Pentagon carpetbagger named Keith Alexander.5
In 2003-2004, deploying wireless networks was hot. Government IT executives were eager to offer wireless Internet access in conference rooms, but I was against it. Armed with white papers from three-letter agencies in D.C. and scary headlines describing “war driving” with breaches, I declared, “No wireless!”
The lead counsel for the alleged mastermind of the Sept. 11, 2001, attacks claimed Thursday that an FBI investigation of the defense attorneys has "sown chaos" in the proceedings, as another week of pretrial hearings drew to a close.
The FBI unintentionally spied on the communications data of some Americans who were not targets of investigations because of typographical errors, according to a government watchdog.
When the National Security Agency wanted to block the public release of former contractor Edward Snowden's emails, it found an unlikely ally: His privacy.
The government cited a federal law protecting privacy rights to deny journalist Matthew Keys' request for Snowden's messages. Experts said Snowden is far from an exception. From Osama bin Laden to former House Majority Leader Tom DeLay, "privacy" claims are the government's latest excuse to keep its secrets secret.
"For an agency whose core mission is the violation of our privacy, privacy is an especially Orwellian rationale for the NSA to invoke in justifying its non-compliance" with the Freedom of Information Act, said Ryan Shapiro, an MIT graduate student who frequently files public records requests with the NSA and other agencies. "That it’s Edward Snowden’s privacy the NSA now claims to defend only heightens the irony."
Tapped in May 2014 by James Clapper, director of the Office of National Intelligence, Evanina is now immersed in coordinating multi-agency efforts to mitigate the risk of foreign infiltration, assess damage from intelligence leaks and tighten the security clearance process.
In a nutshell, I argued that the bill contained some problematic language that could actually allow more access to data by NSA; Rottman agreed that scrutiny was warranted but suggested the situation was not so bad — and certainly better than the status quo; Wheeler suggested the ACLU was too optimistic and pointed to other parts of the bill as potentially open to abuse.
The draft, authored by Tor’s Jacob Appelbaum and others, aims to standardize a technique called TCP Stealth, for keeping servers safe from mass port-scanning tools like GCHQ’s HACIENDA.
Deutsche Post offers the messenger, also available for Android phones, in eight languages and is targeting the global market, according to Mr. Edenhofer.
In an effort to woo buyers in China, Apple has inked a deal to store Chinese customer data in Chinese servers for the first time.
The security world got itself worked up in late July about an attack on the Tor network. The exploit, which ran from January to July, enabled the attackers to identify users looking for hidden services on Tor. Hidden services are typically web sites operated anonymously using Tor.
In this case, however, it turns out that the Syrian government was not to blame. Rather, the NSA caused the disruption by destroying a key router connecting the country to international networks.
According to Snowden, the NSA’s aim was to spy on all Syrians. In the course of attempting to hack into the router for surveillance purposes, the NSA broke the equipment; rather than violating privacy, the NSA directly violated international law and policy on freedom of expression. Syrians lost the ability to communicate during a time when users at risk most needed access to accurate information, open media, and social networks.
Omar Abrego, a 37-year-old father of three, was driving home in an Amtrak truck in his work uniform on Aug. 2 when he was pulled over by officers right in front of his house in the 6900 block of South Main Street (map), which is just four blocks from where Ford was shot and killed by Los Angeles Police Department officers nine days later.
Two sergeants from the Newton Division, which was also involved in the Ford shooting, pulled over Abrego because he was allegedly driving erratically, speeding and had almost hit a pedestrian, according to LAPD officials. When they attempted to pull him over, he kept going.
It would be a great thing if politicians were more critical of the obvious trend towards militarization of police forces. And there's no doubt that some voices have been more critical of overzealous police practices than one might expect. But is it actually a widespread trend?
As a result of Freedom of Information Act lawsuits filed by the American Civil Liberties Union and the New York Times, President Barack Obama’s administration has released the first memo authored by federal appeals court judge and former Office of Legal Counsel lawyer David Barron to justify the killing of US citizen and terrorism suspect Anwar al-Awlaki.
The Justice Department memo is dated February 19, 2010, a few months after Umar Farouk Abdulmutallab attempted to bomb a Detroit-bound plane on December 25, 2009. This memo was later superseded by a second memo that addressed issues the administration had overlooked, according to the Times.
Everything it seems. Over the course of 15 mission flown between August 4, 1944 and January 1, 1945 Operation Aphrodite managed to kill four American crewmen, including Lt. Joseph P. Kennedy, Jr.—eldest son of the politically powerful Kennedy family and older brother to the future-35th president—while failing to damage any of their intended targets and, in most cases failing to even reach their target. Most were shot down, ran out of fuel, or just randomly fell out of the sky in a fiery ball of wreckage.
This is a short call from informing the mainstream media that the country has been living under pseudo martial law for decades.
The fatal shooting of an unarmed black teenager and the ensuing protests in Ferguson, Missouri has rocked America. Even the mainstream media with its aversion to the truth has been forced to address the militarization of the police in America – albeit years too late.
This is a short call from informing the mainstream media that the country has been living under pseudo martial law for decades.
On April 13, 2013, the ACLU (Shasta Chapter) invited me to be their keynote speaker to talk about government secrecy, drones, and the militarization of America. The Ferguson shooting and its coverage it the media prompted me to highlight some of the points made during that talk as they relate to today’s events.
To many observers in Oakland, the scenes in Ferguson of militarized police officers and clouds of tear gas are reminiscent of local clashes, including skirmishes between police and Occupy protesters and the protests that followed the 2009 BART police killing of Oscar Grant.
As journalist Benjamin Carlson points out, “In today’s Mayberry, Andy Griffith and Barney Fife could be using grenade launchers and a tank to keep the peace.”
This is largely owing to the increasing arsenal of weapons available to police units, the changing image of the police within communities, and the growing idea that the police can and should use any means necessary to maintain order.
To our detriment, local police – clad in jackboots, helmets and shields and wielding batons, pepper-spray, stun guns, and assault rifles – have increasingly come to resemble occupying forces in our communities. “Today,” notes Paul Craig Roberts, former Assistant Secretary of the Treasury, “17,000 local police forces are equipped with such military equipment as Blackhawk helicopters, machine guns, grenade launchers, battering rams, explosives, chemical sprays, body armor, night vision, rappelling gear and armored vehicles. Some have tanks. ”
Unfortunately, whatever the threat to so-called security – whether it’s rumored weapons of mass destruction, school shootings, or alleged acts of terrorism – it doesn’t take much for the American people to march in lockstep with the government’s dictates, even if it means submitting to martial law, having their homes searched, and being stripped of one’s constitutional rights at a moment’s notice.
Last April at a Senate hearing, National Security Agency Director James Clapper was asked by Sen. Ron Wyden whether the NSA was spying on the American people. He said no, but he admitted later that it was a lie.
This lie is a felony offense.
By the beginning of the 1990s, that kind of opinionated, black-power-inspired hip-hop had morphed into gangster rap. Of course, it was easier for media and government to represent the likes of Tupac as a danger to society, indoctrinating America's youth, black and white, with violent fantasies, flaunting the thug life as something to aspire to.
A diplomat was once defined as someone whose job is to lie for his country. That’s apparently what makes them different from intelligence officers, whose function is to lie to their country.
When the executive summary of the Senate Select Committee on Intelligence’s (SSCI) report on the CIA’s torture program is finally released, it is likely to discredit a story that defenders of “enhanced interrogation” have been telling for years. The narrative first appeared in the Office of Legal Counsel (OLC) memos that authorized the CIA program. President Bush repeated it in his September 2006 speech acknowledging the existence of CIA prisons, and in 2008 when he vetoed a bill outlawing waterboarding. Slightly different versions appear in Bush’s memoirs, and defenses of the CIA program by George Tenet, Michael Hayden, Michael Mukasey, Jose Rodriguez, John Yoo, Dick Cheney, and others.
Press freedom organizations submitted a petition with more than 100,000 signatures to the US Department of Justice Thursday in support of New York Times reporter James Risen.
The petition demanded that the government stop all legal action against Risen, who has been involved in a six-year battle for press freedom, McClatchy DC reported Friday.
Contrary to the claims of Debra Saunders in "DiFi's tortured logic on interrogations" (Insight, Aug. 12), it is not illogical to think that torture is ineffective. It is instead, the consensus of interrogation experts at the FBI and British Intelligence, and has been for decades. The issue is not that torture victims don't talk, but rather that they will say anything they think will make the pain stop, regardless of its accuracy.
A telecom company and tens of thousands of supporters are calling on President Obama to fire CIA Director John Brennan over a report that showed his agency hacked into Senate computers.
As a person of faith and as an American, the United States committing torture in my name and the subsequent CIA actions around torture are especially disturbing. It is against the very core of who I am as a Catholic and as a human being and is the antithesis as to who we are as a nation.
Five Muslim Americans have filed a lawsuit in federal court accusing the U.S. government of unjustly placing them on the terrorist watchlist. One plaintiff in the suit, Yaseen Kadura, says a federal official tried to pressure him into becoming a government informant in Libya, using removal from the no-fly list as an incentive. The Intercept news site revealed last month the Obama administration has expanded the watchlist system by approving broad guidelines over who can be targeted. Hundreds of thousands of watchlisted individuals are recognized as having no ties to terrorist groups.
President Obama has now acknowledged America’s use of torture. “We tortured some folks. We did some things that were contrary to our values.” Obama went on to try and place the use of torture in context. Recalling the desperation of law enforcement to prevent further attacks post-9/11, Obama said, “It’s important for us not to feel too sanctimonious in retrospect about the tough job those folks had.”
Although I am glad Obama acknowledged the fact of torture and did not try to call it a phony euphemism, I am disappointed in his response. Torture is a crime. It is not a public relations embarrassment that needs to be managed.
US civil rights and religious groups have voiced their concerns over federal agencies of anti-Muslim training material, demanding an urgent audit of federal law enforcement training material.
“The use of anti-Muslim trainers and materials is not only highly offensive, disparaging the faith of millions of Americans, but leads to biased policing that targets individuals and communities based on religion, not evidence of wrongdoing,” a letter signed by 75 groups, including the Council on American-Islamic Relations, Auburn Seminary and the NAACP, reads, Religion News Services reported on Thursday, August 14.
Ten years ago, the infamous photos from Abu Ghraib thrust the issue of torture onto the front page. While some tried to employ the few-bad-apples defense, it was clear then and it is even clearer now that the horror at Abu Ghraib grew out of problems at the top. Torture by U.S. military personnel and intelligence officers was, at its core, a failure of leadership.
Is NYSIC suggesting that it is extreme and threatening to encourage our officials to honor their oath and refuse to obey unconstitutional orders?