EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

02.06.15

Links 6/2/2015: CrunchBang Linux Ends, Ubuntu Phone From BQ

Posted in News Roundup at 6:49 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Easing into open source

    Open source scares people. And tossing them into the deep end usually doesn’t help dampen that fear. Instead, we need to help ease people into using open source. Scott Nesbitt, technology coach and writer, shares some advice to help you do that.

    First, curb the urge to get on open source soapbox. Instead, go for the heart of it—show them how they can do their work with it.

    Open source is not only for the techie. So, explain to people they don’t have to be a coder. They can learn to code, but it’s not required.

  • Coreboot Ports Over XGI Framebuffer Support From Linux Kernel

    The Coreboot project has now ported over the XGI Z9s frame-buffer support from the Linux kernel.

  • DreamHost Celebrates Open Source Throughout February
  • Legalese and coding? Yup, it’s the open-source FOSDEM shindig

    FOSDEM doesn’t get the ra-ra headlines or (thankfully) the “booth babes” but the conference does get networking and top technologists (and Belgian beer). I saw a couple of my tech heroes and big cheeses here a few minutes apart just before writing this, for example, and got some top advice for a specific tech issue a breath later.

    I also saw photos of RMS (Richard Stallman) at large a few paces away, though I didn’t get to meet him in person and buy one of his badges, alas…

    Man-flu and technicolour yawning on the second day didn’t stop me having riotous fun with geekery, champers and IP lawyers this year!

  • Which Light Weight, Open Source Web Server is Right for You?

    If you use Linux, most likely Apache is your web server of choice. Apache is a great choice. It’s incredibly powerful, very reliable, and secure. There may, however, be certain deployments that either do not need all of the features found in Apache, do not have the resources to support Apache (such as in the case of an embedded system), or need something easier to manage. If that’s the case, fear not ─ there are plenty of light weight, open source, web servers out there ready to meet and exceed your needs.

  • Lightning Strikes at Salesforce with DIY Development Platform

    Salesforce’s new Lightning platform aims to make it easier for ordinary folks to build apps, and leverages open source tech to do so.

  • Is Pivotal’s Cloud Foundry open enough?

    A year ago, Pivotal announced its intent to set up a foundation for the open source Cloud Foundry project, but issues lurk in the bylaws and ownership of the name

  • Events

  • SaaS/Big Data

    • The art of learning OpenStack

      Trying to learn more about what OpenStack, the open source cloud infrastructure project, might have to offer? Need some help figuring something out, or inspiration for a new approach to try? We’re here to help. We have gathered some of the best how-tos, guides, tutorials, and tips published over the past month into this handy collection.

    • Hadoop Adjuncts Proliferate: YARN, Koya, Slider, and, Yes…Kafka

      Lately we’ve been covering tools that orbit Hadoop in the Big Data ecosystem, ranging from Elastic Search to Qubole, which offers analytics on Hadoop data as a service (HaaS), to the Apache Spark project. In this arena, Kafka and YARN are much talked about. YARN is a sub-project of Hadoop at the Apache Software Foundation that takes Hadoop beyond batch to enable broader data-processing. Kafka allows a single cluster to serve as the central data backbone for a large organization. With it, data streams are partitioned and spread over a cluster of machines to allow data streams larger than the capability of any single machine.

    • ClusterHQ Raises $12 Million, Building Data Layer for Docker
  • Databases

  • Oracle/Java/LibreOffice

    • Oracle tosses its Linux into Docker’s repository

      Oracle sometimes seems to be a bit miffed by enthusiasm for Linux container darling Docker because its own Solaris “Zones” have done containers for ages.

      Big Red also knows in its heart of hearts that Solaris isn’t for everyone, but reckons its own Linux is for anyone who fancies robust, well-supported Torvalds-spawn. And given that Docker needs an OS in which to run containers, Oracle has therefore decided to make Oracle Linux available in the Docker repository. The company will also package an Oracle-maintained version of MySQL and pop it in the same place.

  • FSF/FSFE/GNU/SFLC

    • GNU Autoconf Archive – News: Noteworthy changes in release 2015.02.04
    • GNU C Library 2.21 Released With Bug & Security Fixes

      Version 2.21 of the GNU C Library is now available. Glibc 2.21 fixes a lot of issues while also adding some new functionality.

      Glibc 2.21 has many bug fixes, several security fixes, a port to the Altera Nios II platform, a new sempahore algorithm, support for TSX lock elision on PowerPC, optimized string functions for AArch64, support for new MIPS ABI extensions, and many other changes.

      More details on glibc 2.21 can be found via the mailing list release announcement. Other GNU C Library 2.21 details can be found via the Sourceware.org Wiki.

    • FSF JavaScript guidelines picked up by Posteo Webmail

      Over the last few months, Webmail provider Posteo has been working with the FSF to license and tag all JavaScript on their Web site and Webmail system so that it is immediately identifiable as free software. They have also done everything possible to ensure that it is 100% compatible with the GNU LibreJS browser extension, which automatically blocks any potentially nonfree JavaScript, making it easy to browse the Web in freedom. This is an outstanding effort in defense of the freedom of Posteo’s users, and the company deserves recognition for it. We hope others will follow their lead.

  • Public Services/Government

    • Half of IT in Bizkaia province to be open source

      This year half of all the software applications at the Diputación Foral de Bizkaia (the provincial council of Bizkaia, Spain) will be open source, up from 25 percent in November 2014. The goal was announced on 12 November at the start of the LibreCon software conference. “Open-source technology offers competitiveness and savings, boosts the economy, promotes knowledge and makes us more transparent”, a press statement quotes Counsellor of the Presidency, Unai Rementeria, as saying.

  • Openness/Sharing

Leftovers

  • Science

    • Six Things Technology Has Made Insanely Cheap

      Innovation makes things cheaper, which frees up cash for consumers to buy other things. That drives the virtuous cycle of economic growth. We dug into the inflation data, more formally known as the personal consumption expenditures price index, to highlight some of the items that have seen the biggest discounts.

  • Health/Nutrition

    • Time to put mental health front and centre for this year’s general election

      The imperative to improve mental health in the UK is primarily a moral one. That said, even a hard-nosed economist, insensible to the suffering of individuals, should appreciate the benefits that better mental healthcare can bring. Unsurprisingly given its prevalence, mental illness has a huge economic impact: a 2010 report by the Centre for Mental Health estimated the aggregate costs in 2009-10 as £105.2 billion – rather more than the total NHS budget for the same year, £95.8 billion. As for the benefits of treatment, a report just released by the same Centre finds that, for every £1 invested in group cognitive-behavioural therapy for adolescents suffering from anxiety, £31 is saved in wider costs.

  • Security

    • Now Sharyl Attkisson’s Lawyer Suggests Her Personal Computer Wasn’t Hacked

      Sharyl Attkisson’s lawyer told the Daily Beast that an investigation that found no evidence her personal computer was hacked is “irrelevant” because it reviewed the wrong computer, despite her own repeated claims that the desktop in question had been compromised. He also falsely claimed her lawsuit against the federal government for alleged hacking was focused solely on a separate work computer.

    • Sneaky Linux malware comes with sophisticated custom-built rootkit

      A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that’s custom built for each infection.

    • DDoS malware for Linux systems comes with sophisticated custom-built rootkit

      A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that’s custom built for each infection.

    • UK government asks: How’s our hacking?

      We know that the NSA likes taking unsolicited action inside the computers of others. We know the FBI is also very much into hacking.

      Now, the UK government is telling the world that its spies and cops are hackers too — and has asked the public what they think about it

      In a new unprecedented document released on Friday, the UK government released the guidelines and rules that all British spy and law enforcement agencies have to follow in their “equipment interference” activities.

    • Friday’s security updates
  • Defence/Police/Secrecy/Aggression

    • The Fiery Cage and the Lynching Tree, Brutality’s Never Far Away
    • [Old] The War Photo No One Would Publish

      When Kenneth Jarecke photographed an Iraqi man burned alive, he thought it would change the way Americans saw the Gulf War. But the media wouldn’t run the picture.

    • ‘A Line in the Sand’ in Fight to Release Thousands of Prisoner Abuse Photos

      A federal judge is demanding that the government explain, photo-by-photo, why it can’t release hundreds, and perhaps thousands, of pictures showing detainee abuse by U.S. forces at military prison sites in Iraq and Afghanistan.

      In a courtroom in the Southern District of New York yesterday, Judge Alvin Hellerstein appeared skeptical of the government’s argument, which asserted that the threat of the Islamic State and Al Qaeda exploiting the images for propaganda should override the public’s right to see any of the photos.

    • Meet The Group That Now Rules Yemen

      Thirteen years ago they were just a few men, disaffected students and farmers, shouting outside a rural mosque in the north Yemeni highlands. Today, they are in charge. They’re known popularly as the Huthis; the U.S. believes they are an Iranian proxy and Saudi Arabia has already fought one war with them.

    • A Blackwater World Order

      The privatization of America’s wars swells the ranks of armies for hire across the globe.

    • Anarchists vs. ISIS: The Revolution in Syria Nobody’s Talking About

      The Middle East today is the last place anyone in mainstream western thought would think to look for progressive political thought, and even less to see those thoughts translated into action. Our image of the region is one of dictatorships, military juntas and theocracies built on the ruins of the former Ottoman Empire, or hollow states like Afghanistan, and increasingly Pakistan, where anything outside the capitol is like Mad Max. The idea of part of the region being not just free, but well on its way to utopian, isn’t one that you’re going to find on mainstream media.

  • Transparency Reporting

    • Why the secret criminal investigation of WikiLeaks is troubling for journalists

      Prosecutors in the Eastern District of Virginia began investigating WikiLeaks in 2010 after the site posted some of the quarter-million State Department cables leaked by Chelsea Manning.

      Last month, an official from the Department of Justice publicly confirmed the investigation is still ongoing. It was the first time anyone, including WikiLeaks’ own defense team, has gotten such confirmation since April 2014.

    • Supreme Court Rules in Favor of TSA Whistleblower Robert MacLean

      Whistleblower laws exist because government officials do not always act in the nation’s best interests.

      The Obama administration, in its war on whistleblowers, just lost a major battle. Major in its venue — the Supreme Court — and major in its implications for future whistleblower cases.

    • Senator Wyden Follows Up With Eric Holder On All Of The Requests The DOJ Has Totally Ignored

      As Attorney General Eric Holder is about to leave office, Senator Ron Wyden has sent him a letter more or less asking if he was planning to actually respond to the various requests that Wyden had sent to Holder in the past, which Holder has conveniently ignored. Wyden notes, accurately, that the government’s continued secrecy on a variety of issues “has led to an erosion of public confidence that has made it more difficult for intelligence and law enforcement agencies to do their jobs.”

    • WikiLeaks founder Julian Assange may sue UK Deputy Prime Minister Nick Clegg for ‘rape’ comment

      WikiLeaks co-founder Julian Assange is considering suing UK Deputy Prime Minister Nick Clegg for defamation over comments made regarding Assange’s legal situation.

      Speaking on LBC radio on Thursday (5 February), Clegg said that Assange should go to Sweden to “face very serious allegations and charges of potential rape.”

      Assange has been accused of sexually assaulting two women in Stockholm in 2010, however no formal charges have been made and Assange denies the allegations.

    • Assange considers law suit against UK Deputy Prime Minister
    • Scotland Yard has spent more than £10 million guarding Julian Assange in Ecuadorian Embassy

      Scotland Yard have spent more than £10 million on policing the Ecuadorian Embassy where Wikileaks founder Julian Assange has been avoiding extradition.

      Mr Assange was granted asylum by the government of Ecuador and has been holed up in the building in Knightsbridge since 2012.

      The Metropolitan Police have posted round-the-clock police officers outside the building ever since, costing an estimated £10,500 a day.

  • Finance

    • The Billionaires at Burning Man

      For his 50th birthday, Jim Tananbaum, chief executive officer of Foresite Capital, threw himself an extravagant party at Burning Man, the annual sybaritic arts festival and all-hours rave that attracts 60,000-plus to the Black Rock Desert in Nevada over the week before Labor Day. Tananbaum’s bash went so well, he decided to host an even more elaborate one the following year. In 2014 he’d invite up to 120 people to join him at a camp that would make the Burning Man experience feel something like staying at a pop-up W Hotel. To fund his grand venture, he’d charge $16,500 per head.

  • PR/AstroTurf/Lobbying

    • Some Other Tall Tales Brian Williams Might Want to Apologize For

      NBC Nightly News anchor Brian William has apologized for falsely claiming (NBC, 1/30/15) that “during the invasion of Iraq…the helicopter we were traveling in was forced down after being hit by an RPG.”

    • Rumors of the Walker Probe’s Death Have Been Greatly Exaggerated

      After a January 30, 2015 ruling from Milwaukee-based federal Judge Charles Clevert, some declared that the “John Doe” probe into alleged campaign finance violations by Governor Scott Walker’s campaign was dead.

      The Franklin Center’s Wisconsin Reporter website claimed that Judge Clevert’s decision “effectively pulled the life support plug” on the investigation. The Milwaukee Journal Sentinel’s right-wing columnist Christian Schneider repeated his erroneous “zombie law” claim, declaring that the ruling “almost certainly means the end of the most recent John Doe investigation.”

  • Censorship

    • Google Chrome Dragged Into Internet Censorship Fight

      Google’s lawsuit against Mississippi State Attorney General Jim Hood is a crucial case for the future of SOPA-like Internet filters in the U.S. This week Digital Citizens Alliance, Stop Child Predators and others voiced their support for the Attorney General, suggesting that Google Chrome should be censored as well.

    • France Implements Administrative Net Censorship

      After review by the French Cabinet last Wednesday, the implementation decree for the administrative blocking of pedopornographic and terrorist websites was published today.

  • Privacy

    • WhatsApp security bug shows private pictures to strangers

      A security problem in WhatsApp means that anyone can see users’ profile photos, even if they have been set to be viewable to friends only, according to security researchers.

    • Proposed changes to US data collection fall short of NSA reformers’ goals

      US intelligence community issues limited list of tweaks to data collection and surveillance at end of year-long effort to respond to Snowden revelations

    • The Newest Reforms on SIGINT Collection Still Leave Loopholes

      Director of National Intelligence James Clapper this morning released a report detailing new rules aimed at reforming the way signals intelligence is collected and stored by certain members of the United States Intelligence Community (IC). The long-awaited changes follow up on an order announced by President Obama one year ago that laid out the White House’s principles governing the collection of signals intelligence. That order, commonly known as PPD-28, purports to place limits on the use of data collected in bulk and to increase privacy protections related to the data collected, regardless of nationality.

    • Lawmakers Call for Investigation Into Verizon’s Use of Mobile ‘Supercookies’

      Three Democratic lawmakers on the influential Senate Committee on Commerce, Science and Transportation are calling on federal regulators to investigate Verizon for its practice of using unique customer codes to track the online activities of its wireless subscribers.

    • Two things I’ve learned from using Tor Browser

      So for the past three months I’ve been using Tor Browser to surf the Web, not as a primary browser, but as a secondary browser. Firefox is my primary browser.

      Together with using StartPage as my search engine, I feel much better about my privacy while surfing the Internet. Using Tor Browser leads to a tad slower browsing experience, but I knew that going in, so no complaints there.

    • DEA using license-plate readers to take photos of US drivers, documents reveal

      The Drug Enforcement Administration (DEA) is using license-plate reader technology to photograph motorists and passengers in the US as part of an official exercise to build a database on people’s lives.

      According to DEA documents published on Thursday by the American Civil Liberties Union (ACLU), the agency is capturing images of occupants in the front and rear seats of vehicles in a programme that monitors Americans’ travel patterns on a wider scale than previously thought.

    • Investigative Journalists and Digital Security

      About two-thirds of investigative journalists surveyed (64%) believe that the U.S. government has probably collected data about their phone calls, emails or online communications, and eight-in-ten believe that being a journalist increases the likelihood that their data will be collected. Those who report on national security, foreign affairs or the federal government are particularly likely to believe the government has already collected data about their electronic communications (71% say this is the case), according to a new survey of members of Investigative Reporters and Editors (IRE) – a nonprofit member organization for journalists – by the Pew Research Center in association with Columbia University’s Tow Center for Digital Journalism

    • Russia might start blocking Internet anonymizers like Tor

      Leonid Levin, the head of the Duma’s committee on public communications policy, wants to grant police the extrajudicial power to block access to Internet anonymizers and “the means of accessing anonymous networks, such as Tor.”

    • GCHQ-NSA intelligence sharing unlawful, says UK surveillance tribunal
    • UK-US surveillance regime was unlawful ‘for seven years’

      Regulations governing access to intercepted information obtained by NSA breached human rights laws, according to Investigatory Powers Tribunal

    • GCHQ spying on British citizens was unlawful, secret court rules in shock decision
    • GCHQ’s Internet surveillance with US ruled unlawful

      Spy agency could now be forced to reveal whether it spied on civil rights groups after watchdog human rights ruling

    • UK tribunal says intelligence-sharing with U.S. was unlawful

      A British tribunal ruled on Friday that some aspects of intelligence-sharing between security agencies in Britain and the United States were unlawful until December 2014, in a ground-breaking case brought by civil liberties groups.

      The Investigatory Powers Tribunal ruled that Britain’s GCHQ had acted unlawfully in accessing data on millions of people in Britain that had been collected by the U.S. National Security Agency (NSA), because the arrangements were secret.

      Campaign groups Liberty, Privacy International, Amnesty International and others brought the case following revelations about mass surveillance made by former NSA contractor Edward Snowden.

    • Electronic Surveillance by Spy Agencies Was Illegal, British Court Says

      The court that oversees intelligence agencies in Britain ruled on Friday that the electronic mass surveillance of cellphone and other online communications data had been conducted unlawfully.

      The legal decision, the first time the court has ruled against the British intelligence services since the tribunal was created in 2000, relates to information that was shared between British security agencies and the National Security Agency of the United States before December 2014.

      Although privacy campaigners claimed the decision as a victory, many experts said the British and American intelligence agencies would continue to share information obtained with electronic surveillance, even if they had to slightly alter their techniques to comply with human rights law.

    • In Historic Ruling, U.K. Surveillance Secrecy Declared Unlawful

      The United Kingdom’s top surveillance agency has acted unlawfully by keeping details about the scope of its Internet spying operations secret, a British court ruled in an unprecedented judgment issued on Friday.

      Government Communications Headquarters, or GCHQ, was found to have breached human rights laws by concealing information about how it accesses surveillance data collected by its American counterpart, the National Security Agency.

  • Civil Rights

    • Polaneczky: Innocent frequent flier detained after run-in with TSA

      Once the items were deemed harmless, Vanderklok says, he told Kieser that if someone had only told him what “organic matter” meant, he could have saved everyone a lot of trouble. Kieser then became confrontational. Vanderklok says he calmly asked to file a complaint. He then waited while someone was supposedly retrieving the proper form.

      Instead, Kieser summoned the Philadelphia Police. Vanderklok was taken to an airport holding cell, and his personal belongings – including his phone – were confiscated while police “investigated” him.

      Vanderklok was detained for three hours in the holding cell, missing his plane. Then he was handcuffed, taken to the 18th District at 55th and Pine and placed in another cell.

      He says that no one – neither the police officers at the airport nor the detectives at the 18th – told him why he was there. He didn’t find out until he was arraigned at 2 a.m. that he was being charged with “threatening the placement of a bomb” and making “terroristic threats.”

      Vanderklok’s Kafkaesque odyssey finally ended at 4 a.m., when his wife paid 10 percent of his $40,000 bail.

      When I heard this story, my first thought was that Vanderklok had to have said or done something outrageous for others to respond with such alarm. In fact, Kieser said as much at Vanderklok’s trial on April 8, 2013.

      [...]

      But here’s the thing: Airport surveillance videos show nothing of the sort.

    • Fairfax SWAT team raids high stakes Great Falls poker game, seizes cash, terrifies players

      On a quiet weeknight among the stately manors of Great Falls, ten men sat around a table in the basement of a private home last November playing high stakes poker. Suddenly, masked and heavily armed SWAT team officers from the Fairfax County Police Department burst through the door, pointed their assault rifles at the players and ordered them to put their hands on the table. The players complied. Their cash was seized, including a reported $150,000 from the game’s host, and eight of the ten players were charged with the Class 3 misdemeanor of illegal gambling, punishable by a maximum fine of $500. The minimum buy-in for the game was $20,000, with re-buys allowed if you lost your first twenty grand.

      [...]

      “It’s crazy,” said the regular, looking back on the night of the raid. “They had this ‘shock and awe’ with all of these guys, with their rifles up and wearing ski masks.” He noted that the Justice Department recently revamped its guidelines for civil forfeiture cases, following reports by The Post about abuses of the seizure process by police around the country, including Fairfax. But in Virginia, the seizure law remains the same, and agencies may keep what they seize, after going through a court process.

    • When Cops Break Bad: Inside a Police Force Gone Wild

      Looking west from the scrub and boulders of the Sandia Mountains, the city of Albuquerque, New Mexico, sprawls across the valley of the Rio Grande, surrounded by the vast openness of the high desert. On the city’s eastern edge, the winding roads and cul-de-sacs of tony subdivisions in the Northeast Heights abruptly give way to the foothills of the mountains, whose sharp red peaks tower over the city.

    • Coca-Cola pulls Twitter campaign after it was tricked into quoting Mein Kampf

      Coca-Cola has been forced to withdraw a Twitter advertising campaign after a counter-campaign by Gawker tricked it into tweeting large chunks of the introduction to Hitler’s Mein Kampf.

      For the campaign, which was called “Make it Happy” and introduced in an ad spot during the Super Bowl, Coke invited people to reply to negative tweets with the hashtag “#MakeItHappy”.

      The idea was that an automatic algorithm would then convert the tweets, using an encoding system called ASCII, into pictures of happy things – such as an adorable mouse, a palm tree wearing sunglasses or a chicken drumstick wearing a cowboy hat.

      In a press release, Coca-Cola said its aim was to “tackle the pervasive negativity polluting social media feeds and comment threads across the internet”.

    • U.S. official: “No coincidence” Islamic State victims in Guantanamo-like jumpsuits

      A top U.S. defense official said it was “no coincidence” that recent Islamic State videos of the savage executions of Jordanian and Japanese hostages showed the victims wearing orange jumpsuits, “believed by many to be the symbol of the U.S. detention facility at Guantanamo Bay.”

    • Fox Host Offers Brazenly Dishonest Defense For Calling Bipolar Disorder “Made Up”

      Fox News Radio host Tom Sullivan is backtracking and brazenly lying about his controversial remarks calling bipolar disorder “made up” and “the latest fad.” While Sullivan now claims his remarks were taken “out of context,” this defense is preposterous. He repeatedly dismissed the validity of bipolar disorder and the clip used by Media Matters was the same one posted by his employer with the headline “(AUDIO) Bipolar Woman Says She DESERVES Disability Benefits. Tom Tells Her She’s WRONG!”

    • An Elite That Has Lost the Impulse to Police Itself

      Few in public life are as contemptuous of privacy as Stewart Baker, an attorney whose career has included stints at the NSA and Department of Homeland Security. He is a staunch defender of most every U.S. government surveillance effort. As Americans expressed alarm at the scope of spying revealed by Edward Snowden, he delivered a speech asserting that they were engaged in an irrational moral panic.

      But even this man, who believes that bulk, warrantless surveillance is fine under the Fourth Amendment, acknowledges that the Drug Enforcement Administration deserves censure for secretly operating surveillance programs. In fact, he believes that the DEA’s behavior was egregious enough that the public’s failure to respond more forcefully calls the value of transparency itself into question.

      Yet he isn’t personally condemning the DEA.

    • HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress
    • CIA’s Merlin Was Arranging Fake Nuclear Deals on an AOL Account Shared with His Wife and Kids

      Witness after witness in the Jeffrey Sterling trial made claims about how closely held the program was. “More closely held than any other program,” Walter C, a physicist who worked on the program described. “More closely held,” David Shedd, currently head of the Defense Intelligence Agency and head of Counterproliferation Operations until just after the Merlin op.

      Of course, Bob S’ admission that — when FBI showed him a list, in 2003, of 90 people cleared into the program, he said it was incomplete — suggests all those claims are overstated.

  • Internet/Net Neutrality

    • Undoing Michael Powell’s Mischief at the FCC

      Michael Powell tried to do for broadband Internet what his father did for Iraq.

      One of the first things George W. Bush did after he was installed in the Oval Office was to put the younger Powell, who was fond of saying things like “the oppressor here is regulation” (Washington Post, 1/23/01), in charge of the agency that regulates media. His blithe attitude toward the consequences of his beloved market was perhaps best expressed by his dismissal of concerns over the digital divide (Chicago Tribune, 2/7/01): “You know, I think there’s a Mercedes divide. I’d like to have one; I can’t afford one.”

    • Morning Joe’s Net Neutrality Conflict Of Interest

      MSNBC’s Harold Ford, Jr. used air time to push net neutrality myths without disclosing his relationship to the telecom industry, which has contributed millions of dollars to lobbying against net neutrality regulations.

    • Stop Saying That The FCC Is ‘Treating Internet As A Utility’ — It’s Not

      Now that FCC boss Tom Wheeler has made it official that he’s going to present rules to reclassify broadband under Title II for the purpose of implementing stronger net neutrality rules (details still to come…), the opponents to this effort have come out of the woodwork to insist, over and over again, that reclassifying is “treating the internet as a utility.” The cable industry’s main lobbyists, NCTA, decried “Wheeler’s proposal to impose the heavy burden of Title II public utility regulation….” and AT&T screamed about how “these regulations that we’re talking about are public-utility-style regulations…” Former Congressman Rick Boucher, who is now lobbying for AT&T whined that “subjecting broadband to public utility regulation under Title II is unnecessary.”

  • Intellectual Monopolies

    • MSNBC’s The Ed Show Highlights Report On Media’s Poor Coverage Of Historic Trans-Pacific Partnership Negotiations
    • I’ve seen the secrets of TTIP, and it is built for corporations not citizens

      It appears that, even though I am past 50, my opportunities to become a spy have not expired. This is because, as an MEP, I have now been granted privileged access to the European parliament restricted reading room to explore documents relating to the Transatlantic Trade and Investment Partnership (TTIP) deal. But before I had the right to see such “top secret” documents, which are restricted from the gaze of most EU citizens, I was required to sign a document of some 14 pages, reminding me that “EU institutions are a valuable target” and of the dangers of espionage. Crucially, I had to agree not to share any of the contents with those I represent.

    • Copyrights

      • Data retention: the copyright mafia want laws in place

        Australia’s current Prime Minister Tony Abbott has asked the Opposition to back data retention laws by mid-March, playing the security card to try and pressure Labor leader Bill Shorten.

        But, as I’ve pointed out on more than one occasion, this rush to retain data of internet users is for other reasons. One, to satisfy big American media companies who want to use retained data to threated those whom they deem to be copyright violators.

        Australian ISPs have been given until April by the government to agree on a scheme for preventing what the big film and music companies call copyright theft. The mid-March deadline for passing data retention laws fits into that scheme neatly.

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts