IRC Proceedings: January 11th – January 17th, 2015
IRC Proceedings: January 18th – January 24th, 2015
IRC Proceedings: January 11th – January 17th, 2015
IRC Proceedings: January 18th – January 24th, 2015
Oracle CTO Larry Ellison wants a bigger piece of the server market and is taking direct aim at Cisco’s UCS to grow share. Oracle’s new X5 Engineered Systems portfolio is a bid by the company to provide lower-cost two-socket converged infrastructure systems running Linux at very competitive price points.
The Gummiboot simple UEFI boot manager hasn’t seen much improvements in recent months but on Friday received a new feature over the course of several hundred new lines of code.
Daniel Vetter of Intel’s Open-Source Technology Center sent in yet another Intel drm-next pull request to David Airlie for accepting into the 3.20 DRM-Next Git tree before he closes off the tree for accepting new feature code (Airlie’s change for the past few kernels has been to stop accepting new code a few weeks before the N-1 release). With this latest Git pull request, the changes aren’t too exciting:
Bryce Harrington, the former Canonical employee part of Ubuntu’s X/Mir team turned Samsung open-source employee, has issued the first maintenance update for Wayland 1.6.
Emil Velikov announced the Mesa 10.4.3 point release during the early hours of today. While most Mesa stable updates aren’t too exciting, this one is certainly noteworthy if you’re a user of the Gallium3D “Nine” state tracker for providing Direct3D 9 support on Linux.
Dying Light is a survival horror game developed by Techland. Up to now its release later this month has been billed as a Windows / PlayStation 4 / Xbox One title, but it looks now like it will premiere on Steam for Linux / SteamOS.
Two more games entered Early Access on Steam during the past couple of days: Armello, a combination of card and board games with role-playing elements, and Perfect Golf, a realistic golf simulator.
Fancy is not a part of Zenwalk Linux. Functionality and workable lightweight infrastructure are. As the developer states in his postings, only usability matters. I like the philosophy behind Zenwalk. I am less impressed with its lackluster desktop environment. Also, I ran out of patience trying to find a solution to the password-not-working issue. The developer needs to provide a quick response.
zenwalkToday in Linux news, Jack Germain has a review of Zenwalk and Dedoimedo.com tries to review Chakra. With the pro-32 bit architecture folks seemingly winning the argument, Bruce Byfield weights in saying what’s surprising is that it’s taken so long to deprecate. Elsewhere, Softpedia.com is reporting that Linus Torvalds patched the kernel to fix a Witcher 2 issue.
The “14.1” indicates an updated and polished release of Netrunner 14 LTS on the same underlying base. Since 14.1 is using the same base “trusty” like Netrunner 14, there is no need for users of 14 to migrate: Simply updating from the shared backports ppa of the Frontier release cycle should give the same result, while keeping customizations in place.
GParted Live, a small bootable GNU/Linux distribution for x86-based computers that can be used for creating, re-organizing, and deleting disk partitions with the help of tools that allow managing file systems, has been upgraded to version 0.21.0 Beta 1.
I recently started using the Slack group chat tool in a few teams. Wishing to add some vanity notifications such as sales and user growth milestones from some Django-based projects, I put together an easy-to-use integration between the two called django-slack.
The next version of the ever-popular Ubuntu Linux distribution is in development and it will be called Vivid Vervet. There are only a few letters left in the alphabet before Canonical will have to come up with a new naming convention, but for now, the alliteration can continue.
Meizu has already outed the first member of its new M1 family, the M1 Note. But the phablet has long been rumored to get a smaller sibling, ever since the M1 project was known just by its codename – Blue Charm.
And Meizu is now quite close to unveiling the M1 Mini. The official introduction will take place on January 28 at a special event. In the meantime more details about the upcoming smartphone have been leaked.
Meizu leaks and rumors were rather quiet for a while, but not anymore. Meizu’s January 28 event is getting closer and closer by the day, and we’re getting more and more information about Meizu’s upcoming products, well, alleged products. We’ve reported earlier today that Meizu might offer the upcoming M1 Mini handset in three different OS variants, running Flyme, YunOS and Ubuntu (Touch) OS. This leak actually sounds really interesting, as I already mentioned, and I’d love to see an Ubuntu-powered Meizu handset, which will happen sooner or later because Canonical and Meizu signed a partnership agreement a while back.
Ninja Blocks has begun shipping the Ninja Sphere and announced it has signed up as a key partner for Canonical’s Ubuntu Core embedded device operating system, as it opens its first office in the US.
The startup launched in 2012, when it was selected to participate the Startmate accelerator program, and also smashed a Kickstarter campaign for its first product, which was also called Ninja Blocks.
A Linux-based desk with WiFi, Bluetooth, and a 5-inch touchscreen automatically adjusts between sitting and standing, and tells you when it’s time to move.
Surfing the web privately is something many web users are interested in, whether they’re doing it on a desktop, laptop or mobile device, but not many people know how to do it. Recently, a detailed WhoIsHostingThis infographic showed you how to secure your connection using a VPN — a virtual private network created on top of a public network to anonymize web traffic — on Windows, Mac and iOS, assuming the user already has access to a VPN service. Phone Arena has put together a similar step-by-step guide of enabling VPN connectivity on Android devices.
It’s not enough to be able to come up with a concept, digitally or 3D design it, and then 3D print it. It’s not enough to be able to replicate and prototype items nearly out of thin air. It’s not enough to have sleek, mind-boggling technology. The question that nearly always follows is, “Yeah, cool — but can I do it from my phone?” It’s the obvious contemporary question that everyone has for the most part, including the guys who make these fantastical products.
Frog by Wyplay is an independent open source software platform for pay-TV operators. The initiative brings together a growing ecosystem of almost 80 companies across the entire digital TV technology value chain including chipset vendors, device manufacturers, independent software vendors, software development and integration services providers and operators.
Some of the folks behind the development of Open vSwitch (OVS) are now working on a new project to add virtual networking for OVS users.
Open source SaaS vendor Open-Xchange gained another partner ally this week in its quest to offer an open source alternative to Microsoft Exchange. The partner, ExtendASP, will integrate the company’s OX App Suite into its customer and product manager solutions.
The move, which the companies announced Jan. 21, promises to increase OX App Suite’s customer base. In that way, it strengthens the position of Open-Xchange as it competes with entrenched proprietary foes in the office-productivity suite market.
You’ve probably seen the cute little dinosaur that appears when Chrome can’t establish a network connection. Well he’s actually the star of his own endless runner game that you can play on PC and Android.
Passwords are always going to be vulnerable to being cracked. Fortunately, there are solutions out there that are making it safer for users to interact with services on the web. The new standard in protecting users is Universal 2nd Factor (U2F) authentication which is already available in browsers like Google Chrome.
The risk of unpatched software is one that WordPress understands well and is taking aggressive steps to mitigate.
While DragonFlyBSD 4.0.2 was released just two weeks ago, the v4.0.3 update is now out.
Chris Buechler has released version 2.2 of the pfSense FreeBSD-based firewall/router focused software platform.
In a study of more than 2,000 college students, the U.S. Public Interest Research Group found that the average American college student spends approximately $1,200 on books and supplies per year. The same study found that 65% of college students opt to not purchase textbooks because the prices are too high.
The new “ORC” Just-In-Time compilation APIs have landed within mainline LLVM.
The following articles on the CIA Haiti sponsored narcotics smuggling by Dennis Bernstein, Howard Levine and Jim Lobe were published in the 1990s and republished by Global Research 25 February 2004. They shed light on the history of US interventionism in Haiti, focusing on the 1991 CIA led military coup. The coup was led coup by general Raul Cedras, resulted in the overthrow of the democratically elected government of President Aristide.
A measles outbreak has sickened 70 people at Disneyland, and could be the spark that brings the once-eradicated disease back in force.
Obesity has hit Australia hard in recent years — but how do our waistlines compare to those around the world? This map, put together from recent obesity data obtained by the CIA, shows that Australia is not alone.
The map, put together by Clinic Compare, shows that the percentage of the population that is clinically obese. Sure, a quarter of Australians are obese, so too Britons. But there are some surprises on the map: 33 per cent of Saudi Arabians, 32 per cent of Mexicans and 30 per cent of Argentinians and are dangerously overweight, for instance.
A device used to monitor the gasoline levels at refueling stations across the United States—known as an automated tank gauge or ATG—could be remotely accessed by online attackers, manipulated to cause alerts, and even set to shut down the flow of fuel, according to research to be published on Thursday.
The Hill’s networks are under constant attack. In 2013 alone, the Senate Sergeant at Arms’ office said it investigated 500 potential examples of malicious software, some from sophisticated attackers and others from low-level scammers. And that’s just the serious cases — in a different measurement, the House IT security office said in 2012 it blocked 16.5 million “intrusion attempts” on its networks.
Yes, the Empire’s leaders really believe that they have become gods. And now we only hear their twisted propaganda slogans, and their self-glorifying lies. They have become like those preachers and priests of the bygone eras: sadistic but constantly frightened, brutal and suspicious.
“Everything changed for Sterling when he filed a discrimination complaint in 2000.”
The jury is still out in the trial of former CIA officer Jeffrey Sterling for allegedly having leaked the story of “Operation Merlin” – the covert CIA effort to lure Iran into working on phony plans for a key component of a nuclear weapon – to New York Times reporter James Risen.
The jury is still out in the trial of former CIA officer Jeffrey Sterling for allegedly having leaked the story of “Operation Merlin” – the covert CIA effort to lure Iran into working on phony plans for a key component of a nuclear weapon – to New York Times reporter James Risen.
But “Operation Merlin” itself was also on trial. The CIA was hoping that testimony by prosecution witnesses and a series of declassified CIA cables introduced as evidence would show that Risen’s account was wrong in recounting that the CIA’s human asset “Merlin” had immediately spotted a flaw in the plans to be turned over to Iran that Iranian engineers might be able to spot as well.
Six days of testimony at the trial of former CIA officer Jeffrey Sterling have proven the agency’s obsession with proclaiming its competence. Many of the two-dozen witnesses from the Central Intelligence Agency conveyed smoldering resentment that a whistleblower or journalist might depict the institution as a bungling outfit unworthy of its middle name.
In a trial that whistleblower advocates have called “damage control” for the CIA, federal prosecutors are pursuing espionage charges against whistleblower Jeffrey Sterling. The case stems from the agency’s attempts to feed Iran flawed nuclear schematics.
Thus they are plotting revenge by simultaneously destabilizing «populist» states and inciting civil war in Venezuela. The fresh troops arriving at the CIA stations are already diving into these new jobs.
Channel 4 News has admitted it could have “challenged more strongly” the views of an ex-CIA officer, who told the programme the best solution to violence in the Middle East was for Muslims to kill each other until they “bleed each other white”.
Michael Scheuer, who was in the CIA from 1982 and 2004 and was involved in the hunt for Bin Laden, said Sunni and Shia Muslims should be left to fight each other, adding the situation was “ideal” when the brutal Islamic State (IS) was advancing on Baghdad and poised to carry out a massacre.
Frank Archibald, the director of the CIA’s National Clandestine Service, plans to retire from his position within the CIA. Archibald was 57 when he took the position in 2013.
The secretive head of the agency’s National Clandestine Service is retiring amid reports of infighting over a reorganization of the intelligence service.
The director of the CIA’s National Clandestine Service, the storied home of the agency’s most secretive intelligence operations, has announced that he plans to retire, The Daily Beast has learned.
CIA spokesman Dean Boyd confirmed that the director announced his retirement “after a long and distinguished career at CIA. We thank him for this profound and lasting contributions to both CIA and to our nation’s security.”
As a practice, the CIA doesn’t identify the head of the clandestine service by name. But Frank Archibald was outed in a Twitter post in 2013, and details of his biography were known to some journalists. Archibald, who was 57 when he took the job that year, reportedly served tours in Pakistan and Africa and also headed the CIA’s Latin America division. The Associated Press reported that Archibald “once ran the covert action that helped remove Serbian President Slobodan Milosevic from power.”
American spies secretly intercepted communications between those involved in the murder of Alexander Litvinenko and provided the key evidence that he was killed in a Russian-backed “state execution”, The Telegraph can disclose.
The National Security Agency (NSA) obtained electronic communications between key individuals in London and Moscow from the time that the former spy was poisoned with radioactive material in central London. The evidence was passed to the British authorities.
As the start of the public inquiry into the poisoning of Alexander Litvinenko in London approaches, an investigation has claimed to reveal “proof” Russia was behind the dissident’s murder.
Scotland Yard found the former Russian spy had consumed a fatal dose of polonium-210 during a meeting with two former KGB contacts at the Millennium Hotel eight years ago but Russia denied any involvement and refused to extradite the suspects.
Officials at the Fort Hood Army base in central Texas could not have prevented a shooting rampage last year in part because the troubled soldier behind the attack gave no clear warning that he posed a threat, according to an Army report released Friday.
If you think this is too harsh, please remember that anyone convicted could be freed by presidential pardon. But the world would know Americans are against torture and our flag can go back up the pole to the top.
Mr. Kissinger hired Mr. Marshall away from Rand, telling him that the intelligence the White House was receiving was “lousy” and “even worse than what one could find in the national press.” He asked the 48-year-old analyst to study the problem.
In their new book “The Last Warrior,” defense analysts Andrew Krepinevich and Barry Watts detail the career and legacy of Andrew Marshall, who recently retired as director of the Pentagon’s Office of Net Assessment after four decades in the job. (See my review.) Early on, they explain why Marshall left his longtime job at the Rand Corp. and moved to Washington in late 1969. President Richard Nixon and National Security Advisor Henry Kissinger had decided that the information they were receiving from the intelligence agencies was “sorely lacking” — and they brought in Marshall to take a look at the problem.
Nixon didn’t believe CIA analyses of Soviet military capabilities and intentions…
After landing at the Rabat airport in 2010, Zakaria Moumni, a former kickboxing world champion, was distressed when he was taken aside by security agents, arrested, blindfolded and taken on a ride under a blanket in the back seat of a car to a secret facility. He says he was held there for four days, during which he was deprived of food and water.
“There is no worse feeling than this hopelessness of being blindfolded and handcuffed naked without being able to control anything,” said Mr. Moumni, 34, who spoke from Paris, where he now lives. “They told me that I was in a slaughterhouse and that I was going to leave in small pieces.”
The Pentagon and the White House are pushing back on reports that the Obama administration is pausing drone strikes and other counterterrorism operations in Yemen, amidst the abrupt collapse of a critical partner government.
The Obama administration has been forced to suspend certain counterterrorism operations with Yemen in the aftermath of the collapse of its government, according to U.S. officials, a move that eases pressure on al-Qaida’s most dangerous franchise.
What is revealed is the ways that the highest-ranking officials in America sanctioned actions that we usually think of as occurring under brutal dictators and leaders who are brought up on charges of war crimes at the International Criminal Court at The Hague.
As the chief spokesman for the CIA, Mark Mansfield was not the first to refer to his position as “the ultimate oxymoron.” He became the not-quite-public face of a secretive agency, tasked with the job of neither confirming nor denying anything publicly.
Poor John McCain and Lindsey Graham, Washington’s original first couple. They only wanted to arm the ‘moderate opposition’ in Syria. Three years on, how come their master plan isn’t working, while ISIS has grown so strong?
In using drones in this way, the Americans seemed to sacrifice the very “precision” that supporters of drone warfare have always argued is one of its principal advantages: after all, there is nothing “targeted” about a “signature strike”. And in any case, “precision” is a rather elastic term when employed in this context. The Hellfire missiles fired by Predator drones, for example, have a “kill zone” of 15 metres (in other words, nothing inside a 15-metre radius survives), whereas the successor to the Predator, the Reaper, is able to fire something called the “Small Smart Weapon”, which can kill an individual while leaving the people in the next room unscathed. Chamayou reports that American strategists expect that in 25 years’ time they will be using “nano-drones”, tiny robotic insects capable of operating in very confined spaces with unimaginable precision.
The site said the provincial government refused special permission for Obama’s car, called the Beast, as well as his motorcade, inside the gates of the famous Taj Mahal in Agra, India.
Just before Obama left Washington for New Delhi, the White House announced that he will no longer travel to the Taj Mahal on Tuesday. Instead, he will stop in Riyadh on his way home.
As the allied bombing of Libya began in 2011, the Obama administration rejected an offer by Moammar Gadhafi to engage in negotiations to abdicate, according to a retired U.S. Navy officer who says he was prepared to broker the deal.
Emerson’s comments drew widespread ridicule, and led to prime minister David Cameron describing him as “a complete idiot.”
The pundit formally apologised and donated £500 to a Birmingham children’s hospital.
There is hard evidence that the United States government has been trying to destabilize Venezuela since the election of socialist President Hugo Chavez in 1998 to the current government of President Nicolas Maduro. Let’s count down the top 5 ways.
More tax dollars consumed, more intrusions in our lives, the further militarization of the country, the dispatching of some part of the U.S. military to yet another country, the enshrining of war or war-like actions as the option of choice — this, by now, is a way of life. These days, the only headlines out of Washington that should surprise us would have “narrowing” or “less,” not “broadening” or “more,” in them.
U.S. drone strikes that hit their intended targets only 21% of the time have resulted in the killings of hundreds of civilians, including children, in America’s hunt for terrorists in Yemen and Pakistan.
According to a data analysis by human rights group Reprieve, CIA drone strikes in Pakistan killed as many as 221 people, including 103 children, in the hunt for just four men on President Barack Obama’s secret Kill List, the Express Tribune reported. The Kill List is a covert program that selects individual targets for assassination and requires no public presentation of evidence or judicial oversight.
The armed forces seem to be reassuring themselves that the violence they inflict — and the violence the enemy inflicts in return — is definitely worth it, according to David Axe
If Guantanamo was the icon of President George W. Bush’s anti-terror policy, drones have become the emblem of the Obama presidency. Indeed, Chamayou maintains that President Barak Obama has adopted a totally different anti-terror doctrine from his predecessor: kill rather than capture, replace torture with targeted assassinations.
If North Americans were asked, “Which country do you think is primarily responsible for supporting terrorism in the Middle East?” the answers would most probably be Iran, or Syria, or maybe Pakistan.
In fact, it is U.S. ally Saudi Arabia which is “the primary source for the funding of radical Islamist groups,” as Noam Chomsky has recently pointed out. (In fact, the U.S. government has itself reached the same conclusion.)
When it comes to the rise of the fanatical terrorist group, ISIS, Chomsky says that it “is a natural result” of the invasion of Iraq ordered by George W. Bush and Tony Blair: “One of the grim consequences of U.S.-U.K. aggression was to inflame sectarian conflicts … that have spread over the whole region.”
The invocation of terrorism is a relatively recent phenomenon, even if the practice of politically-oriented violence is not. A Google Ngram search of the keyword ‘terrorism’ shows that the word virtually did not exist before the 20th century:
The truth is that the troops, through what they’re doing over there, are indirectly destroying our country, our rights and freedoms, our safety and security, and our economic well-being.
The U.S. Air Force fleet of planes and pilots is stretched so thin, the service is considering hiring private military corporations flying supersonic jets to train its fighter jocks in mock air combat.
The likely presidential candidate is doubling down on on his support for anti-ISIS air strikes, despite new evidence that they aren’t working.
My own father, a decorated Navy war hero on US submarines during World War II and Korea, was tortured by his post-war “sins” that he carried for over 70 years all the way to his grave. His particular war sins were the result of being forced at gunpoint by US naval command to comply with America’s racist war policy to kill every Asian man, woman and child in Pacific waters during World War II, even innocent non-Japanese civilian families peacefully eking out a modest living in their small fishing boats. At one point when my machine gunner father couldn’t bear committing any more of his racist nation’s sins, after defiantly throwing his .50 caliber bullet belt to the deck and retreating down below deck to his bunk, his submarine captain charged after him with his revolver drawn ready to murder my father until several of my father’s shipmates talked the raging Medal of Honor winning skipper out of it. For the next seven decades my father agonized over the haunting images of gunning down little children and their mothers laying lifeless in their slowly sinking boats, turning the Pacific blue red with white man’s inhumanity toward yellow race people. But this is what the last “justified,” red, white and blue American war did to my father’s fragile human psyche. Rather than placing the blame squarely on United States war policy in the Pacific theater, he always blamed himself for murdering those innocent families whose only crime was being born with slanted eyes. His PTSD symptoms persisted the next 70 years, countless times suddenly jarred awake in the middle of the night in cold sweat moaning in agony over his nightmares of those haunting, indelible images from so many years before. Then on weekends he would regularly put on his treasured “Victory At Sea” records, and the lilting music like a trance would morosely place him right back into reliving his war trauma, wrestling with his inner demons hundreds of times over while drowning himself in alcohol, futilely self-medicating numbness amidst his lingering, unshakable pain. This is what war does. From any end of the gun, war is always wrong.
Despite public perception of whistleblowers changing for the better, the plight of those who choose to expose wrongdoings “has gotten a lot worse” in the US, former ethics adviser to Justice Department and Edward Snowden’s lawyer, Josselyn Radak, told RT.
JR: Public perception of whistleblowers is changing. You see both Edward Snowden and Bill Binney featured in the documentary Citizenfour by Laura Poitras, which has now been nominated for an Oscar award. People are beginning to realize the public value of the information brought forward by whistleblowers who were being persecuted and prosecuted for exposing illegality.
Binney is probably the most senior intelligence whistleblower in recent history. To give you an idea of his seniority – he designed most of the programmes that Edward Snowden leaked details about. So when William Binney talks about the dangers of mass surveillance, it pays to listen. It’s a bit like hearing Josef Goebbels talk about the risks of propaganda. The guy knows his stuff.
But the Times piece, by Jonathan Weisman and Ashley Parker, seems to treat the poor and middle class as almost interchangeable. Thus “Mitt Romney, vowing a campaign to ‘end the scourge of poverty’ if he runs for president a third time,” is presented as an example of the same phenomenon as “Mitch McConnell…encourag[ing] the Republican troops to refocus policy on the stagnant middle class.”
Yet these are very different political approaches, with different policy implications. The “middle-class tax cuts” Obama is said to favor wouldn’t do much for the poor, whereas the earned-income tax credit, whose expansion Rep. Paul Ryan (R-Wisc.) advocates, is designed to help the working poor rather than middle-income families.
Indeed, traditionally, the Republicans have accused Democrats of favoring the poor at the expense of the middle class (a charge that has led the Democrats for decades to declare their allegiance to the middle class).
The wealthy elite are getting even richer, and a new report says that by 2016, the top 1% will control more than half of the world’s wealth. What explains this staggering level of inequality, and is there any way to buck this trend? Prof. Wolff explains.
Iowa Republican senator Joni Ernst gave her party’s official response to the State of the Union address by boasting self-righteously about her humble origins and how her self-reliant, heartland-state family pulled themselves up by their own bootstraps, but conveniently failed to mention that her family’s farm was the beneficiary of nearly half a million dollars in federal subsidies.
Tsipras has unnerved financial markets with a pledge to overturn austerity and demands a debt write-off from European partners. But his message has resonated with Greeks struggling with unemployment over 25 percent and wage and pension cuts.
With the chance of the oncoming Greek elections EEL/LAK, an Athens-based NGO focused on the promotion of FLOSS and the Commons, has recently asked the political parties about their agenda in relation to Open Governance and the Commons. In total, four political parties replied -according to the polls three of them will succeed in electing MPs- proving that there has been a growing interest over the Commons discourse in Greece.
Vital services such as meals on wheels and home visits have been hit particularly badly since the ConDems came to power in 2010
The Washington Post claims that broadly disclosing that one of its opinion writers is a Republican lobbyist is sufficient even when he is advocating for positions that specifically benefit his firm’s unmentioned clients, a standard media critics say is “troubling” and “dishonest.”
On the one hand, in a fictional universe there is the Pakistani government that collaborates with the Taliban to attack the U.S. Embassy; on the other hand, in real life, there are children who are killed by the Taliban on the grounds that the Pakistani government organizes attacks in collaboration with Western powers. Here is the difference between fiction and reality for the U.S.
That’s not a story that’s limited to Clint-Eastwood-directed warsploitation movies. You’ll hear the same thing on Fox News, where this month Jeanine Pirro delivered a bloodthirsty rant calling for mass murder as a solution to the problem of Muslim extremism, and the network repeatedly made the false claim that radical Islamists had taken over parts of European cities, turning them into Muslim-only “no-go” zones.
That’s its own form of dangerous extremism. Its premises are wrong, and its results are dangerous. By feeding that narrative, American Sniper is part of the problem.
In yet another act sure to increase the speed of George Orwell’s rotations in his grave, the NHS has decided that the opt-out forms I pointed out to many of you a year ago are not worth the paper they are printed on or emails they are sent in. Because, you see, you might have not understood fully the implications of opting out of your data being shared with private companies.
In the wake of the Paris murders, and the subsequent arrests in Belgium, the question of cyber-security and surveillance has again risen to the top of the news agenda. I’m not going to add to the debate here, beyond pointing out that I have a libertarian viewpoint on this; I’ll leave it for others more articulate than myself to make the argument for me.
A more realistic analogy is this: the government simply tell the Post Office (the UK national delivery service) to steam open every letter, from anyone to anywhere, photocopy the contents, file them away, and then send the letter on. Keeping the contents so that they can refer back to them retrospectively. And whilst the Post Office are busy filing your records, BT (UK national landline carrier) is busy recording every single phone conversation you make. It’s the equivalent of having that message “Your call may be recorded for training purposes” built in to the telephone network.
The increasing use of encryption technologies in everyday emails and messaging services will lead to “ethically worse” behaviour by the intelligence agencies, a former head of GCHQ has predicted.
Sir David Omand warned there would be greater intrusion on individuals’ privacy, not less, if agencies are unable to intercept communications – because they will be forced into more direct spying methods.
Fifteen state representatives have signed onto a bill that would require police to get a warrant before using surveillance technology that mimics cellphone towers to identify nearby phones.
David Taylor, R-Moxee, introduced House Bill 1440 this week to promote electronic privacy, he said.
His legislation doesn’t appear to propose changes for the Tacoma Police Department, the only Washington police agency known to possess the device commonly called a Stingray. The device finds suspects by the cellphones they carry. Once connected, the police can capture precise locations of a suspect’s phone and metadata — who he or she calls or texts, when and for how long.
This story has been posted on other social media. Its main focus is on how an Alabama school system (Huntsville city schools) paid a former FBI agent the sum of $157,000 to direct security of their schools but the main purpose was to actually spy on the social media activity of the black students in the schools. The agent was brought in to oversee the Students Against Fear program (SAFe). This program allows students and teachers to submit anonymous tips to security personnel. According to the paperwork provided by the school administration system, the SAFe program does not work directly for the school system. Instead, it is employed by T&W Operations. T&W Operations, which is a service-disabled, veteran-owned, small business in Huntsville, Alabama, provides labor and support services for logistics operations with government and commercial clients. Over 600 students attending these schools had their social media monitored in the year 2013. Students who were expelled due to certain social media issues were mostly African-Americans.
It is the continent’s favourite hobby, and even the European Parliament cannot resist: having a pop at the world’s biggest search engine. In a recent and largely symbolic vote, representatives urged that Google search should be separated from its other services — demanding, in essence, that the company be broken up.
The problem with Google is not that it is too big but that it hoovers up data that does not belong to it.
EFF obtained and analyzed records from the Oakland Police Department’s secretive automatic license plate readers, showing that the department has mounted a program of incredibly intrusive, highly racialized secret surveillance of an entire city.
William Binney, former technical director of the NSA turned whistleblower, last night received the Sam Adams Award for Integrity in Intelligence.
The ceremony in Berlin featured a powerful line-up of fellow whistleblowers and former intelligence officers, who honoured Binney for “shining light into the darkest of corners of secret government and corporate power”.
Edward Snowden, the NSA whistleblower who won the Sam Adams Award in 2013, joined the event via video link from Moscow, to congratulate and thank Binney. “Without Bill Binney, there would be no Edward Snowden,” he said.
Snowden spoke of the “civic duty to say something” that he felt when he saw unlawful surveillance programs in action. Programs that, as technical director of the NSA, Binney himself helped to build.
In accepting the award, Binney said that he resigned from the NSA back in 2001 after he realised the agency was “purposefully violating the Constitution” with its “bulk acquisition of data against US citizens… first against US citizens by the way, not foreigners”.
The incident involving a CIA spy uncovered within the BND ranks was perceived by most Europeans as total nonsense: a total of 218 top secret documents were stolen from BND by a 31-year-old employee Marcus R. over a period of two years while he was cooperating with the ”friendly” CIA. The White House was paying “the loyal agent” according to the “banana republic,” rates up to and including 25 thousand euros, omitting glass beads and colored feathers.
In an act of extraordinary contempt for both the public and democracy, four lords are attempting to insert the bulk of the Snooper’s Charter in the Counter Terrorism and Security Bill in a way that means there will be almost no opportunity to debate it. We have only two days to stop this disgraceful move by writing to members of the House of Lords, and asking them to object to this disturbing attempt to circumvent the proper procedures “because terrorism”.
A new anti-cyberbullying law in Illinois effectively allows schools to force students to hand over their social media passwords if they are suspected to have been the victim of or otherwise involved in cyberbullying. While the law doesn’t explicitly say schools can request passwords, it gives school officials broad scope to act even when alleged bullying occurs using “technology or an electronic device that is not owned, leased, or used by a school district or school.”
Bruce Schneier, Harvard Berkman Center Fellow, talks with Edward Snowden about government surveillance and the effectiveness of privacy tools like encryption to an audience at Harvard’s School of Engineering and Applied Sciences.
Some of humanity’s technological innovations are things we would have been better off without: the medieval rack, the atomic bomb and powdered lead potions come to mind. Religions tend to invent ideas or concepts rather than technologies, but like every other creative human enterprise, they produce some really bad ones along with the good.
Many of the world leaders who came to Paris for the event were among the world’s worst violators of the principles the masses of demonstrators were there to defend. But even their hypocrisy, revolting as it was, could not deflect the demonstration’s positive impact.
Lawmaking officially began last week in most states, and it should surprise no one that abortion is again high on the list of priorities for a number of legislatures going into 2015.
Since the 2010 election tipped statehouses Republican, states adopted 231 new abortion restrictions. Last year alone, 15 states enacted 26 new abortion controls, according to the Guttmacher Institute.
With all those news laws on the books, one might ask, just what’s left to curb? Yet armed with hundreds of pre-written bills—drawn up by model legislation organizations Americans United for Life and the National Right to Life Committee—state lawmakers are finding new ways to make an abortion even harder to get in the new year.
Contrary to the spirit of the Enlightenment, torture had gradually disappeared in the West since the eighteenth century, and only the Nazi and Soviet totalitarianism have reintroduced it in Europe. Once that door opened, it managed to infiltrate the heart of the French Republic. A few years after the end of the Second World War, torture was practiced during the wars in Indochina and Algeria, even if the rulers did never publicly admitted it. To intellectuals like Pierre Vidal-Naquet (The Torture in the Republic, Minuit, 1972) or the Communist Henri Alleg, who had himself suffered to torture (La Question, Minuit, 1958) protested, with others, against this process.
Now that the world is done stating “Je suis Charlie,” it’s time to turn its collective gaze back to the US government’s torture program. One of the beautiful things about the world having such a short attention span is that it is possible to refocus after a distracting event.
Closing Gitmo while not tackling the root problem of its associated archipelago and the ‘exceptional’ US mindset that set it into force would be nothing but a symbolic victory. As is seen by the CIA black sites, barely any information has emerged about each location except for a few notable ones like in Poland. This means that it is unknown exactly what kind of human rights abuses may have been carried out there, demonstrating that the US government has actually done a particularly good job at covering its tracks in these cases. This should serve as a dire warning, however, even if Gitmo is closed, other more secretive ‘detention facilities’ may be opened to replace it, given the ‘need’ that certain influential members of the national and military spheres say there is for keeping it open in the first place. Just as one weed can quickly spread throughout an entire garden, it may be that Gitmo’s final legacy will be that it spread a network of near-identical camps all throughout the world.
The lawyer for a Guantanamo inmate says fear after the Paris attacks risks giving governments a licence to implement the sort of anti-terror legislation that saw her client wrongly detained.
In the book the 44-year-old documents how he was subjected to brutal treatment, including being kept in a “frozen room” for hours on end, forced into group sex with prison guards and repeatedly tortured.
With the recent release of the U.S. Senate Intelligence Committee report affirming aggressive post-911 CIA interrogations that many critics liken to torture, Mikula, a professor of Eastern European History and acting dean of the College of Liberal Arts at Benedictine University, has been reliving her harrowing childhood experiences in the dual context of an expatriate and American citizen.
She finds it ironic today that the same agency which helped her family escape communism is accused of using some of the same harsh interrogation tactics as the totalitarian regime.
“The idea that you would torture people who you didn’t know were enemies or not – that you would torture (innocent) people in order to identify suspects – it makes me think of all we went through to get away from that,” Mikula said.
Mikula, named Zuzana in her native country, is the daughter of Edith Martonik and Jozef Mikula. Her father, who was an outspoken critic of communism, left Czechoslovakia for Austria when it was clear the communists were going to assume control. His hope was to fight communism from afar and foment a change that would allow his return.
One of Margaret Thatcher’s most senior ministers died Thursday amid a swirl of accusations that he was personally involved in the abuse of children and the subsequent coverup of a Westminster pedophile ring.
Lord Leon Brittan, who was appointed Home Secretary in 1983, always denied the allegations, some of which can be published for the first time now that he has died. Police sources also confirm that at the time of his death, he was being investigated over allegations that he had raped a woman as a young man. Brittan died in his sleep at home with his family at the age of 75. He had suffered from cancer and heart problems.
An annotated copy of the address book, which also contains entries for Alec Baldwin, Ralph Fiennes, Griffin Dunne, New York Post gossip Richard Johnson, Ted Kennedy, David Koch, filmmaker Andrew Jarecki, and all manner of other people you might expect a billionaire to know, turned up in court proceedings after Epstein’s former house manager Alfredo Rodriguez tried to sell it in 2009. About 50 of the entries, including those of many of Epstein’s suspected victims and accomplices as well as Trump, Love, Barak, Dershowitz, and others, were circled by Rodriguez. (The existence of the book has been previously reported by the Daily Mail. Gawker is publishing it in full here for the first time; we have redacted addresses, telephone numbers, email addresses, and the last names of individuals who may have been underage victims.)
Slahi had fought alongside the mujahadeen in Afghanistan in the 1990s. This was a war in which the United States aided and even armed members of the mujahadeen against the Soviet-controlled government that had been installed in Afghanistan. However, by working with the mujahadeen, and even pledging support to a then-grassroots Al Qaeda, Slahi later found himself a wanted man.
Mohamedou Ould Slahi has been detained in Guantanamo for 13 years without ever facing trial. From his cell, he wrote “Guantanamo Diary,” a unique account of the conditions in the US detention centre.
The United States has accepted that the former Guantanamo inmate, Australian citizen David Hicks, is innocent, his lawyer says.
Lawyer Stephen Kenny told the Australian Broadcasting Corporation (ABC) that he expected Hicks’s 2007 conviction “to be set aside”.
Hicks’s lawyers appealed his conviction last month, saying it was unsound.
Hicks had pleaded guilty to terrorism charges in a deal that allowed him to complete his sentence in Australia.
The evidence is clear that MI5 and MI6 were involved in the abduction and torture of Gaddafi’s opponents – someone must be held to account
Exonerating spooks for improper conduct is a regular feature of the establishment. After all, you don’t convict your own, turning your nose at activities pursued under the grand, catch-all term of national security. From the start, the CIA review, established to investigate its own activities into spying on the Senate Select Committee on Intelligence, was always predictably constituted, with predictable outcomes.
Andre Seebregts, K.’s lawyer, wanted the judge to prohibit the extradition because the role played by the US secret service (CIA) in the arrest and torture of K. in Pakistan has not been clarified. The judge agreed with him.
Fact: The CIA’s torture program was directly inspired by animal experiments.
In the 1960s, dogs were subjected to random electric shocks from which they could not escape. Eventually the dogs gave up trying to avoid the painful shocks, not even escaping when a path to escape was finally presented to them.
What concerns me most as a medical doctor is the fact that two psychologists hired by the CIA, James Mitchell and Bruce Jessen, directed these human torture experiments. The psychologists were curious about whether the theories of animal “learned helplessness” might work on humans.
The sentencing of someone who couldn’t hack his way out of a paper bag is the latest sign that we’re in the middle of a nerd scare.
I started studying the computer underground back when I worked in tech, as an early web developer, in the mid 1990s. I found the world fascinating, and I interviewed people and wrote about it, initially for myself. I never participated much. At first this was because I didn’t have much to contribute, but in time I came to understand that I wanted to remain on the disinterested side of law enforcement. This was not only because of what it meant for my own long-term prospects, but because it would let me build more understanding of the culture I was studying, and ultimately let me share what I learned of that culture with more people.
An autistic schoolboy hanged himself after receiving a bogus “police” email claiming he had been looking at illegal websites and must pay a £100 fine.
Joseph Edwards was more susceptible to believing the scam was genuine because of his disability, a coroner heard today.
The 17-year-old A-level student was found hanged at his home by his mum, who has since launched a campaign to make children more aware of the dangers from internet scams.
Joseph received the online spam message, claiming to be from Cheshire Police, which said he had been visiting illegal websites with indecent images on his computer and would have to pay a large sum of money to avoid officers taking action.
I spent last weekend elbow-deep in engine grease, hands tangled in the steel guts of my wife’s Mazda 3. It’s a good little car, but lately its bellyachings have sent me out to the driveway to tinker under the hood.
I regularly hurl invectives at the internal combustion engine—but the truth is, I live for this kind of stuff. I come away from each bout caked in engine crud and sated by the sound of a purring engine. For me, tinkering and repairing are primal human instincts: part of the drive to explore the materials at hand, to make them better, and to make them whole again.
Cars, especially, have a profound legacy of tinkering. Hobbyists have always modded them, rearranged their guts, and reframed their exteriors. Which is why it’s mind-boggling to me that the Electronic Frontier Foundation (EFF) just had to ask permission from the Copyright Office for tinkerers to modify and repair their own cars.
This– THIS LINK– could have sent me to jail. Another link came very, very close to sending Barrett Brown to jail. Brown was just sentenced to five years in jail on other charges that the government could make stick, in another step towards the criminalization of everything.
Yesterday at the Earle Cabell Federal Building, in the fine city of Dallas, Texas, a fellow named Andrew Blake wore a curious t-shirt to Judge Sam Lindsay’s court for a hearing to determine how much longer Barrett Brown ought to stay in prison. Blake got his shirt while covering the trial of Chelsea Manning. It was black, with one word, in white, printed across its chest: “truth.” Before things got started yesterday, a federal marshal approached Blake and told him he had to cover up the word. In case you missed that: he had to cover up “truth.” In a courtroom. That’s how it went for much of yesterday, like a script for a bad movie that any reasonable studio executive would read and reject because no way could the plot transpire in real life.
But first, Brown expressed regret. He regretted having recorded and posted videos in which he threatened an FBI agent who was investigating Brown, calling the videos “idiotic” and the product of a “manic state” brought on by a withdrawal from drugs used to control his heroin addiction. He admitted that he “stupidly” tried to hide laptop computers from FBI agents when they arrived at his mother’s home with a search warrant. He said he had crossed the line from journalist to collaborator when he contacted security firm, Strategic Forecasting (Stratfor) with an offer to redact sensitive material from a major 2011 hack, diverting attention from hacker Jeremy Hammond. “I have never denied I was involved with Anonymous,” Brown said. “But that means different things at different times.”
But critics of the sentence, including Brown himself, say he has done nothing that many mainstream journalists haven’t also done in their work and that he is being persecuted because he does not have the protection of a large media organization. Reporters for outlets like the Washington Post, the New York Times and the Guardian, for example, have not faced the same prosecution efforts from the government for their part in publishing documents stolen from the National Security Agency by former contractor Edward Snowden.
Abby Martin speaks with Ali al-Ahmed, Director of the Institute for Gulf Affairs about the death of Saudi Arabian monarch, King Abdullah, and why the media is covering him as a ‘reformer’.
American diplomats pay lip service to human rights while tens of billions of dollars in arms are shipped to the Kingdom of Hate, where you can be executed for ‘sorcery’ or tweeting about Islam.
Nancy Zirkin, executive vice president of The Leadership Conference on Civil and Human Rights, issued the following statement in response to the Senate Republican Majority’s decision to remove the words “Civil Rights and Human Rights” from the name of the Senate Subcommittee on the Constitution, Civil Rights and Human Rights. This subcommittee of the Judiciary Committee has jurisdiction over civil rights oversight:
Saudi Arabia’s deceased King Abdullah, according to just about every obituary in major Western publications, was a reformer. The New York Times, Washington Post, BBC, and NPR all describe Abdullah as a ruler committed to reforming Saudi Arabia’s notoriously repressive practices. Sen. John McCain called Abdullah an advocate for peace; IMF head Christine Lagarde called him a “strong advocate for women.”
But Abdullah did not, in fact, make any fundamental reforms to the Saudi state, which remains one of the most oppressive and inhumane on earth. It punishes dissidents, including currently with multiple rounds of publicly lashing a blogger, amputates hands and legs for robbery, and enforces a system of gender restrictions that make women not just second-class citizens, but in many ways the property of men. Abdullah’s reputation as a reformer comes from some relatively limited policy shifts he made. Praising Abdullah as a reformer, in addition to being misleading, seems to imply that Saudi Arabia should be held to a lesser standard than the rest of humanity, and that its citizens should be somehow grateful for Abdullah’s minor adjustments to a system that remains cruelly unjust.
The constraints and restrictions on Saudi women are too notorious and too numerous to itemise. Right now, two women are in prison for the offence of trying to drive over the border in to Saudi Arabia. It is not just the ban on driving. There is also the ban on going out alone, the ban on voting, the death penalty for adultery, and the total obliteration of public personality – almost of a sense of existence – by the obligatory veil. And there are the terrible punishments meted out to those who infringe these rules that are not written down but “interpreted” – Islam mediated through the conventions of a deeply conservative people.
North Korea called on Thursday for the top United Nations human rights body to investigate allegations of Central Intelligence Agency (CIA) torture in the George W. Bush era, that were contained in a recent Senate report.
The move, announced by So Se Pyong, ambassador of the Democratic People’s Republic of Korea to the U.N. in Geneva, puts more strain on ties with Washington, following U.S. accusations that Pyongyang was behind a cyber attack on Sony Pictures. North Korea denies those accusations.
So Se Pyong, ambassador of the Democratic People’s Republic of Korea to the U.N. in Geneva, said that the issue of the “CIA torture crimes” should be put on the agenda of the U.N. Human Rights Council which meets from March 2-27
“This morning … I sent a letter to the president of the Human Rights Council … requesting that the council take up the issue of CIA torture crimes committed by the United States,” said So Se Pyong, North Korea’s ambassador to the UN in Geneva.
The architect of the Senate’s landmark inquiry into Central Intelligence Agency torture is denouncing an unusual demand from her successor to return all classified copies of the investigation.
When it comes to the CIA’s torture of innocent people, or unconstitutional dragnet surveillance, or assassination of American citizens, Republicans are eager to enable the executive branch. No fiddling with immigration regulations, because tyranny. But go ahead and kill whoever you want. We trust you.
Witness Senator Richard Burr (R-N.C.), the brand-new chair of the Senate Select Committee on Intelligence. Instead of carrying out the oversight functions that are the very reason the committee exists, he is being every bit the CIA lickspittle that I said he was going to be last March.
When the new Senate Intelligence Committee chairman, Richard Burr (R-N.C.), announced that, allegedly unbeknownst to him, the former chairwoman had widely distributed the panel’s study of CIA torture, he said he was perturbed. A sensitive document — one whose validity he has vehemently challenged — now being spread within the executive branch? Concerning, Burr said, to say the least.
Except most of the recipients that Burr is concerned about never even opened their copy.
In response to a Freedom of Information Act request for the full, still-classified 6,900-page torture report, government lawyers wrote that most of the executive agencies that had been copied on the transmission of the full report to the White House from then-Chair Dianne Feinstein (D-Calif.) hadn’t opened their sealed copy — and in one case, never even picked it up.
With this petty action, Burr signals that his time in this important chairmanship will be stridently partisan. It’s not a promising sign for a tenure that ought to be marked by constructive debate.
The new Republican chairman of the Senate Intelligence Committee wants to make sure that a scathing 6,900-page report about the CIA’s torture of terrorism suspects captured after 9/11 is never publicly released.
Nearly 10 years ago, allegations were raised against some European states for colluding with the CIA in post-9/11 anti-terror measures. Amnesty International is now calling on these nations to come clean.
Rights group Amnesty International urged European countries on Tuesday to come clean on alleged co-operation with the Central Intelligence Agency (CIA) in torture, and to help bring those responsible to justice.
“Governments can no longer rely on unsubstantiated ‘national security’ grounds and claims of state secrecy to hide the truth about their roles in the torture and disappearance of people,” said Amnesty counter-terrorism and human rights expert Julia Hall.
When the US Senate released the report on CIA torture in December, the world reacted with shock and outrage. The document detailed the “program of indefinite secret detention and the use of brutal interrogation techniques” that the agency embarked upon in the wake of the 9/11 attacks. These techniques included mock executions, waterboarding, and “rectal rehydration,” along with threats to family members, sleep deprivation, and forced nudity. One detainee is thought to have died from excessive cold.
Rights group Amnesty International urged European countries on Tuesday to come clean on alleged cooperation with CIA operations involving torture and help bring those responsible to justice.
Earlier on Tuesday, Amnesty International published its report outlining Europe’s role in secret CIA torture operations. The governments cited in the report include Lithuania, Poland, Romania, Germany, Macedonia and the UK, the last has been described as the “most important US ally” in CIA operations.
European governments that cooperated with the CIA’s secret detention, interrogation, and torture operations as part of the USA’s global “war on terror” must act urgently to bring those responsible to justice following a US Senate report containing new details said Amnesty International in a new briefing paper.
The Screen Actors Guild has nominated Claire Danes of “Homeland” for its Best Actress Award. It has also nominated Danes, Mandy Patinkin and the rest of the “Homeland” cast for the Outstanding Ensemble Award.
Exonerating spooks for improper conduct is a regular feature of the establishment.
An FBI special agent who lost his job in 2008 told Newsweek columnist Jeff Stein his story about how the 9/11 hijackers slipped through the cracks at the FBI and CIA more than a decade ago.
Mark Rossini said the CIA prevented him from going to FBI headquarters with the information that two known terrorists, who later went on to carry out the 9/11 attacks on the World Trade Center, had entered the US.
Government reports on 9/11 blame a vague “intelligence failure” for the terrorist attack that killed about 3,000 people in 2001 and provide little clarity on why the CIA didn’t communicate crucial information about the hijackers to the FBI. This information, in theory, could have helped the US to prevent the attacks.
Rossini said that after 9/11, when congressional investigators started asking him questions about his work with the CIA’s Osama bin Laden unit, he and another FBI agent stayed quiet at the direction of CIA officers.
That internal review found that the CIA had consistently overstated the value of intelligence gained during the cruel and brutal interrogations of some of its detainees, The New York Times reports.
While the CIA and former members of the Bush administration have been waging a campaign in defense of the spy agency’s actions, its own internal report found that they were overstating how helpful torture had been. According to The New York Times, an internal review commissioned by former Director Leon Panetta found that the agency continuously exaggerated the intelligence it obtained during the brutal interrogations of detainees. According to the review, the CIA knew that information used to track down operatives from al Qaeda and stop terror plots did not come from interrogation of Khalid Sheikh Mohammed, who was waterboarded 183 times.
A major trial is underway in a federal courtroom in Virginia that, at its heart, is tackling issues of CIA interference in other countries, but also the Espionage Act, and the sanctity of journalists’ secret sources. Former CIA operative Jeffrey Sterling is on trial for several violations of the Espionage Act, that involves revelations of a bizarre secret operation called the Merlin Project.
The deaths of Yasser Al Zahrani, Salah Ahmed Al Salami, and Mani Shaman Al Utaybi were never accepted as suicides by their families, two in Saudi Arabia and one in Yemen, or by former prisoners who knew them, especially as autopsies showed the men’s necks had been removed. But the official narrative prevailed. It was “an act of asymmetric warfare waged against us,” Rear Admiral Harry B Harris Jr, the commander of the camp, told a press conference about the deaths. He described a “mystical belief” at Guantanamo that three men had to die at the camp for all of the prisoners to be released.
GOOGLE CEO Eric Schmidt has predicted that the internet as we know it today will disappear in the future.
Schmidt said at the World Economic Forum in Davos that the internet could become a thing of the past as online connections become ever smarter and personalised thanks to the growth of the Internet of Things.
When quizzed as to his views on the future of the web, Schmidt said: “I will answer very simply that the internet will disappear.”
“There will be so many IP addresses, so many devices, sensors, things that you are wearing, things that you are interacting with that you won’t even sense it,” Schmidt said, according to the Hollywood Reporter.
Google chairman Eric Schmidt expects the internet as we know it to ‘disappear’ in the next few years as our online connections become ever more smarter and personalised.
“I will answer very simply that the Internet will disappear,” Schmidt said at the Speaking at the World Economic Forum (WEF) in Davos, Switzerland when asked about his predictions for the future of the web.
“There will be so many IP addresses…so many devices, sensors, things that you are wearing, things that you are interacting with that you won’t even sense it.”
Six men went on trial this week accused of blackmail and extortion after thousands were sent threats demanding cash payments for alleged adult video downloads. Former Pirate Bay spokesman Peter Sunde hopes for a conviction, but wonders if Hollywood content would’ve been handled differently.
A ‘reformed’ Microsoft just a myth perpetrated and propagated by corporate media
Summary: Microsoft myth makers continue their assault on what is objectively true and try to tell the public that Microsoft is a friend of “Open Source”
Calling Microsoft “Open Source” anything is like calling King Abdullah a proponent of women’s rights or pro-women anything (as some elites already shamelessly claim). Microsoft is a strong opponent of “Open Source” and as with Abdullah, those claiming otherwise are either bribed or on the same boat as Abdullah/Microsoft.
We were disgusted to see a very misleading headline from Condé Nast yesterday. The latest propaganda from a Condé Nast publication reads like a puff piece from beginning to end, truly complete and moreover decorated with a highly misleading headline whose aim is openwashing the most anti-FOSS (Open Source) company in the world. Microsoft is doing nothing FOSS here; quite the contrary in fact, as it locks something behind a so-called ‘cloud’. To quote the opening paragraphs of the propaganda piece: “Microsoft has agreed to acquire open-source software company Revolution Analytics, heavily embracing the R programming language, a data analysis tool widely used by both academics and corporate data scientists.”
Revolution Analytics is not an “Open Source” company (the headline misuses this brand). The term “open-source” with a dash serves to highlight that the author is misusing brands (the OSI controls this brand and can potentially take action if it chooses to). Last night we checked all the new articles other than the afore-linked article and all these article did not use the spin. Not even known Microsoft boosters with a long track record did this. To name all which were published around the same time (mostly from Microsoft boosters):
Going through ~30 articles about Revolution Analytics helps reaffirm suspicions that Condé Nast is now in the Microsoft propaganda business. We already highlighted such a trend before.
Now that Microsoft boosting sites are trying hard to paint Microsoft as “Open Source” the last thing we need is a paper like “Wired” (to Microsoft?) pushing this agenda, carrying water for a serial abuser that bribes journalists and misleads the world’s technical community through journalists.
A roundup from Jim Lynch has responded to another recent propaganda piece from Condé Nast (by Microsoft Peter), citing in response to it this call to destroy Internet Explorer (which Condé Nast is openwashing). To quote Slate: “Internet Explorer has become a liability, and I’m happy to report that Microsoft seems to know that.”
Another article worth highlighting is this piece from Andy Patrizio, who has a long history of shilling for Microsoft although we have not seen much of him in recent years. He now works for Microsoft’s propaganda section of the Microsoft-friendly NetworkWorld, carrying water for the Moodle "embrace extend and extinguish" move by Microsoft.
While we expect this kind of openwashing from allies of Microsoft, bribed authors (publications that are run on Microsoft money), etc. we don’t typically expect it from “Wired” because historically, before Condé Nast acquired “Wired”, the paper had covered Microsoft properly, especially in the antitrust days. Condé Nast basically shattered any illusion of neutrality. “Wired” is now reduced to the churnalism business, as a recent statement from its head of operations served to confirm (this quickly reached the media and went viral).
Microsoft does not “love Linux” and it does not “March Toward Open Source” as “Wired” wants us to believe. Microsoft embraces patent abuse and aggression against Open Source because it’s the company’s last resort. Microsoft also tries to infiltrate (to destroy) Open Source and it’s easy to see why, especially now that Microsoft suffers more layoffs (see context). A report from this week “noted that both HP and Microsoft announced plans to cut payrolls by 59,523, a combined 69 percent increase from the 35,136 job cuts by these companies in 2013.”
Microsoft is going down. Don’t let Microsoft drag FOSS down with it. █
A big hole in Apple, but Apple doesn’t mind as long as the public doesn’t know
Summary: Apple neglected to patch known security flaws in Mac OS X for no less than three months and only did something about that vector of intrusion when the public found out about it
LAST year Apple admitted having back doors in iOS, conveniently dubbing them “diagnostics” (Orwellian newspeak). Apple did this only after a security researcher had found and publicised severe flaws that enabled remote intrusion into any device running iOS (there are unfortunately many such devices out there). This led us to alleging that not only Microsoft and the NSA worked to enable back doors for secret access into Windows. Both Apple and Microsoft are in PRISM and both produce proprietary software onto which it’s trivial to dump back doors, both undetectable and immutable.
Weeks ago we showed that Microsoft does not strive to make Windows secure, based on its very own actions whenever the public is unaware of the insecurities (only the NSA/GCHQ and the reporter/s are 'in the know'). Now we come to realise that Apple too — like Microsoft — did not close back/bug doors in Mac OS X for 90 days despite knowing about them. This isn’t a 0-day, it is a 90-day. It’s incompetence, negligence and might one even say deliberate sabotage by Apple. Apple just chose to leave the serious flaws in tact until it was too late because the public found out about it, owing to Google.
Do not let the Wintel-centric media blame Google for merely informing the public that proprietary operating systems like Windows and Mac OS X have holes in them that Microsoft and Apple refuse to patch. We should generally be thankful for this information. It says quite a lot about Microsoft’s and Apple’s priorities. It helps prove China right for banning Windows and Apple operating systems in government.
There is increasing consensus that Apple is going down the bin when it comes to users’ trust and browsing the Net these days I often read or hear from people who abandon Apple for GNU/Linux. Suffice to say, based on public appearances, the NSA is intimately involved in the build process of OS X (for a number of years now), which does make one wonder. █
Benoît Battistelli meets Siemens
Summary: The neglected (by EPO) Article 4a of the European Patent Convention (EPC) and the European Parliament petition/complaint against the EPO’s crooked management
Now that the internal communications person (i.e. PR) is out and things are heating up against the EPO Vice-President (never mind Benoît Battistelli, the EPO President), the corporate takeover of the patent system in Europe can be slowed down. We have just learned from this European patents maximalism blog that “Philips is among the top-10 Patent Cooperation Treaty (PCT) applicants and the top-3 European Patent Convention (EPC) applicants. Owning about 64,000 patents and filing approximately 1,500 patent applications each year (with a strong focus on the growth areas of health and well-being), much is at stake for the company with the introduction of a Unified Patent Court (UPC) and the Unitary Patent (UP). Philips’ principal IP Counsel Leo Steenbeek told Kluwer IP Law in an interview he hopes financial demands of UP member states won´t lead to unrealistic high renewal fees. Philips won’t opt-out patents when the UPC starts functioning.”
This helps remind us who the EPO really serves. It has become a “protection” apparatus for large corporations, largely at the expense of citizens of Europe. The Unified Patent Court would enable huge corporations to sue a lot of rivals or intimidate them. It would also help patent trolls.
Several months ago a source sent us some information about the neglected Article 4a of the European Patent Convention (EPC), which might be of interest. Article 4a of the EPC deals with very fundamental rules. If any rule it is violated, then there is legal basis on which to file complaints.
As our source put it: “Another example of how the current EPO management (meaning Battistelli and the Administrative Council) has managed to avoid political oversight can be seen by consulting Article 4a of the European Patent Convention according to which: “A conference of ministers of the Contracting States responsible for patent matters shall meet at least every five years to discuss issues pertaining to the Organisation and to the European patent system.”
“This Article,” explained our source, “was introduced into the revised version of the EPC (“EPC 2000”) which entered into force on December 13, 2007.
“However, despite the statutory requirement to hold a ministerial conference at least once every five years, no such conference has been convened since the entry into force of the revised EPC in 2007. The first five year period expired on in December 2012, i.e. on Battistelli’s watch. (He was appointed EPO President in 2010.)”
This would not be the first time that Battistelli dodges or eliminates oversight, as we showed numerous times before. “If you can read French,” said our source, “it may be worth having a look at an interview Battistelli gave to a French magazine in 2012.
“In this interview he boasts (in French) of the “independence” that he enjoys as EPO President.” To quote the interview: «Je n’ai jamais été aussi libre, insiste-t-il. Je n’ai pas de ministère de tutelle, de Parlement, de gouvernement. C’est nous qui fixons les règles, les discutons, les négocions.»
In English: “I have never been so free, he insists. I have no supervisory Minister above me, nor any Parliament or government. It is we who discuss, negotiate and decide on the rules.”
In other words, he has got himself a tyranny. He does not even need to obey rules. “The “we” referred to here seems to mean Battistelli himself and the AC,” remarked our source. As we have demonstrated time after time, the Administrative Council is basically in cahoots rather than independent from Battistelli. It’s a banana republic’s status quo.
“However,” he said, “as can be seen from Article 4a EPC, Battistelli’s arrogant boast that he is not subject to any oversight by ministerial or governmental authority betrays a serious misunderstanding of the legal framework established by the revised EPC.
“Obviously, the intention behind article 4a is to provide for some measure of political oversight of the EPO at ministerial level. It is only by ignoring this provision, i.e. by not taking any measures to convene a ministerial conference despite the statutory requirement to do so, that the EPO President and the AC have been able to evade this kind of political oversight.”
“We wish to revive the petition, preferably not just from Croatia.”The rejected complaint (in the form of a petition) to the European Parliament is worth revisiting in this context, given that some European politicians continue to pursue action against the EPO. We wish to revive the petition, preferably not just from Croatia. There is a certain stereotype and a myth that Topić and his ilk exploit; it’s the myth only Croats are upset at Topić, supposedly because of envy. We need more involvement from people outside Croatia and by providing information in English we hopefully make more people aware of the issues and thus more able to communicate them. Any such communication in support of the previous petition from members of the general public could be useful to encourage the Petitions Committee to investigate the abuse as it would indicate to the Committee that there is a public interest in the issues raised by the Petition outside of Croatia (from where the original petition originates).
We have already written several times about the first petition calling for an independent investigation of Topić’s appointment. The petition was submitted to the European Parliament by a Croatian NGO called Juris Protecta. It stated that an independent (outside) investigation was needed, but none ever took place, even two years later. The petition goes back to 2013 and the reference number for the petition was (and still is) 2848/2013. The original petition contained a request for confidential treatment. This request for confidential treatment was subsequently withdrawn which means that the petition is now a public document. In the mean time, Vesna Stilin (another Croat) had submitted an application to join the Petition as a co-petitioner and she was taking other actions to address these matters, as mentioned in several older articles of ours. The previous meeting of the Petitions Committee of the European Parliament was scheduled for 11 November 2014 and the next one is at the end of this month, so there may be time to submit new petitions, something along the lines of the following words of ours (please don’t just copy). Here is some draft text which could be used as a basis for communicating and conveying thoughts to the Petitions Committee:
I/we refer to Petition 2848/2013  which has been filed with the Petitions Committee of the European Parliament and which calls for an independent investigation of the appointment of Mr. Željko Topić as a Vice-President of the European Patent Organisation. In December the petition was rejected not because it lacked merit but because it was claimed to be within the responsibility of other departments. This response is deeply problematic because the nature of the petitioner’s concerns and the core complaint is that those other departments have been gagged, suppressed, or even abolished by those who are supposed to be overseen. That, as some may argue, is how Topić got into his position in the first place. It means that the European Parliament is the last resort and the only body able to engage in a potent investigation. The European Parliament should consider revisiting these issues, among more issues such as the violation of the European Patent Convention (EPC) [see/refer above].
I/we hereby wish to express my/our support for the 2013 Petition and suggest that a new, more extensive investigation into these matters in undertaken. I/we would be grateful if you could acknowledge in due course that my/our support for the Petition has been registered with the Petitions Committee.
 Ref: Petition No. 2848/2013 filed by Juris Protecta (Croatia).
This is just a suggested draft for a letter to the Petitions Committee of the European Parliament to express support for Petition No. 2848/2013 calling for an independent investigation of the appointment of Mr. Željko Topić as a Vice-President of the European Patent Organisation. We urge for expansion of the original complaint/petition, either by citation or by filing of a new petition (clarifying that it is a followup), as a lot more is known now than was known back in 2013. The European Parliament should be able to find plenty of relevant information in French, German, and English. Benoît Battistelli is quickly moving to crush any kind of oversight and if the European Parliament continues to refuse to intervene, it too would lose legitimacy and potentially be seen/perceived as complicit. Members of the European Parliament need to understand that.
For the moment we don’t know whether or not the petition 2848/2013 will ever be the agenda again. It might therefore be worth filing a fresh petition. We would like to point out here that, in principle, any EU citizen who is interested in this matter can write to the Petitions Committee to express support for petitions. Maybe some of our European readers would take leadership on this matter. Other readers would hopefully be interested in expressing their support for the petition or submitting a new one. Some contact details for the Petitions Committee are as follows:
Secretariat of the Committee on Petitions
60 rue Wiertz / Wiertzstraat 60
B-1047 – Bruxelles/Brussels
If you do choose to communicate with a petition, please consider sharing some information with us in the comments below, e.g. a reference number. Organising the action would make it more effective. █
Linux has always had passionate advocates and some of them have created images that some might construe as propaganda.
Have you ever installed a full desktop Linux system on your Chromebook? It isn’t all the hfard, but it is a bit more complex than it should be. New features in the latest version of Chrome OS will make dipping into an alternative operating system easier. For example, you’ll be able to easily boot a full Linux system from a USB drive and use it without any additional hassle!
The way IBM and the big Linux distros – Canonical (the company behind Ubuntu) Red Hat, and SUSE – are tackling the portability problem has to do with the way server platforms treat data stored in memory. Most Linux software is written for the x86 architecture, which uses the “little endian” approach to storing bytes in memory. The alternative is “big endian,” which has traditionally been used by mainframes and IBM’s Power architecture. (Detailed explanation of the difference here)
Carlos Horowicz: Planisys is a Cloud Services Provider headquartered in Argentina with its hardware and connectivity infrastructure mainly in U.S. data centers.
Planisys provides businesses with CDN, DNS, and transactional e-mail services focusing on clients with high-traffic requirements like latin american online newspapers.
Monday I speculated that Bodhi Linux founder Jeff Hoogland’s change of heart was possibly due to reminiscing with Christine Hall in her interview. Well, today Hall spoke with Hoogland again to find out. In other news, Phil Johnson has 11 technologies that annoy Linus Torvalds and Softpedia.com is reporting on Torvalds’ decision to leave code in the kernel for one lone machine. Jack Wallen said ordinary users are the ideal candidates for Linux and Konrad Zapałowicz is back with three ways beginners can help out with the kernel.
Linus Torvalds is considered one of the greatest living programmers, and for good reason, having written some of the most widely used software, such as the Linux kernel and the Git revision control system. He’s also known for not being shy about sharing his opinions on things that he doesn’t like through colorful and sometimes NSFW language. Sometimes, he’ll direct his sharp tongue at people who, in his opinion, do substandard work or companies and organizations with which he may have a disagreement or be in competition. Most often, though, the target of Torvalds’ ire is technology that he feels isn’t up to snuff. Use the arrows above to read Torvalds’ thoughts about 11 technologies that have gotten under his skin repeatedly over the years.
Linus Torvalds is not known to interfere with other projects than the Linux kernel and it must be something really special to get him involved. Well, it looks like the Linux port of The Witcher 2: Assassins of Kings proved to be interesting enough.
Bottomley shared that with efitools 1.5.2 it’s tested and works for IA32. He’s been using it with the Quark SoC board via the Galileo Kipps Bay D. He’s been playing with the Intel Quark and will share more in a future blog post.
Maarten Lankhorst of Canonical released the libdrm 2.4.59 library on Wednesday. While most libdrm updates tend not to be too exciting, the v2.4.59 release carries a bit more weight.
Following yesterday’s NVIDIA GeForce GTX 960 launch, here’s an 11-way comparison looking at all of NVIDIA’s Maxwell GPUs as well as many Kepler and Fermi GeForce graphics cards under Linux. Beyond the raw OpenGL performance, the thermal and power efficiency data is also available for the tested range of GeForce 900/700/600/500/400 series graphics cards.
Keith Packard who this month left Intel’s graphics team to join HP to work on “The Machine” has released a new pre-release version of X.Org Server 1.17.
In continuation of this morning’s launch-day article for the NVIDIA GeForce GTX 960, the graphics card that’s priced at $200 USD and is built on the very power efficient Maxwell architecture, here’s some more Linux benchmark results.
There’s a “frame-parallel” branch of libvpx to enable frame parallel decoding. This is designed to speed up the VP9 decoding process for multi-core processors. The work is explained by its developers as, “In frame parallel decode, libvpx decoder decodes several frames on all cpus in parallel fashion. If not being flushed, it will only return frame when all the cpus are busy. If getting flushed, it will return all the frames in the decoder. Compare with current serial decode mode in which libvpx decoder is idle between decode calls, libvpx decoder is busy between decode calls. VP9 frame parallel decode is >30% faster than serial decode with tile parallel threading which will makes devices play 1080P VP9 videos more easily.”
Docker 1.5rc1 is upon us and should be ready to slide down the slipway in the first week of February.
Announced in a newsgroup – as is proper – the new version is billed by developer Arnaud Porterie as containing “many major features”.
The Wine development release 1.7.35 is now available.
Wine 1.7.35 is out today as the latest bi-weekly development version of Wine for running Windows programs on Linux and other operating systems.
Shadow Warrior, an FPS build by Flying Wild Hog that is described as a bold re-imagining of the classic 3D Realms’ shooter with the same name that was released back in 1996, might be getting a Linux release.
Well this was a surprised! Dying Light has hints that it may come to Linux thanks to information from the awesome SteamDB.
The visuals in the game are just fantastic, and we really don’t have many games in this class on Linux.
Dying Light is a new FPS from Techland and it’s all about surviving the night during a zombie apocalypse. This is a studio specialized in this kind of games, and it looks that they might also be interested in the Linux platform.
The publisher of Hotline Miami, Devolver Digital, has unveiled its new game Ronin, being created in collaboration with Tomasz Wacławek.
Due out on PC, Mac and Linux later this year, a debut trailer for the turn-based action platformer shows off elements that are clearly inspired by the critically-acclaimed Gunpoint, only with more katanas.
On Thursday my Broadwell-powered Lenovo ThinkPad X1 Carbon laptop/ultrabook finally arrived for some Linux testing of Intel’s exciting Haswell successor. While many tests are forthcoming of this third-generation X1 Carbon — including Broadwell Windows vs. Linux benchmarks — here’s my initial experiences over the first ~10 minutes with this new hardware.
An even more impressive review, this time of Plasma 5 on Utopic, is from Ken Vermette.
Matthias Clasen has announced that the GNOME development team has released GNOME 3.15.4, and this is now the latest and most advanced version of the desktop environment.
GNOME 3.15.4 was released on Thursday night and is the latest pit stop on the road to the very exciting GNOME 3.16.
Two open source titans put their rings together and joined forces to announce that Red Hat Enterprise Linux v7.1 beta is now available on the IBM Power Development platform. Last month Red Hat announced that v7.i beta supported IBM Power Systems based on little endian mode. Today, it is available and ready to use on the platform directly via download as well as at IBM Innovation & Client Centers worldwide.
Many users have already switched to 64-bit a long time ago and they must be wondering why there is still a need for the 32-bit architecture. It creates headaches because many app developers don’t actively support it anymore and it’s becoming too expensive to maintain.
There’s been many changes and additions for Fedora 22 talked about so far and with this week marking the system wide change proposal deadline we have a last look at some of the new work that’s hoping to be done for the May release of Fedora 22.
Leaks posted this evening on Weibo claim to show some of the features of the upcoming Meizu m1 mini including the choice of Ubuntu OS.
Weibo posts picked up this evening by Meizu News, hold some interesting surprises for Meizu fans. The images which appear to be from leaked marketing material, list a few of the specifications of the mini Meizu along with price and a choice of operating system.
In a recent security notice, Canonical has published details about a Samba exploit that has been found and fixed in Ubuntu 14.10 and Ubuntu 14.04 LTS operating systems.
A new rumor regarding the impending launch of a Meizu powered by Ubuntu Touch has started to circulate online and it looks like some new images have been leaked from Weibo, a microblogging platform very popular in China.
This goes in line with previous news, stating the Meizu m1 mini will be a multi OS device, coming with your choice of Meizu’s Flyme OS, Yun OS, developed by Alibaba, and Ubuntu. The stock Android version was unexpected and it remains to be seen whether it will be another option to purchase, or is a pre-production model for development purposes.
Lubuntu 15.04 Alpha 2 (Vivid Vervet) is now out and ready for testing. This LXDE-based distro doesn’t have too many changes worth mentioning, with the exception of the base.
The second Alpha version for the 15.04 branch of Ubuntu GNOME has been released and is now ready for testing. It’s not a major evolution from the previous Alpha, but some of the important packages have been upgraded.
Kubuntu 15.04 Alpha 2 (Vivid Vervet), a Linux distribution based on Ubuntu and the KDE desktop environment, is now available for download and testing. The developers have made quite a few substantial improvements, including to the Plasma desktop.
The Ubuntu MATE developers have just released the Ubuntu MATE 15.04 Alpha 2 Linux distribution, which is now available for download and testing. It’s the first one in the new development cycle and it comes with quite a few improvements.
Along with the official Ubuntu flavors, Ubuntu MATE 15.04 Vivid Vervet alpha 2 was released yesterday. Read on to find out what’s new.
The SAMA5D4 Xplained Ultra (SAMA5D4-XULT) follows the SAMA5D3-based SAMA5D3 Xplained, which was developed by Newark Element 14 and Atmel to support the SAMA5D3 system-on-chip. In this case, the Xplained board amplifies the capabilities of the SAMA5D4 SoC announced by Atmel last October. Newark Element14 is the U.S. distributor of U.K.-based Premier Farnell.
Sometimes a product comes along, that makes so much sense, that you wonder how no one thought of it before. For example, the Snuggie. I mean come on, a blanket with sleeves? Genius! Let us not forget about the George Foreman Grill; that thing makes some damn tasty turkey burgers.
As many of you know, I’ve been involved with Tizen for quite some time. I manage Tizen at the Linux Foundation, which means I get a unique perspective on the project. And as anybody who has talked with me about what I do, I am a huge supporter of the Tizen platform and its goals, and am a general optimist (including but not limited to Tizen, of course).
2014 was a big year, with Tizen wearables and cameras hitting the market, Tizen IVI 3.0 achieving GENIVI 7.0 compliance, and a lot of interesting platform work on Tizen:Common. 2015 has really gotten off to a great start as well, with the announcements at CES that all new Samsung Smart TVs released in 2015 will run Tizen, starting in February.
Lava has launched the Iris 350 budget smartphone, which is now listed on the company’s site at a price of Rs. 3,499. The official listing of the Lava Iris 350, without revealing an exact release date, notes that the handset will soon be available in stores.
Android tablets are a dime a dozen these days. Look in any electronics store and you’ll see a sea of virtually indistinguishable slates, few of which manage to stand out.
Dell’s new Venue 8 7000 tablet is a noteworthy exception. The Venue 8 7000 — sometimes also referred to as the Venue 8 7000 Series or the Venue 8 7840 — is a distinctively stylish tablet with some unusually compelling qualities. Its name may be awkward and forgettable, but the device itself is anything but.
And with a price of $400 — the same as Google’s flagship Nexus 9 tablet — it’s one of the most interesting Android options available today.
If you’re in the market for a new cellular plan, you may want to wait for a new player to enter the game: Google. New reports suggest the company is planning on launching a wireless cellular network in an effort to get more people on the Web. It’s a move that could, in turn, force existing providers to offer better plan pricing and better data speeds.
2015 is the year the battle for your wrist goes nuclear, as the highly anticipated Apple Watch will finally hit store shelves.
Last year, Google unveiled its design vision for the future. Called Material Design, it incorporates bold colors, flat elements, and informative animations to create a fresh user interface for the modern age. Material Design made its major debut with the launch of Android 5.0 Lollipop in the fall, and Google has been rapidly updating its own apps and services to take advantage of the new design directives.
Supporting Android in the enterprise is no longer optional, it is necessary.
Not a whole lot of LG G3 users can claim to be running Android 5.0 Lollipop or later at the moment even though the rollout technically began last year. Unsurprisingly, the update is taking its sweet time and has so far been mostly limited to South Korean, Europe, and a handfull of other markets. Android 5.0 Lollipop only started rolling out across the majority of Europe last week and now it finally seems ready to grace some other countries as well. The next country in line to receive it will apparently be Australia according to Gizmodo. The article says that official sources from LG Australia have told local LG G3 owners about the good news so this is more than just a rumor.
The Android 5.0.2 release is crawling along and finally available on our Nexus 7 2013, allowing us to install the latest Nexus Lollipop update and see how it performs on the newest Nexus 7.
It looks like Google is about to bring its Nexus Player streaming box to some online and brick-and-mortar retailers within the next few days: The Nexus Player as well as the optional Nexus Player gamepad, both of which are being manufactured by Asus, started to appear on Newegg’s website. The online electronics retailer still lists both as unavailable, with a release date of January 25.
LibreOffice for Android has long been one of the biggest demands in the open source world. The reason is simple, a majority of Android users (myself included) who are concerned about vendor lock-in don’t save their data in Microsoft’s controversial docx, or Apple’s incompatible Pages formats. ISO approved ODF is the only way to go if you don’t want your files to become inaccessible in the future.
I love Android, but still dabble from time to time with iOS. Doing so usually makes me thankful at how Android works, with its deep Google integration, smart sharing features, and Material Design flourishes in Lollipop.
Google’s Android OS is now up to version 5.1, dubbed Lollipop. The software broke cover as Android L at Google I/O over the summer of 2014 and we’ve long been anticipating the then-teased Material Design features; an entirely new design language that breathes fresh life into Android. Android Lollipop is now out in the wild on a range of devices, but of course it first arrived on Google’s own batch of Nexus hardware, debuting on the new models – the Nexus 6 smartphone and Nexus 9 tablet.
It was a bold prediction in 2009 that Microsoft would take its Windows operating system open source. The advent of Windows 10 says it hasn’t come true — yet.
I don’t write about Microsoft much here. That’s largely because, as I noted recently, open source has won. Well, it’s won in the field of supercomputers, cloud computing, Web servers, mobile systems, embedded systems and the Internet of Things. Of course, it hasn’t won on the desktop – although there are some interesting indications that even there things may be changing. That means Wednesday’s launch of Windows 10 is still important, since it affects the daily lives of many people – far too many. Here, I want to focus on a few key aspects that emerged.
With many of the videos from linux.conf.au now available, and a three-day weekend about to hit Australia, there’s no excuse not to watch the best talks from last week.
WhatsApp has released a web client version of its popular social platform for the desktop, but there are a number of limitations that will prevent plenty of users from getting it through their browser of choice.
Developers of the Firefox browser want to better protect user privacy by limiting the amount of data contained in Referer headers.
Platform9, which many people have taken note of as a virtualization-focused startup, is making news this week after it announced the availability of Platform9 Managed OpenStack, a SaaS solution that leverages an organization’s existing servers into an AWS-like agile, self-service private cloud. Platform9 claims it can allow organizations to spin up an OpenStack private cloud deployment within minutes.
On the heels of its introduction as a hot new publlic company a few weeks ago, Hortonworks, which focuses on the open source Big Data platform Hadoop, is expanding its reach. Recently, Hortonworks extended its technology partner program with the addition of three new certifications it offers. Hadoop-related certification is a very hot commodity in the tech job market at the moment.
Meritalk’s new report, Cloud without Commitment, underwritten by Red Hat and Cisco, examined federal barriers to cloud adoption including migration, data portability, integration and future agility.
Seventy-five percent of federal IT workers want to move more services to the cloud, but are held back by data control concerns, according to a survey released this week by MeriTalk. According to “Cloud Without the Commitment,” only 53 percent of federal IT workers rate their cloud experience as very successful, the same number as are being held back by fear of long-term contracts.
Trees are incredibly smart. They run on sunshine, provide shade in summer and ever so kindly drop their leaves to allow the winter sun through. And now a team from the University of Exeter has determined that they are good for our mental health, too. Londoners who had more trees on their street popped fewer antidepressant pills.
The PC-BSD crew that base their desktop-focused BSD operating system off of FreeBSD put out their 10.1.1. release candidate this week.
This quarterly update to PC-BSD (v10.1.1) is set to bring a new system updater that supports automatic background updating, improvements to the boot environments / GRUB support, GPT partition installation improvements, all PC-BSD desktop utillities have been converted to Qt5, OVA files for virtual machines, and various other improvements over the original PC-BSD 10.1 release.
Besides working toward PC-BSD 10.1.1′s release, the PC-BSD crew have also been working on improving their Lumina Desktop Environment.
Nearly a year ago I wrote about PC-BSD developing its own desktop environment and months later it was out in alpha form. The new PC-BSD desktop is called Lumina and it’s a homegrown environment catered toward the BSDs. The Lumina desktop is FreeDesktop.org/XDG-complaintand they’re hoping for it to be an alternative to GNOME or KDE.
Tesla Motors CEO Elon Musk posted a blog entry on June 12 that was far from typical, but not unexpected for those who know him. He discusses the “wall of patents” his company owns for the manufacturing of electric cars and argues that “these days they serve merely to stifle progress.” The result? Tesla has made all of its patents public, paving the way for an open-source electric car. There’s a similar movement underway in IT: The open-source cloud. What can IT professionals learn from Musk’s recent move?
There was a time not long ago when publishing was difficult and expensive. Thanks to services like Lulu.com and Lulujr.com, that’s changing. Open source and Creative Commons licensing has also opened the door for teachers and students to inexpensively and easily find a new and authentic audience for their work.
In work that has serious implications for anyone believing their open source project contributions are anonymous, the researchers find that as many as 95 per cent of contributors to a decent-sized code base can be identified.
Apple’s journey from ‘it just works’ to ‘it just needs more work’ may undermine the company’s reputation for quality
Nearly 80% of Americans — 80%! — even wanted doctors and nurses that treated Ebola patients to be locked into quarantines, despite lack of medical evidence.
Of course, a mass Ebola outbreak in the United States never materialized.
But a major measles outbreak is already here. And it’s only going to get worse.
Less than half of firms regularly take basic measures like installing patches and updating software, Cisco research finds
Cisco has warned that many businesses’ faith in their security tools and policies is misplaced, as just 42 percent of UK firms have highly sophisticated measures in place – less than India, the US and Germany.
The networking firm’s Annual Security Report found that 75 percent of Chief Information Security Officers (CISOs) believe their tools are ‘very’ or ‘extremely’ effective yet less than half take standard steps like patching and updating software to the latest versions, increasing their protection.
Adobe has rushed out an emergency fix for a flaw that was affecting users of its Flash Player tool on Windows, Mac and Linux systems.
Adobe said in a notification about the fix that it was aware that the flaw was being abused by criminals to carry out attacks against Flash Player.
“Adobe is aware of reports that an exploit for CVE-2015-0310 exists in the wild, which is being used in attacks against older versions of Flash Player,” the firm said.
SPIEGEL: One of the reasons Snowden didn’t approach the New York Times was that the paper had refused to publish the initial research about the NSA’s bulk collection in 2004. The story was only published almost a year later. Was it a mistake to have held back on that reporting?
Baquet: I wasn’t even at the New York Times then and I don’t know what the discussions were like. It’s easy to look at it now and say, “how could the New York Times not have published the story,” but I won’t judge them because I wasn’t here, and I don’t know what the discussions were like. Bill Keller, the former editor in chief, has said the story was not as good as the one they published.
SPIEGEL: There are other cases where the New York Times showed a lot of consideration for the US government. In 2011, for example, you didn’t print a story about drone bases in Saudi Arabia. Can you give us an insight into what your criteria are for not publishing those kinds of stories?
Baquet: It was my decision not to publish the drone research — and it was a mistake. The circumstance was that the American-born radical cleric Anwar al-Awlaki had been killed by a drone strike. We were writing a story on deadline. A high-ranking CIA official called me up and made the case to leave out where the drone base was. It was Saudi Arabia. I accepted it. And I was wrong. I made a decision on deadline that I regretted almost the next day. We then published the information later. It taught me a lesson. But there are instances where I think you do have to hold things back, and I can think of some instances where I don’t regret it.
SPIEGEL: For example?
Baquet: During WikiLeaks, there was one specific instance in which there was a really remarkable cable. Moammar Gadhafi was still in power and it was a greatly detailed cable, which clearly came from somebody with firsthand knowledge of Gadhafi’s activities. It felt like a great thing to publish, but the government made the case that if we published it, it would be very clear to Gadhafi where it came from, and that the source would be killed. Once I reread that cable in light of that, I think it was pretty clear that the government was making a compelling case not to publish it. As I recall, everybody involved agreed not to use that particular cable.
The moral depravity into which the US is sinking is shown by the movie American Sniper glorifying the exploits of a racist killer receiving six Oscar nominations, whereas ‘Selma’ depicting Martin Luther King’s struggle against racism has received none.
American Sniper is directed by Clint Eastwood, and tells the story of Chris Kyle, a US Navy Seal who served four tours of duty in Iraq as a sniper credited with 160 confirmed “kills”, and earning him the dubious honor of being lauded the most lethal sniper in US military history.
Anything resembling balance and perspective is sacrificed in American Sniper to the more pressing needs of US propaganda, which holds that the guys who served in Iraq were the very best of America, men who went through hell in order to protect the freedoms and way of life of their fellow countrymen at home. It is the cult of the soldier writ large, men who in the words of Kyle (Bradley Cooper) in the movie “just want to get the bad guys.”
On January 21, 98 U.S. senators voted to affirm that “climate change is real and not a hoax.” But the media should not misconstrue that vote as evidence that the Republican-led Senate is now seeing eye-to-eye with scientists on the issue. Moments later, 49 senators voted to deny that “human activity significantly contributes to climate change” – the position held by the vast majority of climate scientists.
The town, with a population in the low hundreds, was forecast to swelter through a whopping 49 degrees Celsius (120.2 degrees Fahrenheit), according to the Australian Bureau of Meteorology (BoM). By 1:30 p.m., Marble Bar had reached a high of 48.4 degrees Celsius. At 2:30 p.m. local time, the mercury dropped a measly point to 48.3 degrees Celsius, while by 4 p.m. it had only slid to 48.2 degrees Celsius.
A cancer-causing component of oil has been detected in the drinking water supply of an eastern Montana city downstream from a crude oil spill
Oil spill into Yellowstone River renews concerns about pipeline safety.
Instead of protecting it, the Queensland and Australian federal government have traded the crown jewel of the Seven Wonders of the World for exporting more heat-trapping gas and coal and more poisonous mercury vapor.
In a world plagued by economic depression, certain states are beginning to take measures against the financial oligarchy.
So in Obama’s proposal, offered more as a what-if dream than as a concrete agenda he expects to see enacted by Congress, the wealthiest 1 percent would give up a little more than 1 percent of their income–after seeing their share of income more than double since 1980. All in all, it’s a shift of 0.2 percent of US personal income.
You call that stealing from the rich to give to the poor? I call it Sheriff of Nottingham Lite.
After six years of recession – during which three centre right coalitions failed to raise the country from its knees – young, unemployed, frustrated Greeks are looking for a new way out.
But Iftikhar was merely suggesting that there is prejudice based on skin color in our political culture–hardly a far-fetched claim–and that non-white politicians like Jindal may tend to bash other minorities (in this case, Muslims) in order to avoid the consequences of this prejudice. (Iftikhar’s use of the skin-scrubbing metaphor indicates that he finds this a futile endeavor.)
On the other hand, it’s equally hard to argue that Obama has done much to slow the boom down. The administration has resisted pressure from environmental groups to regulate hydraulic fracturing, and Obama’s current energy secretary, Ernest Moniz, has been a fairly outspoken defender of the technique. If anything is holding back drilling, it’s falling prices, not administration policies.
Iranian authorities have shut down a newspaper and suspended its licence after it published a front page depicting George Clooney at the Golden Globes alongside the headline “I am Charlie, too”.
China is blocking VPN services that let users skirt online censorship of popular websites such as Google and Facebook amid a wider crackdown on online information, tech companies and specialists said Friday.
That is the terrifying dystopian world portrayed by a group of Harvard professors at the World Economic Forum in Davos on Thursday, where the assembled elite heard that the notion of individual privacy is effectively dead.
“Welcome to today. We’re already in that world,” said Margo Seltzer, a professor in computer science at Harvard University.
“Privacy as we knew it in the past is no longer feasible… How we conventionally think of privacy is dead,” she added.
Laying eighteen pages of clauses before the Lords to insert the Snoopers’ Charter into an already complicated bill is an abuse of procedure. The Lords cannot have time to properly consider the bill, and would deny the Commons the opportunity to consider the clauses as well.
Four members of the House of Lords have attempted to bring back from the dead the Communications Data Bill – otherwise known as the Snoopers’ Charter. The entirety of the bill that had previously been rejected (or at least put on hold) by Parliament – some 18 pages in all – was added as a late ‘amendment’ to the Counter Terrorism and Security Bill currently passing through the Lords. This is utterly cynical at best, and a total abuse of parliamentary procedure at worst.
The Technological boom has touched nearly every industry; it may now be taking over the farming industry. Monsanto and John Deere, two big Agribusiness giants, have started services that allow them to collect minute by minute data from farms as crops are being planted and harvested. Currently available to Midwestern farmers, both companies pledge that the data will benefit the farmers by increasing profits.
In order to create clear rules about when law enforcement agencies can access and track Americans’ electronic location data Sen. Ron Wyden, D-Ore., and Rep. Jason Chaffetz, R-Utah, reintroduced the Geolocation Privacy and Surveillance Act (GPS Act) today.
The bipartisan, bicameral bill is co-sponsored by Sen. Mark Kirk, R-Ill., and in the House by Reps. Peter Welch, D-VT and Jon Conyers Jr., D-MI.
They are best known for hacking government and corporate websites, but in the wake of the Westminster child abuse scandal and allegations of establishment cover-ups, the Anonymous internet collective has a new target: exposing international paedophile networks.
A journalist with connections to the hacking collective Anonymous has been sentenced to five years in jail after posting online links to stolen data.
Barrett Brown originally faced charges punishable by more than 100 years in prison, but the sentence was reduced after he pleaded guilty last year.
He said he broke the law to reveal details of illegal government activity.
The case drew criticism from advocates of free speech and media rights organisations.
Terrorists, hackers, and journalists. According to a recent Guardian article covering new Snowden documents, British spy agency GCHQ considers all of these individuals threats—various levels of threats, but threats nonetheless. One intelligence report goes so far as to say, “Of specific concern are ‘investigative journalists’ who specialise in defence-related exposés either for profit or what they deem to be of the public interest.”
It shouldn’t need to be said, but journalists’ communications need to be safe from government hands. And yet, we see example after example of the British government going after this important check to power. (The US has done its fair share of targeting journalists as well.) The Guardian, for example, was forced by GCHQ to destroy their hard drives containing Snowden documents. That was soon after David Miranda, partner of journalist Glenn Greenwald, was detained and interrogated at Heathrow for nine hours. England has notoriously abused its surveillance laws to spy on journalists, prompting over 100 editors to sign a letter to the British prime minister calling for a stop to the spying and passage of a strong freedom of expression law.
THE US DEPARTMENT OF JUSTICE (DoJ) will pay $134,000 to a woman who was the victim of a spoof Facebook page that featured her in varying states of dress.
The fine relates to a case from 2010 when a waitress called Sondra Arquiett was arrested as part of a drugs bust.
The BBC reports that Arquiett complained after she realised that images, including some with her in short shorts, had been posted online by a third party.
She sued the government for its actions and the DoJ set about considering it. The DoJ has admitted what it did, but has not accepted that it acted improperly.
The Supreme Court heard oral argument yesterday in the Fourth Amendment case Rodriguez v. United States. At issue is whether an officer “unnecessarily prolonged” an otherwise legal traffic stop when he called for backup in order to safely walk a drug-sniffing dog around the stopped vehicle. According to a previous Supreme Court ruling, the use of drug dogs during routine traffic stops poses no constitutional problems so long as the traffic stop is not “prolonged beyond the time reasonably required to complete that mission.”
It didn’t take long for North Carolina Republican Sen. Richard Burr to stir up his Democratic colleagues on the Senate Intelligence Committee he now chairs. He has sent the White House a letter, The New York Times reports, demanding that copies of an internal CIA report on torture be “returned immediately.”
Burr and some other Republicans didn’t like the report released under the previous Intelligence Committee chair, Sen. Dianne Feinstein, a California Democrat. In it, the CIA’s use of torture was detailed and documented, and it embarrassed the agency and, for that matter, the country.
Shortly after he became chairman of the Senate Select Committee on Intelligence in January, Senator Richard Burr told reporters in his home state that he had no intention of trying to rewrite the committee’s 6700-page, $40 million torture report. Burr said that despite his disagreements with the report, he wanted to “look forward and do oversight in real time.”
It turns out that Burr’s statement was half true: he doesn’t want to rewrite the torture report. But he does want to help the CIA slip it into a memory hole—along with the Panetta Review, an internal CIA study that confirms the Senate report’s conclusions.
King Abdullah’s reign brought about marginal advances for women but failed to secure the fundamental rights of Saudi citizens to free expression, association, and assembly.
Greece’s anti-bailout Syriza party has widened its lead over the ruling conservatives to 6.7 percentage points from six points previously, a survey showed on Friday, two days before a national election.
The British, forever bragging about how attuned to irony they are, are responsible for some of the most hilariously ironic free speech and privacy violations in the world. There was the man charged with a “Racially Aggravated Crime” because he made a statement criticizing Islam—which turned out to be a direct quote from Winston Churchill. There’s the flat in London surrounded by 32 CCTV cameras—it once belonged to George Orwell.
There is no direct evidence that an ex-CIA officer leaked details of a classified mission to a journalist, but phone and email records show the two were in frequent contact, an FBI agent testified Wednesday.
Prosecutors wrapped up their case with a web of circumstantial evidence based on the phone and email contacts.
Former CIA man Jeffrey Sterling, 47, of O’Fallon, Missouri, is charged with leaking information about a purportedly botched operation to thwart Iran’s nuclear program to New York Times reporter James Risen, who wrote about the mission in the 2006 book “State of War.” Risen has refused to disclose his sources.
Hugo Chávez was elected President of Venezuela four times from 1998 through 2012 and was admired and supported by a large majority of that country’s citizens, largely due to his policies that helped the poor. King Abdullah was the dictator and tyrant who ran one of the most repressive regimes on the planet.
The effusive praise being heaped on the brutal Saudi despot by western media and political figures has been nothing short of nauseating; the UK Government, which arouses itself on a daily basis by issuing self-consciously eloquent lectures to the world about democracy, actually ordered flags flown all day at half-mast to honor this repulsive monarch.
It’s not often that the unelected leader of a country which publicly flogs dissidents and beheads people for sorcery wins such glowing praise from American officials. Even more perplexing, perhaps, have been the fawning obituaries in the mainstream press which have faithfully echoed this characterization of Abdullah as a benign and well-intentioned man of peace.
Tiptoeing around his brutal dictatorship, The Washington Post characterized Abdullah as a “wily king” while The New York Times inexplicably referred to him as “a force of moderation”, while also suggesting that evidence of his moderation included having had: “hundreds of militants arrested and some beheaded”. (emphasis added)
While granting that Abdullah might be considered a relative moderate within the brazenly anachronistic House of Saud, the fact remains that he presided for two decades over a regime which engaged in wanton human rights abuses, instrumentalized religious chauvinism, and played a hugely counterrevolutionary role in regional politics.
Above all, he was not a leader who shied away from both calling for and engineering more conflict in the Middle East.
King Abdullah of Saudi Arabia died yesterday aged 90, and there has been some controversy over the tributes paid by world leaders to the ruler of a repressive regime that carries out public beheadings and bans women from driving.
You are not supposed to repeat what the Queen says in private conversation. But the story she told me on that occasion was one that I was also to hear later from its subject – Crown Prince Abdullah of Saudi Arabia – and it is too funny not to repeat. Five years earlier, in September 1998, Abdullah had been invited up to Balmoral, for lunch with the Queen. Following his brother King Fahd’s stroke in 1995, Abdullah was already the de facto ruler of Saudi Arabia. After lunch, the Queen had asked her royal guest whether he would like a tour of the estate. Prompted by his Foreign Minister, the urbane Prince Saud, an initially hesitant Abdullah agreed. The royal Land Rovers were drawn up in front of the castle. As instructed, the Crown Prince climbed into the front seat of the front Land Rover, with his interpreter in the seat behind. To his surprise, the Queen climbed into the driving seat, turned the ignition and drove off. Women are not – yet – allowed to drive in Saudi Arabia, and Abdullah was not used to being driven by a woman, let alone a queen. His nervousness only increased as the Queen, an Army driver in wartime, accelerated the Land Rover along the narrow Scottish estate roads, talking all the time. Through his interpreter, the Crown Prince implored the Queen to slow down and concentrate on the road ahead.
Documents published online for the first time Thursday indicate that the FBI opened an inquiry into New Jersey Democratic Sen. Bob Menendez on August 1, 2012, focusing on repeated trips he took to the Dominican Republic with longtime campaign contributor and Miami eye doctor Salomon Melgen. TheDC reported in November that Menendez purchased the service of prostitutes in that Caribbean nation at a series of alcohol-fueled sex parties.
Saudi Arabian activist blogger Raif Badawi, sentenced to 1,000 lashes and 10 years in prison for advocating free speech, may not have to serve the full decade in prison.
Badawi family’s spokesperson, Dr Elham Manea, who is also an associate professor specialising in the Middle East at University of Zurich, said on Facebook that the news was delivered by a Saudi ambassador in Germany.
She wrote: “Saudi ambassador in Germany informed NDR-TV that flogging will not continue and #RaifBadawi maybe not have to serve the whole time in prison.”
A journalist and activist accused of working with Anonymous has been given a five-year prison term and ordered to pay nearly $900,000 in restitution and fines. Barrett Brown was sentenced on Thursday after pleading guilty last year to charges of transmitting threats, accessory to a cyber-attack, and obstruction of justice. Supporters say Brown has been unfairly targeted for investigating the highly secretive world of private intelligence and military contractors. After his sentencing on Thursday, Brown released a satirical statement that read in part: “Good news! — The U.S. government decided today that because I did such a good job investigating the cyber-industrial complex, they’re now going to send me to investigate the prison-industrial complex.” We discuss Brown’s case with Kevin Gallagher, a writer, activist and systems administrator who heads the Free Barrett Brown support network. He says that the public should not believe what the government says about Brown.
Campaigners blast policy as ‘discrimination’ but attraction cites ‘child protection’ rules after turning away adults and their carers
A major U.S. Supreme Court decision has upheld the right of federal employees to become whistleblowers. The case centers on former Transportation Security Administration Federal Air Marshal Robert MacLean. In July 2003, MacLean revealed to an MSNBC reporter that the Department of Homeland Security had decided to stop assigning air marshals to certain long-distance flights in order to save money, despite warnings of a potential plot to hijack U.S. airplanes. MSNBC’s report on the story sparked outcry, and the policy was quickly reversed. MacLean was fired three years later after admitting to being the story’s source. He filed a lawsuit over his dismissal, sparking a multi-year legal battle that ended earlier this week when the Supreme Court ruled on his behalf in a 7-to-2 decision. At issue was whether MacLean’s actions could be protected by the U.S. Whistleblower Protection Act, a law that protects employees if a disclosure exposes unlawful conduct, gross mismanagement or threats to public safety. We speak to Robert MacLean and attorney Neal Katyal, who argued MacLean’s case before the Supreme Court. Katyal is the former acting solicitor general of the United States.
Christine Lagarde, the head of the International Monetary Fund, has praised King Abdullah of Saudi Arabia as a “strong advocate of women”, but human rights campaigners said his reign only brought marginal advances for women, while failing to secure fundamental rights of free expression, association, and assembly.
In paying tribute to the king who died on Thursday aged 90, Lagarde – who has expressed her concerns over gender inequality – described the monarch as a great leader who implemented many reforms.
“In a very discreet way, he was a strong advocate of women. It was very gradual, appropriately so probably for the country. I discussed that issue with him several times and he was a strong believer,” said Lagarde, who is attending the Davos economic forum in Switzerland.
Former Conservative MP Louise Mensch has unleashed an extraordinary tirade on Twitter, instructing both David Cameron and the Queen to “fuck off”.
Mensch became enraged after the British Government declared all UK flags be flown at half mast to mourn the death of King Abdullah on Thursday.
She began by criticising US President Barack Obama for paying tribute to the late royal, whom Mensch said “whipped women for driving & is currently starving his daughters.”
The chief executive of BlackBerry has claimed that Apple should be forced to make apps for BlackBerry users under net neutrality laws currently being debated in the US.
Two weeks before the crash, Anatol Shmelev, the curator of the Russia and Eurasia collection at the Hoover Institution, at Stanford, had submitted to the Internet Archive, a nonprofit library in California, a list of Ukrainian and Russian Web sites and blogs that ought to be recorded as part of the archive’s Ukraine Conflict collection. Shmelev is one of about a thousand librarians and archivists around the world who identify possible acquisitions for the Internet Archive’s subject collections, which are stored in its Wayback Machine, in San Francisco. Strelkov’s VKontakte page was on Shmelev’s list. “Strelkov is the field commander in Slaviansk and one of the most important figures in the conflict,” Shmelev had written in an e-mail to the Internet Archive on July 1st, and his page “deserves to be recorded twice a day.”
Earlier this month, Lamar White, Jr. woke up to discover his Internet connection wasn’t working. He had just gotten a new cable box installed at his Dallas, Texas, home and figured his lines should still be in ship shape because it hadn’t been long since they were last checked.
Rather than just assume he had crappy Internet service, like you or I might, he thought his home computer system was on the receiving end of a denial of service attack. White, you see, is something of a major figure in the political media. And there are a good many people who may want revenge for the things he’s dug up.
What The Media Should Know About The GOP Bill That Is Net Neutrality In Name Only
On January 20th, La Quadrature du Net along with other European organisations co-signed an open letter [pdf] calling once more the EU’s Member States to adopt clear and strict rules to protect Net Neutrality. However, a negociation document shows that at the same moment, Member States were one towards the end of a free Internet. It is time for the European Parliament to get back to work on this issue and defend a real protection of Net Neutrality, against oligopolistic strategies of the large Internet actors backed by governments.
A Greek anti-piracy group has lost its bid to have various torrent sites blocked by local Internet providers. The Athens Court ruled that barring access to torrent sites such as KickassTorrents and The Pirate Bay is disproportionate and unconstitutional, while hindering the ISPs’ entrepreneurial freedoms.
A man jailed for 50 years in the United States for multiple bombings, drug smuggling and felony perjury, is attempting to leverage copyright troll cases to his advantage. Brett Kimberlin says that since a court has already revealed the identities of BitTorrent users, it should also unmask his critics.
Policy makers intending to promote creativity have always overemphasized the importance of “copyright protection” without addressing the wide range of other concerns that are necessary to consider when making comprehensive innovation policy. In an era where everyone, with the use of their computer or mobile device, can easily be a consumer, creator, and a critic of art, we can not afford to ignore this digital ecosystem of artistry and innovation. Yet copyright remains completely out of touch with the reality of most creators today, while the rules that do pass seem to stray even further from addressing their needs.
And then it dawned on me … just who the ideal candidate for Linux should be. It’s not the developer (though they probably get more benefit out of the platform than any user type), it’s not the gamer, it’s not the geek, and it’s not the administrator. The ideal candidate is the average user.
3-D printers are becoming popular tools, dropping in price and becoming available to almost everyone. They can be used to build parts that you can use around the house, but more and more, they also are being used to create instruments for scientific work. Although a growing library of objects are available in several on-line databases, there is nearly an infinite number of possible things you might want to build. This means you likely will want to design and build your own creations.
Purism, the company behind the Librem 15, promises that it will ship an Intel CPU fused to run unsigned BIOS code. The hope is that this will allow a future where free software can replace the proprietary, digitally signed, BIOS binaries.
Acer on Wednesday announced two new ruggedized Chromebooks geared for classroom use. Both will go on sale in February.
The Acer Chromebook C910 and C740 have a durable design built around reinforced covers and hinges. The new models support multiple user sign-ons and offline file access.
The Linux kernel is a very advanced piece of software that is able not only to cater to all the current hardware needs but also to run on hardware that was decommissioned and is no longer produced for more than twenty years.
The learning curve to becoming a Linux kernel developer is pretty steep and choosing the right direction might be somewhat difficult (but not as hard as you think – see my previous article.) However, I have some ideas on how to start this beautiful journey. I hope that these guidelines will be useful for someone.
Alex Deucher has sent in his DRM-Next changes for the open-source Radeon graphics driver updates that will target the Linux 3.20 kernel.
NVIDIA quietly released the 346.35 Linux graphics driver on Friday.
With Fedora 22 switching to libinput as its X.Org input driver and others beginning to look at utilizing xf86-input-libinput that uses a shared input library with Wayland, there’s some details end-users and developers need to know about the migration.
This morning NVIDIA is formally announcing the GeForce GTX 960 as the latest Maxwell GPU. The GeForce GTX 960 is a mid-range GPU priced starting out at $200 and comes with a compelling set of features. The past few days I’ve been testing out the eVGA GeForce GTX 960 2GB graphics card and in this article are some initial performance figures under Linux.
While there have been GLX_EXT_buffer_age patches for Mesa going back months, they’ve been for DRI3. Chris Wilson of Intel has now implemented GLX_EXT_buffer_age support along the DRI2 code-paths.
Version 3.1 of the GLFW OpenGL library for creating and managing windows/OpenGL contexts and handling input/events is now available.
Ideally, tapecalc works like a traditional paper-tape calculator, like you used in your business classes in secondary school, years ago. Even the display seems to mimic the paper roll effect.
Jan Schmidt spoke last week at Linux.Conf.Au 2015 about the State of the GStreamer project and some of their interesting accomplishments recently along with some of they work they have moving forward.
WhatsApp is the most used messenger service on mobile devices, but it’s also one of the few that don’t have an API or a client that can run on other devices as well, like PCs for example. That is no longer the case and Linux users now have access to WhatsApp by using the Google Chrome browser.
Another cloud storage vendor is eying the open source community. This week, MediaFire announced a new open source toolkit compatible with Linux and FreeBSD, giving Linux desktop fans another cloud storage option to compete with Dropbox, Google Drive and the like.
With Xonotic 0.8.0 finally having been released after one and a half years in development, here’s some open-source Mesa/Gallium3D graphics benchmarks on many different graphics cards for this high-profile open-source first person shooter game.
He forewarns that there’s explicit language in his video due to being upset over the poor graphics performance of Catalyst 14.12 when using a Radeon R9 270 graphics card for this Unity 4 game. The rest of his system comes down to an AMD FX-8350 Vishera, 8GB of RAM, Ubuntu-derived Linux Mint 17.1, and is playing at 1920 x 1080. His Radeon R9 270 graphics card is from XFX. The specs should be good enough for this independent Unity-powered game, but at least with Catalyst 14.12, there’s still issues to overcome.
Today we are very excited to give you the next iteration of Xonotic, the free and fast arena shooter. Yep, you guessed it: Xonotic 0.8.0 is out! This version is the culmination of months of effort from many individuals from across the globe. It contains improvements in just about all visible aspects of the game and onto the web. There are new menu screens, gameplay features, and a much-anticipated new weapon: the Arc! We’re excited for the what the future holds, and we hope to see you out on the servers soon. Happy fragging!
Storm United is a beautiful FPS game running on the Unreal Engine that will have full Linux support, and they have shown off their first real game-play video. The game was originally built in Unity, but it was dropped in favour of Unreal Engine which performs far better for this type of game.
KDE is one of the oldest open-source desktop projects which can be found today, and over the years it has established a rich history of highs and lows. During some points it has been the undisputed ruler of the desktop world, while other times it had fallen behind or faced hard trials.
A memory everything but forgotten, just over 6 years ago KDE tore itself apart in spectacular fashion to assemble itself anew. Brave users who wandered through the rubble and wreckage saw developers rebuild the KDE before their eyes, witnessing the birth of ‘Plasma Desktop’ and it’s sister project ‘KDE Development Platform’. It was universally understood that this twisted gnarled creature of a computing experience was both hideous yet full of potential, and over 5 years of refining Plasma it had struggled, crawled, hobbled, walked, run, and eventually mature into a fine desktop.
My objective was to release some games for the ’15.04′.
GNOME has quietly been working on sandboxed applications support and for GNOME 3.16 they hope to ship an initial reference runtime implementation of their new technology.
Matthias Clasen wrote a lengthy blog post tonight detailing the sandboxed applications for GNOME. The goal of sandboxed applications is to make it easy for third-parties to distribute applications that work on multiple distributions, give the applications as little access as possible to the host system, and to also make it easier to write applications.
GNOME 3.15.4 is out. This is a development snapshot, so use it with caution.
Not long ago, the Linux Mint team has decided to change their release policy and adopt only the LTS versions of Ubuntu, the systems released between to LTSs being only point releases that update the main components. Also, they have moved Linux Mint Debian Edition’s (LMDE) code base from Debian Testing to Debian Stable.
There is no shortage of security-focused Linux distributions on the market, and among them is Pentoo Linux. While some security-focused Linux distributions concentrate on privacy, like Tails, others like Kali Linux and Pentoo focus on security research, providing tools that enable research and penetration testing. Pentoo Linux differentiates itself from other security Linux distributions in a number of ways. The primary difference is the fact that Pentoo is based on Gentoo Linux, which is a source-based Linux distribution that uses the Portage package-management system. Gentoo has capabilities known as “Hardened Gentoo,” which Pentoo also inherits, providing users with additional security configuration and control for the Linux distribution itself. Pentoo 2015 RC 3.7 was released Jan. 5, providing updated tools and features. Among the new features is the integrated ability to verify that the distribution files have not been corrupted. Pentoo provides many applications for security analysis, including wireless, database, exploit, cracking and forensic tools. In this slide show, eWEEK looks at key features and tools in the Pentoo 2015 RC3.7 release.
Robolinux is an easy-to-use Linux distribution based on Debian that features various flavors. A GNOME desktop has been added and the devs have put forth a number of new applications. It’s still the same OS that wants to replace Windows by emulating its conditions, so nothing much has changed there.
Black Lab Linux, a distribution that is based on Ubuntu 14.04 LTS and is using the Xfce desktop environment, has been upgraded to version 6.0 SR 1.1 and is now available for download.
Manjaro would like to present our first public release version of Manjaro KDE Plasma 5 Desktop (Bellatrix 0.9.0) to it’s users to test with our new Qt5/python3 based installer named Calamares.
Manjaro KDE is a Linux distribution that uses snapshots of the Arch Linux repositories and a custom version of KDE. The developers have just pushed version 0.9.0 Pre1 (Bellatrix 0.9.0) out the door and they made quite a few improvements.
Q4OS is a Linux distribution built to offer a desktop experience similar to that of Windows XP. The developers are preparing to launch version 1.0 and they have made quite a few changes.
Open source software vendors do something akin to selling air: They get people to pay for something that easily, and perfectly legally, can be had for free. But added security is becoming an increasingly important part of the value proposition, as Red Hat (RHT), maker of one of the leading Linux enterprise distributions, emphasized this week in a statement on its software subscriptions.
Red Hat is hiring more developers that will focus on Fedora, especially the Fedora Workstation product, that in turn will flow back into RHEL and Red Hat Enterprise Linux Workstation. Among the type of work that Red Hat is looking for in the candidates include experience with Wayland, LLVMpipe, X.Org, compiler optimizations, graphics driver enablement, etc.
OpenStack is an open-source IaaS cloud platform that was developed through the collaborative efforts of Rackspace Hosting (NYSE:RAX) and NASA with the objective of countering the dominance of Amazon.com’s (NASDAQ:AMZN) AWS. The platform has AWS-like features including EC2 and S3 compatibility that allows businesses to build their own Amazon-like cloud services in their datacenters.
Ahead of evaluation by the Fedora Engineering and Steering Committee (FESCo), more of the planned changes for Fedora 22 are being discussed on the Fedora developers’ list. Here’s some more of the likely Fedora 22 changes that haven’t been covered by our earlier articles on F22 feature work.
Mea culpa! When I first saw that Canonical was coming out with its own combination of Docker containers and a lightweight Linux distribution in Ubuntu Core, I presumed it was a pure server play. I was wrong. Canonical, Ubuntu Linux’s parent company, also wants to turn Ubuntu Core into the operating system for the Internet of Things.
The modern PCs have become ridiculously small and more powerful with each passing year. Up until now no one thought that it could be possible to fit everything into a mouse, but that’s now becoming a reality and it’s powerful enough that it can run even an OS like Ubuntu.
The second alpha of the Vivid Vervet (to become 15.04) has now been released!
The second alpha for the Ubuntu 15.04 Vivid Vervet flavors (Kubuntu, Ubuntu GNOME, Lubuntu and Ubuntu Kylin) has been released. Let’s take a quick look at what’s new.
The Ubuntu flavors opting in for a second alpha release for the 15.04 Vivid Vervet cycle have out their new releases today.
The next version of the popular Ubuntu Linux operating system is due in April. Ubuntu 15.04 Vivid Vervet is currently under development, but you can take a recent nightly build for a spin if you want to test it out before the official launch.
Intel announced a portable access point and content server for schools that runs Ubuntu on an Atom E3815, and serves up to 50 students using WiFi or GbE.
The second Alpha of Vivid (to become 15.04) has now been released!
The Samsung Z1 is the first Tizen based Smartphone to be launched and we are hoping it is the first of many Tizen Smartphones to come. The Z1 has now made its way to the Samsung eStore in India and can be yours for the price of 5,700 INR, which is a very competitive price for such tech.
This is an Interesting little video that I found on the net. Created by YouTube user TheGarchaHD, it walks you through the User Interface of the Tizen based Samsung Z1 and shows you some of the features of the Tizen 2.3 Operating System.
Messaging apps these days don’t have to just live in your smartphone or your tablet, they need to be with you wherever you are, and that might be sitting with you at your computer. Messaging apps like facebook, WeChat and Line already have this option and it seems to be the best you really do need to include the PC in your platform choices.
WhatsApp is coming to the desktop, thanks to a web client that launched today for Chrome and Android. Reached by The Verge, WhatsApp confirmed earlier rumors, which pointed to a newly live page at web.whatsapp.com. “The primary use is of course still on your phone,” a spokesman said, “but there are people who spend time in front of a computer at home or at work and this will help bridge the two.”
This Android 5.0.2 Lollipop update review will take a look at everything Nexus users need to know, right now, about the Android 5.0.2 Lollipop release for Google’s Nexus devices.
An alleged update roadmap has leaked online for HTC devices, revealing when Android 5.0 Lollipop will roll out to various handsets in the company’s lineup.
While developing the Galaxy Zoo app for Android, I experienced problems with UI responsiveness while the app was downloading from, or uploading to, the remote server. I don’t mean just the usual problems caused by doing network I/O or file system access in the UI thread – mistakes that can often be caught by using Strict Mode. I mean that buttons didn’t respond to presses if the app happened to be doing I/O in an AsyncTask.doInBackground().
For the purpose of this article, we look at TrueCaller and a slew of popular third party Android Launchers. We have seen similar behavior across many of the latest ‘utility’ applications, so it is fair to extend the analysis to the entire domain.
Have you heard the one about the big media house whose new, proprietary content management system (CMS) handles its every need, worked straight out of the box and with which all the journalists are in love? No?
Google is out with its first stable Chrome browser update of 2015, with security vulnerabilities fixes topping the list of improvements in the new release. In total, Google is patching 62 different security flaws in the update.
In contrast, Microsoft has yet to provide a single security patch for its Internet Explorer browser in 2015, while Mozilla’s Firefox 35 had nine security advisories attached to it.
IBM pays analyst firm Evans Data Corporation for what are widely regarded as worthy reports — in this role, Evans has cited IBM as an “industry leader” for making Hadoop more accessible, scalable and reliable for developers in a new analyst survey.
The OpenACC support was merged for GCC 5 on the final day of permitting new work for this major GPLv3 compiler update.
A system for smartphones, tablet computers and PCs that can warn students, teachers and school personnel of emergencies is to be developed for the Norwegian Akerhus county. The solution will be built by the Danish ICT service specialist Magenta, using open source components.
Mirantis, focused on the OpenStack cloud computing platform, has expanded its ambitious Mirantis Training for OpenStack course collection with two new courses and a Certificate Verification portal. Mirantis’ training platform has been running since 2011, and is differentiated from some other training platforms in that the coursework is OpenStack distribution-agnostic. According to Mirantis, Eighty eight percent of students rate it as better than other professional industry training offerings due to the quality of its instructors, its hands-on format, and its curriculum that is removed of vendor bias.
The railway will be 7,000 kilometers long and go through Kazakhstan, reports Bloomberg citing Beijing’s city government on the social networking site Weibo, China’s alternative to Twitter. The railway will make travel easier between Europe and Asia, the statement said.
South Korea’s online espionage program may be primarily focused on the North, but it’s also targeting the United States—and the U.S. government isn’t making a stink about it.
The NSA wasn’t much interested in North Korea at the time but that changed – partly because the spy agency managed to get its hands on useful zero-day exploits used against the Norks, according to recently disclosed files. NBC News adds that US intel agencies had no forewarning of the Sony hack. After Sony reported the breach to the FBI’s cyber unit on 24 November, it became possible to trace back the attack.
So even after comprehensively bugging North Korea’s ‘net connection, the best the spy agency had was the equivalent of a CCTV camera rather than a burglar alarm capable of detecting a crime in progress.
“The pieces don’t add up,” said Tal Klein, vice president of strategy for Internet-security firm Adallom. “I cannot dispute the fact that the NSA hacked the North Koreans, because that is the ultimate trump card—there’s empirical evidence that I will never be able to see. But the attack does not fit the mold of a nation-state attack, but of a revenge-oriented attack.” – See more at: http://www.eweek.com/security/doubts-persist-over-north-korean-link-to-sony-hack-despite-nsa-claim.html#sthash.8k1lwUtf.dpuf
Our guest for Episode 50 of the Steptoe Cyberlaw Podcast is David Sanger, the New York Times reporter who broke the detailed story of Stuxnet in his book, Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power. David talks about his latest story, recounting how North Korea developed its cyberattack network, and how the National Security Agency managed to compromise the network sufficiently to attribute the Sony attack. We talk about how understanding the White House helped him break a story that seemed to be about NSA and the FBI, North Korean hackers’ resemblance to East German Olympic swimmers, and the future of cyberwar.
American soldiers will deploy to Ukraine this spring to begin training four companies of the Ukrainian National Guard, the head of US Army Europe Lt. Gen Ben Hodges said during his first visit to Kiev on Wednesday.
Did you hear the one about Hillary doing an impression of Vladimir Putin in Canada? Because it actually happened, Jackie Kucinich reports. During a wide ranging policy speech to the Winnipeg Chamber of Commerce, Hillary answered a question about the American electoral system with an impression. The moderator began asking her “if for some reason you decided to be president” and then quickly corrected himself, “actually run for that because there is a process.”
“There is a process, it’s not like Putin,” she said.
Cue the laugh track.
It has taken decades of deteriorating politics and security for Yemen to reach its current level of crisis, though now the costs might come not just in the form of the suffering of the Yemeni people but also in regional instability and the proliferation of international terrorism. While the causes of Yemen’s crisis are intensely local—having to do with longstanding issues of corruption, tribal and North-South differences, and a constitution in need of amending—it is being amplified both by meddling regional actors and a menacing terrorist group with international reach.
The tensions in the North that have been heightened following this week’s alleged Israeli airstrike that killed senior Hezbollah officials in the Golan Heights are also being felt in Lebanon, where apprehension is growing over the specter of another cross-border war.
Since Barack Obama’s previous State of the Union address, the US president has relaunched the Iraq war – this time with a Syrian appendix – ensured the presence of US troops in Afghanistan through 2024 and continued drone strikes in Yemen and Pakistan. Yet if Obama’s 2015 State of the Union is to be believed, “tonight, we turn the page”.
On foreign policy and national security, Obama cannot be blamed for wanting the page turned. Unlike in his previous States of the Union, there is no dead Osama bin Laden or Muammar Gaddafi to tout. His strongest foreign achievement in 2014 – an admittedly historic one – has been to normalize relations with Cuba, though, as with all things Obama does, congressional Republicans vow opposition.
A similar observation might be made of Clint Eastwood’s American Sniper about Iraq. Like the Iraq War itself, Eastwood’s movie begins by exploiting a historically inaccurate delusion and, then, sustains itself for two hours on the mission to protect US soldiers against the insurgency that arose in opposition to the US invasion and occupation based on the initial delusion.
The planned flogging of a Saudi blogger convicted of insulting Islam has been delayed for a second straight week, a leading international rights group said Thursday, a move that comes amid mounting pressure from Saudi Arabia’s Western allies for authorities to cancel the punishment.
The London-based Amnesty International said that around eight doctors carried out medical tests on Raif Badawi, 31, and recommended that he not be flogged this Friday. Saudi authorities postponed his flogging last week after a doctor concluded that his wounds from the first 50 lashes had not yet healed, according to Amnesty.
The announcement, made early on Friday, said his brother, Salman, had become king.
He was told that he helped to kill more than 1,600 people, but as time went by he felt uneasy with what he was doing. He found it hard to sleep and started dreaming in infra-red.
In May 2009, a former adviser to General David Petraeus named David Kilcullen wrote an op-ed in the New York Times calling for a moratorium on drone strikes carried out by the United States against al-Qaida and its associates in Afghanistan, Pakistan, Somalia and Yemen. The military advantages of using drones (the US Army defines a drone as a “land, sea or air vehicle that is remotely or automatically controlled”) are outweighed, Kilcullen argued, by their costs.
An estimated 3,500 people — hundreds of them children — have been killed by drones. While some of those killed were undoubtedly violent terrorists, fewer than 50 (2 percent) were confirmed to be high-level targets, according to a study undertaken by Stanford Law School and New York School of Law. There are numerous allegations, some confirmed by reliable news sources, of entire wedding parties and extended families being killed by U.S. drones.
On January 23, Kathy Kelly, co-coordinator of Voices for Creative Nonviolence, a campaign to end U.S. military and economic warfare, will begin a three-month jail sentence in federal prison for a protest against drones (also known as “unmanned aerial vehicles”) at Whiteman Air Force Base in Missouri. I had a chance to interview her before she had to turn herself in.
Former US drone sensor operator Brandon Bryant admits he “couldn’t stand” himself for his participation in the country’s drone program for six years – firing on targets whose identities often went unconfirmed.
In closing, here is a quote from the ACLU regarding the use of drones:
“The executive branch has, in effect, claimed the unchecked authority to put the names of citizens and others on “kill lists” on the basis of a secret determination, based on secret evidence, that a person meets a secret definition of the enemy. The targeted killing program operates with virtually no oversight outside the executive branch, and essential details about the program remain secret, including what criteria are used to put people on CIA and military kill lists or how much evidence is required.
While Lebanon and Israel await Hezbollah’s response to Sunday’s deadly Israeli drone strike in the Golan Heights, the motive for the provocative attack, which could yet trigger further violence, remains shrouded in confusion.
The continued silence from the Israeli government and military over the airstrike combined with some ambiguous comments in the media from Israeli security sources have only added to the puzzlement and drawn criticism in Israel.
The Knesset Foreign Affairs and Defense Committee devoted itself to an important issue on Tuesday: the Israel Defense Forces’ decision to stop stationing soldiers in communities near the Gaza Strip. But if these Knesset members aren’t too busy with the election campaign, perhaps they should also make some time in the near future to discuss what is beginning to look like a major security crisis: the open threats by Iran and Hezbollah to take revenge for Sunday’s assassination of senior officials from both Hezbollah and the Iranian Revolutionary Guard, which they attribute to Israel.
The president said it was important to have legal constraints on the controversial drone program but that the program was aimed at minimizing casualties. “Under that our goal has always been: how do we target very specific terrorists who are proven to be trying to kill us — or more frequently kill innocent Muslims in their home countries,” he said.
Yet there is something about drone warfare that is profoundly disturbing. How do our military and intelligence officials know if someone is a potential terrorist? Do we know the criteria by which a person or persons are targeted? Is it someone who is poised to kill, or is it someone who once killed? Is it prevention or revenge?
Our tactics produce more dangerous, more committed extremists
Since the Vietnam War, with its gruesome and inflated U.S. tallies of enemy dead, the Pentagon has denied keeping body counts. But, in fact, the military does add up the number of enemy fighters it believes it has killed — and proudly boasts of the totals in official documents that it never intends for public circulation.
American Sniper retells the story about four Iraq combat tours of the most lethal sniper in US military history, Chris Kyle. Despite having been nominated for six Academy Awards, including Best Picture, the Clint Eastwood directed film was better than I expected, and I still hated it.
With a record breaking $105 million in box office earnings in its opening weekend, the film has arguably generated more controversy in the US than any movie I can recall.
Much of the controversy has centred on the portrayal of the late Chris Kyle himself. Veterans who served with Kyle have praised the accuracy of actor Bradley Cooper’s impersonation, but a number of liberal journalists have lambasted the film for not staying true to Kyle’s autobiography. In fact, the film came close to portraying Kyle as a reluctant warrior. You know, the whole “I’m just doing my job” routine. In the book and in Kyle’s own words, however, killing 160 Iraqis, who were mostly the “civilian by day, soldiers by night” type, was something Kyle actually took great satisfaction from.
“I don’t shoot people with Qurans. I’d like to but I don’t,” Kyle told a military investigator after being accused of killing an unarmed Iraqi civilian. In other parts of his book, Kyle writes: “I couldn’t give a fuck about the Iraqis” and “I hate the damn savages.”
From the point of view of the U.S. military and the national security state, the period from September 12, 2001, to late last night could be summed up in a single word: more. What Washington funded with your tax dollars was a bacchanalia of expansion intended, as is endlessly reiterated, to keep America “safe.” But here’s the odd thing: as the structure of what’s always called “security” is built out ever further into our world and our lives, that world only seems to become less secure. Odder yet, that “more” is rarely a focus of media coverage, though its reality is glaringly obvious. The details may get coverage but the larger reality — the thing being created in Washington — seems of remarkably little interest.
That’s why websites like TomDispatch matter. They offer the larger picture of a world that’s being built right before our eyes but is somehow seldom actually seen — that is, taken in meaningfully. America’s Special Operations forces are a striking example of this phenomenon. The commando is, by now, a national culture hero, the guy who stands between Hell and us. But what special ops forces really do all — and I mean all — over the planet, doesn’t seem of any particular interest to Americans in general or the mainstream media in particular. The way those “elite” forces have parlayed their popularity into a staggering growth rate and just what that growth and the actions that go with it actually mean in terms of, say, blowback… well, that’s something you’re simply not going to read much about, other than at a website like this one.
Fox News has apologized for broadcasting false information about Muslims in the wake of the Paris attacks. Last weekend, self-described terrorism expert Steve Emerson claimed on air that parts of Europe, including the entire English city of Birmingham, were totally Muslim areas where non-Muslims do not go. Emerson was forced to apologize, but the claim about so-called “no-go zones” was repeated by other Fox guests and anchors. On Saturday, according to a CNN Money tally, Fox News took time out of four broadcasts to apologize for reports on Muslims. Jeremy Scahill, co-founder of The Intercept, discusses the rise of so-called “terrorism experts” by Fox News and other major cable networks. In two recent interviews with CNN, Scahill has criticized the news giant and others for their use of “on-air analysts who also work in the private sector and make money on the idea that we should be afraid.” He also responds to blistering criticism from FBI chief James Comey of using an anonymous al-Qaeda source in reporting on the Charlie Hebdo massacre, and analyzes what al-Qaeda’s claim of responsibility will mean for the U.S. drone war in Yemen.
War, then, is to be sustained and expanded. Put simply, Western governments with large-scale militaries and jihadist organizations with violence central to their strategies are engaged in an asymmetric exchange of violence, wherein killing of both combatants and civilians is routine. Drone strikes and bombing raids over Iraq and Syria generate reciprocal responses from al-Qaeda and groups now associated with ISIS in the form of beheadings, kidnappings and killing of civilians through various means.
It is an “a-symmetric” conflict because Western states’ strikes are far more lethal than those of jihadi organizations and ISIS. For every innocent civilian murdered by ISIS, U.S. drones and air strikes — and now French bombing raids — kill many, consequently rallying new recruits against the United States and France with each raid.
Who among our congressional leaders speaks for an anti-war position? Will we see an anti-war presidential candidate in 2016? It seems unlikely.
The former head of Britain’s intelligence agency MI5, Lord Evans, has added his voice to demands for a clampdown on the Internet and e-communications in the wake of the terror assaults on the Charlie Hebdo office in Paris and a Jewish supermarket, in which 17 people were killed.
We have allowed fear and hate to foster the rise of paranoiacs, demagogues, opportunists and fools, driving our attention and resources away from immediate, dire situations: climate change, globalism, economic inequality and the degradation of education and the national infrastructure.
White HouseWhite HouseWhat can we expect in President Obama’s State of the Union with regard to U.S. foreign policy in 2015? Not much. As in every every State of the Union since 2002, the president is expected to address foreign policy largely within the framework of the war on terror and counterterrorism operations. But the State of the Union is largely a vehicle for rhetoric, not honest explanations of policy. President Obama mentioned drones in a State of the Union for the first time last year, claiming his administration had “imposed prudent limits” on their use.
Tethong said she would appeal the ruling.
During the trial, which began in December but was halted when Elmer collapsed outside the Zurich courtroom, Tethong argued that Elmer had not broken any Swiss laws because he had not obtained the information as an employee of a Swiss bank.
A new report from the anti-poverty group Oxfam has helped put inequality back near the top of the global agenda, just in time for the World Economic Forum’s annual gathering of global elites in Davos, Switzerland. In particular, one striking claim from the Oxfam report has generated headlines: By next year, the top 1% of the world’s population could own more wealth than the other 99%. The Oxfam report – just one of many attempts at measuring worldwide economic disparities – fits into a broader pattern of growing interest in, and concern about, inequality.
Braintree first announced the v.zero SDK back in July last year. The SDK allowed automatic shopping cart integration with PayPal among other payment types. In September, Braintree revealed a partnership with Coinbase to accept Bitcoin, but this is the first implementation of their collaboration.
Oil prices jumped in early Asian trading on Friday as news of the death of Saudi Arabia’s King Abdullah added to uncertainty in energy markets already facing some of the biggest shifts in decades.
Abdullah died early on Friday and his brother Salman became king, the royal court in the world’s top oil exporter and birthplace of Islam said in a statement carried by state television.
Five years after the Supreme Court opened the floodgates of campaign spending with its Citizens United decision, top newspapers in the three states with the most expensive judicial campaigns, Ohio, Alabama, and Texas, have largely failed to connect Citizens United with major changes in these races. The influx of money into state judicial elections following the decision has accelerated negative advertisements and campaign financing that may influence judges’ decisions.
CNN’s post-speech discussion of Barack Obama’s State of the Union address included anchor Wolf Blitzer’s reaction to colleague Jake Tapper’s view that the president had outlined a liberal economic agenda. Blitzer’s analysis illustrates the logic behind corporate media’s longstanding efforts to dissuade politicians from advocating for progressive policies…
Republicans are trying to burnish their party’s image–and Congress’–by promising to “get things done” now that the GOP controls both the House and Senate. But a new Wall Street Journal/NBC News poll shows that the public doesn’t care much about some of the first things the GOP, or President Barack Obama, is trying to do.
Despite dedicating numerous segments to comments made by MIT economist Jonathan Gruber about tax credits established under the Affordable Care Act (ACA) that appear to support a right-wing challenge to their legality, Fox News’ programming on weeknights has ignored remarks made by Gov. Scott Walker (R-WI) that undermine the legal theory behind this upcoming Supreme Court case.
In France and the United States, there seems to be near-universal agreement that to self-censor because of threats of violence is unwise and cowardly. The slogan “Je Suis Charlie,” which millions adopted in the wake of the Paris attacks, meant different things to different people, but its core, defiant message was that terrorists shouldn’t get to decide the boundaries of our political debate.
This was also the perspective of many Americans when, at the end of last year, a mysterious group said to be associated with North Korea threatened to wreak havoc if Sony didn’t cancel “The Interview,” a comedy about a plot to assassinate Kim Jong-un. Political leaders of both national parties criticized Sony for withdrawing the film. Some particularly outraged Americans urged their fellow citizens not just to watch the film but to pay for the privilege on the theory that their doing so would convey an appropriate message to the dictator. President Obama weighed in, too, saying, “we cannot have a society in which some dictator someplace can start imposing censorship here in the United States.”
The revelations of Edward Snowden have exposed to the world a massive breach of democratic rights by the US intelligence agencies and their allies. They have also unleashed protests and expressions of sympathy for Snowden’s efforts among broad social layers.
The documentary begins with a dramatic statement by US Senator Dianne Feinstein (Democrat, California). The Senate Intelligence Committee chairman declares: “I want him to be captured. The hunt is on!” The programme assumes the guise of a spy thriller. The measures taken by the US authorities to remove Snowden from circulation are extraordinary and menacing. This is not only the view of the documentary, but of the protagonists themselves: Edward Snowden, as well as Julian Assange and Sarah Harrison of WikiLeaks.
The widespread dissemination of ideas can disrupt society and subvert the power of those at its top.
Gutenberg’s printing press, for example, helped spur the Protestant Reformation that over time helped overturn the religious and political order of Europe.
In an often-bloody process that took about 400 years, the authoritarian empires that ruled the continent gave way to modern, democratic nation-states.
Books have been banned (and burned) precisely because new ideas are a threat to the people in charge.
I am in Berlin for the annual Sam Adams Award – this time to William Binney, formerly Technical Director of the NSA. There will be an address by Edward Snowden (and a short contribution from me). It really is a tremendous event, with some very senior former intelligence professionals making revelations about the extent to which the security state is out of control, a tool of immoral governments dominated by corporate interests.
Another pile of Snowden documents has been released by Der Spiegel, detailing more of previously revealed NSA/GCHQ activities — like the harvesting of exploits and hardware shipment “interdiction” — along with some new stuff, including the NSA’s piggybacking on other countries’ surveillance to further buttress its massive haystacks.
The NSA quietly commandeered a botnet targeting US Defence agencies to attack other victims including Chinese and Vietnamese dissidents, Snowden documents reveal.
What data is harmless in the hands of the government? Apparently, not much. Case in point: the data collected by E-ZPass transponders. While the system helps alleviate traffic congestion, it also tracks drivers’ movements. If you thought it just triggered toll payments, you’re drastically underestimating the government’s desire for data.
Edward Snowden, the infamous former NSA employee, leaked a number of secret documents. Just recently Der Spiegel released another one, revealing that South Korea’s cyber espionage program has been targeting the US for a while now, despite officially being aimed against North Korea.
A team of nine journalists including Jacob Appelbaum and Laura Poitras have just published another massive collection of classified records obtained by Edward Snowden. The trove of documents, published on Der Spiegel, show that the National Security Agency and its allies are methodically preparing for future wars carried out over the internet. Der Spiegel reports that the intelligence agencies are working towards the ability to infiltrate and disable computer networks — potentially giving them the ability to disrupt critical utilities and other infrastructure. And the NSA and GCHQ think they’re so far ahead of everyone else, they’re laughing about it.
Whistle-blowers like Bill Binny, Thomas Drake, and Edward Snowden, along with wrongly accused U.S. citizens, have been fighting for their rights. Not from terrorists, but from the U.S. government.
While they fight, many Americans have become complacent with their diminished rights and lack of privacy.
The Patriot Act passed 6 weeks after 9/11 in a climate of fear and imminent threat. It diminished freedom in the U.S., providing the government sweeping powers to spy on, arrest, and detain individuals. The original legislation provided little oversight. Since 2001, there has been a major struggle between protecting constitutional rights and increasing government powers to battle imminent terror.
A bill filed in Alaska late last week would ban “material support or resources” to the NSA. This would not only support efforts to turn off NSA’s water in Utah, but have practical effects on federal surveillance programs if passed.
Alaska Sen. Bill Wielechowski prefiled SB13 on Jan. 16. The legislation would prohibit the state and its municipalities from using assets, including personnel, to assist a federal agency in collecting certain telephone records or electronic data without a warrant, making it the fourth state to introduce legislation similar to a bill up for consideration in Utah this year.
“World War III is a guerrilla information war with no division between military and civilian participation.” – Marshall McLuhan, Culture is Our Business, 1970
New Snowden documents recently revealed that the NSA is getting ready for future digital wars as the agency postures itself in an aggressive manner towards the world. “The Five Eyes Alliance“, a cooperation between United States, Canada, Britain, Australia, and New Zealand, is working hard to develop these weapons of Cyber Warfare.
So called “D” weapons, as reported by Der Spiegel, will paralyze computer networks and infrastructure that they monitor. Water supplies, factories, airports, as well as the flow of money are all potential targets.
Does the National Security Agency (NSA) have the authority to collect and keep all encrypted Internet traffic for as long as is necessary to decrypt that traffic? That was a question first raised in June 2013, after the minimization procedures governing telephone and Internet records collected under Section 702 of the Foreign Intelligence Surveillance Act were disclosed by Edward Snowden. The issue quickly receded into the background, however, as the world struggled to keep up with the deluge of surveillance disclosures. The Intelligence Authorization Act of 2015, which passed Congress this last December, should bring the question back to the fore. It established retention guidelines for communications collected under Executive Order 12333 and included an exception that allows NSA to keep ‘incidentally’ collected encrypted communications for an indefinite period of time. This creates a massive loophole in the guidelines.
The new Documentary ‘Citizenfour’ revealed the existence of another ‘whistleblower,’ someone even higher ranking than Snowden who came forward.
As the team of journalists reporting for Der Spiegel describe it, “the US government is currently undertaking a massive effort to digitally arm itself for network warfare.” And, they report, the NSA—along with its intelligence partners around the world—”have adopted ‘plausible deniability’ as their guiding principle for Internet operations.”
A cross-party alliance of former defence ministers, police chiefs and intelligence commissioners will try to force a revised “snooper’s charter” into law before the general election.
The proposals to amend the counter-terrorism bill currently in the Lords and due for debate on Monday have been tabled by a group led by former Conservative defence secretary Lord King. The other supporters are the Liberal Democrat former reviewer of counter-terror laws, Lord Carlile, the former Labour defence minister, Lord West, and the former Metropolitan police commissioner, Lord Blair.
Dutch intelligence services AIVD and MIVD walk on the leash of USA’s National Security Agency (NSA) and are “extremely docile” and seen as “subordinates”, says former NSA and CIA employee Edward Snowden in an interview to Volkskrant and Nieuwsuur.
The Dutch security services AIVD and MIVD do whatever the US security service NSA tells them, according to whistleblower Edward Snowden in an interview with the Volkskrant.
RT: Are people taking their privacy more seriously after all the Snowden revelations? Or are they just making a joke of it?
AM: Yes, one of the jokes, of course, is “GCHQ is always listening to its customers.” I think people are beginning to take their privacy more seriously. It depends on which country you live in though because depending on the media coverage and the degree of media coverage people are more or less aware of what’s going on.
For example, in Germany there is a historic understanding of the importance of privacy as the last defense against sliding towards tyrannical government. And also people are very conscious still of more recent history, things like the Stasi secret police. So they take these issues very seriously and in fact there are a number of initiatives in Germany to up the protection of citizens’ rights.
However in places like the UK for example where the media has been largely censored around reporting some of the very serious disclosures which Mr. Snowden produced, there is less awareness; there is more a sort of complacency that the spies are always the good guys, that … if you do nothing wrong you have nothing to hide. But I think even in the UK people are waking up to this, so all we can do is thank Edward Snowden for all he has done for raising awareness of these various issues around the world.
How a brutal government used cutting-edge spyware to hijack one activist’s life
Edward Snowden is pointing to the recent terror attacks in Paris as proof that government surveillance can’t stop terrorism.
“The problem with mass surveillance is that you’re burying people under too much data,” the government leaker said in an interview with a Dutch public broadcaster.
“We see that France passed one of the most intrusive, expansive surveillance laws in all of Europe last year, and it didn’t stop the attack,” he added. “This is consistent with what we’ve seen in every country.”
Concluding a controversial case that has dragged on for over two years, on Thursday morning the jailed journalist Barrett Brown will go before a federal judge to receive his sentence. He faces up to 8.5 years in prison.
The charges relating to the hyperlink represented a serious threat to press freedom. EFF and other press organizations planned to file an amicus brief supporting Brown’s motion to dismiss eleven of the hyperlinking charges, noting that journalists routinely link to documents that, while illegally obtained, are of interest to the public. Thankfully, the government came to its senses in March 2014 and (before we could file our brief), dismissed eleven of the charges based on hyperlinking. The next month, Brown signed a sealed plea agreement that significantly reduced the remaining charges. Ultimately, he pleaded guilty to three crimes: being an accessory after the fact to the unauthorized access to Stratfor’s computers; interfering with the execution of a search warrant by hiding a laptop; and, most seriously, threatening an FBI agent.
A campaign to stop the UK Government spying on journalists and their sources has today been given “priority” by the European Court of Human Rights (pictured, Shutterstock).
The Bureau of Investigative Journalism submitted a legal challenge to the Regulation of Investigatory Powers Act prompted by Edward Snowden’s revelations over state mass electronic surveillance.
It claims that the UK state is breaching European law by accessing the electronic communications and telecoms records of journalists.
Today the Bureau learned that the ECHR has prioritised its legal challenge, meaning a judgment is expected with around a year rather than the usual four or five years.
Every national newspaper editor has backed the Press Gazette Save Our Sources campaign and signed a joint letter of protest to Prime Minister David Cameron over police spying on journalists’ phone records.
Around 100 editors have signed a letter co-ordinated by Press Gazette and the Society of Editors to warn that the draft code of practice on use of the Regulation of Investigatory Powers Act puts journalists’ sources at risk.
Politicians promised new controls in the code, but instead the new draft guidance states that police can continue to secretly view journalists’ phone records provided they give “special consideration” to the “proportionality” of doing so.
The joint letter (full text below), submitted as part of the RIPA code consulation, states that the draft code “provides wholly inadequate protection for journalists’ sources”.
And it warns that there is nothing in the new code to stop police again targeting the phone records of journalists in order to uncover lawful sources, as they did with The Sun.
The draft code appears to encourage police to access journalists’ phone records by stating that they are not “privileged information”.
Israel’s government watchdog, the state comptroller, said on Tuesday that he had opened an investigation into decisions made by military and political leaders during last summer’s 50-day war with the Hamas militant group in Gaza.
The announcement was Israel’s latest effort to head off an International Criminal Court inquiry into its conduct during the war, and came days after prosecutors at the court opened a preliminary examination of possible war crimes committed in the Palestinian territories, the first formal step that could lead to charges against Israelis.
On January 27th, domestic violence survivor Marissa Alexander will walk out of Florida’s Duval County jail — but she won’t be free.
Alexander, whose case has gained some notoriety, endured three years of jail time and a year of house arrest while fighting off a prison sentence that would have seen her incarcerated for the rest of her life — all for firing a warning shot that injured no one to fend off her abusive husband. Like many black women before her, Alexander was framed as a perpetrator in a clear case of self-defense. In November, as her trial date drew close, Alexander accepted a plea deal that will likely give her credit for time served, requiring her to spend “just” 65 more days in jail. Media coverage of the development suggested that Alexander would soon have her “freedom,” that she would be “coming home.”
But earlier Wednesday, the seventh day of the trial, defense attorneys poked holes in the government’s case. Hunt testified that around the time Risen began asking questions about the program in May 2003, she believed the most likely source for the leak was someone on the Senate Intelligence Committee. Sterling had talked to the panel’s staffers in March of that year about his concerns that Iran might be able to take advantage of flaws in the designs, in part because they were too obvious.
One is an enemy of America, a group of evil Sunni terrorists who ruthlessly employ their own twisted vision of Islamic Sharia Law to behead people, punish homosexuality and criminalize adultery.
And the other’s one of America’s staunchest Sunni allies in the Middle East, on the road to democracy, albeit one that employs its own twisted vision of Islamic Sharia Law to behead people, punish homosexuality and criminalize adultery.
Senator Richard Burr is acting like a man who doesn’t understand the role or duties that he now has. With the Republican Party assuming control of Congress, the North Carolinian is chairman of the Senate intelligence committee, the body charged with overseeing the CIA. His responsibilities are momentous. All senators are called to act as power-jealous checks on the executive branch. And the particular mission of the Senate intelligence committee, created in the wake of horrific CIA abuses, obligates Burr to “provide vigilant legislative oversight over the intelligence activities of the United States” and “to assure that such activities are in conformity with the Constitution and laws.”
Edward Snowden blames politicians who ask for more powers for intelligence services after the Paris attacks of ‘seizing a catastrophe for their own benefits’. They need to remember recent history, he says, pointing to the Patriot Act as the American response after 9/11. ‘A quick law is never a good law’, Snowden says in an interview with Dutch daily newspaper De Volkskrant.
According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
A court officer handed out a packet of these same documents with bright red SECRET markings on the front to each juror (the government had tried to include such a warning on the binders of other exhibits, but the defense pointed out that nothing in them was actually classified at all). Judge Leonie Brinkema, apparently responding to the confused look on jurors’ faces, explained these were still-classified documents intended for their eyes only. “You’ll get the context,” Judge Brinkema added. “The content is not really anything you have to worry about.” The government then explained these documents were seized from Jeffrey Sterling’s house in Missouri in 2006. Then the court officer collected the documents back up again, having introduced the jurors to the exclusive world of CIA’s secrets for just a few moments.
Prosecutors asked a federal jury Thursday to convict former CIA officer Jeffrey Sterling on leak charges to send a message that the spy agency’s secrets can be protected and that those who cooperate with the U.S. intelligence can be confident the government will do all it can to keep their identities under wraps.
But in its closing statement, the defense argued that government lawyers were long on conjecture and short on proof — and a lawyer for Sterling presented an alternative theory of who leaked top-secret details of a CIA operation aimed at undermining Iran’s nuclear program.
Six days of testimony at the trial of former CIA officer Jeffrey Sterling have proven the agency’s obsession with proclaiming its competence. Many of the two-dozen witnesses from the Central Intelligence Agency conveyed smoldering resentment that a whistleblower or journalist might depict the institution as a bungling outfit unworthy of its middle name.
“Guantánamo Diary” is the most profound account yet written of what it is like to be that collateral damage. One fall day 13 years ago Mohamedou Ould Slahi, a 30-year-old electrical engineer and telecommunications specialist, received a visit at his house in Noakchott, Mauritania, from two officers summoning him to come answer questions at the country’s intelligence ministry. “Take your car,” one of the men told him, as Slahi stood in front of his house with his mother and his aunt. “We hope you can come back today.” Listening to these words, Slahi’s mother fixed her eyes on her son. “It is the taste of helplessness,” he writes, “when you see your beloved fading away like a dream and you cannot help him. . . . I would watch both my mom and my aunt praying in my rearview mirror until we took the first turn and I saw my beloved ones disappear.”
On one of the roughest days in Mohamedou Ould Slahi’s 14 years of captivity at Guantánamo Bay, Cuba, an American interrogator initially suggested that he pray out loud, then ridiculed him when he began reciting the Quran.
Chained, barefoot and wearing only a thin uniform in an interrogation room chilled to 49 degrees, Mr. Slahi found himself on the receiving end of a barrage of questions. “Yes or no?” one interrogator shouted at him.
Years before the release in December of a Senate Intelligence Committee report detailing the C.I.A.’s use of torture and deceit in its detention program, an internal review by the agency found that the C.I.A. had repeatedly overstated the value of intelligence gained during the brutal interrogations of some of its detainees.
The internal report, more than 1,000 pages in length, came to be known as the Panetta Review after Leon E. Panetta, who, as the C.I.A.’s director, ordered that it be done in 2009. At least one of its authors won an agency award for her work, according to a recent briefing that the agency’s inspector general gave to staff members of the Senate Intelligence Committee.
Britain’s intelligence agencies engaged in a series of previously-unknown joint operations with Colonel Muammar Gaddafi’s government, and used the information extracted from rendition victims as evidence during partially-secret court proceedings in London, according to an analysis of official documents recovered in Tripoli since the Libyan revolution.
The exhaustive study of the papers from the Libyan government archives shows the links between MI5, MI6 and Gaddafi’s security agencies to have been far more extensive and than previously thought, and to have involved a number of joint operations in which Libyan dissidents were unlawfully detained and allegedly tortured.
Most legislation that includes the word “cyber” is nothing more than an excuse to give the government a larger piece of the action — generally by redefining the term “information sharing” to mean a one-way street of data collection running from private companies (and their customers) to various law enforcement and security agencies.
Award winning whistleblower William Binney says his new job is to make the US government honest, make them face the truth publically, and to prevent further violation of the rights which America has never intended to stand for.
The Sam Adams Award for Integrity and Intelligence is to be given in Berlin this Thursday. This is an annual ceremony where intelligence professional are rewarded for their contribution in sharing light on governments’ wrongdoings. Such whistleblowers as Edward Snowden and Chelsea Manning have got this award in the past. This year the prize goes to William Binney, retired NSA technical director. He left his high profile job in order to try to bring the NSA to account.
Former NSA contracter-turned-whistleblower, Edward Snowden gave the documents to a team of nine journalists including Laura Poitras, who directed the documentary Citizenfour, and they were published by Der Spiegel.
Just over a year ago, Jacob Appelbaum and Der Spiegel revealed pages from the National Security Agency’s ANT catalog, a sort of “wish book” for spies that listed technology that could be used to exploit the computer and network hardware of targets for espionage. One of those tools was a USB cable with embedded hardware called Cottonmouth-I—a cable that can turn the computer’s USB connections into a remote wiretap or even a remote control.
A court in Dallas has sentenced Barrett Brown to 63 months in federal prison, minus 28 months already served. For count one in the case, he receives 48 months. For count 2, he receives 12 months. And for count 3, he receives 3 months. He is also ordered to pay $890,000 in restitution.
The government’s charges against the intelligence and security reporter stemmed from his relationship with sources close to the hacker group Anonymous, and the fact that Brown published a link to publicly-available copies of leaked Stratfor documents.
His original indictment carried a maximum sentence of 105 years. But as per the terms of a 2014 plea deal, the journalist and firebrand now faces a maximum sentence of eight and half years in prison.
“Jeffrey Sterling was the hero of Risen’s story,” prosecutor Eric Olshan finished his closing argument in the Jeffrey Sterling trial. “Don’t let him be the hero of this one.”
“They are patriots,” prosecutor Jim Trump ended his remarks, speaking of the many CIA officers the jury had heard from. “They do their work without accolades.” He then compared Sterling with those patriots. “Sterling is not a patriot,” he described after accusing Sterling of betraying the CIA and his colleagues. “He is the defendant, he is guilty.”
This is yet another outrageous violation of press freedom by the British government, which has increasingly shown contempt for newsgathering and the rights of journalists.
Britain’s cyber intelligence agency collected emails from numerous media outlets from Britain, the United States and other countries while also declaring in internal communications that investigative reports should be considered a threat to government operations.
With documents provided by National Security Agency (NSA) whistleblower Edward Snowden, The Guardian reported that Government Communications Headquarters (GCHQ) intercepted emails from journalists working for American and European news sources. Those affected by the email sweep included the BBC, Reuters, The Guardian, The New York Times, Le Monde, The Sun, NBC and The Washington Post.
The president will have to address net neutrality, the Patriot Act and cybersecurity this year. The platitudes in the State of the Union aren’t reassuring
In a rebuke to a legion of online supporters and what the journalist and one-time member of Anonymous called a “dangerous precedent”, Barrett Brown was sentenced to 63 months in prison by a federal judge in Dallas on Thursday.
Brown’s backers from across the web had hoped he would be able to walk free with his 31 months of time served for what they insist was “merely linking to hacked material”. But the 33-year-old, who was once considered something of a spokesman for the Anonymous movement, will face more than twice that sentence. The judge also ordered him to pay more $890,000 in restitution and fines.
We’ve written a few times about the ridiculous case against Barrett Brown, a journalist who took a deep interest in Anonymous and various hacking efforts. As we noted, a key part of the initial charges included the fact that Brown had organized an effort to comb through the documents that had been obtained from Stratfor via a hack. The key bit was that Brown had reposted a URL pointing to the documents to share via his “Project PM” — a setup to crowdsource the analysis of the leaked documents. Some of those documents included credit card info, so he was charged with “trafficking” in that information. Brown didn’t help his own cause early on with some immensely foolish actions, like threatening federal agents in a video posted to YouTube, but there were serious concerns about how the government had twisted what Brown had actually done in a way that could be used against all kinds of journalists.
Child sex abuse campaigners have spoken of their fury that Leon Brittan has taken secrets of an alleged Westminster paedophile cover-up to his grave.
The former Tory Home Secretary has died after a long fight with cancer – leaving unanswered questions about his role in the disappearance of a dossier said to reveal the existence of an abuse network at the top of government.
And detectives declared they would still be investigating claims Lord Brittan raped a teenager in 1967.
The dossier was handed to him in 1983 by Tory MP Geoffrey Dickens and the row over its “loss” led to Home Secretary Theresa May launching a wide-ranging public inquiry into the allegations of a paedophile ring.
Internationally recognized agencies such as Amnesty International and Scotland Yard have undertaken an investigation into individuals who allegedly participated in acts of torture carried out in Cuba.
I came across this startling bit of news in the British newspaper The Independent on January 14. There, I read that the British human rights group Reprieve submitted a report to the renowned police agency, asking that it investigate a British company for alleged complicity in extremely serious human rights violations.
The accused company is named “G4S.” The British government, the newspaper adds, has been investigating G4S for some time to determine whether it has violated principles established by international conventions. According to the charges, the company offered administrative services to a harrowing prison, notorious for its abuses and for confining human beings without previous or due process: the United States’ Guantanamo Naval Base.
Last year, we wrote about a European Commission consultation on copyright, which revealed the vast chasm between the views of the public and those of the copyright industry. In particular, where the former wanted many aspects of copyright to change, the latter thought things were pretty good, and should be left as they were.
First of all, I’m not quite clear on how the Sony Hack was really an “attack on free speech” unless you really believe the point of the hack was to get Sony to not show The Interview (a storyline that only showed up well after the hack). But, considering that some of the only real news to come out of the hack was an elaborate mulit-pronged strategy by the MPAA to censor the internet by twisting various laws, that statement is kind of ridiculous.
The UK Conservative MP Mike Weatherley spoke at a second reading of the Intellectual Property Bill in Parliament and called for prison sentences for “persistent” downloaders. Mr Weatherley is a former entertainment industry executive and is Prime Minister Cameron’s Intellectual Property advisor. He also defended the idea of disconnecting families from the Internet if their router is implicated in accused acts of copyright infringement.
“They’ll get sort of addicted, and then we’ll somehow figure out how to collect sometime in the next decade.”
Summary: ‘Free’ drugs (a proprietary software analogy) the new strategy of Microsoft in its latest battle against Free software, especially in schools where choice is a rarity (if not an impossibility), with the premeditated intention of forming dependency/addiction among young people
The Microsoft marketer from the CBS-run ZDNet says that GNU/Linux has now successfully pushed the price of Windows down to $0. No wonder the company is laying off many employees and fighting with the IRS over its tax violations. Microsoft is a company in rapid decline and there are many ways to show this. Just because Microsoft pressures and even bribes people to pay lip service to Vista 10 doesn’t mean it’s real news or that FOSS sites should cover it too (but some do). It’s more of a distraction or a decoy amid a lot of negative publicity for Microsoft. Vista 10 is not ‘free’, neither gratis nor libre. That’s a lie perpetrated by Microsoft and propagated by Microsoft-friendly media. As Pogson put it in his rebuttal: “Freedom isn’t just about the price. An operating system isn’t a service. One needs software on a device to make it seem intelligent, nothing more. Bundling that other OS with every kind of device on the planet doesn’t make any sense at all.”
Microsoft has been trying to infiltrate the FOSS community and even infiltrate GNU/Linux (the winners at Microsoft’s expense). Here we have Microsoft’s proxy Xamarin producing yet another Microsoft entrapment for GNU/Linux users (Mono) and here we have Microsoft trying to repurpose Free software as Microsoft lock-in. When Microsoft says “open source” it means proprietary plus some exploitation of FOSS in the Trojan sense, based on its silly press releases that it pushed even into CNN, (i.e. paid for by Microsoft handsomely). For those who missed it, Microsoft is now trying to push proprietary software with OOXML lock-in, which Microsoft committed crimes for, into Moodle. Microsoft’s ally in schools, Blackboard (proprietary), also tried to accomplish that when it acquired the competition (Moodlerooms). It is capture by proxy (Microsoft uses its own proxy) and it serves to highlight an inherent vulnerability in the ‘openness’ of Free software (it leaves itself open to Trojan horses unless it is willing to put up some resistance). Microsoft did the same thing to Linux (proprietary Hyper-V through Novell as the bribed proxy) and it is becoming a serious issue. The media too plays a role in it (see the paid press releases above) and Bill Gates’ bribes to The Guardian are clearly paying off because this wicked paper is now portraying Gates as a champion of education with another mindless advertisement/puff piece. This is often about imposing Microsoft software on schools. Gates has already made it explicitly clear that he views children the same way drug dealers view them. It’s market share. It’s money. “In other news,” wrote a reader to us, “he is attacking Moodle quite heavily. I guess the goal is to make it 100% tied to MS Office, Sharepoint, Exchange and all the other crap.”
“Microsoft has been been trying to infiltrate the FOSS community and even infiltrate GNU/Linux (the winners at Microsoft’s expense).”“Wired still sucks up to Bill,” he added, linking to this latest puff piece. Gates has spent over a billion dollars so far bribing news sites, blogs, etc. so we have grounds for suspicion that Wired too (Condé Nast) has an unstated conflict of interest. Another news site of Condé Nast has employed full-time Microsoft boosters and one of them, Peter Bright (Microsoft Peter), is now openwashing Internet Explorer despite admitting that “Internet Explorer is closed from end to end.”
Watch out as Microsoft and Bill Gates try to hijack school curriculum to impose Microsoft as part of what’s obligatory (imposed from above). The attempt to make Moodle connected to the NSA PRISM-complying (Microsoft was first in PRISM) OOXML-spreading Microsoft Office is just the first step. █
RSS Feed: subscribe to the RSS feed for regular updates
Site Wiki: You can improve this site by helping the extension of the site's content
Site Home: Background about the site and some key features in the front page
IRC Channels: Come and chat with us in real time