As Lenovo clearly ships a lot of GNU/Linux and Chrome OS PCs even in China and as far as I know Lenovo has never shipped unlicensed software, I think this is InfoWorld making its own news or playing an early April Fools joke. It’s probably the latter… Whether it’s just a renewal of the old agreement from 2006 to “recommend” that other OS, I don’t know, but it’s a very bad joke.
It’s hard to get tech support 400 kilometers away from the Earth, which is why Keith Chuvala of United Space Alliance, a NASA contractor deeply involved in Space Shuttle and International Space Station (ISS) operations, decided to migrate to Linux. As leader of the Laptops and Network Integration Teams, Chuvala oversees the developers in charge of writing and integrating software for the Station’s “OpsLAN” – a network of laptops that provide the ISS crew with vital capabilities for day-to-day operations, from telling the astronauts where they are, to inventory control of the equipment used, to interfacing with the cameras that capture photos and videos.
Linux is the perfect platform for this kind of experimentation. The reason why the operating system is so secure, for example, is because any developer can look at the source code and work out what’s happening. The arcane and hidden data transfers that make up the World Wide Web should be no different. In this issue, we investigate some of the tools that can reveal this hidden world, as well as showing you how easy it can be for these tools to be turned against us. And just like with Linux, the solution to these weaknesses are increased transparency, awareness and education. It’s like debugging the internet!
The internet is full of unpleasant people who would love nothing more than to steal your passwords, crack into your WordPress site and generally make a nuisance of themselves at your expense. So we learned their black arts so that you can protect yourself against them, and in the process we discovered that protection rackets have moved online through the power of DDOS attacks.
That shouldn't come as any surprise. IDG, for example, found in the last quarter of 2012 that while overall server revenue is only growing at 3.1 percent year over year, Linux experienced 12.7 percent year-over-year growth for the quarter, while Windows only increased 3.2 percent and Unix was down 24.1 percent.
Just this week I did a post on how much in demand Linux skills are in the job market. They are in demand, of course, because Linux is increasingly being used in enterprises--and not just at the server level. New research from The Linux Foundation in its report “Linux Adoption: Third Annual Survey of World’s Largest Enterprise Linux Users” confirms this fact.
"We see the growing success of Linux adoption in the enterprise, especially as it’s used for the most important areas of business, leading to the rise of Linux and collaborative development across many industries,” said Amanda McPherson, vice president of marketing and developer services, The Linux Foundation, in a statement. “Having a realistic understanding of where Linux is gaining traction in the enterprise helps to inform vendors and users about how they can work together to advance Linux and the technologies it supports.”
Linux adoption for mission-critical deployments and the cloud continues to grow in 2013. That's the top-line finding from a new Enterprise End User Report from the Linux Foundation.
Today something struck home and really punctuates the current state of affairs we now have with Linux Desktops.
The Croods, which took #1 in the box office this weekend with an estimated $44.7 million, used a powerful Linux render farm to create the film
The developers behind the Shotwell photo manager for Linux-based operating systems are setting their sights on a weak spot of the Linux desktop: e-mail.
Yorba, the creator of Shotwell, has turned to crowdfunding site Indiegogo in an attempt to raise $100,000 toward the e-mail client, named "Geary." After two days, Yorba has raised about $8,000.
This week, some surprisingly positive data arrived about Linux's growing volume of welcome in enterprises. But if you ask many people why Linux isn't more entrenched at enterprises, they might cite compatibility issues with widely used platforms such as Microsoft Office, support concerns, and more. One longstanding concern about Linux in the enterprise has surrounded the fact that email has never been really enterprise-grade on Linux platforms.
As a matter of fact, some of the more promising efforts to pull off smart open source email have been left in the gutter. Mozilla, for example, has pulled way back on its efforts with Thunderbird. That's why it's interesting to note that some of the respected developers behind the Shotwell photo manager application are working on an email idea called Geary.
We've covered Shotwell many times and it is very popular with Linux users. The developers behind it are talented.
The Linux kernel can now be set up to use SSDs as cache for hard drives; Btrfs has native RAID 5 and 6 support. The kernel development team has also resolved two performance problems caused by previous changes.
On Sunday, Linus Torvalds released the fourth pre-release version of Linux kernel 3.9. In his release notes, he noted that development has not yet settled down and called for testing of the RC.
Synapse is a desktop utility that adds speed and convenience to finding files and launching applications. It does not eliminate the Linux distro's menu,
KDE developers are working on a brand new network manager for this most advanced 'desktop environment'. One of the reasons behind this new network manager, as the developer Jan Grulich explains is "Because the source code of the old one is complicated and it’s not simple to fix or add something, so we decided to start writing the new one from scratch."
The latest iteration of the popular GNOME desktop, version 3.8, sees release today – but what are notable changes and improvements should you be looking out for?
Here’s a list of our 10 favourite changes – in no specific order – new to this release.
GNOME 3.8 has been released today, the new version bringing many new features and enhancements, including a new application view and overhauled window layout for GNOME Shell, new setting panels for privacy, search and notifications and of course, many updates to the core GNOME apps like Web (Epiphany), Boxes, Documents and more.
The developers of the popular panel launcher application Cairo-Dock have updated it to version 3.2. Following around six months of work, the new version offers improved multi-display support and includes a new application for producing screenshots which should eventually be able to replace gnome-screenshot. The new Sound-Effects plugin adds sounds to some dock actions. Remote folders (such as through Samba or FTP) and encrypted drives can now be managed via the Shortcuts applet.
Regardless of what people say about netbooks, their portable factor is very convenient for teaching. However, I wanted to change some of the distros on the HD of my Dell Inspiron Mini 10. It formerly sported
1. Mandriva 2010.2 (main production distro) 2. Pardus 2011 3. Mepis 11 4. Mageia 2 5. Mandriva 2011
The leading open source company Red Hat has once again reported the impressive revenues of US$ 1.3 billion for the fiscal year 2013. It was 17% up year-over-year. The company reported fourth quarter subscription revenue revenue of $348 million.
Jim Whitehurst, President and Chief Executive Officer of Red Hat said, "We continued to see momentum with large deals in Q4, closing a record number of deals in excess of $5 million and $10 million. We now provide solutions to over 90o/o of Fortune 500 companies as well as tens of thousands of smaller companies. New customer additions coupled with renewing and up-selling our existing customer base enabled us to exceed the billion dollar milestone in both subscription revenue and deferred revenues for the first time."
Shares drop in after hours trading as the open source software provider squeaked out solid earnings but missed the revenue target.
Interesting insights into the future of Debian can be seen in interviews with candidates for Debian Project Leader in Debian’s new official blog.
The candidates are distinguishing themselves with new ideas to expose the glory of Debian GNU/Linux to the world or to improve operations or to involve a wider community in the production, testing, distribution and promotion of Free Software. It seems to me that no matter who wins the most support, Debian is ready to take a bigger role at the centre of the FLOSS world.
Brand new, two egged SparkyLinux 2.1 ‘GameOver’ is out. It’s the second, special edition of SparkyLinux ‘GameOver” released for Easter 2013.
It has been directly built on SparkyLinux 2.1 ‘Eris’ and Debian testing ‘Wheezy’. All packages have been synchronized with Debian testing repos of 24/03/2013.
MapR, a "Big 3" Hadoop provider, is partnering with Canonical to make Hadoop an even bigger phenomenon than it is already. Specifically, the companies are making an Ubuntu-integrated MapR M3 distribution available for download.
Wind River announced today that it has registered the Wind River Linux Carrier Grade (CG) profile for compliance with the Linux Foundation’s Carrier Grade Linux (CGL) v5.0 requirements. Accordingly, the company claims Wind River Linux to be the first Yocto Compatible CGL-registered Linux distribution.
Wind River has introduced the Wind River Linux Carrier Grade (CG) Profile for the latest version of Wind River Linux. Formally registered for the CGL 5.0 specification with the Linux Foundation, the profile is the first delivery of Carrier Grade Linux functionalities on top of a Yocto Project Compatibleproduct, says Wind River.
Oh my. 8 cores in an ARMed CPU/SoC, 4 at 1.2-1.8gHz and 4 at 1.2gHz with 2gB RAM… 28nm allows all that computing power to sip juice from the battery. It’s certainly competitive with legacy PCs of just a few years ago and it can fit in a pocket or tablet. Linux makes all this run. Android makes it fit on tiny screens with fingers and do amazing things with hundreds of thousands of “apps” and Samsung tweaks that a bit to make it even more useful. Quit drooling on your keyboard!
PathPartner Technology has joined the GENIVI Alliance with an eye toward marketing its embedded multimedia software and design services to developers of next-generation automotive in-vehicle infotainment (IVI) devices.
The rumored Amazon smartphone will feature a 4.7-inch display, according to a new DigitTimes report. Yeah – we know that the source is not always that accurate, but whatever…we’re passing along.
Amazon today announced that its popular and rather cool X-Ray service has expanded into the realm of television. Ever find yourself watching a TV show and wondering, “Where have I seen that guy before”? This is the sort of app and feature that answers those questions.
Tied to IMDb, the X-Ray service runs on Kindle and Wii U devices and enables Amazon Instant Video viewers to quickly ID actors and learn more about them. Sorry guys, it won’t work on your standard phone or tablet; you must purchase and watch through Amazon’s Instant Videos.
An extensive slide presentation on using Android in embedded systems is available for free download on the website of Free Electronics. The presentation provides an efficient technical introduction and overview of the process of developing embedded Android software, on both the OS and application levels.
Samsung want to introduce a 8” AMOLED display to fight against the new upcomming NEXUS 7 and iPad mini. Samsung’s new AMOLED tablet will follow-up the Galaxy Tab 7.7, Samsung’s first AMOLED tablet.
OpenKM, a leading developer of open source, web-based enterprise document management solutions, today announced the launch of OpenKM Cloud, a new cloud-based offering that makes deploying and managing OpenKM fast, simple and affordable in the cloud.
Hackers seem to be successfully attacking almost everyone these days. Already this year, the news has included high-profile cyberattacks targeting Facebook, Microsoft, Apple, Chase, Evernote, The Federal Reserve, Twitter, The Wall Street Journal, Bloomberg, Reuters, The New York Times and other companies.
While no security software can provide complete protection from every cyberattack, the open source community has developed a variety of tools that home users, small businesses and enterprises can use to improve their security profile. Many of these open source projects are of a very high quality—in fact, many have won awards and some have been incorporated into commercial applications.
At the core of the Software Defined Networking (SDN) revolution is the OpenFlow protocol. Enabling OpenFlow on physical switches is something that multiple vendors have been working toward. Enabling OpenFlow on virtual switches is now Switch Lightsomething that Big Switch, a startup led by the creators of OpenFlow, is now pushing forward.
Code review can be a bit of a recipe for drama. There was a large-ish amount of drama in a close project quite recently that stemmed from patch review, and it got me thinking about how we handle this in free software.
In free software code review, along with other practices that we call “agile practices” (such as continuous integration, unit testing, behavior driven design, test driven development) is a relatively new thing in some projects, especially those on the desktop stack.
Can a group of 100 certified tech innovators, including Silicon Valley CEOs, venture capitalists and analysts, sit down together for a few hours and solve the world's crisis in tech skills? That's the question that a British Airways program called UnGrounded is asking, and the way the program intends to get an answer is quite swashbuckling. Through Ungrounded, 100 tech luminaries will board a flight on June 12 in San Francisco, headed for London, where they will tackle the tech skills problem in a challenge sponsored by Ideo, a technology design firm.
The online ad industry has attacked Mozilla over its decision to block third-party cookies in a future release of Firefox, calling the move "dangerous and highly disturbing," and claiming that it will result in more ads shown to users.
https://blog.mozilla.org/privacy/2013/02/25/firefox-getting-smarter-about-third-party-cookies/
Launching a new mobile OS is a difficult project since the market leaders, Android and iOS, have such a big lead. Even Microsoft, with its near-infinite financial resources and vast ecosystem of complementary products, has struggled to gain traction. And new entrants face a chicken-and-egg problem: developers don't want to write apps for a platform without many users, while users don't want to buy a phone without many apps.
A major announcement this year at Mobile World Congress was the Firefox Operating System (OS), built by Mozilla, the same company that brought you the world’s leading browser until Google claimed the throne with its web browser, Chrome.
Firefox OS runs on HTML 5 through the Firefox browser’s engine, which handles demands more efficiently in weaker phones. It features the typical grid of apps set on top of a four app bar at the bottom.
The default mapping app bundled with the Geeksphone is HERE Maps, which was developed by Nokia. The application has improved steadily since we started using it. It's gone from unusable to functional but bare-bones.
Gaming is among the most resource-consuming and complex of all computing tasks. Historically gaming has been the realm of native code running on bare metal operating systems, but thanks to a new effort from Mozilla, real gaming via a web browser is now a reality.
For all the talk about cloud, it might come as a surprise to many in the industry that "cloud" is not a well-understood term. It's often perceived as "just a buzzword" or something without a lot of substance. While the term can be abused, it's actually an important concept and it's certainly not just a passing fad.
In talking to people following the Apache CloudStack graduation, and meeting with the local Linux User Group (LUG), it dawned on me that cloud still bears some explanation. Let's take a look the standard definition, some types of clouds, and why it matters.
Oracle's treatment of MySQL and its community since its purchase of Sun has proved Widenius' original fears correct, the developer says. Not mincing words, Widenius says that Oracle has made it clear "that they have no love for open source, working with the community, or MySQL in general".
The early bird gets the worm, or in this case, the new portable home gaming system. Ouya's $99 Android-based console is now shipping to early backers, and is expected to hit shelves this summer for all consumers. Ouya games include action, sports, arcade, and indie, played directly on your TV. Big-name publishers like Square Enix and Namco Bandai have already signed on with the company, which also snagged independent developers like Tripwire Interactive and Adam Saltsman. The Ouya may seem like the underdog in the established console market, but the little machine is aiming to disrupt the entire home gaming platform.
The Free Software Foundation Europe (FSFE) is running its annual Document Freedom Day campaign today to raise awareness of the importance of open standards. This year's Document Freedom Day involves over 50 groups from 30 countries and focuses on open standards in web-based streaming technologies, especially on increasing the awareness and usage of HTML5. This year's campaign is sponsored by Google and openSUSE.
In 30 countries around the world, activists are celebrating Open Standards on today's Document Freedom Day, an annual campaign to promote Open Standards. More than 50 groups are hosting events around the world, from Brussels to Nicaragua to Nepal.
Open Standards are crucial to ensure that different computer systems can work together, and that users can access documents regardless of the computing platform or device they use. They are the foundation of the Internet and the World Wide Web.
At the Latvian Geospatial Information Agency in Riga, all parts of the organisations use open source. Linux, to begin with, provides a stable operating system for its databases, both proprietary and the open source alternative Postgresql. Naturally the agency uses all kinds of open source solutions for its Geographic Information Systems, including Postgis and Quantum Gis.
One of the ways Obama won the 2012 election was with technology. It wasn’t the only way, but technology offered one thing that feet on the street couldn’t: a force multiplier effect. The technology used during the campaign to accept donations and manage volunteers was based on open source and open standards. Open source helped the campaign accomplish several things. It enabled the team building the technology to create a culture of code, innovate faster, and solve problems the open source way.
April Fools' Day is not a national holiday, so no, you don't get to stay at home and play with your Raspberry Pi or read Hacker News all day. But, you do get to the opportunity to join a community of pranksters around the globe who will invariably succeed in some knee-slapping, good humor.
Despite claims that the UK is a world leader in open data, detailed UK addresses are still locked down. But worse is about to happen. The government is thinking about flogging off this data as part of the Royal Mail privatisation, making it impossible for it to be made open data.
Three advocates for a universally free scholarly literature give their prescriptions for the movement's next push, from findability to translations.
Cheap open-access journals raise questions about the value publishers add for their money.
We always thought the power of open source hardware lies in the ability to build upon others’ work and, when it comes to hardware, good documentation is the key to making this happen.
As the number of open source projects continue to grow, it’s important to generate clearly-findable, modular, remixable documentation that can not only improve the quality of projects—but can also enhance cross-project collaboration. Quality documentation is essential to boosting the true spirit of open innovation.
On the opening day of EclipseCon 2013, the Eclipse Foundation handed out the annual awards to the top individuals, projects and technologies in the Eclipse ecosystem. The individual and project awards were selected in an online vote of peers, while a judging panel selected the winners of the technology awards.
Perhaps it's the rapid pace of change here in the tech world, but it seems scarcely a day can go by without someone declaring some technology or another "dead."
Take the netbook, for example. People have been saying for years it's dead; today, however, we have the Chromebook phenomenon.
The command line is another popular target, of course, but few can compete with the Linux desktop itself, the death of which has been trumpeted so many times now that Linux Girl has lost count. Amazing how something that's "dead" can keep on satisfying so many users!
Well, recently in the Linux community there's been occasion to discuss another purported "death" -- or at least one that's often wished for. The "victim" this time? None other than Perl.
The Associated Press has this story on what it means for lawyers to join the U.S. Supreme Court bar. As the article suggests, being a member of the Supreme Court bar doesn’t mean much. Pretty much any lawyer who pays the $200 is admitted, at least if they have been in good standing in a state bar for three years and get two other bar members to sign on.
So, you know all that talk about things like Aaron's Law and how Congress needs to fix the CFAA? Apparently, the House Judiciary Committee has decided to raise a giant middle finger to folks who are concerned about abuses of the CFAA. Over the weekend, they began circulating a "draft" of a "cyber-security" bill that is so bad that it almost feels like the Judiciary Committee is doing it on purpose as a dig at online activists who have fought back against things like SOPA, CISPA and the CFAA. Rather than fix the CFAA, it expands it. Rather than rein in the worst parts of the bill, it makes them worse. And, from what we've heard, the goal is to try to push this through quickly, with a big effort underway for a "cyberweek" in the middle of April that will force through a bunch of related bills. You can see the draft of the bill here (or embedded below. Let's go through some of the pieces.
The federal prosecution and suicide of Aaron Swartz has galvanized Internet activists and prompted attacks by hackers. Now it’s dividing candidates in Massachusetts’ special U.S. Senate campaign. Among the toughest critics of the case against Swartz is Republican Senate candidate Daniel Winslow, a Norfolk state representative and former judge. Winslow said the case shows the dangers of allowing prosecutors unchecked authority.
A draft cybersecurity bill circulating among House Judiciary Committee members would stiffen a computer hacking law used to bring charges against Internet activist Aaron Swartz.
The bill draft would tighten penalties for cyber crimes and establish a standard for when companies would have to notify consumers that their personal data has been hacked, according to a copy obtained by The Hill.
Some law enforcement agencies in the US use informants in as many as 90% of their drug cases. But there are surprisingly few rules on how informants are used and a groundswell of calls for the system to be reformed.
A Guantanamo detainee who allegedly revealed valuable information about 9-11 mastermind Khalid Sheikh Mohamed is suing Poland in a European court.
Abu Zubaydah's lawyers say he was held in a CIA black site in Poland, which they say has withheld critical information needed to investigate his case. He was allegedly held in Poland between 2002 and 2003.
...arming obscure rebel groups is, in part, the CIA's bread and butter — it's just that they're not supposed to get caught.
WaPo reports that newly-confirmed CIA director John Brennan (who was also involved in the CIA's torture program and has since moved on to writing an assassination-without-due-process "playbook") has tapped three former senior officials to oversee the appointment of the former chief of staff to brazen torture apologist Jose Rodriguez to head the CIA's clandestine service. The group consists of John McLaughlin (CIA deputy director during the CIA's torture heyday), Stephen Kappes (another rendition, torture, and interrogation (RDI) supervisor - read about his covering up a prisoner's death here) and Mary Margaret Graham (whose problematic professional history you can read about in Steve Coll's recent New Yorker piece on CIA whistleblower John Kiriakou). Does anyone not see the problem with RDI daddy Brennan assigning RDI supervisors to promote the RDI queenpin?
A group of Clark Magnet students learned firsthand Wednesday which U.S. presidents worked best with the CIA over the years and what it’s like to take part in various intelligence roles.
Admiral Bobby Inman, former deputy director of the CIA, spoke with students in the school’s Geopolitics Club, which is known for snagging interviews with military/political figures via Skype.
Under the CIA’s supervision, more than 160 military cargo flights have delivered weapons to anti-government armed units in Syria. (The New York Times, March 25)
While there was the usual glitz and glamour at this year’s Oscars, the star not strolling down the red carpet was actually an intelligence arm of the U.S. government. By bestowing “Argo” with its top award, the Academy gave props to the CIA for the forgotten heroic mission to save six Americans trapped in Iran. “Zero Dark Thirty,” also up for best picture, portrayed CIA analysts as heroes ridding the planet of a psychopathic murderer.
Tony Mendez told hundreds who filled an auditorium in Rudder Theater that he would give the movie Argo a grade of “90 percent” for realism in its portrayal of the 1979 operation that resulted in the successful rescue of six U.S. diplomats hiding in Iran.
The retired CIA operative was invited to Texas A&M by the George Bush Presidential Library Foundation to participate in a question-and-answer session that accompanied a special screening of Argo.
Should we be happy or worried that the CIA may, someday soon, no longer be able to order a drone pilot to shoot a Hellfire missile in some faraway land?
Organisers keen to build on renewed focus of president's targeted killing programme by holding series of protests in April
An inside look at two villages ravaged by American aerial assaults
According to reports, there's a beef between anti-spam operation Spamhaus and Cyberbunker, a Dutch Web host. Spamhaus claims Cyberbunker unleashed a barrage of spambots that is pounding the Internet at an alleged 300GB/s, apparently at enough choke points to slow everything down.
[...]
Assange's various stinks with large government organizations, including the United States, changes the story drastically if you ask me.
Three links sit at the bottom of the page: City Hall Fights Back, Spamhaus Blackmail War, and Swat Team Raids Bunker. All are worth reading—if you have the time to wait for the pages to load. It's as if Cyberbunker was the one suffering from a denial of service attack.
The top Swedish prosecutor pursuing sexual assault charges against Julian Assange has abruptly left the case and one of Mr Assange's accusers has sacked her lawyer.
The turmoil in the Swedish Prosecution Authority's effort to extradite Mr Assange comes as another leading Swedish judge prepares to deliver an unprecedented public lecture in Australia next week on the WikiLeaks publisher's case.
Australian media reported on Thursday that the woman was not happy with how her lawyer Claes Borgström had handled the case when speaking with the media.
While her application to a Swedish court to change lawyer is not available to the public, Borgström addressed the report in a statement.
"It has been impossible to avoid contact with the media in this case. When I have been in contact with the media it has been with the approval of my client, sometimes she has asked me to do so," he wrote.
Borgström, Sweden's former equality ombudsman (Jämställdhetsombudsmannen), is no stranger to taking on controversial cases.
His former client has reportedly asked that lawyer Elisabeth Massi Fritz take over.
Marianne Nye, a high-profile Swedish prosecutor, has left the case unexpectedly and been replaced by a less seasoned collaegue, Ingred Isgren. The reasons for the departure have not been disclosed.
Time and again, throughout America's history, individuals with a passion for truth and a commitment to justice have opted to defy the unjust laws and practices of the American government in order to speak up against slavery, segregation, discrimination, and war. Even when their personal safety and freedom were on the line, these individuals spoke up, knowing they would be chastised, ridiculed, arrested, branded traitors and even killed.
PRIVATE DEBT NEEDS TO BE DESTROYED MUCH MORE THAN PUBLIC DEBT -- PRIVATE DEBT IS NOW BEING DESTROYED BY SELLING IT TO THE PUBLIC
MORGAN STANLEY: Cyprus Is No Longer A Full Member Of The Eurozone!
Yesterday we brought you some commentary from various economists and pundits who were arguing that in a sense, Cyprus has just left the Eurozone.
The reasoning with this: In order to reopen Cypriot banks (tentatively scheduled for Thursday) Cyprus will need to impose strict capital controls to prevent a bank run. In other words, there will be limits on how much money you can take out, move to another bank, etc.
As the price of Bitcoin peeked its head over $90 this morning, we reached a historic milestone: Bitcoin is worth a billion dollars.
I’m talking about Bitcoin as a whole here. The market cap (price times number of coins in existence) as I’m writing this is at $1,035,238,115, just over a billion (or as my Euro friends often say, thousand million) U.S. dollars.
Of course from a market perspective this doesn’t mean all that much – if we were a stock instead of a currency we’d still be considered “small cap” until about 2 billion, and a billion dollars is about the annual GDP of Micronesia but a nice big round number does feel good, doesn’t it?
Well, as depositors in Cyprus just found out, there is a risk that you could lose 40 percent (and that is the best case scenario) of your money if you put it in the bank. Why would anyone want to take that risk – especially in a nation that is already experiencing very serious financial troubles such as Greece, Italy or Spain?
After being shuttered for nearly two weeks, Cyprus banks reopened on Thursday but not without tight new restrictions in place that put limits on the manner and amount of funds that depositors can withdraw.
Shares of the cyber-currency bitcoin have surged in the past week as investors seek safe havens following the unprecedented bailout of Cyprus' banks.
The US Congress has installed a new cyber-espionage review process for government technology purchases which effectively pushes Chinese companies out into the cold.
The funding law signed this week by President Barack Obama is part of growing US paranoia over Chinese cyber attacks.
A South Carolina Republican primary for an open congressional seat leaves former South Carolina Gov. Mark Sanford the favorite to win an April 2 GOP runoff.
Sanford's return to politics, after an extramarital affair and elaborate lies to cover it up, has prompted discussion about how unlikely such a comeback is for a staunch Republican in a party steeped in so-called "family values."
The case revolves around a hashtag -- #unbonjuif ("a good Jew") -- which became the third-most popular on the site in October 2012. The UEJF took Twitter to court, demanding that those who had tweeted anti-semitic remarks using the hashtag be named by Twitter so the police could prosecute them for hate speech.
The Washington Post revealed Wednesday in a front-page story that a woman currently running the clandestine service had signed off on a controversial 2005 decision “to destroy videotapes of prisoners being subjected to treatment critics have called torture.”
The woman, the first to hold the position in the agency's history, replaced John Bennett last month on an acting basis. Bennett's name wasn't kept secret when he was promoted to chief in July 2010. But the Washington Post didn't identify the woman, noting that the high-ranking official “remains undercover and cannot be named.”
A scandal is brewing in Germany over the refusal of a Munich court to provide the Turkish media with reserved seats at an upcoming neo-Nazi murder trial. German editorialists claim bureaucracy is getting in the way of needed transparency and could damage the country's image.
Criticism is growing in Turkey that Turkish media have not been admitted to the forthcoming trial of the NSU terror group, eight of whose victims were Turks. Experts are warning of damage to Germany's image.
It could be that Stallman has a point. There are widespread reports this week, after a public address from FBI officials, that the FBI has made Gmail surveillance a top priority for this year. Surveillance efforts like these could start extending to Google Voice, Dropbox and other applications as well.
GOOGLE is killing Google Reader. That may not matter much to many of you; use of Google Reader [a tool, by the way, for reading online content via RSS] was concentrated among a small group of relatively intense users. As it happens, that small group includes quite a lot of people who write for or as part of their living (it's the second tab I open most days, after Gmail). And so Google Reader has been mourned over, angrily at times, a bit more than the many other Google services that have come and gone with little ado.
This article details the story of the ‘NSA Four’ – including GAP clients Tom Drake, J. Kirk Wiebe and William Binney – featuring insight from their attorney, GAP National Security & Human Rights Director Jesselyn Radack. The four tried to expose multi-billion dollar waste and fraud – involving a highly unethical, invasive and illegal information surveillance system called Trailblazer – while at the NSA. Over the course of the next decade, they endured intense legal harassment as the NSA attempted to cover its tracks and save itself from the embarrassing exposure for closing down a separate program – this one legal, ethical, and inexpensive – that could have potentially prevented the terrorist attacks on 9/11.
When it was originally introduced in November 2011, CISPA would have allowed companies to pass information to the National Security Agency. The bill was reintroduced this February. According to the Electronic Frontier Foundation, which strongly opposes the bill, CISPA would have allowed companies to "hand 'cyber threat information' to any government agency with or without limitations on what agency can receive the information."
Over the last decade there has been an increasing change in the nature of surveillance – particularly the ability to search online, through social networks and through semi-public sources of information, reinforcing the need for the law to be reformed to protect the public from unwarranted surveillance.
What needs to be made very clear is that just because information is on the internet, it does not necessarily follow that the police should collect and analyse it. It is essential that it the gathering of information is proportionate, necessary, balanced against the need of police to do their job, allows for a free and open internet and meets the public’s expectations of privacy.
Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a “top priority” this year.
Last week, during a talk for the American Bar Association in Washington, D.C., FBI general counsel Andrew Weissmann discussed some of the pressing surveillance and national security issues facing the bureau. He gave a few updates on the FBI’s efforts to address what it calls the “going dark” problem—how the rise in popularity of email and social networks has stifled its ability to monitor communications as they are being transmitted. It’s no secret that under the Electronic Communications Privacy Act, the feds can easily obtain archive copies of emails. When it comes to spying on emails or Gchat in real time, however, it’s a different story.
...military force to detain and hold indefinitely without charge or trial American citizens on American soil
Regarding what portions of my book are as significant today as they were in the past I would suggest the readers of “:Bringing Down America” arrive at their own conclusions. As for myself, I see the objectives and goals of the weatherman to be the same today as they were 30 years ago and the only difference is the use of politics versus violence.
These are the same people who are clueless to the existence of various legislation such as the NDAA, the military commissions act of 2006, and the Patriot Act, among others, that legalize the indefinite detention of terror suspects, that eliminate habeas corpus and give the prosecutor the power to incarcerate someone AFTER acquittal, as some examples. They think that applies only to terrorists (are you too, or will you be, a terror suspect?). They also don’t know or care about the executive orders Bush, Obama, and other presidents have signed, designed, in one way or another, to implement martial law in Amerika if Americans resist the tyranny.
Earlier today I sent an e-mail to the Wikimedia Foundation’s mailing lists, letting people there know that I’m planning to leave my position as Executive Director of the Wikimedia Foundation. The purpose of this post is to get the news out to a somewhat larger group.
When the Senate passed a budget resolution Wednesday that appears to prevent some of the potential damage from sequestration, the Continuing Resolution included several food- and agriculture-related earmarks. But one inclusion in particular is especially controversial. The “biotech rider” would require the USDA to approve the harvest and sale of crops from genetically modified seed even if a court has ruled the environmental studies on the crop were inadequate. This aspect of the bill infuriated many sustainable food and agriculture groups, who nicknamed the bill the “Monsanto Protection Act.”
Luvdarts LLC created a kind of MMS advertising that was designed to be forwarded to friends' cell phones, a sort of digital "greeting card" that often included discounts. But the company only wanted its ads forwarded exactly one time—and Luvdarts really meant it. When the cards were forwarded more than once, that was copyright infringement in the company's view. In 2010, it filed a lawsuit saying that cell phone companies should actually take responsibility for their users' alleged infringement. Today, that lawsuit finally fell apart at an appeals court.
Paul Hansmeier, widely regarded as a ringleader for the prolific copyright trolling firm Prenda Law, has been having a rough year. After a Minnesota man accused his firm of identity theft, Hansmeier gave remarkably evasive answers to questions posed by defense attorneys. Upon reading the transcript, a judge declared that "someone has a lot to hide." The judge has since ordered Hansmeier and his Prenda colleagues to his courtroom on April 2. Prenda has begun to backpedal, dismissing pending copyright cases around the country.
While we keep hearing folks in the entertainment industry and their supporters in DC talk about how great it is that the "six strikes" "Copyright Alert System" (CAS) was a "voluntary" agreement between industry players, one of the worst kept secrets in the world was that the White House was heavily involved. They basically helped Hollywood out and at least hinted strongly at the fact that if no "voluntary" agreement came through, legislation might have to be put in place (creating a novel definition of "voluntary"). Specifically, it came out that Victoria Espinel, the White House's IP Enforcement Coordinator (IPEC), had been emailing with people about the program.
"To promote the Progress of Science and useful Arts." That is the purpose of Article 1, Section 8, Clause 8 of the Constitution, which is sometimes referred to as the "copyright clause" (or "the patent clause"), which enables both areas of law to be created via Congress. It's also the part that is most often ignored. As we've discussed, the whole purpose of this clause is to make it clear that the public are the sole stakeholders when it comes to proper policy making decisions regarding these laws. However, with this new push for comprehensive copyright reform, it appears that the copyright lobby is already working on ways to make sure that the public is marginalized in the discussion.