The use of free and open source software solutions for office productivity and for desktop PCs is second nature to those working for the town of Lemi in Finland. The administration has been using the vendor independent IT solutions for a decade. Safer, easier and cheaper, reports the town's treasurer.
Many people are familiar with the fact that the world of journalism has contracted in nasty ways in recent years, putting many fine writers out of business and sending them into new fields. The trend has carried over to the blogosphere and many online publications, causing previously high-quality sites to shut down and writers to go silent.
I run three Linux distributions on my laptop:
Debian 7.0 Xfce – because of the rock-solid stability of Debian. It also controls my GRUB2.
Mageia KDE – because I am in love with Mageia since day 1.
Linux Mint Cinnamon – because I really think this is a good combination of convenience, performance and functionality. I must admit that I disliked Mint in their early versions, mostly due to their overly complex menu. In my opinion, the current version does not have this issue.
All of these are 64-bit. The “choice for the day" depends on my mood, but Mageia is the default option in the GRUB config.
In this week's episode we talk about the most recent IRC meeting held while also mentioning the hostilities that took place against the Ubuntu Forums.
Being past the merge window for Linux 3.11, it's mostly bug-fixes going in but 3.11-rc2 also has the removal of the CSR staging driver that was dropped after losing developer interest and then a bunch of one-line code changes surrounding the removal of __cpuinit markers. These two patches generated most of the noise for 3.11-rc2.
Anyone who has ever spent five minutes in the Linux blogosphere is probably already well-aware of Linux creator Linus Torvalds' propensity for speaking his mind in the plainest of terms.
It was just slightly more than a year ago, after all, that he dropped an "F-bomb" on Nvidia, though that's by no means been the only example over the years.
A Phoronix reader has shared two NVIDIA binary Linux graphics driver "hacks" he's written for overriding some functionality of the NVIDIA binary blob for GeForce hardware.
Besides publishing the OpenGL 4.4 specification today, the Khronos Group also published their provisional draft of the OpenCL 2.0 specification for GPGPU comptuing. OpenCL 2.0 brings several new compute-focused features over OpenCL 1.2.
An independent open-source developer has provided a set of four xf86-video-ati X.Org driver patches to boost the 2D rendering performance for Evergreen and Cayman GPUs right now though the optimizations can also be back-ported to R600 and R700 graphics processors too.
Rob Clark has posted the second version of his MSM DRM driver, an open-source reverse-engineered kernel Direct Rendering Manager driver for Qualcomm's "Snapdragon" SoCs.
With so many flavors of Linux and the awesome apps in their repositories, finding the right app for getting things done can be tough. In our fifth annual Lifehacker Pack for Linux, we're highlighting the must-have downloads for better productivity, communication, media management, and more.
You are new to Linux, you are searching for a simple method to convert your videos or your music to fit your Mobile’s resolution or your player’s supported formats.
BitTorrent released a beta version of a new Linux- and Android-ready peer-to-peer file sync package. BitTorrent Sync currently operates on Windows, Mac, and Linux PCs and laptops, Android smartphones and tablets, and an evolving list of Linux-based devices, including the Raspberry Pi and numerous NAS products, enabling on-the-go, secure uploads and sync from mobile to storage devices, as well as M2M/IoT scenarios.
The Walking Dead is a hugely popular US series about a post Zombie apocalyptic world, where a group of survivors have to band together to survive. The series was green lighted for a game, which was taken up by the talented Telltale games, resulting in a game that won multiple awards and accolades, along with a top spot in many people’s recommended lists and wish lists. Thus it was only natural for the game to go mobile, which it actually did 6 months previously on the iOS. However, after the long wait, the game finally got the green light on Android too, with The Walking Dead: Assault being officially released on the Android, courtesy of Skybound LLC.
You won’t have noticed unless you’re one of the minority of Steam users not running Windows 7, but Team Fortress comes in three flavours these days: Windows (vanilla), Mac (mint), and Linux (green tea?).
The U.S. Navy said on Monday that divers are investigating whether they can salvage the four unarmed bombs dumped by U.S. fighter jets into Australia’s Great Barrier Reef Marine Park — but in the meantime, not to worry. The ordnance is not a big threat to the environment.
U.S. fighter jet pilots were forced to drop the bombs during a training exercise gone wrong last week. The two AV-8B Harrier jets had launched from the USS Bonhomme Richard during joint exercise with Australia's military on July 16.
As you may know, the development of LXDE was very slow in the past years, so the developers of LXDE, in collaboration with the Razor-Qt team have decided to rewrite the entire desktop environment with Qt, renaming the project LXDE-Qt. This information is not new, I have previously written about LXDE-Qt here.
This is just a brief wrap up about a patch I just submitted: in a nutshell, this patch enables the practical use of the acceleration sensor on Nexus 7 in Linux.
I’m back now from Akademy 2013 in Bilbao. It was a great event where I could meet so much great people from the KDE community. The kind of moment you don’t sleep a lot as there are always nice people to share a cool moment, being communicative and creative, and that at the end you feel like: “ho, no, it’s already the end!” ;)
This week I’m going to start and finish implementing iTunes importer. After that I’m going to spend some time on tests, repurposing them for the new Importers framework. If most things go well, everything that I have planned should be ready for the GSoC Midterm Evaluation, along with some things I haven’t (i.e. the “framework”).
While KDE's KWin has experimental Wayland support in KDE 4.11, it won't be until about one year from now where the Wayland support for the KDE desktop is fully baked and offered in a release form. The wait should be worth it though with the exciting KDE Plasma Workspaces 2 and KDE Frameworks 5.
Because programming is a craft and not a science, thus the term Gnomecraft!
Note that “GNOME Software App for Fedora 20ââ¬Â³ equals ”GNOME Software App for GNOME 3.10ââ¬Â³.
The team is proud to announce the release of Linux Mint 15 “Olivia” KDE.
Paul Smith, Vice President and General Manager of Red Hat’s U.S. Public Sector businesses addresses misconceptions about open source adoption and shares how it will “future proof” innovation in the public sector.
Lucas Nussbaum, Debian Project Leader, gave an interview to ITWire highlighting ways to boost innovation within the project.
The High Court in Pretoria’s decision to declare certain sections of the Currency and Exchanges Act unconstitutional opens a door for a parliamentary review of the country’s “antiquated” exchange control system, the DA said on Sunday.
The Ubuntu Edge runs both Android and open source Ubuntu Touch software -- and the people behind it want your help to the tune of $32 million Indiegogo.
Ubuntu today has announced the Ubuntu Edge campaign on Indigogo, for a fully converged, beautiful, sleek, phone that can run Ubuntu, Android, and boot a full desktop.
This beautifully crafted smartphone is a proving ground for the most advanced mobile technologies on the horizon, a showpiece for true mobile innovation. A
At the heart of it all is convergence: connect to any monitor and this Ubuntu phone transforms into an Ubuntu PC, with a fully integrated desktop OS and shared access to all files.
Manufacturers used to be able to charge hundreds for a new smartphone. Now that everyone has one, prices are plummeting.
Canonical's ambitious $32 million crowdfunding campaign will make it clear up front what kind of demand the company can expect for a phone that dual-boots Ubuntu phone OS and Android. "This is pretty shrewd," said analyst Chris Hazelton. "It's a very competitive market, so this is a risky venture, but getting that funding beforehand and having the cash in hand makes it less risky."
Canonical is hoping to raise $32 million from enterprises and enthusiasts who are willing to pay for a limited edition Ubuntu for Android phone that has the specification of a laptop and delivers the "full desktop experience" when plugged into a big screen.
The Ubuntu Edge is a pioneering device designed to drive innovation in the mobile industry.
It disappeared for the weekend but, as of this morning, the Ubuntu website is once again trailing something mysterious…
Ubuntu Mobile isn’t new; Canonical has already done much to promote its efforts to break into the smartphone mobile software space. But today the company is launching an Indiegogo campaign to fund the development of its first own-branded Ubuntu mobile hardware, the Ubuntu edge. The Edge is a smartphone that hopes to be more than that, by replacing a desktop PC as well.
Campaign hopes to raise €£21.5 million for a new device that will combine the convenience of a mobile with the power of a desktop.
Although Apple and Google currently control large majority of smartphone OS market share with iOS and Android respectively, other major large technology brands are keen on introducing alternative operating systems for smartphones, tablets and other mobile devices. The latest entry into the mobile operating system market is Ubuntu, the world's most popular free operating system for desktops.
Canonical, the company behind one of the most popular operating systems Ubuntu Linux, has launched an insanely ambitious indigo crowd-funding campaign to raise $32 million by August 22 to build the Ubuntu Edge smartphone. That's precisely 1 million dollar per day to reach that goal. Backers committing $600 on day one, or $830 thereafter, will receive one of these mobile devices in May 2014. The company, as excepted, due to initial hype and excitement has already raised $1 million in the first 5 hours.
Canonical last week posted 15 patches so Mesa could support their Mir Display Server and specifically the Mir EGL platform. Those patches haven't received many comments from upstream Mesa developers, but there were more than 200 comments in our forums. Over the night, Canonical has posted X.Org Server patches for supporting XMir plus the open-source driver patches so it can handle XMir with nested compositing.
Running a Linux-based operating system can be a wonderful experience. Linux distributions have relatively few security problems, are typically stable and are set up to have convenient access to massive amounts of gratis software. Perhaps I'm preaching to the choir here, but I feel Linux distributions offer some of the best desktop solutions available today. The problem, as I see it, is that many people either aren't aware that Linux-based solutions exist or are not comfortable transitioning from their current desktop operating system to something different. I understand the transition can be a difficult one, I made it myself and it wasn't entirely smooth -- there was definitely a learning curve going from Windows to Slackware. Fortunately there are developers out there who recognize that a lack of familiarity is one of the big hurdles to entering the Linux community and they have tackled the task of making Linux distributions that will be feel familiar to new users. One of these distributions is Zorin OS.
Despite the popularity of lightweight desktop environments, options like KDE have also had their hand in making desktop Linux a real pleasure to use. Recently, I wrote a distro comparison of Ubuntu vs. Debian, explaining that Debian presents you with various desktops from which to choose while Ubuntu provides only Unity. To take this a step further, I'll be exploring Kubuntu today so I can expand on that initial comparison.
Nary two weeks back, Netrunner 5 Enigma was released. Also known as version 13.06, this is the latest stable release of the Netrunner distribution, based on Kubuntu. As you have seen in my previous reviews, Netrunner tries to combine the classic KDE desktop with web-based applications and cloud services, which should kind of bridge between the two worlds, one of the typical computing device and the other more oriented toward always doing something online, sort of.
Today in Open Source: Linux Mint 15 KDE is out! Plus: Take a screenshot tour, watch a video review, and download Linux Mint 15 KDE
One of the things that we have been discussing at length in the past few months is the graphics stack in Kubuntu, and how we’re working towards having Plasma Workspaces 2 running on top of Kubuntu-next and Kubuntu-next-next(-next). In this article, I will explain the strategy we have laid out for a smooth transition.
Designed to bridge the Arduino and Raspberry Pi worlds, is the Embedded Pi going to drive the low-cost microcomputer to new heights?
Intel (INTC), Samsung and the Linux Foundation are behind a recently launched a $4.04 million application development contest called the Tizen App Challenge aimed at adding some heft to app development for the alternative open source platform.
Samsung Electronics has dramatically ramped up their Linux hiring and development efforts in the past three years and they are still on track for hiring another 20,000 Linux and open-source developers.
Samsung is making an Android Galaxy phone with a retro clamshell look, the throwback design that breaks so easily but apparently just won't die.
The Moto X is one of the worst kept secret, and we know almost everything about the upcoming device from Google/Motorola. The rumours, leaks and speculations have already told us about the internal hardware, screen size, customisations. We even saw pictures of Eric Schmidt himself showing off the phone at an event. The only thing we had no idea about was the price. However, an anonymous tipster claims that the Moto X will in fact be even cheaper than Nexus 4!
Cyanogen Mod is one of the most preferred builds of custom ROMs among the enthusiats Android crowd. The popularity can be attributed to the relatively stable build and its compatibility with most of the handsets out there.
AOKP or Android Kang Project is an open forum of Android ROM development community that has been behind the release of some really good ROMs. But of late there hasn’t been any definitive releases from them, though they have been busy testing their latest ROM behind the scene. Their latest rom is the stable release of AOKP Jelly Bean Milestone 2, a highly customized version of the stock Jellybean version of android.
When Android was first released, application downloads did not look promising. One major reason was poor app selection; you can’t download something that isn’t there. As app available grew on Android, so did total downloads. Still, iOS outclassed Android by far when it came to app downloads, especially with such a strong head start.
"A great start to the week with a warm, sunny, quiet Monday. Well, almost quiet. The first Vivaldi tablets, new dual-core engineering boards and the custom EOMA68 developer workbenches we commissioned have all been shipped out. Don't get too excited: the tablets are pre-certification (EC/FCC) and are on their way to us so we can verify the Q/A targets we set out. Still ... "
KDE's Vivaldi tablet is finally starting to ship... but only for QA testing and the open-source tablets haven't yet received their certification.
Software review site Boffin, reveals its top free music making software for the year. Innovation, feature range and accessibility among the factors that determine Boffin’s choices.
Frankly, I can't say I was surprised when I read that RIM's BlackBerry 10 transmits user email account credentials to RIM servers, which then log into the account. Obviously someone at RIM thought this would be a good idea, but anyone who does anything that requires keeping email private -- say, an executive discussing sensitive negotiation strategies with colleagues, or a doctor or other health care worker, or, well, just about everyone -- should be appalled that RIM covertly collects their username and password, then logs into the account.
Numenta.org has been created as the home for the NuPIC (Numenta Platform for Intelligent Computing) open source project and community. The project was announced today in a keynote address at the OSCON open source conference.
NASA’s Space Apps Challenge recently became the world’s largest open hackathon, with over 8,000 participants spanning 44 countries. Meanwhile, many of the features many of us use every day — sometimes more than once a day — such as Facebook’s Like button and Timeline, debuted at closed (internal, employee-only) hackathon events.
NASA has ditched Windows on the International Space Station. But why was it ever there in the first place, wonders Simon?
Linux wireless networking, Gluster and Ceph distributed storage, the OpenStack cloud and much more are on the agenda for this year's LinuxCon/CloudOpen North America conference, whose program the Linux Foundation has announced. Here's a look at some of the highlights that the channel can look forward to at the event, which will take place in New Orleans Sept. 16-18.
Fall show to feature Android, Tizen tech tips
SOFTWARE DEVELOPER Mozilla has announced that it will release updates to Firefox OS every three months, with security updates scheduled every six weeks.
Mozilla is busy aligning its entire company around its new Firefox OS mobile platform, which will even soon include embracing a new CEO focused on it. In its pursuit of the perfect cadence for new releases of Firefox OS, Mozilla has announced an aggressive rapid release cycle for improving the operating system. Specifically, it will make feature releases available to partners each quarter and deliver security updates for the most recent two feature releases every six weeks.
Mozilla hopes to pump out a new version of its smartphone Firefox OS every three months - and wants to lock mobile networks to this roadmap of updates.
Linux is wildly successful, free and open source software and represents the future of operating systems.
OpenStack is wildly successful, free and open source software and represents the future of cloud computing.
Therefore, OpenStack is like Linux.
As much as it would be nice to wrap up the OpenStack cloud computing platform in a neat little bow and offer it up to the great gods of allegory, there are key differences in the basic origin stories of OpenStack and Linux that make the comparison a little strained.
In a move that promises to advance the development of open source Big Data and distributed storage technology, database-as-a-service (DaaS) provider Cloudant has announced the merging of its distributed database platform into the Apache Foundation's CouchDB project. The decision is a good example of convergence within the open source world, and could have an especially important impact on open source clustering technology.
The large numbers of you who watched our recent Regcast All about OpenStack (catch it in the on-demand version if you missed it) show how much interest there is in the project. But no one pretends that OpenStack is anywhere near mature. It is a work in progress and in the short term it will mostly be visible in the service provider community.
In addition to those customers, Oracle's Engineered Systems, including Exadata Database Machine, Exalogic Elastic Cloud, Oracle Big Data Appliance, Oracle Exalytics In-Memory Machine, and Oracle Database Appliance, all run Oracle Linux.
During Oracle's most recent fiscal quarter, Ellison reported that the Exa-class systems had their best quarter ever in terms of sales. Over 1,200 engineered systems were sold in the fourth quarter alone, in a year in which Oracle sold over 3,000 engineered systems in total.
Coekaerts added that Oracle customers purchasing standard Oracle x86 servers have support for Oracle Linux included. Additionally, Oracle deploys many customers on Oracle Linux in Oracle Cloud and Oracle Managed Cloud Services.
The field of test and measurement is set to benefit from open-source software applications if a Kickstarter fundraising project is successful.
The other day I came across a new initiative for funding open source development called the Bitcoin Grant. While interesting at first sight, I was wondering: How is this better than the traditional donation button most open source projects have? The Bitcoin Grant then seems to limit who can donate and how you can use those donations (you can’t pay rent with bitcoins just yet).
While FreeBSD 9.2 is expected in about one month for release, further out in the pipeline is FreeBSD 10.0 and with it will come many new end-user features.
It's not yet been determined when FreeBSD 10.0 will be released, but given their past release cadence, this next major FreeBSD operating system should arrive in 2014. Among the features so far include:
GNU Parallel 20130722 ('Engelbart') has been released.
The search for a new tuberculosis drug after many decades and first time through a unique model of open drug discovery programme may finally bear fruits in near future, with India all set for the launch of the phase II clinical trial of the drug candidate.
Over the weekend I heard from a frustrated developer that AMD has reportedly conceded in their support for Open64. AMD has been a big backer to Open64 in years prior as an alternative to using the GNU Compiler Collection. AMD has their own Open64 fork where they have support for the latest AMD CPU features. The most recent release of AMD's x86 Open64 compiler is version 4.5.2.1 and this series introduced AMD "Piledriver" Family 15h support, AVX/XOP/FMA3/FMA4/BMI/TBM/F16C intrincs, improved performance, and was updated against Open64.net trunk.
Khronos unveiled today the OpenGL 4.4 specification as the latest industry-standard graphics API. OpenGL 4.4 delivers on buffer placement control, efficient asynchronous queries, shader variable layout, efficient multiple object binding, and a streamlined process for porting of Direct3D applications.
For those of you who weren't raised Catholic (like me), or who don't have a sort of morbid fascination with religion in general (like me), perhaps I should explain what indulgences are. See, in the Catholic faith, there's a transitional period (not a place) called Purgatory, where the mildly-sinful undertake purification or punishment before admittance to Heaven. Should you commit no mortal sins, but some lesser sins, you go through this process which you can primarily complete only if enough people on Earth pray for your soul. So you better be nice to those around you, or you could be stuck experiencing the purification of inner-fire for quite a while. But, if you're not the kind of soul that enjoys such penance-flames, you can obtain indulgences. Indulgences are offered by the Church and they are essentially giant time-erasers for the period you're supposed to spend in Purgatory. You get them, according to Pope John Paul II, through "only the most important prayers and good works of piety, charity and penance."
Gmail's new layout doesn't just keep your inbox organized, it also gives Google the perfect opportunity to send you unsolicited email ads. These sponsored missives appear as highlighted entries under the Promotions tab, where you can also find deals and updates from online services you subscribe to.
Also, please note that when I talk about users I don’t mean folks who don’t know much about computers because they don’t use them all that much. For example if your work does not involve editing electronic files and using office suite and email then I wouldn’t expect you to be an expert. On the other hand, if you have been using Microsoft Word and Outlook on every week day from 9am till 5pm for the last 15 years the I’d at least expect you to know how to double space a document or set up an email signature. If you can’t do these things, and you have to call the help desk on average once or twice a week so that they can remote-in and do it for you, then perhaps you shouldn’t be in this line of work…
Having very recently become a parent, I finally have something in common with William and Kate apart from my British nationality. It was not an ‘easy’ birth, if there is such a thing. In short, our little girl got stuck and needed to be wrested out using a suction pump. Her head was temporarily cone shaped as a result which made her look like a comedy alien.
After years of sweeping the issue under the rug and hoping no one would notice, the FDA has now finally admitted that chicken meat sold in the USA contains arsenic, a cancer-causing toxic chemical that’s fatal in high doses. But the real story is where this arsenic comes from: It’s added to the chicken feed on purpose!
It is no exaggeration to say that Monsanto has now become the most hated corporation in the world.
Up to 750 million mobile phones around the world carry SIM cards that contain a programming flaw that could leave their owners vulnerable to fraud. The bug allows a hacker to remotely access personal data and authorise illegal transactions within minutes.
The UN’s International Telecommunications Union is to send an alert to all mobile phone operators after being presented with “hugely significant” evidence of a design flaw by renowned German code-breaker Karsten Nohl.
Apple says its developer site was targeted in an attack, and that any information that was taken was encrypted. The site remains down
Enterprises spend millions every year on security appliances intended to secure their networks. Yet many of those devices are themselves not secure.
The U.S. Marshals Service has lost track of at least 2,000 encrypted two-way radios and other communication devices valued at millions of dollars, according to internal agency documents, creating what some within the agency view as a security risk for federal judges, endangered witnesses and others.
The former head of MI6, Sir Richard Dearlove, said he’s going to reveal new details behind the ‘dodgy dossier’ if he disagrees with the findings of the Chilcot Inquiry into UK’s role in the Iraq War.
Dearlove provided intelligence about Saddam Hussein’s Weapons of Mass Destruction (WMDs) that was allegedly exaggerated and “sexed-up” by Tony Blair's government.
The 68-year-old intelligence veteran has spent the last year writing a detailed account of events leading up to the Iraq War, which started in 2003. Initially, he intended to make his work available to historians after his death but Sir Richard told the Daily Mail that he could well change.
As the government looks for alternatives to convince the US to call off its drone campaign in the tribal areas, the foreign ministry has asked Prime Minister Nawaz Sharif to drop his plan to ask Washington for the transfer of drone technology from his list of options citing ‘legal implications’.
Matthew Aid of Foreign Policy has published an excellent report detailing the secret intelligence gathering partnership between the National Security Agency (NSA) and the Central Intelligence Agency (CIA).
A hacktivist who calls himself "The Jester" (styled "th3j35t3r") has targeted NSA whistleblower Edward Snowden and anybody who offers to help him.
In late 2001, a National Security Agency analyst was asked to do something unusual. Instead of locating a target's cell phone to eavesdrop on his conversation, the analyst was asked for the phone's location in real-time. It was apparently the beginning of the NSA's role in the CIA's drone operations that, a new report compiled by Pakistan suggests, had killed nearly 200 civilians by 2009.
The US National Security Agency (NSA) is using phone signals to track locations of militant targets in real time, a technology that has helped Central Intelligence Agency (CIA) locate targets for drone attacks, Washington Post reported.
“The foreign signals that NSA collects are invaluable to national security,” the agency said in a statement released Friday to The Post.
According to current and former counterterrorism officials and experts, NSA has become the single most important intelligence agency in finding al Qaeda and other enemy overseas after Septermber 2011 attacks in Washington.
The top U.S. military officer said in a letter released on Monday that American forces could undertake a range of missions to help Syrian rebels if asked by the White House, from providing training to establishing no-fly zones or conducting limited attacks on military targets.
Sir Richard Dearlove is considering releasing his own version of events if the Chilcot Inquiry does not reveal the lies Tony Blair used to take Britain into the illegal Iraq war.
Pakistan on Wednesday lodged a strong protest against the recent drone strikes in North Waziristan that killed 18 persons, and demanded to end them on immediate basis, Geo News reported Wednesday.
For a response to President Obama’s comments on the acquittal of George Zimmerman and racism in the United States, we’re joined by Dr. Cornel West, professor at Union Theological Seminary and author of numerous books. On Obama’s remarks comparing himself to Trayvon Martin, West says: "Will that identification hide and conceal the fact there’s a criminal justice system in place that has nearly destroyed two generations of precious, poor black and brown brothers? [Obama] hasn’t said a word until now — five years in office and can’t say a word about a 'new Jim Crow.' … Obama and [Attorney General Eric] Holder — will they come through at the federal level for Trayvon Martin? We hope so — [but] don’t hold your breath. There’s going to be many people who say, 'We see this president is not serious about the criminalizing of poor people.'"
Amid recent American efforts to expand military presence within US borders, Dr. Paul Craig Roberts was quick to describe the Obama administration as a routine violator of the U.S. Constitution. Dr. Roberts, who served as assistant secretary of the treasury in the Reagan administration and played a significant role in creating the economic system that became known as Reaganomics, cited the NSA spying scandal, the drone program and the assassination of American citizens as examples that the government continues to violate the will of the American people. The Voice of Russia contacted Dr. Roberts to inquire about his rather harsh critique of the US government. Read more: http://english.ruvr.ru/2013_07_23/American-neoconservatives-are-Nazi-to-the-core-Roberts-0118/
Leaked internal data produced by Pakistani officials documenting drone strikes on the ground reveal a high civilian death toll, countering US claims that the targeted assassination campaign results in “exceedingly rare” fatalities.
The 12-page dossier was compiled for the the authorities in the tribal areas, the Bureau notes, and investigates 75 CIA drone strikes and five attacks by NATO in the region conducted between 2006 and 2009. According to the document, 746 people were killed in the strategic attacks. At least 147 of the victims were civilians, and 94 were children.
“I was glad to see him bring it in,” West replied. “He said we must never rationalize killing innocent people in the name of self-defense, and then I thought about our drone policy, which makes us the George Zimmerman of the world in terms of killing innocent folk in the name of self-defense.”
New revelations from the CIA's killer UAV program show how the agency is able to lock Predator drones on targets through their mobile phones--even after they have turned their phones off.
A secret document obtained by the Bureau reveals for the first time the Pakistan government’s internal assessment of dozens of drone strikes, and shows scores of civilian casualties.
The United States has consistently claimed only a tiny number of non-combatants have been killed in drone attacks in Pakistan – despite research by the Bureau and others suggesting that over 400 civilians may have died in the nine-year campaign.
The internal document shows Pakistani officials too found that CIA drone strikes were killing a significant number of civilians – and have been aware of those deaths for many years.
Of 746 people listed as killed in the drone strikes outlined in the document, at least 147 of the dead are clearly stated to be civilian victims, 94 of those are said to be children.
The US House and Senate intelligence committees have approved CIA weapons shipments to opposition fighters in Syria, allowing the Obama administration to move ahead on the stalled program, senior congressional and administration officials said Monday, according to a report by the Washington Post.
Kiriakou was the first member of the CIA to publicly acknowledge that torture was official US policy under the administration of President George W. Bush. He was convicted in October of last year of violating the Intelligence Identities Protection Act (IIPA) when he provided the name of an officer involved in the CIA’s Rendition, Detention and Interrogation (RDI) program to a reporter and sentenced in January of this year. He reported to prison on February 28 (which was also the day that Pfc. Bradley Manning pled guilty to some offenses and read a statement in military court at Fort Meade).
Some international tourists to Szczytno are on the hunt of CIA torture traces in this town in north-eastern Poland with 27,970 inhabitants. Szczytno is situated in the Warmian-Masurian Voivodship, but was previously in Olsztyn Voivodship.
Pioneering what is commonly being referred to as the “geospatial web or web GIS,” open source geospatial software firm OpenGeo has entered into an investment and technology development agreement with In-Q-Tel, Inc., a nonprofit investment firm that identifies commercial technology applications for the CIA and the broader U.S. intelligence community.
Must the government take every possible ounce of flesh from Pfc. Bradley Manning in punishing him for his massive data dump to WikiLeaks? The woeful answer is yes.
It would be “extremely bad precedent” for the government to convict Manning of “aiding the enemy” for leaking information to such an outlet, Coombs said during the trial. The American Civil Liberties Union has taken up that argument, saying that the charges against Manning could have far-reaching implications for other whistleblowers who might leak information for patriotic reasons, but who could still be accused of treason.
He drives a truck emblazoned with "WikiLeaks TOP SECRET Mobile Collection Unit" to Fort Meade as he covers Bradley Manning's trial.
Journalist Barrett Brown spent his 300th day behind bars this week on a range of charges filed after he used information obtained by the hacker group Anonymous to report on the operations of private intelligence firms. Brown faces 17 charges ranging from threatening an FBI agent to credit card fraud for posting a link online to a document that contained stolen credit card data.
At a hearing Thursday, military judge Col. Denise Lind refused to toss out ‘aiding the enemy’ and other weakly substantiated charges against Bradley Manning. Alexa O’Brien on her previous rulings and her history of deference to the prosecution.
Without an informed and free press, there cannot be an enlightened people. That's what this trial is really about
Michael Ratner: Even though judge refused to grant defense motion to dismiss charges of aiding the enemy, Manning still could be found not guilty of that count.
Julian Assange is also a emacs user.
In a creative response to a 2012 World Trade Organization (WTO) ruling, the National Oceanic and Atmospheric Administration (NOAA) has issued a new regulation supported by Public Citizen that strengthens the criteria for dolphin-safe labeling. Mexico, which challenged the policy, sought a rollback of the labeling program and has indicated that it may challenge the new regulation and seek WTO authorization to impose trade sanctions against the United States.
Photographer Nina Berman had just started focusing on climate and environmental issues when she read an article about fracking and its connection to the possible contamination of New York City’s drinking water. Berman resides in New York and knew very little about how the controversial process of drilling for natural gas via hydraulic fracturing worked and decided to head to Pennsylvania for Gov. Thomas Corbett’s inauguration in 2011.
China has become a popular target of environmental ire, drawing criticism for its soaring carbon emissions and perceived intransigence during climate negotiations.
The extreme far north (or south) isn't the only place on Earth that spends the winter locked in perpetual darkness. Beginning in September and ending in March, the Norwegian town of Rjukan is cast into a perpetual shadow. But no longer: This month, engineers are completing The Mirror Project, a system that will shed winter light on Rjukan for the first time ever.
While the power of transnational corporations expands, income and wealth disparities are threatening societies.
It has now been five years since the beginnings of the Global Financial Crisis (GFC). What has been learned - if anything - by international agencies about the nature of the crisis and how to manage macroeconomic policy? In the wake of the crisis, ongoing problems of the Eurozone, slow and fragile growth in the United States and a slowdown of emerging economies, governments around the world have been reviewing the risks to insure economies against the systematic failure of banking and insurance systems.
Goldman's apparent business strategy:
Buy Metro International, a leading aluminum warehousing firm.
Deliberately slow down customer service so that it take 16 months to ship orders instead of six weeks.
Charge customers extra for storage because their aluminum is lying around longer.
Game the regulations requiring that at least 3,000 tons be moved out of storage each day by simply shuffling it between warehouses.
Three women alleged to have been turned out of their homes because firms working for G4S had failed to pay rent
Last week’s bankruptcy filing by the city of Detroit is being used as a test case for a much wider assault on the pensions and health benefits of millions of state and municipal employees around the country.
A law went into effect this month that ends the ban on U.S. government-made propaganda from being broadcast to Americans. In a remarkably creative spin, the supporters of this law say that allowing Americans to see American propaganda is actually a victory for transparency.
Remember the private mercenary army Blackwater that caused such a stir in Iraq during an unprovoked attack in 2007? Apparently, Monsanto and the controversial security firm are in bed together, described by blogger Randy Ananda as "a death-tech firm weds a hit squad." At this point, you might be wondering what in the world the GM seed giant needs with the services of a 'shadow army'? It appears as though the corporation found it necessary to contract with Blackwater in order to collect intelligence on anti-Monsanto activists as well infiltrate their ranks.
This week, Citizens for Responsibility and Ethics in Washington (CREW), a non-profit government watchdog group, released a report – “The Worst Governors in America”, and Wisconsin Governor Scott Walker came in sixth in the top category. The report has an amusing circus theme and dubs Walker a "Ringmaster," but it is heavily documented and footnoted to reliable sources and primary documents. The criteria CREW used when assessing the nation’s governors were the following: corruption, transparency, partisan politics, pressuring public officials, cronyism, self-enrichment, scandal and mismanagement.
...belief that he can clean up the web with technology is misguided and even dangerous...
Moving onto filtering today, David Cameron has created a very unfortunate debate about what he expects from Internet Service Providers.
Today prime minister David Cameron will announce that in future UK Internet subscribers will be required to opt-in if they want to be able to watch adult content online. The theory is that somehow Internet service providers will be able to stop such material having a ‘corroding influence’ on the nation’s children. But can the ISPs pull it off without collateral damage, and can we trust the government to stop there?
THE UK GOVERNMENT decision to impose automatic online pornography filtering via UK ISPs today could cause a multiplicity of issues, such as loss of trade for online retailers and a decline in trust from web users.
UK Prime Minister David Cameron announced in a speech earlier today that after months of negotiation the UK government has been working with four UK ISPs - Virgin Media, Talktalk, Sky and BT - to roll out of an opt-in pornography blocking system in which people will have to choose whether their internet connection will be able to access adult content.
"By the end of this year, when someone sets up a new broadband account the settings to install family friendly filters will be automatically selected," Cameron said. "If you just click 'next' or 'enter', then the filters are automatically on."
In yet another story of copyright being used as censorship, a clip of Senator Elizabeth Warren responding forcefully to some dubious claims made by some CNBC hosts has been pulled from Warren's own YouTube account:
You know from reading IT-Lex that in Britain, online defamation is no laughing matter. Over the weekend, the Independent posted news of a new, developing legal skirmish involving something that was said on Twitter. Perhaps you remember Pippa Middleton, whose sudden rise to fame threatened to overshadow her sister’s (royal) wedding. Last year, Pippa released a book of cooking and entertaining tips, entitled “Celebrate: A Year of Festivities for Families and Friends”. Why? Who knows – but it’s a question that was asked by The Telegraph. Reviews were savage, and apparently sales weren’t too strong either. Not surprisingly, this book opened Pippa up to some internet mockery, and that’s where the current issues arise.
UK PRIME MINISTER Dave Cameron is getting ready to announce a UK system for accessing adult content, an opt-in one that will probably be worse than no controls whatsoever.
We had a whiff of this last week when ISPs were reacting to a letter from the government that asked them to kick in cash for craziness and consider making people think that the system would be default-on rather than an opt-in choice.
The ISPs confirmed the letter and it was not well received, but the government decided to push on with its plans anyway.
David Cameron's quest to clean up the dark corners of the internet continues. As I’ve written before, his policies are ignorant and technically implausible. His latest attack on Google and its competitors is showboating of the most transparent kind. The Prime Minister has scented blood after Google’s public shaming over tax and sees easy poll gains in pursuing the internet giant on the understandably emotive topic of child sexual abuse.
The security official said that NSA remains adamant that Snowden's revelations caused serious damage and believes that it knows the extent of the material that was downloaded.
Online activists hope to use Congress’ power of the purse to remove funding from domestic surveillance; they are rallying behind an amendment set for a vote on Tuesday.
While many news outlets are discussing the exposure of the National Security Agency’s surveillance programs, far fewer are discussing the “Federal Data Services Hub,” a database created by the Affordable Care Act.
Never mind the non-stop collection of metadata and other sneaky surveillance tools being implemented by the US: a new report has revealed the National Security Agency’s spy powers allow the government to grab location data on just about anyone.
By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off.
The National Security Agency workforce has grown by at least one-third, to about 33,000 employees, since the 9/11 terrorist attacks, and the agency has expanded its headquarters and operations to rival the size of the Pentagon.
Last month's realisation that the U.S. National Security Agency (NSA) -- by means of a top-secret program codenamed "PRISM," has been trawling the audio, video, photo, email, and phone records of millions of Americans at home and abroad, serves as a stark reminder to those of us living in supposed "liberal democracies" that we've increasingly allowed state-surveillance mechanisms to become normalised and domesticated in a post 9/11 world.
Fugitive U.S. intelligence leaker Edward Snowden has become the winner of this year’s Whistleblower Award established by German human rights organizations, the German branch of Transparency International said in a statement, according to RIA Novosti.
“This year’s winner of the Whistleblower Award is Edward Snowden,” said the statement posted on TI Germany website on Monday, July 22.
Paltalk COO and President Wilson Kriegel discusses the company's growth and the NSA leaker Ed Snowden's mention of the company with Cory Johnson on Bloomberg Television's "Bloomberg West"
Britain’s Guardian newspaper has repeatedly declared its support for whistle-blower Edward Snowden to be put on trial in the United States.
One of the ways that the US National Security Agency taps into internet traffic is by going straight to the major data hubs that international traffic passes through. But secretly gathering that data isn't so simple: for every tap into the transmissions, some data is lost — and someone monitoring it for intruders is bound to notice.
Litt acknowledged that public discussion about these kinds of activities should have been taking place before Snowden leaked data revealing the programs' existence. Now exposed and with details at least partially disclosed, intelligence community officials are working on declassifying and publicly releasing program information, a plan for which Litt said he is optimistic.
The former American intelligence operative Edward Snowden is still trapped in transit. A previous NSA whistleblower tells Channel 4 News about the "ruthless" government campaign against him.
Decades ago, long before the Reagan and Bushes, the government had already expanded its domestic surveillance activity beyond that of any time in history. Created in 1952, the NSA immediately became the biggest American intelligence agency, with more than 30,000 employees at Ft. Meade, Maryland, and listening posts around the world. Part of the Defense Department, it is the successor to the State Department's "Black Chamber" and American military eavesdropping and code-breaking operations that date to the early days of telegraph and telephone communications.
The WikiLeaks Party has written to Australia’s Privacy Commissioner Timothy Pilgrim formally complaining about the recently revealed news that the telco signed a secret agreement a decade ago with US Government agencies such as the FBI and the Department of Justice that provided American law enforcement with access to all of the telco’s traffic passing in and out of the US.
The text of Telstra’s deal was published last week by independent media outlet Crikey (PDF) and has caused consternation in Australia’s technology community, due to the breadth of the access provided by Telstra. Telstra was one signatory to the deal, which came about due to its joint venture Reach landing submarine telecommunications cable into the US.
Startpage.com is my search engine of choice.
We've covered the NSA revelations and subsequent government petitions at some length, but here's a new twist to the story of the government's pervasive monitoring program -- a view of the activity from an ISP's perspective. According to Pete Ashdown, the CEO of XMission, a Utah ISP, the company received its first FISA warrant "request" in 2010. There's no way to challenge FISA warrants and no legal recourse -- so Ashdown had no choice but to install a server, one of the NSA's own machines, in their data center.
The U.S. Muslim Brotherhood, apparently aware of the stigma associated with their names, has a new modus operandi: Work through interfaith partners whenever possible. The Council on American-Islamic Relations is using that tactic in its lawsuit against the National Security Agency, letting the First Unitarian Church of Los Angeles take the lead.
Germany's two main intelligence services used a special surveillance programme of the US to collect vast amounts of communications data, even as the government continued to deny prior knowledge of such operations, a report claimed Sunday.
Revelations about the National Security Agency's surveillance programs made by Edward Snowden, the 29-year-old ex-NSA contractor currently searching for a safe haven so he can escape espionage charges, have rocked not only U.S. residents, but the nation's allies as well.
Nicolás Maduro reiterated his rejection and condemnation of the statements issued by Samantha Power, the Washington ambassador nominee to the United Nations, on Venezuela. "When she went to Congress, she went crazy and started to attack Venezuela just like that. She started to say that she is going to the UN to monitor and make clear what the repression on political and civil institutions in Venezuela is, and that she will address the lack of democracy in Venezuela"
Intelligence agencies in Germany and the US have been collaborating, according to a new report from a German magazine. The German government has been using bulk data collected by the National Security Agency.
In a detailed account on Foreign Policy, the Central intelligence Agency, in concert with the National Security Agency, has been demonstrated to conduct what is referred to as "black bag" operations, or the manual hacking of a target's computer by uploading spyware onto anything ranging from personal laptops to large-scale servers. When a specific target is out of the NSA's reach, it calls on the CIA to do, in its own parlance, a "surreptitious entry."
Since the early days of the Cold War, the FBI and CIA have bent the law to spy on American citizens, starting with Eastern European refugees who had sought sanctuary in this country, writes Richard Rashke.
He is the billionaire Google boss under fire for not doing enough to protect children from internet porn.
Yet today The Mail on Sunday can reveal that 58-year-old Eric Schmidt, Google’s executive chairman, does fiercely protect one thing: his own private life, which is as colorful and complex as the ever-changing ‘Google doodle,’ which pops up each time the search engine is launched.
In the past few years, the unlikely sex symbol with thinning hair and pockmarked skin has embarked on a string of affairs with younger women, including a vivacious television host who dubbed him ‘Dr Strangelove,' a leggy blonde public relations executive and a sexy Vietnamese concert pianist.
I fear for you; I think of you with a heavy heart. I imagine hiding you like Anne Frank. I imagine Hollywood movie magic in which a young lookalike would swap places with you and let you flee to safety—if there is any safety in this world of extreme rendition and extrajudicial execution by the government that you and I were born under and that you, until recently, served. I fear you may pay, if not with your death, with your life—with a life that can have no conventional outcome anytime soon, if ever. “Truth is coming, and it cannot be stopped,” you told us, and they are trying to stop you instead.
Read more: A Letter to Edward Snowden | The Nation http://www.thenation.com/article/175339/letter-edward-snowden#ixzz2Zkz7joBC Follow us: @thenation on Twitter | TheNationMagazine on Facebook
Chancellor Angela Merkel's government on Monday promised a full review of Germany's intelligence services amid public anger over media reports that they were cooperating with their U.S. counterparts in domestic spying.
Germans are very protective of their privacy because of the historical experience during the Nazi era and Stasi following the war, Annie Machon a former intelligence officer for MI5 has told RT.
German Chancellor Angela Merkel's government on Monday announced a probe into ties between its secret services and US agencies whose sweeping online surveillance was revealed by fugitive intelligence analyst Edward Snowden.
Whatever your civil liberties stance, the technologies underpinning the National Security Agency's data collection and analysis programs, such as PRISM, spell opportunity for companies looking to connect a different set of dots -- identifying potential customers, spotting fraud or cybercrime in its early stages, or improving products and services.
The pillars of the NSA's architecture are big data systems, particularly a distributed data store called Accumulo, machine learning and natural language processing software, and scale-out cloud hardware (we delve into all three in much more depth in our full report).
The US’ National Security Agency could be rejigged as a self-funded entity fulfilling its missions while saving taxpayers billions of dollars and also providing them with a host of useful services.
Its substantial computing platform and its superior security knowledge could jumpstart new jobs and businesses if the agency had a commercial arm.
The NSA is interested in the tiniest fraction of the data it collects, the bits about finding terrorists. The rest of the data is useless to it but it keeps it anyway. It’s a highly valuable resource to others.
Pete Ashdown, the CEO of small Utah ISP XMission, says that in 2010 he received a Foreign Intelligence Service Act (FISA) warrant that allowed the federal government to monitor the Internet activity of one of his customers. Ashdown was also given a gag order, preventing him from talking about key details relating to the warrant. In an article on BuzzFeed, he explained how the government “wanted to come in and put in equipment on my network to monitor a single customer.” Federal agents came in and set up a duplicate port that tapped into the customer’s traffic and allowed the government to see everything the person sent and received. The executive noted that the ending result was “a little box in our systems room that was capturing all the traffic to this customer.”
Among the snooping revelations of recent weeks, there have been tantalizing bits of evidence that the NSA is tapping fiber-optic cables that carry nearly all international phone and Internet data.
The idea that the NSA is sweeping up vast data streams via cables and other infrastructure — often described as the “backbone of the Internet” — is not new. In late 2005, the New York Times first described the tapping, which began after the Sept. 11, 2001 attacks. More details emerged in early 2006 when an AT&T whistleblower came forward.
In Louisiana, the wife of a former soldier is scaling back on Facebook posts and considering unfriending old acquaintances, worried an innocuous joke or long-lost associate might one day land her in a government probe. In California, a college student encrypts chats and emails, saying he’s not planning anything sinister but shouldn’t have to sweat snoopers. And in Canada, a lawyer is rethinking the data products he uses to ensure his clients’ privacy.
These actions might be dastardly all on their own, but when you measure them against how the United States has behaved when the shoes were on the other foot, you're left with a dose of hypocrisy that would kill most lab rats. Take, for instance, the case of Michael Christopher Meili, security guard in Switzerland (chocolate!) for UBS, their mega-bank. He revealed some of UBS' shady dealings when it came to the banking documents of Jewish clients during the holocaust.
While the government and defenders of the NSA surveillance program continue to want to paint Ed Snowden out to be a spy and trying to "aid the enemy," public opinion continues to side with Snowden and believe that he's a clear whistleblower, calling attention to government excess. Glenn Greenwald has published a fascinating email exchange between Snowden and former Senator Gordon Humphrey, who apparently sent an unsolicited email to Snowden to thank him for exposing government wrongs.
In one sentence, the Office of the Director of National Intelligence (DNI) dismisses public outcry over the NSA's global surveillance program — and reports NSA spying will continue.
July 28th marks the 35th anniversary of the political assassination of two Puerto Rican independence activists, Carlos Soto Arriví and Arnaldo Darío Rosado, in the infamous Cerro Maravillai case. This case, which was widely followed among Puerto Ricans, involved an agent provocateur that led the activists to an ambush that resulted in their brutal murder by paramilitary agents within the colonial police force. The event led to two investigations, the second of which revealed a conspiracy to cover up both the assassination plot as well as the destruction and manipulation of evidence carried out by the colonial police and justice department, and well as the federal justice department and FBI. Cerro Maravilla symbolizes for many the most outstanding recent example of repressive measures, from surveillance to political assassination, unleashed by US imperialism against the anticolonial movement in Puerto Rico.
What happens when a former top-level State Department official asks the government to reveal if it’s reading his communications? John Kael Weston on his adventures in our national-security state.
In a new report about the rapid expansion of the US National Security Agency, The Washington Post details a cellphone location tracking program whose existence the agency initially seemed to deny following disclosures from whistleblower Edward Snowden. As part of the agency's considerable post-9/11 growth, the NSA assembled a team in the basement of its headquarters in Fort Meade whose purpose is to track the locations of cellphones in real time, The Post reports.
He notes that this particular monitoring experience ended about two years ago, and he wonders if he'll hear from them for talking about the experience, but he's willing to face up to that. Of course, there are very, very few ISP owners who are willing to stand up and talk like this. Beyond Ashdown, the short list includes Nicholas Merrill and I'm not sure who else. If more internet companies were willing to speak up, it would help bring more clarity to what's going on, even if they faced some significant backlash in doing so.
A nursing student at Pima Community College (PCC) has filed a lawsuit claiming that she was illegally suspended after she complained that her classmates were speaking in Spanish and orally translating English to Spanish so excessively that she was failing to learn.
He can order anyone indefinitely detained. He can throw them in military dungeons. He can deny them due process and judicial fairness.
President Obama was a late convert to the Bush Administration's antiterror detention policies, but his latter-day position has now been vindicated. A panel of the Second Circuit Court of Appeals voted 3-0 last week to reject a lower court order that would have limited the ability of Congress to authorize the President to detain enemy combatants and those who aid and abet them.
White is black and down is up. Leaks that favor the president are shoveled out regardless of national security, while national security is twisted to pummel leaks that do not favor him. Watching their boss, bureaucrats act on their own, freelancing the punishment of whistleblowers, knowing their retaliatory actions will be condoned. The United States rains Hellfire missiles down on its enemies, with the president alone sitting in judgment of who will live and who will die by his hand.
The Fourth Circuit — which covers CIA, JSOC, and NSA’s territory — just ruled that journalists who are witnesses to alleged crimes (or participants, the opinion ominously notes) must testify in the trial.
She says she had no warning that someone was going to search her car after she left to catch her flight. So the woman contacted News10NBC.
We found out it happened to her because she valet parked her car. Those are the only cars that get inspected.
“In 2008, in a piece you wrote, ‘Why am I a socialist?’ you wrote this: ‘The inability to articulate a viable socialism has been our gravest mistake,” host Paul Jay says to Truthdig columnist Chris Hedges during the latest installment of an interview on The Real News Network’s “Reality Inserts Itself.” He then asks: “Do you still believe that?”
Hedges responds: “Yes, because we have allowed ourselves to embrace an ideology which, at its core, states that all governance is about maximizing corporate profit at the expense of the citizenry. For what do we have structures of government, for what do we have institutions of state, if not to hold up all the citizenry, and especially the most vulnerable?”
Two recent news reveal that Homo sapiens aren’t always loyal to a tyrannical regime. Edward Snowden opened the valve so that crude secrets could flow out of NSA’s pipelines—to benefit humanity. And, in protest of America’s “dirty wars,” Brandon Toy publicly resigned last week from his job at the US Defense contractor General Dynamics. In his resignation letter, published on Common Dreams, Toy wrote: “I have always believed that if every foot soldier threw down his rifle war would end. I hereby throw mine down.”
The US led NSA's 'phone signal tracking' program has reportedly helped Central Intelligence Agency (CIA) locate militant targets for drone attacksin Pakistan.
Speaking at Image’s annual Image Expo event, Stephenson declared that—effectively immediately—all digital comics sold through the company’s revamped website would be free of digital rights management (DRM) technology. This decision makes Image the first major comic book publisher to sell its digital content without the chains that have frustrated many readers for years.
The embattled porn-trolling operation known as Prenda Law is in hot water, largely due to a tough sanctions order penned by US District Judge Otis Wright. That order required Prenda to pay $81,000 in sanctions and also referred lawyers connected to the group to criminal investigators.
Finland is the first country in the world in which Parliament will vote on a “fairer” copyright law that has been crowdsourced by the public. The proposal, which obtained the required 50,000 Finnish votes just a day before the deadline, seeks to decriminalize file-sharing and legalize the copying of items that people already own.
A citizens' initiative for more reasonable application of copyright law passed the 50,000 signature mark on Monday, meaning it will go to Parliament for debate. Meanwhile, a call for a national referendum on continued EU membership expired without gaining sufficient voter backing.