Eke. Smart TVs may be intelligent, but they certainly aren't invincible. A team of researchers at the Black Hat conference this week detailed and warned that Samsung's line of Smart TVs were "rife with vulnerabilities that could leave the devices vulnerable to remote attacks." It sounds eerie, and the potential is certainly huge. Granted, it's important to remember that Black Hat hacks are explained to the companies ahead of time, and the specific hacking methods are kept private in order to keep this from becoming a nefarious thing.
Sysgo announced the port of their Industrial Grade Linux ELinOS to Delta's next generation power system controller.
Think of that for a moment… If a single organization should lean to GNU/Linux because of the cost of 20 million licences for an OS, how fast should the world move to GNU/Linux on thousands of millions of computers? It’s exactly the same problem, “How do we reduce the cost of the whole system to something more affordable? . It has the same solution, “Use Free/Libre Open Source Software, the GNU/Linux OS.” . Sticking with M$’s OS is succumbing to a divide-and-conquer approach. Together we are bigger and better than M$ and GNU/Linux is our OS. Millions of programmers around the world have worked for years and pooled their resources for everyone to share.
My name is janith kashan and i am a software engneer as well as i have done CCNA (Cisco Cerificate In Network Admistartion) so i want to tell you is me and my group can promot linux OS in sril lanka so if my idea is a good one please let me know you can send me a mail to my e mail
Big week for Linux news with major kernel news and a reshaping of the Linux desktop space.
My vote goes to 2006-07. I started in mid-2006 and the chance meeting with Linux was purely political. I had won an uncontested primary for the Green Party’s nomination for Insurance Commissioner of California and, as a Green, I didn’t take corporate contributions. Faced with the prospect of having to buy Adobe Illustrator and Photoshop to make campaign materials, the IT guy for the California Green Party asked me if I had heard of “Free/Open Source Software.” I hadn’t, but I was quickly brought up to speed: I didn’t need Adobe — there was Scribus and GIMP that would do the same thing. “Oh, and the Mac you have? It will run an operating system called Linux — try Debian and see how you like it.”
If you’re gifted with independently manipulable eyebrows, now would be the time to raise a single brow. An inventor in Canada claims to have created a solar-powered Ubuntu laptop that can run directly from power generated by its built-in solar panels, or recharge its 10-hour battery with just two hours of sunshine. If that wasn’t enough, the laptop — pretentiously dubbed Sol — is ruggedized for military and off-road use and you also get built-in GPS, Bluetooth 4.0, WiFi, and 3G/4G LTE. The best bit, though, is the price: The Sol will cost just $350 — or $400 if you want a submersible, waterproof model.
This is what I observed in schools in Canada. Individuals fed up with holding M$’s train just installed GNU/Linux and moved on leaving “the tax”, the restrictions and phoning home all behind. This is no doubt part of the slowdown in legacy PC shipments. Older PCs are being given new life with GNU/Linux and running and running… just like the EverReady Bunny.
I decided to begin my investigations regarding The State of Linux in Asia-Pacific, here in New Zealand. This article is the first in a series. After spending some time in each of the major cities speaking with I.T. leaders and users alike, I find that New Zealand may epitomize successful Linux adoption in this region.
Netcraft has provided it’s latest Hosting Providers sites ordered by failures.
In this week's episode a Call To Arms is issued relative to testing the extra special Xubuntu Xmir live ISO image in non-virtualized environments as further discussed here. The Xubuntu team is facing a decision-making deadline of August 22nd as to what they're going to do relative to XMir.
Last evening, on August 4, Linus Torvalds announced the immediate availability for download and testing of the fourth Release Candidate version of the upcoming Linux kernel 3.11.
Sticking to his plan to select one longterm stable kernel release every years, Greg KH, the Linux Foundation fellow and a lead kernel developer, has chosen 3.10 as the stable release.
This release will be maintained for the next two years giving enterprises, embedded players and many millions other to bake their cake on top of that.
Through a series of commits today to Coreboot, initial support for AMD Kabini APUs is present, courtesy of Advanced Micro Devices and Sage Electronics Engineering. AMD Kabini is the low-power APU targeting sub-notebook/netbook/ultra-thin devices and based upon AMD's Jaguar micro-architecture.
Patches were published today that add support to Wayland's Weston compositor for Sony Clickpad touchpads.
NVIDIA released version 0.7 of libvdpau, the VDPAU wrapper library for interacting with driver-specific Video Decode and Presentation API for Unix (VDPAU) implementations.
For those concerned about the Reverse PRIME and multi-screen Reverse Optimus enablement for the AMD open-source X.Org driver, the support is now present in its Git tree.
Back-ends have been implemented for VDPAU to implement the video hardware-based decoding process over OpenGL and through Intel's VA-API interface, for those not using the NVIDIA binary blob or the VDPAU Gallium3D state tracker.
Phoronix benchmarks have already shown that Mesa 9.2 dramatically improves the Intel Haswell Linux experience and that there's even some performance gains for other intel GPUs. On the AMD Radeon side, Mesa 9.2 also improves the performance for AMD hardware. How does Mesa 9.2 change the game for the Nouveau driver with NVIDIA graphics hardware? Here's some new results looking at the Mesa 9.1 vs. Mesa 9.2 performance for Nouveau, the reverse-engineered open-source NVIDIA graphics driver.
The performance of the open-source AMD Radeon Linux graphics driver for AMD Fusion APUs has improved a lot, but the Gallium3D driver performance still isn't yet on par with the AMD Catalyst binary driver. In this article are a variety of tests from an AMD APU including with the Linux 3.11 dynamic power management support, Mesa Git, and when using the R600 SB shader optimization back-end.
Linux offers a vast collection of open source small utilities that perform functions ranging from the obvious to the bizarre. It is the quality and selection of these tools that help Linux stand out as a productive environment. A good utility cooperates with other applications, integrating seamlessly.
When referring to productivity tools, we do not mean the main applications that you use. Enhancing productivity is concerned with ways of helping an individual make more effective use of their office suite, web browser, email client, design tools, groupware applications, programming environments, etc.
MPV is yet another fork of the mplayer/mplayer2 code-base, but it does at least offer up some changes over the code currently found in MPlayer2.
It's been revealed that a new aircraft flight simulator game, which last year was released for Windows and the Xbox 360 / PlayStation 3 consoles, will soon see a native port released for Linux as well as OS X via Steam.
Shadow Warrior Classic Redux, a remastered version of the classic game launched back in 1997, has just received a Linux version.
As everyone knows, generally Linux has never had a strong argument against Windows OS when it comes to gaming. 9/10 people will say they use something like Windows 7 or XP for their gaming (depending on the DirectX version being used/required).
[...]
For those who have not considered a Linux machine for gaming, I say, why not? For those already there, I say, welcome!
Upgrading things is a big part of cyberpunk fiction. Arms receive hidden blades, faces become nightmarish Google Glass perversions, and children become Akira-like cyberflesh monsters. It’s pretty weird. But Shadowrun Returns developer Harebrained Schemes are embracing the concept, and have posted a round-up of the future upgrades planned for their tactical RPG.
In the latest monthly alpha update to the Unvanquished open-source first person shooter are some renderer improvements, art asset enhancements, and much more.
I don’t know about you but, despite having an endless list of gaming titles in my Steam for Linux library, I never feel like I quite have enough…
MONACO: WHAT'S YOURS IS MINE, originally released in April 2013, is Pocketwatch Games' love-letter to the heist film genre, projected into a real-time stealth, co-op multiplayer game. Assemble a crack team of thieves and execute the perfect crime. Choose them from a familiar list of archetypes, including The Pickpocket, The Cleaner, and The Lookout. Exploit their individual skills, and the spoils are yours. Monaco boasts a colorful and unique retro-style, a throwback to a romanticized time; much like the films to which it pays homage.
Air Conflicts - Experience top combat action in this brand new arcade flight sim and become immersed in the exploits of famous aircraft carriers. The developers have stated they expect it to hit Linux in a few weeks.
If you have never messed around with a Linux system, but have seen a YouTube video about it, there’s a high chance that you’ve seen someone show off their fancy desktop effects, most notably the “wobbly windows” effect. These effects are possible due to the window manager software that controls the windows that contain the various programs that you run. However, like most other Linux applications, there’s more than one that does the job, and the top two that offer the complete package are Compiz and KWin. While both of these solutions have their specific areas, we can still compare the objectively to see which one is more customizeable and functional.
Our daily lives are becoming more gadget-assisted every day and (as we approach to the “internet of things”) we have more and more computers around us in the shape of TVs, smartphones, cameras, media centers…
This week, I've been working on exposing Amarok's playlist management and dynamic playlists. The playlist interface pretty much mirrors the internal Amarok hierarchy, exposing three components- the playlist manager, playlist-providers and the playlist objects themselves. No synced playlists for now though.
The dynamic playlist is, however, a whole different beast. What I want for the dynamic playlists is to have a scriptable bias, besides exposing the existing biases. As far as the existing biases are concerned, I was able to expose them via a single class using some Qt meta-magic:
digiKam team is proud to announce the release of digiKam Software Collection 3.3.0. This version include a new core implementation to manage faces, especially face recognition feature which have never been completed with previous release. Face detection feature still always here and work as expected.
Packages for the release of the Calligra Suite 2.7.1 are available for Kubuntu 13.04, 12.10 and 12.04. You can get it from the Kubuntu Backports PPA. They are also in our development release.
The GNOME developers announced a few days ago the immediate availability for download and testing of the fifth development release towards GNOME System Monitor 3.10, for the upcoming GNOME 3.10 desktop environment.
The GNOME project announced plans for supporting Wayland quite a while ago and progress has been reported incrementally for months. Wayland was supported in GNOME 3.95 for the particularly crafty, but starting with 3.10, binaries will be offered for Wayland right beside X. Matthias Clasen posted of this and other decisions made today at Guadec.
When it comes to hacking, security, forensics thing like that, linux is the only and the preferred tool. Linux is very hacker friendly from ground up. But still there are distros that are more oriented towards assisting hackers. To name a few, backtrack, backbox, blackbuntu etc.
The stable release of gNewSense 3.0 is a fact. With the help of GNU Linux-libre and various other people helping to check and hack on freedom issues, we've been able to produce a new major version that aligns with the Free Software Foundation's freedom guidelines as well as Debian's quality standards. You'll find that the look has changed from previous releases, marking the change from Ubuntu to Debian as a base. We also support 3 architectures now: i386, amd64 and mipsel (Lemote Yeeloong).
The PCLinuxOS Magazine staff is pleased to announce the release of the August 2013 issue of the PCLinuxOS Magazine. The PCLinuxOS Magazine is a product of the PCLinuxOS community, published by volunteers from the community. The magazine is lead by Paul Arnote, Chief Editor, and Assistant Editor Meemaw. The PCLinuxOS Magazine is released under the Creative Commons Attribution-NonCommercial-Share-Alike 3.0 Unported license, and some rights are reserved.
Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced continued global expansion with new and expanded facilities around the world. Red Hat also announced that its facilities in Raleigh, N.C., Westford, Mass., and Beijing are expected to achieve Leadership in Energy and Environmental Design (LEED) certification, highlighting the company's commitment to building environmentally sound offices. Today, Red Hat has more than 80 offices worldwide with more than 5,700 employees.
"The deal would be palatable if every Ubuntu Edge was delivered with shares of stock in Canonical, but as it stands now, why would I want to invest money to help Canonical make money?" said Robin Lim, a lawyer and blogger. "Eventually, we do have to realize, we are not partners in this venture. Just potential customers who Canonical wants to profit from."
You know the drill: you’re having a relaxing time browsing cat photos and hamster .gifs on the internet when “ping!” – your laptop battery starts to demand suckling time on the nearest AC power point.
Crowd funding is the way forward if you want to guarantee yourself with a set number of audience, buyers, and investors who will ensure you stay afloat as long as you’re dishing out content worth investing.
The Internet of Things keeps on growing. This week Canonical’s Victor Palau leaked new details about his company’s upcoming Ubuntu device, MIT researchers pulled the curtains back on a 3-D printer that can produce food, and Nvidia’s long anticipated SHIELD console finally hit stores.
Ubuntu Touch starts getting real When Ubuntu Touch debuted to developers this winter, it was more of a mockup than an OS, despite its promise. Now a beta version for developers reveals Ubuntu Touch taking shape in an operational way. Design similarities to Windows Phone and iOS 7 prove the "flat," modern look is in.
Canonical may be facing an uphill battle in bringing the Ubuntu Edge, its Linux-powered "superphone," to market. But in a sign of the company's impressive influence within the mobile ecosystem, it has been quietely building a network of channel partners through its Carrier Advisory Group (CAG), which includes a number of big-name mobile carriers and which continues to grow.
Today in Open Source: The five best Ubuntu spins! Plus: Twenty five free intelligent Android games, and eight apps for Linux system administrators
While Ubuntu is switching to MIR from Xorg, ditching Wayland, other Ubuntu flavors have not yet decided whether they will follow the suite of not. Since KDE and Gnome communities have put their weight behind community developed Wayland, it's quite obvious that Kubuntu or Gnome edition may not switch to XMIR yet. One flavor has however gone ahead and offers XMIR based images for users to try - it's Xubuntu.
Full disclosure: I live with Kayla, and had to jump in to help resolve an enraging problem we ran into on the Kubuntu installation with KDE, PulseAudio and the undesirable experience of not having sound in applications. It involved a fair bit of terminal work and investigation, plus a minimal understanding of how sound works on Linux. TuxRadar has a good article that tries to explain things. When there are problems, though, the diagram looks much more like the (admittedly outdated) 2007 version:
The Xubuntu team hasn't decided yet if the Xfce Ubuntu flavor will switch to XMir or continue with X.org for 13.10. Before making the decision, this needs to be properly tested so an Xubuntu ISO running on Mir & XMir has been made available for download.
When I started this series of blogs, I asked: "Can you do signal processing on the Pi?" I think the answer is a resounding yes.
Hardkernel and its community Odroid project opened $149 pre-orders on an updated version of the open platform Odroid single board computer, featuring Samsung’s eight-core Exynos 5410 Octa SoC. The Odroid-XU runs Android, Ubuntu, and other Linux OSes, and offers features including an eMMC socket, two USB 3.0 and four USB 2.0 ports, HDMI video, 100Mbit Ethernet, and more.
Sony has released the open source files for the new Sony Xperia Z Ultra, and you can download the files direct from Sony’s developer website at the link below., the release is in the form of software versions 14.1.B.0.461.
Google Ventures is blazing a new trail for venture investors, delivering advice and services to its portfolio companies with in-house teams of experts in the fields of design, marketing, recruiting and engineering. I had a fascinating discussion with Google Ventures design partner Jake Knapp about how he and his four design partners help Google Ventures portfolio companies design better products and better businesses.
Last week, the news broke that Android phone users with Office 365 subscriptions can now download Microsoft Office Mobile App, letting them create and edit Word, Excel and PowerPoint documents. Office Mobile, of course, has been available for Apple devices, but it is notable that Microsoft has cozied up to Android, an open source platform.
Much has been made about Google's $35 Chromecast dongle, which lets users stream their desktops and video to large screen TVs, but there is now a similar application for the Raspberry Pi that offers some of the same functionality: PiCast. Its developer has an informational page up here, where he notes: "I thought what do I have that I could use w/HDMI [licensing] and wouldn't be terribly hard to do? My Arduino? Nope BUT my Raspberry Pi can do it all, literally and [at the] same price as the Chromecast."
Admit it—all those meetings are mind-numbing. So other than slurping coffee by the gallon, what can you do to snap out of brain fog, sharpen your wits and have a little fun while you’re at it? Brainiac game apps ought to do it!
The best way to secure your network is to try to tear it down, through penetration testing. With dSploit, you can now do it on the move
Panasonic announced a DECT-compatible digital cordless landline phone that runs Android 4.0 with Google Play access. The KX-PRX120 is equipped with a 3.5-inch, HVGA screen on the handset, which offers a front-facing camera for Skype calls, as well as WiFi, Bluetooth, and GPS for mobile Android use, but lacks cellular technology.
Zink Imaging announced the launch of two Android-powered, WiFi-enabled label and photo printers that don’t require ink cartridges, but instead use heat to create images on special adhesive-backed paper. The $199 Zinc hAppy and $299 hAppy+, which adds a 3.5-inch touchscreen, are designed to be controlled via Android and iOS apps.
Small tablets are making big gains, while Apple is beginning to plateau, says market researcher Canalys.
The company offers backers who didn't receive a console until after it was on store shelves a $13.37 credit for use in the Ouya Discovery Store.
IDC has released its figures for shipments of tablet PCs in Q2 of 2013. There are huge rates of growth in unit-shipments for Android/Linux suppliers but the big story is that Apple’s market share of units is down dramatically
I came upon a post by Ashwin Dixit, Ownlifeful: India and Open-Source Software. It’s a brief but reasonable list of advantages for India, or any other country to adopt GNU/Linux widely.
When Drupal creator Dries Buytaert addressed the inaugural DrupalCon Sydney conference earlier this year he said the open source project's community had to move beyond seeing it purely as a content-management system. Drupal can compete with the proprietary Web experience management solutions provided by companies like Adobe and Sitecore, Buytaert said.
Osell, a subsidiary of DinoDirect China Limited, has recently launched a marketing campaign that will navigate through the bush of e-commerce practitioners and reach its specialized customers.
"The purpose of this campaign is to identify our customers more accurately and reach out to them in a more efficient way. The target customers of Osell would be those who already own an e-commerce website, either created by open source software such as Magento and Zen Cart or created by their own technical teams, and intending to sell their products on their websites," the marketing director of Osell Mingpu Su says.
At the time, the United States was pumping nearly $4 billion into new voting machines, spurred on by Florida’s 2000 presidential election fiasco. But the shift to machines built by companies such as Election Systems & Software and Sequoia Voting Systems (now called Dominion Voting Systems) had introduced all sorts of new problems.
Notice how everyone is on their smartphones these days? We’re now at the point where mobile Internet usage is poised to actually overtake desktop Internet usage. This tectonic shift is projected to happen within the next year according to many analysts. Sales of mobile devices already surpassed desktop and notebook PC sales in 2012 and we can all see, anecdotally, how people can’t imagine living without their smart phones. This presents a unique challenge to businesses that have previously relied on desktop websites to reach their target market.
What good is a device with a mind blowing super high resolution touch screen when it's browser isn't taking advantage of that screen. Yes I am talking about Chrome Pixel.
Mozilla uploaded a few hours ago, August 6, the final packages of the Mozilla Firefox 23.0 web browser for all supported platforms, including Linux, Mac OS X and Windows.
IBM this week said it is backing the VMware-launched Cloud Foundry initiative. IBM said it will collaborate with Pivotal, the company spun out of VMware, the sponsor of Cloud Foundry on the open source Platform as a Service (PaaS) project.
Because Hadoop is open source, "the entire planet with lots of innovative minds all over the place can direct their attention to their problems to enhance the platform in particular ways to make their life better. The aggregate benefit is that it is just not a fair fight. That is not to say that Hadoop is perfect in every possible way. There is much that we as a community need to do."
The first release candidate for FreeBSD 9.2 is out this morning and it's on time compared to past FreeBSD releases that have been belated.
The GnuCash development team proudly announces GnuCash 2.5.4, the fifth release in the 2.5.x series of the GnuCash Free Accounting Software which will eventually lead to the stable version 2.6.0. It runs on GNU/Linux, *BSD, Solaris and Mac OSX.
Because Android is Free Software and gratis, the non-free software competition cannot compete with it, therefore the market has less alternatives, thus the consumer suffers from this lack of competition. In a nutshell that is the argumentation of the so-called "Fair Search" coalition. Essentially they are asking the European Commission to favour a restrictive business model over a liberal one, which is exactly the opposite of what competition regulators should do in order to achieve a fair market.
During the lecture, held at NYU by HackNY—a nonprofit, organized by Columbia and NYU faculty, whose mission is to “federate the next generation of hackers”—Stallman advocated the benefits of truly free software.
[...]
He also claims software as a service (SaaS) is inherently bad because your information goes through a server beyond your control and that server can add additional software when it likes.
“The server has your data and it will probably show it to the NSA,” he said to a crowd that was all too aware of recent events with Wikileaks and “our great hero Edward Snowden.” Instead he encourages peer-to peer apps to avoid third parties.
That’s why he takes issue with open source software. He says it’s booked as a way to have people test and improve code quality at no cost, but it doesn’t give them any control over the software.
“Our ideals become forgotten,” he said of open source eclipsing free software, and encouraged the audience to keep talking about free software.
The word 'community' has many definitions, especially in the world of open source software and Linux. Urban planner, artist and TED fellow Candy Chang has her own understanding of community, cultivated through collective art projects in her hometown of New Orleans. Her "Before I Die" project, for example, transformed an abandoned house in her neighborhood into an interactive wall for people to share their hopes and dreams -- a project The Atlantic called “one of the most creative community projects ever.”
Astute readers will have noticed that we’ve begun publishing our "Open Voices" eBooks in the ePub format. Now, some of our best essays and interviews are available as lightweight and portable files, and can be read on any electronic reading device that supports this open standard.
EFF is at Black Hat and DEF CON this week, two conferences that draw a wide variety of people from tech including security researchers, coders, engineers, and everyday users. This year, EFF is pushing its campaign around making common sense changes to the Computer Fraud and Abuse Act—including a phone booth called the CFAA DC Dialer that allows DEF CON attendees to call their Representative.
Boston-based Boundless, which creates “textbook alternatives” from open-source content, is launching a $19.99 interactive textbook that it says gives students a more structured approach to studying.
For almost 15 years, some of the more interesting work in the field of robotics has been driven by open source efforts. Last year, the Open Source Robotics Foundation (OSRF) took shape, which is a well funded and organized central entity that can provide oversight to some of the most important open source robotics efforts. The organization recently helped the U.S. Defense Department host its Virtual Robotics Challenge (VRC) entirely in the cloud, with participants in the competition competing from remote locations using SoftLayer Technologies' cloud computing platform.
For decades anyone buying a new computer did so in the knowledge that within a few years it would be overtaken by a much faster machine.
Driving this rapid evolution has been Moore's Law – which has allowed the building block of information processing, the transistor – to be packed in greater numbers onto ever smaller computer chips.
But Moore's Law is slowing, as various engineering challenges have limited the rate at which transistors can be added to processors and this throttling back will increasingly provide an opening for the little guys to make their mark in the hardware world.
Working with the minnowboard.org open source community Intel has helped produce a sub-$200 PC (GBP €£130) aimed at software application developers.
The MinnowBoard is an Intel Atom processor-based raw materials (i.e. motherboard only) unit aimed at the low cost, hobbyist and embedded computing markets.
A while back I wrote about some Open-Source Electrical Engineering Design tools. Several of you chimed in to add some even more highly useful tool ideas. The short summary of the blog is that some excellent tools exist for doing simple EE design for test and measurement: KiCAD for schematic, LTSpice for simulation, FreePCB for layout and anyone you trust for printed circuit board (PCB) manufacture (I use Advanced Circuits). Some readers contributed some great additions, including PCB prototyping options Sunstone Circuits and OSH Park.
With the successful space launch of ArduSat aboard a H-IIB rocket, the first open satellite platform that allows private citizens to design and run their own applications in space is now on its way to the International Space Station (ISS).
The development team of the Anjuta IDE (Integrated Development Environment) announced a few days ago the immediate availability for download and testing of the fifth development release towards Anjuta 3.10.
Intel developers working on the LLVM compiler infrastructure have been working on AVX-512 instruction set support in recent days. Intel AVX-512 instructions support 512-bit SIMD instructions with providing twice the number of data elements handled by AVX/AVX2 with a single instruction and four times that of SSE instructions.
The OpenMP 4.0 specification has been unveiled as a major new specification for programming of accelerators, SIMD programming, and better optimization using thread affinity.
Nearly 10,000 people who worked at the stricken Fukushima No. 1 nuclear plant are eligible for workers’ compensation if they develop leukemia, but few are aware of this and other cancer redress programs.
An official at Japan's nuclear watchdog told Reuters on Monday radioactive water seeping from the Fukushima Dai-ichi nuclear plant into the sea constitutes an "emergency," an assessment far more extreme than previously stated.
"Right now, we have an emergency," head of Japan's Nuclear Regulatory Authority (NRA) task force, Shinji Kinjo, told the news service.
A dozen cities in Argentina mobilized in May to protest the multinational Monsanto. In Cordoba, where Monsanto plans to install its largest plant in Latin America, the march was massive and a survey reveals that the population rejects the company.
A small, Linux-powered device unveiled at DEF CON allows hackers to take over devices’ Wi-Fi connections and manipulate data flows
Many good open-source software tools are freely available for penetration testers (and hackers) for testing the security of WiFi networks and their users. Getting those tools to run on a given computer isn't always easy, and walking around with a notebook running WiFi penetration tools isn't exactly the right approach if you're trying to be discrete.
A security researcher picks apart the shady world of Booter services that offer distributed denial of service attacks as a service.
In Pakistan, "people are angry, upset, hurting, grieving. This is not something that makes sense either morally or from a national security point of view."
The US has so far killed more than 2,500 people in its ‘secret’ drone war in Pakistan. All but 22 of 372 recorded CIA strikes have taken place in Waziristan – a hostile and inaccessible area for journalists and researchers.
In the past two years the Bureau has published three major investigations into CIA strikes in Pakistan – all based on field research in Waziristan. So how has it been able to achieve this?
These aren’t the airplane-sized drones that the U.S. military and intelligence services have used to seek out and kill alleged terrorists with laser-guided missiles. Instead, they are oversized model planes fitted with cameras, thermal-imaging units and global-positioning systems and often launched by hand. They can be cheaper than a helicopter to operate, so law enforcement agencies are increasingly thinking about using them over U.S. soil. But privacy concerns have brought together liberals concerned about individual freedom with tea partiers suspicious about government in urging restraint when it comes to drones.
[...]
The FBI has said drones allow the FBI to learn critical information that otherwise would be difficult to obtain without introducing serious risk to law enforcement personnel. For example, the FBI used drones at night during a six-day hostage standoff in Alabama earlier this year. It ended when members of an FBI rescue team stormed an underground bunker, killing gunman Jimmy Lee Dykes before he could harm a 5-year-old boy held hostage.
Prime Minister Nawaz Sharif, attired in English suit and shinning tie, has finally smiled—thanks to Master John Kerry from the United States of America.
A president who came into office pledging to take the 'war on terror' out of the shadows plunged it deeper into those shadows
"I told you so!" was the tone coming from the NSA chief today as more terror attack warnings were released all over the place.
"Now you don't mind being snooped on so much do you, huh, huh, huh?" the NSA chief said then he added, "We just saved your asses from fake terrorist attacks that were never going to happen by unknown terrorists and stuff."
A man from Devoyne, North Texas said: "Is it safe to come out from under the table now?"
Many in the Chicago metro area were holed up in basements all night and day yesterday local news stations were reporting.
In New York city a woman was so scared that she could not talk.
The CIA was smuggling weapons from Libyan weapons depots to the Syrian rebels during the 2012 attack on the US embassy in Benghazi. According to a report by CNN, an unnamed source has leaked that the alleged cover-up of the circumstances around the attack is to hide the reality of the smuggling, which occurred before the escalation of the Syrian civil war. This shows that the CIA has been arming the Syrian rebels since at least September 2012. The agents were running the operation out of the Benghazi “annex,” which has been reported as a secret safehouse of the CIA in the city, not far from the embassy.
Stones, instead of rifles or bullets, are the weapon of Kashmir’s newest fighters.
We all knew the battle between IBM and Amazon Web Services over which gets to build the CIA cloud goes well beyond the $600 million contract itself. With the U.S. government’s “cloud-first” initiative many billions of dollars worth of business are at stake. Whichever vendor finally gets the nod from the CIA will automatically gain credibility for other government agencies wanting to build secure clouds. In short if IBM wins, no government bureaucrat will be fired for buying IBM cloud. Ditto for AWS.
Common sense tells me that cops don't need a Taser or a shotgun to subdue a 95-year-old man.
A president who came into office pledging to take the war on terror out of the shadows plunged it deeper into those shadows
By grounding the drones, we will stop creating new enemies faster than we can kill them.
2. Close the U.S. drone base in Saudi Arabia. One of the reasons Osama bin Laden said he hated the United States was that the United States had military bases in the Holy Lands in Saudi Arabia. President Bush quietly closed those bases in 2003, but in 2010 President Obama secretly reopened a base there for launching drones into Yemen. It’s a national security threat ripe for blowback. So are many of the over 800 U.S. bases peppered all over the world. We can save billions of taxpayer dollars, and make ourselves safer, by closing them.
The global terror alert shows the jihadists aren’t just alive and well – they are thriving. Bruce Riedel on the birth of a new terror generation.
Last week the LA Times and Washington Post both carried op-eds calling for an end to the so-called War on Terror
The surveillance video captures the final moments of Hastings life and provides intriguing details of the "crash.” The video shows a flash of light appearing at the 13-14 second mark, the headlights are on at 14 seconds, but all lights are extinguished at the 16-second mark. The car then turns left and the first horizontal explosion appears just after the 16-second mark (it ejects the left front tire across northbound highland approximately 40-50 feet). The second explosion engulfs the engine compartment at the 17-second mark. The third and largest explosion consumes the passenger compartment at the 17-18-second mark.
Highly radioactive water seeping into the ocean from Japan's crippled Fukushima nuclear plant is creating an "emergency" that the operator is struggling to contain, an official from the country's nuclear watchdog said on Monday.
Like a towheaded baby whose golden curls inevitably turn mousy brown at exactly the same age he or she starts giving a crap about hair color, our planet is going darker on top as it ages. That’s bad news for a couple of reasons — first, because it’s happening as a result of global warming, and second, because it will make global warming worse.
Climate change has reduced ice in the Arctic to record lows in the past year, forcing animals to range further in search of food
The bad news is that the terrible drought in New Mexico has led some farmers to sell their water to the oil and gas industry. The worse news is that many of them are actually pumping the water out of the aquifer to do so.
The worst news of all is that once the frackers get through tainting it with their witches’ brew of chemicals, that water often becomes unrecoverable — and then we have the possibility the used fracking water will end up contaminating even more of the groundwater.
Opposition is growing to the idea of President Obama naming Larry Summers to head the Federal Reserve. As William Greider wrote in The Nation, "Summers is a toxic retread from the old boys’ network and a nettlesome egotist who offended just about everyone during his previous tours in government. More to the point, Summers was a central player in the grave governing errors that led to the financial collapse and a ruined economy."
The American Legislative Exchange Council (ALEC) is running a secretive, multi-million dollar slush fund that finances lavish trips for state legislators and has misled the Internal Revenue Service about the fund’s activity, two government watchdog groups charged today.
One week after it was first reported that talk radio giant Cumulus Media might cut ties with Rush Limbaugh and pull his show from 40 of its stations nationwide, the end result of the contractual showdown remains unclear. But we do know this: The damage has been done to Limbaugh and his reputation inside the world of AM radio as an untouchable star.
At the height of the Occupy Movement the support for these mostly young people was considerable. They were attacking the 1% and speaking out for all workers. Here in Oakland I remember being on the back of a flatbed truck about to speak on the day of the big strike that shut down three shifts at the port of Oakland and felt a tug at my ankle. It was my former boss.
As I looked out in to the crowd, some estimates put at 30 to 40 thousand I saw co-workers and management personnel who I never see at events like these. People have had enough. Thousands of decent jobs lost, people thrown out of their homes in to the street, poor people cut off from public assistance and those protesting the shutting down of fire stations in their neighborhoods or the state parks where they took their families for the only affordable vacation around, were there looking for some solution to this crisis that is being shifted on to the shoulders of workers and the middle class. And this, after we bailed out the bankers and dragged their system from the edge of the abyss. Older people, the disabled, youth, a Lucky Stores worker earning $21 an hour after more than 40 years on the job described how powerful the feeling was to be there that day and shut down the docks.
The intelligence community has been harping on the word "metadata" to try to underscore that the information they collected is not quite "data", is not subject to the same limits, and is not quite as bad. I want to put an end to this charade, by way of an analogy.
Former spy-agency contractor Edward Snowden has caused a fierce debate over civil liberties and national-security needs by disclosing details of secret U.S. government surveillance programmes.
Documents obtained by Reuters have revealed that the US Drug Enforcement Administration has a secretive unit assigned to conducting unconstitutional surveillance techniques and transmitting the information to agencies across the country to aid in criminal investigations.
On Monday, Reuters reported on previously undisclosed documents showing that a secret Drug Enforcement Administration (DEA) unit uses information collected by intelligence agencies—including the National Security Agency (NSA)—to build evidence for criminal cases. The true origin of this information is usually concealed from defense lawyers—and sometimes even prosecutors and judges—to seemingly do an end-run around the normal court procedures for a criminal defendant’s right to discovery.
A day after a New York Times story broke on the intense jockeying for NSA intelligence from various agencies within the federal government, Reuters has published an explosive report on the DEA (Drug Enforcement Administration) and its collaboration with the NSA and other agencies providing intelligence.
No apocryphal levity this week. Instead, a sombre look into an almost-present future. For once, Tim Cook isn't holding his cards close to his chest; he makes no secret of Apple's interest in wearable technologies. Among the avenues for notable growth (in multiples of $10bn), I think wearable devices are a good fit for Apple, more than the likable but just-for-hobbyist TV, and certainly more than the cloudy automotive domain where Google Maps could be a hard obstacle.
GenieDB has launched a MySQL distributed database service to manage data across multiple regions and cloud providers, making it suited to companies with concerns about the NSA having access to their data.
Members of Congress have complained that they have been repeatedly rebuffed when trying to get the most basic information about the activities of the National Security Agency and the secret court that oversees its activities.
Glenn Greenwald of The Guardian newspaper in the UK reported that at least two members of Congress feel that they haven’t received adequate information about the NSA’s most basic activities.
Two Congressmen, Republican Representative of Virginia Morgan Griffith and Democratic Representative of Florida Alan Grayson, have told The Guardian that despite their repeat requests for details of the NSA's Prism programme, the US Intelligence Committee has refused to provide them with any information.
In late July, Rep. Justin Amash proposed an amendment to the annual Defense spending bill that would prevent the NSA from targeting anybody not currently under an investigation. Unsurprisingly, the amendment was voted down. Now one Senator is trying the same thing in the Senate, but his attempt might be more successful.
Washington moves quickly. Some 22 embassies are 'closed'.
Within hours senators are defending the National Security Agency's highly controversial programmes for intercepting, that means bugging of some kind, of emails and phones across the US and the rest of the world.
The US government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private researchers express disillusionment with the National Security Agency.
The German secret service must explain why it handed over metadata to the NSA, a minister has said. Germany’s government claimed it was ignorant of the activity of the secret service, which was described as being “in bed with the US” by Edward Snowden.
When General Michael Hayden sat down to tape Fox News Sunday, he blinked quickly and acknowledged Chris Wallace's introduction. Then, in response to Wallace's third question, he proceeded to tell a huge whopper, without ever losing eye contact with the camera and the audience. That would be us.
On August 5, Reuters revealed that the Drug Enforcement Agency (DEA) is storing wiretaps and other intelligence intercepts, some of which it obtains from the NSA, in a massive database called DICE. The agency then uses DICE to launch investigations against drug and arms smugglers.
In a nationwide show that they care about their constitutional rights and are willing to take a stand for them, hundreds of Americans gathered in over a dozen US cities on Sunday, to protest against US government surveillance programs.
Former spy-agency contractor Edward Snowden has caused a fierce debate over civil liberties and national security needs by disclosing details of secret U.S. government surveillance programs.
JavaScript attack had a hard-coded IP address that traced back to NSA address block.
The NYPD did not respond to questions regarding whether it had received intelligence from the Special Operations Division.
Documents reveal how two Congress members were refused requests for information on NSA dragnets
The Electronic Frontier Foundation's Cindy Cohn and Trevor Timm have compiled an extensive list of things to demand from NSA reform legislation, from obvious things like ending bulk collection to crucial legal subtleties like fixing the problem of standing in cases regarding surveillance.
Following a wave of polls showing a remarkable turn of public opinion, Congress has finally gotten serious about bringing limits, transparency and oversight to the NSA’s mass surveillance apparatus aimed at Americans.
While we still believe that the best first step is a modern Church Committee, an independent, public investigation and accounting of the government’s surveillance programs that affect Americans, members of Congress seem determined to try to enact fixes now. Almost a dozen bills have already been introduced or will be introduced in the coming weeks.
Following Snowden’s release of classified data from CIA and NSA, blowing the whistle on various government programs that spied on citizens; many big Internet firms have admitted that they were helping the intelligence agencies by providing personal data and private information regarding conversations and correspondence via email or even texting.
[...]
HTTPS is the secure version of the most popular Internet exchange protocol, the Hypertext Transfer Protocol.
Germany's BND foreign intelligence service is said to have forwarded massive amounts of data to the NSA - legally, it maintains - because information on German citizens was not included. Opposition parties are outraged.
The Guardian's NSA files have awakened many a curiosity about the actual technological capacity of the government. What it does do is a most important question; what it can do is only slightly less germane.
Still, there's a lot we don't know about some basic questions. For example, is it true, as Edward Snowden boasted, that an analyst can "wiretap" anyone simply because he or she chooses to do so?
Here's the basic gist of an answer:
The NSA has the capability to wiretap anyone it targets. It does not have the immediate capability to target Americans at will, but it does have the capability to change capabilities — to a point — to allow it to actually wiretap any American at will.
There was a big cyber attack on anonymous online network Tor over the weekend that led to the bust of an alleged child pornography "facilitator" by the FBI.
A visiting US expert on terrorism says it is hard to imagine al Qaeda training anyone in New Zealand. Glenn Carle, who was the CIA's former deputy national intelligence officer for transnational threats, is visiting New Zealand as part of a book tour and was referring to recent justifications for the GCSB bill by the Prime Minister.
Sources told CNN more than 20 CIA agents were at or near the U.S. consulate in Benghazi, Libya, when Ambassador Chris Stevens was killed.
A mind-blowing detail has emerged from the internal correspondence of NGO Save the Children disclosing its infiltration into the Abbottabad Commission to save its skin following allegations of the CIA’s penetration into the NGO in a hunt for Osama bin Laden through Dr Shakil Afridi, now under arrest in Peshawar.
“Some of us suspected that the khakis had access to the record and receive daily updates but never realised an NGO had infiltrated too,” said an official privy to the Commission’s working.
The leaked communication indicates that Lt Gen (retd) Nadeem Ahmed, an unofficial representative of the Army and ISI in the Commission, was allegedly cultivated by Save the Children who would offer him ‘how-to-do’ bailout advice, even sharing details about the internal politics of the Commission and classified record, something in radical contradiction to his reputation as a thorough professional and a man of integrity.
He briefed the deputy country director of Save the Children, according to the email, about the views of different members, staunch opposition from a panel colleague, Ashraf Jehangir Qazi, resulting in his dissenting note on the NGO and other institutions, and Gen (retd) Nadeem’s plan to effectively counter this note in collaboration with Justice (R) Javed Iqbal, the Chairman.
A field investigation by the Bureau of Investigative Journalism has uncovered fresh evidence that the CIA briefly resumed targeting first responders to drone strikes in Pakistan's tribal areas with 'double-tap' attacks. The Bureau, a non-profit, non-partisan, London-based news organization, first reported that the US deliberately targeted first responders attempting to rescue drone strike victims with follow-up attacks, called 'double-tap' strikes, in February 2012. In addition to targeting rescuers, CIA drones also attacked people attending funerals of suspected militants killed by US forces.
Venezuelan officials warned of an alleged plot to assassinate the country’s President and launch a paramilitary invasion of the country. A former CIA agent, Cuban exiles living in the US and Latin American leaders were fingered in the conspiracy
President Nicolas Maduro, who succeeded Hugo Chavez, first alleged that his enemies want him dead while on the campaign trail in April.
The CIA inflated the case of a kidnapped Egyptian cleric in order to protect high-ranked government officials from prosecution in Italy, a former intelligence agent admits for the first time.
Sabrina De Sousa, 55, has long denied involvement with the CIA, and even asked the United States for immunity after she was charged by Italian officials for the 2003 “extraordinary rendition” of Hassan Mustafa Osama Nasr. But a decade after that kidnapping, the case has reemerged in recent days upon news that her former CIA boss in Milan was captured in Panama, only to be sent back to the US in lieu of what would have likely turned into an extradition request from Italy.
The CIA is seeking to reduce the number of its Afghanistan bases of operation from a dozen to as few as six over two years, going with the overall American withdrawal. But even after 2014, it will maintain a significant footprint.
Two US drone strikes killed four suspected al-Qaeda terrorists Tuesday morning in Yemen's Mareb province.
The Obama administration has announced it will keep 19 diplomatic posts in North Africa and the Middle East closed for up to a week, due to fears of a possible militant threat. On Sunday, Senator Saxby Chambliss, the top Republican on the Senate Intelligence Committee, said the decision to close the embassies was based on information collected by the National Security Agency. "If we did not have these programs, we simply would not be able to listen in on the bad guys," Chambliss said, in a direct reference to increasing debate over widespread spying of all Americans revealed by Glenn Greenwald of The Guardian. "Nobody has ever questioned or disputed that the U.S. government, like all governments around the world, ought to be eavesdropping and monitoring the conversations of people who pose an actual threat to the United States in terms of plotting terrorist attacks," Greenwald says.
Security researchers tonight are poring over a piece of malicious software that takes advantage of a Firefox security vulnerability to identify some users of the privacy-protecting Tor anonymity network.
The IP address hardcoded into the 0-day Firefox javascript, used to compromise the Tor network via a version of Tor bundle has been traced back to Science Applications International Corp (a company investigated by Blue Cabinet) which has worked with former Edward Snowden employer Booz Allen Hamilton, is an NSA contractor, has supplied communications technology to the Assad regime, and also developed a tool for the NSA called – wait for it – PRISM.
All told, the poll found support ranged from a low of 16 percent (for a program collecting the content of U.S. communications without any mention of court approval or anti-terrorism efforts) to a high of 41 percent (if the government gathered metadata with court approval as part of anti-terrorism efforts).
With concern rising high over the intrusion wrought by the National Security Agency, with the emails and telephone calls of U.S. citizens being recorded, the low-profile U.S. Drug Enforcement Administration unit has been up to similar tactics.
The greatest threats to peace of mind and security remain, not stateless agents fumbling over dirty bombs and vicious rhetoric, but States and State agencies. Being mindful of their errors, and being concerned over their infractions, should be at the forefront of our minds. Besides, the idea of a terrorist threat is like Freudian subconsciousness: almost always unprovable.
Even if the weekend’s intelligence warnings about the threat of terrorist attacks in the Middle East came from electronic eavesdropping abroad by the National Security Agency, that would not ease congressional opposition to the NSA’s mass collection of domestic phone records, lawmakers from both parties said Monday.
A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.
One of Silicon Valley’s most respected technology experts, Steve Blank, says he would be “surprised” if the US National Security Agency was not embedding “back doors” inside chips produced by Intel and AMD, two of the world’s largest semiconductor firms, giving them the possibility to access and control machines.
Our report on private investigators, published earlier this year, highlighted the growing use of the industry by public authorities, with particular concern being raised about the occasions that they were used without RIPA authorisation.
Following a wave of polls showing a remarkable turn of public opinion, Congress has finally gotten serious about bringing limits, transparency and oversight to the NSA’s mass surveillance apparatus aimed at Americans.
...funnel me information on a daily basis about where the fish are located.
Michael Hayden, who also headed the CIA, speculates on global hacker response if Edward Snowden brought back to US
The little-known Privacy and Civil Liberties Oversight Board, created in 2007 on a 9/11 Commission recommendation, was limping along for years with no appointees or staff leadership. All that changed with this summer’s revelations of domestic surveillance of Americans’ telephone activity by the National Security Agency.
The board -- an independent agency that consists of four part-time members and a full-time chair who advise the president and Congress on the balance between security and privacy -- this month will finally welcome its first executive director, attorney Sharon Bradford Franklin. That’s after it took more than two years for President Obama to nominate and for the Senate to approve the board members—Chairman David Medine was just confirmed in May.
Are Microsoft & Google arms of the State?
What we’re witnessing is the revelation that big-name Corporate America (and Corporate Elsewhere as well) has been folded into the U.S. government (the State) since at least 2007, though my guess is that this has been going on slowly for a long time.
It’s not unusual to come across a report in the New York Times that reeks of government oversight — a report that should have some kind of reader health warning such as: “The U.S. government approves this message.”
[...]
This is clearly such a self-serving narrative for the NSA, one has to wonder: who initiated the report? The New York Times or the NSA?
My first response when reading this was to simply think: spare me the bullshit about the choir boys who run the NSA.
Rather than post a clip here and bother explaining why it stank, it seemed better ignored.
But then an exclusive report from Reuters appeared — a report revealing that in blatant disregard for the United States Constitution, the NSA does indeed provide law enforcement agencies with intelligence intercepts.
That the Reuters report would come out within hours of the New York Times report could be a stunning coincidence, but if you believe that you probably also believe that NSA chief Keith Alexander and DNI James Clapper would never lie.
That government officials spoon-feed stories to press stenographers is not exactly news. However, the “coincidence” of these two reports does suggest an additional and more disturbing explanation about how the NSA is able to play the media: through surveillance of journalists as they are gathering information for news reports.
Why would the NSA not regard reporting about the NSA as raising national security concerns? Indeed, what better way could there be of tracking down leakers than by keeping a close eye on the relatively small number of journalists who are likely to be contacted by any would-be whistle-blower?
The revelations of mass online spying by US government agencies that involved cooperation from the British and the German governments and intelligence services, as well as the upcoming elections have forced the German government to try to match the indignation of the country's citizens with some action.
A few days ago they symbolically called off the Cold War-era surveillance pact with the US and Britain, and now German Justice Minister Sabine Leutheusser-Schnarrenberger is calling for EU-wide punitive measures to be introduced for corporations that have been found participating in the US spying activities.
PBS Newshour recently featured an interview with NSA whistleblower/GAP client Bill Binney and a clip from the GAP conference, “Whistleblowers, Journalists, and the New War Within.” Also interviewed was fellow NSA whistleblower Russ Tice, and former NSA Inspector General Joel Brenner, who challenges both Binney and Tice. The whistleblowers discuss, among other things, how their suspicions of the agency’s data collection activities have grown to match the full€ scale operation that the American public is learning about today.
In a troubling vindication for the cynics, it seems government officials in Washington are celebrating the recent announcement of a terror threat to US interests around the world as a happy distraction from the NSA spying scandal.
It’s outrageous, the Times suggests, that Chambliss would raise this point, because “No one has questioned the N.S.A.’s role in collecting intelligence overseas, but the debate is about domestic efforts to vacuum up large volumes of data on the phone calls of every American that are legally questionable and needlessly violate Americans’ rights.”
I’m not making that last quotation up.
Nobody has questioned the N.S.A.’s role in collecting intelligence overseas?
According to the NYT report, several government agencies have complained that the NSA and the FBI shut them out of any data they collect. The NSA has refused these requests from other agencies due to "legal constraints" and "privacy concerns."
The primary defense of the necessity of the US National Security Agency’s broad spying powers—including, apparently, recording pretty much everything anyone anywhere is doing on the internet—is that its activities are necessary to protect against terrorists and violent criminals. But a report published Saturday in the New York Times indicates that federal agencies with far more mundane mandates are unable to resist the lure of the NSA’s vast trove of data.
A day after we learned of a draining turf battle between the NSA and other law enforcement agencies over bulk surveillance data, it now appears that those same agencies are working together to cover up when those data get shared.
The closing of U.S. embassies in 21 predominantly Muslim countries and a broad caution about travel during August that the State Department issued on Friday touched off debate Sunday over the National Security Agency’s sweeping data collection programs.
Congressional supporters of the program, appearing on Sunday morning talk shows, said the latest rounds of warnings of unspecified threats showed that the programs were necessary, while detractors said there was no evidence linking the programs, particularly the massive collection of cell phone records of hundreds of millions of Americans, to the vague warnings of a possible terrorist attack.
Following the controversy stirred up by ex-intelligence analyst Edward Snowden, who leaked info about mass surveillance programs to the media, new info surfaces about a top secret NSA program called XKeyscore that monitors "nearly everything a typical user does on the Internet."
Americans are just beginning to discover that a secret court has been 1 to be free from unreasonable searches and seizures. They are also learning that this court is made up primarily of conservative activists from the Republican Party who have no respect for the original intent of the Constitution’s framers.
Imagine a government that spies on its citizens, often without warrants.
[...]
This is not what a democratic government is supposed to do. Decisions about use of government authority to maintain national security should be debated in an open and transparent fashion. The government should be required in open court subject to public scrutiny to justify why it needs to monitor communications among its citizens, demonstrating that it has met the constitutional burden of particularized suspicion. This is what Americans fought a war of independence for, and it is supposedly what separates the United States from undemocratic countries. Limiting discretion to protect rights is what the law is supposed to do, it is why the law matters.
The NSA, GCHQ, Frenchelon and their counterparts in other countries are spying on every detail of our online lives. Even the once-private lands of Tor are no longer safe. Here in the UK, David Cameron wants our ISPs to start filtering our web content to protect our innocent minds.
The Justice Department says it is reviewing the Drug Enforcement Administration’s “Special Operations Division”—the subject of an explosive report published by Reuters on Monday. The SOD works to funnel information collected by American intelligence agencies to ordinary narcotics cops—then instructs them to “phony up investigations,” as one former judge quoted in the story put it, in order to conceal the true source of the information. In some instances, this apparently involves not only lying to defense attorneys, but to prosecutors and judges as well.
Premier hacker conference Def Con, which just wrapped up its 21st year, played host to security professionals who all had very different opinions on what the NSA is up to. In fact, the only thing everyone could agree on is that the PRISM revelations came as no surprise.
Malware used to identify Tor users contacted an IP address owned by US government agency, researchers claim
Government bodies at the local level can step into the fray. Counties and cities can refuse to assist any federal attempts at indefinite detention in their jurisdictions. These measures will not only provide practical protections for their citizens, they will send a strong message to Columbus.
When you build a network of support from the ground up, it will create a strong mechanism to demand that your state legislature will do the same. One step, and one community at a time, you can nullify indefinite detention.
VALENTIN CRISTEA , an 83-year-old engineer living in the tiny Romanian town of Comarnic, will never forget a day more than 55 years ago. On February 8th 1956, he was arrested by the Securitate, Romania’s notorious secret police, because he was accused of links with an anti-Communist resistance group. He was sentenced to five years in prison for disclosure of state secrets and jailed at the Râmnicu SÃÆrat prison.
From July 26th to 29th, Management at Mobile Rail Solutions fired three workers actively engaged in unionizing efforts. The termination of these organizers is a direct attack on their Union drive and apparent retaliation for their recent OSHA filings. Management then threatened to continue firing workers showing no respect for their employees or labor law.
In response, the workers have self-organized a strike and will be picketing at Union Pacific's Global 1 location in Chicago, Illinois. They demand a meeting with Mobile Rail's general manager to discuss the recent wave of Unfair Labor Practices and for the reinstatement of their three fired workers. With most workers coming to the picket line, they expect locomotive servicing will come to a halt.
I’ll start by saying that anyone reading the awful comments made towards these people will agree that they are appalling, unacceptable and have no place at all in any sort of reasoned debate/world. I’ll also say that in respect of the issue that caused this (more females appearing on bank notes) I fully supported this campaign at the time, I think notable women from history should have been on UK bank notes years ago without the need for a campaign to get the ball rolling – And if any of these Twitter abusers want to send threatening comments to me, please do so, we can all have a laugh at your expense.
And this is what the article is about. Laughing. Laughing at the commenter’s who made such disgusting remarks. Perhaps the one issue of this story which sticks in my throat though is the fact that this has been going on for years. I’ve had my wife threatened (via the comments section on this very blog) I’ve had accusations and insults thrown at me and even now, Microsoft Advocates that are anonymous on Usenet still abuse/insult myself and others – the reason? We support and champion an alternative to Microsoft. Want to see what these “people” get up to? Check out the last 15 or so years of posts on comp.os.linux.advocacy by posters such as “Flatfish”, “DFS”, “Cola Zealot”, “Hadron” to name a few. These people have spent around 15 years abusing regulars of that group under those and many other nyms – the “crime”? to dare to suggest that there may be better alternatives to Microsoft products. – I’ve never considered taking these issues to the police. Why? Because I am an adult and can handle it myself.
To its credit (and I can't believe I'm saying that), it appears that the NSA has rejected most of these requests, saying that those other issues are not high enough of a priority and they don't want to violate privacy rights (don't laugh). Still, given how much pressure is coming from other agencies of the government, you have to expect that sooner or later the NSA will be pressured into opening up the data to other parts of the government. In fact, part of the concern about CISPA and other cybsersecurity legislation wasn't just that it would put the NSA in control over such information, but that it also made it clear that government agencies would be free to share that data with each other, for almost any investigative purpose.
We've been working our way through a paper released last week by the Commerce Department, concerning copyright reform, and will have a much more detailed post about it soon (there's a lot in there), but over at the Washington Post, they're highlighting the silly recommendation to bring back the plan to make unauthorized streaming a felony. This was a part of SOPA and was widely discussed. It wasn't technically in PIPA, but there was something of a "companion" bill from Senator Amy Klobuchar that effectively had the same thing. This got a fair amount of attention when Justin Bieber was asked about the law, and said that Klobuchar should be locked up.
You probably remember the online outrage over the Stop Online Piracy Act (SOPA) copyright enforcement proposal. Last week, the Department of Commerce’s Internet Policy Task Force released a report on digital copyright policy that endorsed one piece of the controversial proposal: making the streaming of copyrighted works a felony.
As it stands now, streaming a copyrighted work over the Internet is considered a violation of the public performance right. The violation is only punishable as a misdemeanor, rather than the felony charges that accompany the reproduction and distribution of copyrighted material.