HP wants to blow your minds with what's in its development pipeline. The Machine, it says, will introduce a new kind of system architecture that will use memristors and silicon photonics to "replace a data center's worth of equipment with a single refrigerator-sized machine." It will be able to address 160 petabytes of data in 250 nanoseconds. It will pump up to 100 terabytes of storage into a single Android phone.
OnMetal Cloud Servers are built with Open Compute Project-specified hardware and run OpenStack.
3.14.x is no longer the newest kernel that you can get for your distribution and its place has been taken by the 3.15 branch. Even if that is the case, this is still one of the most advanced releases that you can find and it's still a very popular choice for many Linux distributions.
Outside of Logitech, there's many Linux users that have come up with several different open-source utilities for supporting Logitech under Linux. For most of these apps the hardware support is limited to the few keyboards/mice that the developer owns, but it isn't too hard reverse-engineering a USB keyboard for others to help out and contribute.
While the Linux 3.16 kernel is still many weeks away from being released, Intel's Open-Source Technology Center already has some new code for testing that will ultimately end up in Linux 3.17.
While the support is still experimental and isn't intended for end-users, here are some fresh benchmarks of the Nouveau driver DRM code for Linux 3.16 when re-clocked.
OpenRA, an open source project that aims to recreate the classic Command & Conquer, is now at version 20140608.
The Steam Summer Sale 2014 starts later today and there will be numerous discounts available for a couple of weeks, but there are a few games that don't get all that much publicity and that are actually hidden gems.
FlightGear 3.0, an open source flight simulator that supports a variety of popular platforms and is developed by skilled volunteers from around the world, is available for download.
FlightGear aims to create a sophisticated and open flight simulator framework for use in research or academic environments, pilot training, or as an industry engineering tool. This is probably the only simulation of its kind on the Linux platform, especially in terms of complexity...
The Steam Summer Sale is here, and Lord GabeN and his minions are tossing out deep, deep discounts on games left and right. There are flash sales and hidden gems galore, but alas: Only a small proportion Steam's catalog includes Linux support. What's an open-source aficionado to do?
Both LXDE and Xfce are fast and easy to use. The desktops they produce are uncluttered and efficient. That said, I find that Xfce is a bit more pleasant for me to use due to its additional special effects and fewer design quirks. That is where the LXQt difference comes into play. The additional tweaking that the QT settings panel brings to LXDE seems to close the LXDE and Xfce gap considerably.
Edje is the library within the Enlightenment realm that seperates the UI from the application and allows for skinning the UI to easily change the GUI of Enlightenment applications. For encouraging skinning of apps and making it easier to handle, Eflete is under development as a new Enlightenment program to serve as a theme editor for Edje.
Packages for the release of KDE SC 4.13.2 are available for Kubuntu 12.04LTS, 13.10 and our development release. You can get them from the Kubuntu Backports PPA.
With KDE Frameworks 5 and Plasma 5 not too far away our awesome Blue Systems build crew now increased the cadence at which we publish new Neon 5 Live ISO images for you to test.
PDF Annotations in Evince — the default PDF viewer in Fedora — are currently getting some much needed attention by GNOME Google Summer of Code student Giselle Reis. Basic PDF annotation support has been available in Evince for a while now, however, it currently only supports pop-up (sticky notes) style annotations, and there is also the bug where annotations can’t be deleted.
Once upon a time SimplyMEPIS, Mandrake Linux, and Lindows were popular and generated a lot of attention. Where are they now?
Red Hat Wednesday said it plans to acquire eNovance, a Paris-based cloud services provider and major contributor to the OpenStack community championed by Red Hat.
Tesla Motors Inc (NASDAQ:TSLA) CEO Elon Musk made waves last week when he opened the company’s patents to other firms to use ‘in good faith’, saying that he was acting in the spirit of the open source community, and Red Hat, Inc. (NYSE:RHT) CEO Jim Whitehurst, one of the de facto leaders of that community, has welcomed him to the fold.
The reason you are reading an article on Fedora Scientific during Open Source Week is obvious. Outlined here are the benefits of using Fedora Scientific for scientific work. I encourage you to use Fedora Scientific and help make it better.
There is no love between Linux and Windows users, but that doesn't stop Linux users to transform their operating system until it looks like the latest Windows 8. In fact, the WinAte theme is actually perfect for this task.
The press picked up the recent press release about Debian LTS but mainly to mention the fact that it’s up and running. The call for help is almost never mentioned.
Canonical is preparing to pull the plug on Ubuntu 13.10 (Saucy Salamander), the operating system that was launched only nine months ago.
Ubuntu 13.10 (Saucy Salamander) was released on October 17, 2013 and the developers from Canonical have announced right from the start that they intend to only provide support for nine months.
This latest announcement finally corrects the support period for all the Ubuntu OSes. After Canonical switched from 18 months to 9 months of support, some unusual situations were created with the upgrade path, but now everything is in order...
Jack Wallen digs into the upcoming Samsung Tizen release to uncover how the mobile giant managed to beat Canonical to the Linux-phone punch.
Finally as far as content goes, for the most important (commonly used) applications these distributions are similar to the Cinnamon/Mate distributions — Firefox browser, VLC Media Player, Libre Office, and GIMP. For other common applications and utilities they have what is included or at least typical with their respective desktop software collections, such as (KDE) Amarok music player, Dolphin file manager, k3b CD/DVD disk burning, Kate text editor, digiKam photo management; (Xfce) Banshee music player, Thunar file manager, Xfburn CD/DVD burning, gedit text editor, gThumb photo viewing/management.
GS4 unveiled an autonomous, Linux-based robot security guard called Bob, based on a MetraLabs “Scitos A5ââ¬Â³ robot programmed by the University of Birmingham.
U.K.-based security firm GS4 Technology has launched a three week trial at its Gloucestershire headquarters of a robot called Bob that was designed by the University of Birmingham School of Computer Science. GS4 will evaluate Bob’s performance as a trainee security officer. Bob is part of a €£7.2 million ($12.2 million) project called STRANDS, hosted by the University of Birmingham, with an aim of expanding the role of robots in the workplace.
Another day, another small-form-factor PC. This one, the pcDuinos3S, meets that fine line between budget-friendly and usable, being priced at $99 and able to run either Android or Linux, depending on your needs. We've got a rundown of its features after the jump.
The pcDuino3S is a case-toting alternative to the slightly cheaper and case-lacking pcDuino3, which is sold for $77. With the 3S model comes the same features, as well as a white box around the board that saves those without DIY inclinations some hassle.
APlus Mobile is seeking Kickstarter funding for a Linux-based “Personal Drone Detection System” that detects nearby drones using mesh grid triangulation.
It sounds at first like an April Fool’s joke delayed in development, but it appears to be legit: APlus Mobile and its R&D spinoff Domestic Drone Countermeasures (DDC) have launched a Kickstarter project for a device that will detect when a drone aircraft approaches within 50 feet. The Personal Drone Detection System is available in $499 (alpha testing) and $699 (beta testing) funding packages, shipping in November 2014 and April 2015, respectively.
Google has pushed yet another update to its Android OS, just within a few weeks of 4.4.3 release. But before you get too excited about any new feature, let me tell you it’s mostly a security fix release.
There's a new kid in town. Yes, this is the same town that is ruled by the widely popular Galaxy smartphones, the shiny-looking iPhones, and the ever-reliable Nexus devices. In other words, this is a tough market to break in and yet another Android device entering into this market seems like a premature death sentence. However, it isn't.
Researchers have built a free open-source honeypot software program aimed at propelling the hacker decoys into security weapons for everyday organizations.
Google conducted research to determine why girls are opting out of learning how to code? As a result Google found that most girls decide before they even enter college whether they want to learn to code—so the Tech-world must win them over them at a young age. They also found that there were four major factors that determined whether girls opted into computer science: social encouragement, self-perception, academic exposure and career perception. According to recent studies less than 1 percent of high school girls express interest in majoring in computer science.
Android: Mozilla is best known for its web browser, but the company also produces Firefox OS for a limited number of handsets. With a little sideways thinking, though, you can try some of its apps in Android.
Much like Google Chrome, Firefox supports webapps—the OS and apps are built with the same technology—and this is how you can bring Firefox OS to Android. Apps work like browser extensions, so they take up very little room making them ideal for older devices or those with limited storage. Download a copy of Firefox for Android from the Google Play Store, or update your existing copy to 29 or above.
Fire up Firefox and visit the Firefox Marketplace, the Firefox version of Google Play or the Chrome Web Store. Take a browse through the Marketplace and tap an app that takes your fancy. Just as with regular Android apps, Firefox OS apps let you know about the permissions they need, and you have to accept this before you install anything.
A Structure conference panel discussing the state of open source cloud computing agreed that open source clouds need to get easier to use, but not on much else.
There I was, 4 years ago (this past January) at CampKDE in San Diego, giving a talk on data privacy, warning the audience about the risks to their privacy from cloud vendors – in particular, Dropbox. So, build it yourself they said. Sure, I’ve built things in the past, so sure, I’ll do it. And there is where I started my odyssey, first, to protect myself, my friends and my colleagues from the snooping of governments, and other bad guys, and later – as I saw the worldwide interest grow – to build a real and successful project.
I had to decide a few things before I got started of course, including what it is I wanted ownCloud to do, what development platform to use, how I wanted to structure ownCloud, and of course, to name it ownCloud.
The Document Foundation has announced that the final version for LibreOffice 4.2.5 has been released for all the available platforms, including Linux.
This is just a maintenance release for the 4.2.x branch, but users of this particular version should consider upgrading nonetheless. The developers have squashed numerous bugs for this release and that can be easily observed from the changelog,
LibreOffice 4.2.5 is now the most advanced build available from The Document Foundation, but the developers maintain a number of other branches as well. Users will be able to find the 4.1.6, 4.2.3, and 4.2.4 downloads on the official website...
The news comes three months after the passing of Pat McGovern, who started IDG in 1964 as a research firm and put out Computerworld with a tiny staff in its earliest days. It’s sad to think of IDG losing its founder and flagship print publication so close together, but in a way, it’s also fitting.
Just for fun, I checked to see which countries are the wealthiest in the world, based on a ranking of Gross Domestic Product (GDP) per capita. According to the Central Intelligence Agency’s (CIA’s) World Factbook, the crown goes to energy-rich Qatar, where GDP per capita last year stood at more than $102,000 US.
Rounding out the list of top-10 richest nations are Liechenstein, Macau, Bermuda, Monaco, Luxembourg, Singapore, Jersey, Norway, and the Falkland Islands.
Paraguay ranked a lowly 143rd, with a GDP per capita of just $6,800 per person in 2013. In fact, most of the happiest countries according to the Gallup poll results failed to crack the top-100 list of the world’s wealthiest nations, based on the CIA’s data.
At Docker we take security very seriously and try to be as transparent as possible. This morning proof of concept exploit code was published showing how to break out of a Docker Engine 0.11 container.
Chrome OS is taking an extra precaution to warn users about sources of spyware that can come from installing alternate keyboard layouts. These keyboard layouts, if installed from third-party sources, can use keystroke logging and collect user input for nefarious purposes. François Beaufort, a Chromium developer, revealed that the developer channel of Chrome OS has already implemented a popup warning to educate users about the risk.
Iraq is back, as in blowback: this replaces Ukraine for the moment, America always on the lookout for a situation which can be turned, because of US policy in the first place, into a source of provocation. Iraq, our intervention guaranteed internal civil war, here, with the gains of ISIS, a chance to return in some form, concentrated drone attacks, rather than so-called “boots on the ground,” possibly to inflame the entire region, itself destabilized for obvious reasons (protection of Israel and the continued plight of the Palestinians). As Spinney and Polk wrote in CounterPunch, contradiction plagues American policy, in this case, turning to Iran for help against ISIS while threatening Iran for some time with severe military and economic punishment. How Obama and Kerry can keep straight faces is one for the annals of war.
The US is playing all sides of this exploding conflict, towards larger US/NATO objectives.
The invading force, ISIS, is a creation of the US CIA and oil-soaked US allies Saudi Arabia, Kuwait and Qatar.It is an Al-Qaeda front. Al-Qaeda has been the military-intelligence arm of the CIA since the Cold War. ISIS is the Anglo-American empire’s leading military-intelligence army in its ongoing war against Syria.
Back in the early 2004, comedian Dave Chappelle produced a masterpiece entitled “Black Bush” – a comedic mockumentary of the events leading up to (and immediately following) the United States’ “second crusade” in Iraq, led by former president George W. Bush.
[...]
Now they’re our allies or something … sort of like al-Qaeda (who we were supporting in Syria) is now our enemy in Iraq.
At the White House on Thursday afternoon, the American president outlined an everything-but-the-war strategy that was classic Barack Obama: his press briefing offered perhaps a telling signal about his own expansive version of the Global War on Terror, while still managing to be subtly evasive about what he might actually do in Iraq.
The US military will be increasing surveillance, Obama said, preparing to send military "advisers" to Iraq and urging, not so subtly, for a political shift away from Nouri al-Maliki's government. He did not, of course, answer the question on everyone's minds about how America plans to deal with the Iraq crisis: Will Obama engage in fighting to stabilize the country?
Six suspected militants were killed in a drone strike in Miranshah Tehsil in North Waziristan, Pakistan, local tribesmen and Pakistani intelligence sources not authorized to speak to media told CNN on Wednesday.
The drone struck a house and a pickup truck in the Daraga Mandi area of Miranshah, they said.
This should be obvious to pretty everyone by now, but apparently the Wall Street Journal didn't get the message. Today, the paper published an editorial by Cheney and his daughter Liz in which the former Vice President blasts the "collapsing Obama doctrine" of foreign policy."
According to a recent report by the U.N. 356 people have been killed in the conflict in eastern Ukraine. Of these 257 were civilians, 86 were Ukrainian military. If these numbers are accurate it would mean that only 13 separatists have been killed so far (I find that hard to believe). The real death toll is likely higher than this.
TV coverage of the current Iraq crisis looks a lot like 2003, when pro-war pundits, former generals and hawkish politicians dominated the debate. CNN's Situation Room, hosted by Wolf Blitzer, illustrates how TV has returned to that narrow, pro-government discussion of Iraq.
The Bertrand Russell Society held its 41st annual conference at the University of Windsor in Windsor, Ontario on June 13-15, 2014. Dozens of academics, students, and Russell admirers from five countries and eight US states attended the conference, which featured presentations on various aspects of Russell’s diverse interests and works, including his work in logic and philosophy, and his political writing and activism. Bertrand Russell was one of the twentieth century’s most important and influential philosophers and public intellectuals. He was awarded the Nobel Prize for Literature in 1950, and he was a founder and early leader of the nuclear disarmament movement.
President Barack Obama announced on Thursday that he will send 300 Green Beret Army special operations soldiers to Iraq. They will be detailed to Iraqi National Army Headquarters and brigade HQs and their primary task will apparently be intelligence-gathering and helping with the Iraqi National Army response to the advances of the Islamic State of Iraq and Syria (ISIS or ISIL). Likely the intelligence-gathering in turn is intended to allow the deployment in Iraq of American drones. At the moment, the US has no good intelligence on the basis of which to fly the drones.
Obama has ruled out returning combat troops to Iraq in order to quell the insurgency. However, he has notified Congress that up to 275 armed U.S. forces are being positioned in and around Iraq to provide support and security for U.S. interests.
As the latest reporting from both Baghdad and Washington, D.C. reveal diplomatic machinations paving the way for possible U.S. airstrikes in Iraq, increasing numbers of people are asking President Obama—and the American people—to look at the repeated and failed policy of military intervention in the region as the best argument against making the same mistake yet again.
Critics claim these drone strikes have killed thousands of innocent civilians, including children.
More than 400 large US military drones have crashed in major accidents around the world since 2001, a record of calamity that exposes the potential dangers of throwing open American skies to drone traffic, according to a year-long Washington Post investigation.
The unmanned military planes have slammed into homes, farms, runways and a transport plane in midair.
Commercial drone flights are set to become a widespread reality in the United States, starting next year, under a 2012 law passed by Congress. Drone flights by law enforcement agencies and the military, which occur on a limited basis, are projected to surge.
Wikileaks founder Julian Assange was not subjected to torture whilst detailed in a UK prison but was still the target of aggressive surveillance, the whistleblowing organisation’s official spokesman, Kristinn Hrafnsson, has told RIA Novosti.
There is some confusion as to precisely what this money is being spent on. Four teams of eight police officers, plus logistics, waiting to arrest Assange around-the-clock for two years should not cost more than €£3,234,176 - which leaves €£3,115,824 unaccounted for. That the Met has refused to release a “break down” of the policing costs “on national security grounds” adds to concerns that this money is being used to surveil the embassy.
Embattled WikiLeaks publisher Julian Assange announced Wednesday from London the publication of a secret draft text of the Trade in Services Agreement (TISA), a controversial global trade agreement said to make it easier for corporations to make profits and operate with impunity across borders.
The whistleblower and transparency website WikiLeaks published on Thursday the secret draft text of the Trade in Services Agreement (TISA) Financial Services Annex, a controversial global trade agreement promoted by the United States and European Union that covers 50 countries and is opposed by global trade unions and anti-globalization activists.
A study of abandoned oil and gas wells in Pennsylvania finds that the hundreds of thousands of such wells in the state may be leaking methane, suggesting that abandoned wells across the country could be a bigger source of climate changing greenhouse gases than previously thought.
Ed Miliband will set out Labour's first plans for cuts to the welfare system, ending out-of-work benefits for roughly 100,000 18-to-21-year-olds and replacing them with a less costly means-tested payment dependent on training.
The number of British households falling below minimum living standards has more than doubled in the past 30 years, despite the size of the economy increasing twofold, a study on poverty and deprivation in the UK claims .
According to the study, 33% of households endure below-par living standards – defined as going without three or more "basic necessities of life", such as being able to adequately feed and clothe themselves and their children, and to heat and insure their homes. In the early 1980s, the comparable figure was 14%.
While the Trade in Services Agreement Financial Services Annex document leaked overnight doesn’t quite justify some of the headlines it has attracted, there is plenty in the draft that is deeply concerning.
The text of a 19-page, international trade agreement being drafted in secret was published by WikiLeaks on Thursday as the transparency group’s editor commemorated his two-year anniversary confined to the Ecuadorian Embassy in London.
Mehdiganj plant at centre of protests accused of extracting too much groundwater and releasing pollutants above limits
Khan strayed from most media coverage around New York's "biggest gang raid ever" by writing about the people living in the housing projects at the heart of the early-morning 400+ officer raid (complete with helicopters and riot gear), and by including voices of residents critical of it. The initial New York Times story (6/4/14) included only official accounts. The Rupert Murdoch-owned New York Post (6/4/14) printed Facebook quotes of some of the teenagers indicted (an apparent attempt to prove their guilt in the court of public opinion–a guilt assumed by the headline's flat assertion about "Rival Gangs Arrested"), as well as quotes from the Manhattan district attorney and residents offering comments supportive of the end to alleged violence–if not the raid itself.
[...]
It's of course this type of media objectivity that allows for authorities to dominate public discourse through the virtual invisibility of criticism. Their heightened voice, made possible by the media's willingness to become echo chambers for them, point to a relationship where the line between media and the state is blurred.
Every time a government attempts to censor the Internet and block access to websites, advocates of Web freedom ritually respond that the effort is useless: Technology will beat police action every time. It's true -- but only to the extent that people are interested in resisting. Most aren't, which is why governments have not stopped messing with site blockages and other Web restrictions.
A few days ago, Iraq blocked the social networks, as beleaguered governments sometimes do, believing it would cut off activists from each other and stop them from organizing. Immediately, traffic to Tor, the anonymous network supported by volunteers throughout the world, rocketed...
The Star has obtained documents related to the Conservatives’ controversial Internet surveillance bill that have been heavily censored — even blocking out the “Canada” in “Government of Canada.”
Yet they don't seem to think about what they lose when Facebook hands that personal data over to the NSA, or to any other security or intelligence authorities, such as GCHQ in the UK.
Any EU-level judgement on a case filed against Facebook for its alleged involvement in helping the Americans snoop on millions of people is likely to take over a year.
Facebook currently limits the number of your “friends” who can see your posts to about 7 or 8%. What? You thought that “friends” list was yours? It's not. It's theirs. And think about it, if you had a thousand friends, and 25 of them, that's 2.5% posted 3 or 4 times a day, another 25 posted once a day, and a hundred posted once a week, that would be at least 150 daily posts for you to comb through, leaving little room for Facebook to insert ads and promoted content which customers have paid for into your news feed.
The German Government has reportedly tightened the rules for awarding sensitive public IT contracts, following whistleblower Edward Snowden’s revelations regarding the US National Security Agency’s (“NSA”) mass surveillance activities.
One year ago, Europeans were livid when Edward Snowden revealed NSA mass surveillance of European citizens. Now that new documents show most EU countries are in cahoots with the NSA, the public remains mostly mum.
Denmark's Defence Intelligence Service (DDIS) is intercepting data sent through fibre cables from Norway, according to newly published documents leaked from the US's National Security Agency (NSA)
Another set of leaked NSA documents has been posted in a team effort by The Intercept and Danish newspaper Dagbladet. This one deals with the NSA's RAMPART-A program, a surveillance effort that depends on the cooperation of involved countries to be successful. As the NSA has always made an effort to point out, its interception of foreign communications is both completely legal and the sort of thing people would expect a national security agency to be doing.
The UK needs to grant Germany access to RAF Croughton military base which reportedly hosts a joint CIA/NSA unit, a Labor MP told British PM David Cameron, urging him to help the German federal investigation of the phone tapping of Angela Merkel.
Paglen’s latest work, a site-specific piece for the London Underground stop, is a huge photographic panorama that depicts the area surrounding Menwith Hill, an RAF base used by the NSA. At first glance, the landscape is idyllic and unmistakably British, with luscious green fields and a smattering of stone cottages. But lurking on the horizon are a series of white bubbles; a rare but tell-tale physical sign of the secretive surveillance conducted by the security agency.
The British government is reportedly intercepting communications from social networks, emails and text messages even when there is no suspicion of wrongdoing. According to a report from Privacy International, British spy agencies have been monitoring the Facebook and Twitter activity of every Internet user in the country. Authorities are also said to be collecting data on people’s web searches and emails.
So why doesn’t the NSA start watching Wall Street’s agents of financial terror? Why don’t its snoops look into every nook and cranny of our economy where investment bankers, hedge fund managers, private equity kingpins, and derivative wheeler-dealers are trading inside information and rigging markets, milking mergers and nuking jobs, all the while stuffing multiple millions (or billions) in their pockets?
In what’s being billed as a momentum boost for anti-surveillance advocates, the US House of Representative on Thursday approved an amendment that significantly reigns in warrantless searches on Americans’ communication records.
According to these documents, India is an “Approved SIGINT partner” with the NSA. SIGINT is a common term used in intelligence circles that stands for signals Intelligence, and refers to capturing of communication between two people. Decrypting of messages, traffic analysis etc are also part of SIGINT. The agency then taps these SIGINT partnerships for creating two major programs called RAMPART-A and WINDSTOP for collecting data in transit between the source and the servers, as opposed to collecting data from each Internet company (Google, Microsoft, Yahoo) separately. Considering WINDSTOP only partners with second parties, primarily the UK, to access communications into and out of Europe and Middle East, third-party partner like India should fall under RAMPART-A.
Whether you consider Edward Snowden a traitor or a patriot, before he hit the news most people didn't give much thought to government spying on everyday citizens. During a recent interview, he said that the NSA has the ability to spy on your smartphone, even if it's turned off.
Keep in mind what the NSA is up to. This goes well beyond a sniffer program scanning Karachi-bound text messages for “Death to the Great Satan! Allahu Akbar!” The NSA has been intercepting laptop computers being shipped to customers in order to install software bugs in them, redirecting Web traffic to install malware on computers, installing agents in video games, and generally behaving like an implausible villain in a Robert Ludlum novel. It is using the flimsiest rationales to extend its surveillance to domestic targets. The toothless USA Freedom Bill passed by the House last month was intended to curtail some of this, but would have relatively little practical effect even if it were to become law, its enforcement protocols being remarkably loosey-goosey. The bipartisan amendment put forth by Kentucky’s Thomas Massie (R.) and California’s Zoe Lofgren (D.) passed 293 to 123, and would impose funding restrictions as well as implement a specific ban on any agency effort “to mandate or request that a person redesign its product or service to facilitate” surveillance.
A new release of Snowden's leaked NSA docs detail RAMPART-A, through which the NSA gives foreign governments the ability to conduct mass surveillance against their own populations in exchange for NSA access to their communications. RAMPART-A, is spread across 13 sites, accesses three terabytes/second from 70 cables and networks. It cost US taxpayers $170M between 2011 and 2013, allocated through the NSA's "black budget."
Several new Snowden-leaked documents show how closely Germany's intelligence agencies work with the NSA. But did the German government deliberately soften laws protecting privacy to make life easier for them?
Documents published earlier this week by German magazine Der Spiegel reveal that one of the National Security Agency’s surveillance programs in Germany was named “WILDCHOCOBO.”
Germany’s lead federal prosecutor has opened a criminal probe into espionage operations by the National Security Agency (NSA) of the nation’s leadership; especially the allegation of NSA’s spying against German Chancellor Angela Merkel.
The House on Friday passed a defense spending bill with an amendment that would bar the National Security Agency from conducting warrantless searches of its databases for Americans’ communications records.
U.S. intelligence officials disclosed late Friday that the Obama administration has received approval from a special federal court to continue the National Security Agency’s collection of telephone metadata for another three months.
In an unusual show of bipartisan unity, the U.S. House of Representatives passed a funding bill Friday with an amendment, co-sponsored by San Jose Democrat Zoe Lofgren, that would limit the surveillance powers of the National Security Agency.
The United States has made top-secret deals with more than 30 third-party countries so that the National Security Agency can tap into fiber optic cables carrying internet data in those parts of the world, new leaks reveal.
Over the past year, the United States government has been in the news a lot for its efforts to undermine the Internet’s basic privacy and security protocols.
There were the Edward Snowden revelations about the National Security Agency sweeping up metadata, paying contractors to embed backdoors into their security technologies, hacking various private accounts of network administrators and developing malware to infect computers.
Rousseff summed it all up rather succinctly in a blunt speech at the United Nations last September, denouncing "a situation of grave violation of human rights and of civil liberties; of invasion and capture of confidential information concerning corporate activities, and especially of disrespect to national sovereignty."
Canadians were largely unmoved by the Edward Snowden leaks and the disclosure of mass surveillance programs like PRISM, with few showing any serious worries about domestic government surveillance in a poll by Abacus Data in June 2013. But now a new poll by Forum Research suggests Canadians are growing suspicious of the latest Conservative cyberbullying bill C-13, with most rejecting a piece of legislation many think is more about beefing up government surveillance powers than protecting teens from bullies.
ACLU uncovers e-mails regarding Stingray devices borrowed from US Marshals Service.
Scott Ainslie at MuckRock has pried loose a few more Stingray documents with a FOIA request. What was requested were contractual documents, which seem to be something law enforcement agencies feel more comfortable with releasing. Anything pertaining to the actual use of Stingray devices still remains heavily shrouded, thanks in no small part to the intercession of the federal government.
The Wilmington Police Department has surveillance equipment called Stingray. It turns your phone into a tracking device, giving law enforcement crucial information on where you are. But it might violate your rights.
Journalist Glenn Greenwald defended the value of digital privacy and slammed those who dismiss its importance during a stop on his national book tour Thursday.
“We all need places where we can go to explore without the judgmental eyes of other people being cast upon us," he said. "Only in a realm where we’re not being watched can we really test the limits of who we want to be. It’s really in the private realm where dissent, creativity and personal exploration lie.”
He said that people who downplay the importance of privacy typically say, "I have nothing to hide." But, he added, those people aren't willing to publish their social media and email passwords.
Even when the government conducts secret activities, those ventures have to be funded, and a vote in the U.S. House of Representatives last night took a swipe at the NSA’s domestic spying practices by cutting some of its funding.
On March 14, 2013, an SSO weekly briefing included a note regarding such a discovery. The unit had been informed two days earlier that "the access point for WHARPDRIVE was discovered by commercial consortium personnel. Witting partner personnel have removed the evidence and a plausible cover story was provided. All collection has ceased."
According to Der Spiegel, Wharpdrive was a fiber-optic cable tap (underseas fiber is often laid by consortia of companies, so it's possible this took place at an onshore landing point for such a cable). Employees from one of the companies involved—though not the company that had a relationship with NSA and the German intelligence agency BND—apparently noticed some unusual gear and commented on it. In response, the company involved with the NSA ("witting partner personnel") removed the tap and made up a story to explain what the gear in question had been doing.
In Edward Snowden's archive on NSA spying activities around the world, there are numerous documents pertaining to the agency's operations in Germany and its cooperation with German agencies. SPIEGEL is publishing 53 of them, available as PDF files.
During the Cold War, West Germany's foreign intelligence service cooperated closely with the NSA. Klaus Eichner, an agent with the East German Stasi, monitored it at the time, and now he tells SPIEGEL what he knew about the collaboration.
European Union countries need stricter controls to protect citizens from spying, a top data protection official said on Thursday, a warning that may rekindle a debate about snooping before an EU summit next week.
After a somewhat desultory year of little to no change, reform of the United States surveillance state appears to have finally found momentum.
Recently the USA FREEDOM Act was gutted and rammed through the House, and two funding amendments that would have cut monies for forced backdoors and certain government searches failed.
Last night, however, the House passed a single amendment to the military funding bill that did what the two failed amendments had attempted. At once, a large House majority had taken an unambiguous stand against certain parts of the government’s surveillance activities.
An overwhelming House vote to cut funds for back doors into your private life sets up a summer surveillance fight: will the Senate stand up before the White House shuts it down?
We've already written about the surprising, but encouraging, vote late last night to defund backdoor searches by the NSA. But it's worth looking at some of the floor debate on the amendment last night -- in particular the push against the amendment from Reps. Goodlatte and Ruppersberger, who both appear to flat out admit that the NSA does warrantless spying on Americans' communications, in direct contrast to earlier claims. The reasons for these two to argue against the amendment are clear. Goodlatte was the guy who negotiated the "deal" with the White House and the House Intelligence Committee to completely water down the USA Freedom Act, and he knows that this amendment puts some of the substance that he stripped out right back in. Ruppersberger, of course, represents the district where the NSA is headquartered, and is the ranking member for the House Intelligence Committee. His loyalty to the NSA over the American public has always been clear. But to have them basically admit that the NSA does warrantless spying on Americans is quite impressive.
A bipartisan coalition of 38 civil liberties and public interest organizations, including the Electronic Frontier Foundation, sent a letter to Congress yesterday that draws a line in the sand on NSA reform. The coalition made it clear that it cannot support the watered-down version of the USA FREEDOM Act passed in the House of Representatives without significant changes to the legislation, and outlined clear steps that Congress can take to address problems with the bill.
The House voted 293 to 123 late Thursday to approve amendments to a Defense appropriations bill (HR 4670) that would defund warrantless seraches of NSA-collected communications and prevent the NSA and CIA from requiring products have "back doors" that allow them to more easily conduct searches.
Roughly three days ago, an Indiegogo surfaced promising "to protect people around the world from the mass surveillance that is currently being perpetrated by governments and corporations around the world." More than $116,000 has already been raised, and that's without the viral guidance of media attention.
Anyone that has to regularly pay for food, water, gas, electricity or anything else knows that inflation is too high. In fact, if inflation was calculated the same way that it was back in 1980, the inflation rate would be close to 10 percent right now.
Within the next week, the U.S. Supreme Court is scheduled to decide on a pair of cases that will have major implications for the over 91 percent of Americans who carry a cellphone. At issue is the question of whether police officers are legally allowed to search through the contents of someone’s phone—that is to say, much of a person's private life—without first obtaining a warrant.
Amongst the new trove of classified documents released by Der Speigel is a rather academic discussion, in the NSA's own foreign affairs journal, about the differences between American signals intelligence collection and German signals intelligence collection.
One passage in particular stands out, as it highlights how the Germans give far more weight to privacy than the NSA does.
A poll suggests intelligence agencies could benefit from some controlled leaks.
Former federal government contract worker Edward Snowden's disclosures of virtually limitless surveillance of American citizens by the National Security Agency corroborated the late Supreme Court Justice Louis Brandeis' wisdom that sunshine is said to be the best of disinfectants.
Is the liberty movement more dangerous than al-Qaida? CNN national security analyst Peter Bergen thinks so.
Mustafa Aslan died on Friday afternoon after being shot in the head by an Israeli soldier at Qalandiya refugee camp near Ramallah a few hours previously. He was 22-years-old.
Mustafa is the third Palestinian victim of the Israeli authorities’ ‘search’ for three teenagers – two Israeli and one US-Israeli – who went missing on 12 June after leaving the illegal Israeli settlement bloc of Gush Etzion near Hebron.
Let's say it all together now: The United States has a problem with guns.
Since the horrifying Sandy Hook tragedy of 2012, there have been 74 school shootings and 17,042 gun deaths.
To the frustration of many Americans, a stalled debate stands in the way of solving our gun violence problem, even though the solution is staring us in the face. The Onion captured this feeling perfectly with one of its headlines last month: "'No Way to Prevent This,' Says Only Nation Where This Regularly Happens."
In a case over retaliation against a public employee who was fired after testifying about corruption, the Supreme Court says the man gave testimony as a concerned citizen and should not have been punished. The decision was unanimous, overturning lower courts.
TECHNOLOGY saves stress. Except when it adds stress. Supermarket self-checkout machines may look inviting enough, but were, in fact, inspired by medieval devices of torture.
The issue of whether it is legal or illegal to fly radio-controlled and unmanned aircraft in South Africa is a complex one involving three different organisations.
As things stand today, the South African Civil Aviation Authority (SACAA) has no regulations to govern what it calls Unmanned Aircraft Systems (UAS’s), which means it is illegal to fly unmanned drones in South Africa.
This past Memorial Day weekend, New Yorkers who happened to look up may have seen the words EXISTENCE OR NONEXISTENCE appear across the skyline in synchronized bursts of white smoke.
The seemingly spontaneous event was a project of mine called Severe Clear. It was inspired by a letter the CIA sent the ACLU rejecting their Freedom of Information Act request for documents relating to the U.S. government’s classified drone program. The letter reiterates the now familiar Glomar response, stating that the agency can “neither confirm nor deny the existence or nonexistence” of records responsive to the request.
The CIA secretly developed a "demonic" Osama bin Laden action figure to scare Pakistani and Afghan children and undermine public support for the al-Qaida figurehead, it has emerged.
What the journalists’ body asked for from other newspapers was a form of censorship: self-censorship. George Orwell has written about the damages of self-censorship in any democratic society. The first priority of journalists is to unearth the truth and if they start exercising self censorship than truth is going to be the first casualty.
At a conference in New York in March, Risen said the Obama administration has shown itself to be “the greatest enemy of press freedom that we have encountered in at least a generation”. By then his case had reached the Supreme Court, where the Justices declined to intervene.
The letter was sent to Sens. Harry Reid, D-Nev., and Mitch McConnell, R-Ky., a few days after the Supreme Court refused to hear the appeal of James Risen, a New York Times reporter who has been contesting a subpoena requiring him to testify at the upcoming trial of a former CIA agent.
The agent, Jeffrey Sterling, is accused of revealing classified information about a failed CIA plan to compromise Iran’s nuclear program, an operation described in a book by Risen.
In the meantime, Senator Feinstein, Chair of the SSCI, has stated that the Director of National Intelligence has assured her that the declassification of the SSCI’s executive summary and findings and conclusions will be completed by early next month, ideally before July 4. If this is still the case, it is not necessarily inconsistent with the CIA’s status reports filed today. Presumably the Executive branch will be finished with its declassification review of the SSCI’s documents before it turns to the two ancillary documents (the CIA response and the Panetta Report), and will then deliver the declassified versions of the executive summary and findings and conclusions to the SSCI, which could decide to publish them before August 29. The period between early July and August 29 would also give the SSCI and the Executive branch eight weeks or so to negotiate over any possible disagreements about the scope of the declassification.
In the 1950s, the CIA produced a pornographic film starring an actor made up to resemble Indonesian President Sukarno. The idea was to discredit Sukarno in the eyes of his countrymen, according to the 1976 memoir of a CIA officer, Joseph Burkholder Smith, as the Indonesian leader was viewed as insufficiently pro-West at the time.
There’s been a lot of talk coming out of Washington, D.C. lately about the need for “regime change” in Iraq – which is particularly ironic when you consider the current regime was hand-picked by the Central Intelligence Agency (CIA) during an American military invasion that cost trillions of dollars and thousands of lives.
Biden’s visit, though, only serves to highlight the historical role the U.S. has played in prompting some of the problems seen today in Guatemala. In 1954, the C.I.A. helped organize a coup to oust a popular leader and install a right-wing dictator who plunged the country into a 36-year civil war. Effects of the war, which Amnesty International and many other groups label a genocide of the Mayan people, are still felt today and contribute greatly to Guatemala’s current problems.
We live in an age now where the Western media has been virtually subsumed by banking and military interests. If “our side’s” dirty deeds are kept out of the news, and the latest “bogeyman” kept in, then today’s war profiteers can get away with whatever they want. “Defensive” NATO with its proxy armies and “deniable” private military contractors sponsoring butchery across the globe has become a Napoleon with nukes, bringing the day ever closer when these wonder-weapons might again be used in anger.
The controversial program called Project Camelot had been operational nearly a decade into the Vietnam war, as the Special Operations Research Office (SORO) located at American University had received millions in funding from the US Army to conduct a six country study on civil unrest. The current social science program directed by Minerva and the Department of Defense (DoD), appears to have also partnered with some of the most well-known universities in the United States by studying the behavior of peaceful activism and how political ideology shapes protest movements in the world at large.
And now a former CIA operative may get a day in court to add to that peculiar lore. On Friday a federal trial judge in Washington, D.C. could rule on a discovery motion by “Peter B.,” a former CIA officer who contends that the spy agency fired him without due process and then badmouthed him, scuttling his chances for a job with a CIA contractor.
Jake Newsome was jailed last week for posting offensive comments online. His is the latest in a string of cases that have led to prison terms, raising concern that free speech may be under threat from over-zealous prosecutors
The Senate Intelligence Committee is moving forward with its Cybersecurity Information Protection Act—a problematic, potentially civil liberties-killing piece of legislation that looks just like the CISPA bill the internet fought so hard to kill last year—and the year before that.
CIPA, written by Senate Intelligence Chair Dianne Feinstein (D-Calif.) and Sen. Saxby Chambliss (R-Ga.) will be considered by the committee next week, according to Feinstein.
Half the major publishers in Germany have started a process of arbitration — which, no doubt, will lead to suits — to demand that Google pay them for quoting from and thus linking to their content. And now we know how much they think they deserve: 11% of Google’s revenue related to their snippets. From their government filing, they want a cut of “gross sales, including foreign sales” that come “directly and indirectly from making excerpts from online newspapers and magazines public.” [All these links are in German.]
As you may have heard, there's been some hubbub this week about claims that YouTube is going to remove some videos from indie musicians/labels who don't agree to the contract terms for YouTube's upcoming music subscription service. Ellen Huet, over at Forbes, has a good article explaining how this isn't as dire as some are making it out to be, but the more I'm digging into it, it seems even less than that. There's no doubt that this is a royalty dispute, with some indie labels upset about the basic terms that Google is offering, but, if you haven't noticed, the complaints seem to be coming from the same folks who complain about the royalty rates of every single online music service. There are some people who will just never be satisfied. Furthermore, the deeper you dig into this, it becomes quite clear that any artist who wants to have their videos on YouTube can continue to do that.