Tomorrow is St. Valentine's Day and a lot of Open Source is feeling mushy. The Free Software Foundation began a campaign to show all the hard-working developers, managers, and support staff appreciate and has dubbed February 14 I love Free Software Day. openSUSE and the Document Foundation are in the act as well. Elsewhere, the Mageia project has announced their Valentine's gift - Mageia 5 Beta 3.
Google is planning to push 2-in-1 devices in 2015, according Digitimes Research's inquiries within the upstream supply chain. Google's 2-in-1 Chromebook designed by Quanta Computer is expected to be completed by the end of the first quarter.
So I think it a good idea for Linux gamers and gamers in general to try to be patient while Valve does its work. The worst thing that could happen is for Valve to prematurely release SteamOS or the Steam Machines before they are ready for prime time. A buggy, slow version of SteamOS would cause many gamers to think twice about using it. And a badly designed controller or other hardware screw up would also damage the entire SteamOS platform.
Cutegram is one of those new apps that you fall in love with them instantly, especially if they provide overwhelming features. It is a Telegram client for GNU/Linux, Windows, and Mac OS X systems, written in Qt5/QML and designed to blend perfectly into the KDE Plasma graphical desktop environment and dubbed by its developers “Best Telegram Client Ever.”
... is the new hype these days. Everyone seems to want to be part of it; even Microsoft wants to allow Docker to run on its platform. How they visualise that is slightly beyond me, seen as how Docker is mostly a case of "run a bunch of LXC instances", which by their definition can't happen on Windows. Presumably they'll just run a lot more VMs, then, which is a possible workaround.
Nearly one year after the release of PulseAudio 5.0, the release of PulseAudio 6.0 is finally here with many changes.
F2FS remains a very promising open-source file-system for targeting flash-based storage on Linux, though for Linux 3.20 the changes aren't too exciting.
Back in 2013 Torvalds talked of renaming Linux 3.20 to Linux 4.0 when the time came, but as talked about in several articles since then, there hasn't been much communication whether the in-development Linux 3.20 will be re-branded as Linux 4.0. Like with the move from Linux 2.6.x to Linux 3.0, Torvalds wanted to move to v4.0 simply since the minor point release numbers were getting high.
Paolo Bonzini has sent in the KVM pull request for the Linux 3.20 kernel and it includes some interesting changes and features for this important piece of the open-source Linux virtualization stack.
Beyond the big set of AMD Radeon changes for Linux 3.20, Alex Deucher of AMD mailed in some important Radeon DRM driver fixes today that are a big deal for some R9 290 "Hawaii" users of the open-source driver.
While we're only in the middle of the Linux 3.20 kernel, for what might still be called Linux 4.0, Intel already has updated DRM driver code for testing that will not be merged until Linux 3.21 (or what might also be known as Linux 4.1).
While Intel's official Mesa DRI driver has supported "Gen8" Broadwell graphics for many months, today the support for these latest-generation HD/Iris Graphics processors landed within the unofficial ILO Gallium3D driver.
While the X.Org Foundation is voting on joining SPI and the SPI already represents a range of open-source projects from PostgreSQL to Debian, this organization is being criticized this week over how they negatively interacted with the Elementary OS project.
Wayland 1.7.0 along with the reference Weston 1.7 compositor were released in the early hours of the morning as a great Valentine's Day gift to open-source users wishing to run the next-generation Linux display stack. The Wayland/Weston 1.7 release continues polishing up the stack as an alternative to the security-ridden X.Org Server.
It's been almost two and a half years since the last official release to the open-source OpenShot video editing software. OpenShot 2.0 has been talked about for much of this time but this major update to the once very promising non-linear video editor has yet to materialize.
Jonathan Thomas posted an update on OpenShot and the new features its gained recently in the lead-up to OpenShot 2.0. Among the progress shared in the "OpenShot Valentines Weekend Update" is read/write animated GIF support, major video playback improvements, cross-platform improvements, a new icon and branding, and libOpenShot 0.0.4 has been released. Jonathan has also made good progress on the Qt user-interface to OpenShot.
Frederik Gladhorn created the QtTextToSpeech module a while ago as a test to see how feasible it would be to wrap all the platforms Qt is supported on's TTS APIs in one easy to use Qt API. This turned out to be a great idea in my opinion. The predecessor to QtSpeech in KDE applications was Jovie, formerly known as kttsd. While it worked for the most part it required a daemon to be running which spoke with different synthesizers (originally) then was modified to use speech-dispatcher directly instead (when it was renamed to Jovie). QtSpeech on the other hand is a library. If you want to use it, you link to it in your application, create a QTextToSpeech object, and pass any text to speak to it's "say" method. No D-Bus connection required, no daemon required, just a small, light library that wraps the native platform TTS API directly.
Tonido is a cross platform, free application that allows you to access all files on your computer from a web browser, smartphone, tablet or even DLNA enabled devices. You can access your files from anywhere, and ofcourse you can share them to your friends, family, and colleagues as well. Additionally, you can create a secure private share that only authorized people are allowed to access them. As you’re the only person to access or share your files to others, you have a private and secure Cloud on your hand.
Alright, so Colossal Order thinks they can mend our broken city builder hearts with Cities: Skylines next month, March 10th. What demands are they going to make of our Mayoral PCs to achieve this?
Artifex Mundi has had a strong presence on Steam for Linux since they got through Steam Greenlight last year. Last month they published their 14th game on the digital store, and as usual it was a same-day release for Linux on Steam.
I know some of you are wanting this badly, so the good news is that Age Of Wonders III will be officially released on Linux in beta form soon.
The developers working on the Linux versions of Metro Last Light Redux and Metro 2033 Redux have released a long-awaited new patch release.
Linux gamers still seem to be unable to play co-up, the motion blur when running is still there when turned off (not as bad as it was), and performance is still utterly abysmal. I have relayed my feedback to Techland as usual in the hopes they fix it up.
The Parsix GNU/Linux Project proudly announced a few minutes ago, February 14, that the first maintenance release of the Parsix GNU/Linux 7.0 (codename Nestor) computer operating system based on the Debian 7 Wheezy distribution has been officially released and is now available for download from its website or as an upgrade to existing Parsix GNU/Linux 7.0 users.
Parsix GNU/Linux 7.0 (code name Nestor) brings the latest stable GNOME desktop environment, a brand new kernel built using or modernized kernel build system, updated installer and support for UEFI based systems. This version has been synchronized with Debian Wheezy repositories as of February 6, 2015. Parsix Nestor ships with GNOME 3.12 and LibreOffice productivity suit by default. Highlights: GNOME Shell 3.12.2, X.Org 1.14.7, GRUB 2, GNU Iceweasel (Firefox) 35.0.1, GParted 0.12.1, Empathy 3.12.7, LibreOffice 3.5.4, VirtualBox 4.3.18 and a brand new kernel based on Linux 3.14.32 with TuxOnIce 3.3, BFS and other extra patches. Live DVD has been compressed using SquashFS and XZ.
We’re proud to announce the release of Rebellin Linux v2.5! Plenty of great news from the Rebellin Project!
Arne Exton, the creator of numerous distributions of GNU/Linux, including the untroublesome and fast Exton|OS, had the pleasure of informing us today, February 14, about a new build for its MeX Linux computer operating system based on Ubuntu 14.10 (Utopic Unicorn), Debian 8 Jessie, and Linux Mint 17.1 (Rebecca).
The third Beta of the forthcoming Mageia 5 Linux kernel-based operating system has been officially announced via Mageia’s blog on February 13, as a gift for Valentine’s Day “The release date was a close call between Friday, the 13th and Valentine’s day… but finally, Mageia 5 beta 3 is available for tests.”
The release date was a close call between Friday, the 13th and Valentine’s day… but finally, Mageia 5 beta 3 is available for tests. You will find more information about it on the Release Notes page.
The third beta to the much delayed Mageia 5 is now available for some Valentine's weekend testing.
There's a new trend called "devops" that is sweeping the enterprise IT world and its become a life-or-death career situation for many IT departments.
At the DevConf.cz conference last weekend, I was given the okay to let it slip that Remy DeCausemaker will be joining Red Hat to work full-time on Fedora Community Action and Impact. Remy has been around Fedora a long time, and from his previous position at the Rochester Institute of Technology, was instrumental in launching the first minor in Free and Open Source Software. Remy will join the Fedora Council and lead initiatives for even greater Fedora community success and growth.
DevConf.cz 2015 took place last week in Brno, Czech Republic as the annual Red Hat / Fedora focused open-source Linux event. For those interested, the videos of the sessions are up online.
The sale of the first ever Ubuntu phone through a European flash sale was evidently a success. Of course, we wouldn’t know as the phone isn’t available yet to those of us who live on this side of the pond, so it hasn’t been getting much press over here. However, EU sites are all atwitter with headlines like “Ubuntu Sells Out!”
Version 0.11 of the Mir Display Server was released this week for Ubuntu.
A recent post on the elementary blog about how they ask for payment on download created a bit of a stir this week. One particular sentence struck a nerve (it has since been removed from the post): “We want users to understand that they’re pretty much cheating the system when they choose not to pay for software.”
No, they aren’t. I understand that people want to get paid for their work. It’s only natural. Especially when you’d really like that work to be what puts food on the table and not something you do after you work a full week for someone else. I certainly don’t begrudge developers asking for money. I don’t even begrudge requiring payment before being able to download the software. The developers are absolutely right when they say “elementary is under no obligation to release our compiled operating system for free download.”
Taking a look back at the week’s news across the Android world, this week’s Android Circuit highlights a number of stories including all of Samsung’s leaks around the Galaxy S6 and the S6 Edge, the Sony Xperia Z4, phablets fight it out, Android’s crash rate beating iOS, Microsoft and Samsung team up, who’s using Android Wear, the dates for I/O 2015, and OnePlus loves Tuesdays.
Android Circuit is here to remind you of a few of the many things that have happened around Android over the last seven days (and you can read the weekly Apple news digest here).
Yesterday, I linked to a page on Amazon that offered $140 of free Android apps for a limited time. But I goofed because there's also another page that includes an ongoing list of the one hundred top free Android apps in Amazon's store, and I forgot to include it. The list includes free games as well as free apps, and it's updated hourly.
Paul Ford, once again, has written up something fascinating. He discusses something I had no idea happened: when an iPhone user texts with another iPhone user using iMessage, the outgoing texts appear in calm blue bubbles. When an iPhone user texts with a non-iPhone user (or an iPhone user using something other than iMessage -- meaning mainly Android users, obviously), those outgoing texts are in a harsh green. Here are the two examples Paul shows, starting with the iPhone to iPhone:
Google is testing a way to make its super-cheap Android One smartphones more useful and accessible to people in emerging markets.
Google’s latest ad spot centered around their new motto — “Be Together, Not the Same” — hit the net late last night. The video doesn’t feature a slew of Canadian Androids or thousands of Android devices singing in unison. None of that. It’s rather simple, showing a variety of videos from around the net in which people are engaged in their own, unique, sometimes complex handshakes. That’s about it.
The popular Xposed Framework, which adds tons of customization options to Android, is now available as an alpha build for Android 5.0 Lollipop. Just the other day, developer rovo89 posted a teaser on XDA hinting that Xposed for Android 5.0 would be available ‘soon’. That day has finally come, so if you’re rooted and running Lollipop, get to it!
Samsung’s products include the Galaxy S4/S5, Galaxy S5 with KNOX, Galaxy Note 3, Galaxy Note 10.1 2014 Edition, Galaxy Note 10.1 2014 Edition with KNOX 2, Galaxy Note Edge with KNOX 2, Galaxy Tab S 8.4 and 10.5 LTE with KNOX 2, and the Galaxy Alpha with KNOX 2. For Samsung, Knox provides the added security features key to making the grade in the CSfC program.
However, never say never: Xiaomi revealed last year that it plans to invest $1 billion in online video content, which could eventually pave the way to target Chinese expats, or even wider audiences, outside of China as well. With that in mind, it’s worth taking a closer look at Xiaomi’s Mi TV, the company’s 47-inch smart TV, which was on display at the press event as well.
With many organizations incorporating open source code into their software, business managers should have a basic understanding of what open source is all about. After all, Gartner and Accenture report open source adoption rates nearing 100% so it’s likely that your development team is already incorporating open source code into their projects.
So, what is open source? When a developer chooses to make his or her project open source, it gives third party developers the right to tinker and innovate with it. Check out this comprehensive video for an in depth explanation.
Developers incorporate open source into their projects to accelerate development time, thus reducing costs for the organization overall. Most of the time, the code is open to the public; but it is imperative that collaborators refer to a set of chief regulations and terms involved in open source software license management and dispersal.
Google has announced the launch of PerfKit, an open source cloud benchmarking tool aimed at aiding developers evaluating performance features.
In less than a week, SCALE13x kicks off in Los Angeles! The hotel it takes place in is full so it promises to be busy - of course, there are more hotels around.
My blog post on the Oracle/Sun merger got quite a bit of attention, and a few folks from Oracle took exception to my portrayal of Sparc dying on the vine and a thin roadmap. After a few conversations, I have a better picture of things, and I was wrong.
But before Automattic, the parent company of WordPress, was on the path to being a billion-dollar company, Mullenweg was simply an eager coder with a healthy attitude for self-experimentation.
In conversation with author Tim Ferriss this week, Mullenweg elaborated on some of his productivity hacks, including his now-famous stint with the “Uberman” polyphasic sleep schedule. Polyphasic sleep simply means more than one sleep period per day; many of our friends in Spain are on a polyphasic sleep cycle with their luxurious afternoon siestas.
The OpenEMR community has released version 4.2.0. This new version will be 2014 ONC Certified as a Modular EHR.
What's big data analytics worth in monetary terms? Hitachi gave a clue this week with news that it intends to acquire business intelligence company Pentaho for a sum rumored to range between $500 million and $600 million.
We hope to continue rolling these –CURRENT images as a way for testers and developers to tryout both FreeBSD and PC-BSD bleeding edge features, often months before a planned release. These images include a full PKG repository compiled for that months image. Users of this system will also be able to “upgrade” when the next monthly image is published.
The PC-BSD camp has started spinning development images of FreeBSD/PC-BSD 11.0 in the present 11.0-CURRENT state that is still far out from being officially released.
Valentine's Day traditionally is a day to show and celebrate love. So why do not take this as a chance to show your love for Free Software this year?
Every year on 14th February, the Free Software Foundation Europe asks all Free Software users to think about the hard-working people in the Free Software community and to show them their appreciation individually on this "I love Free Software"-Day.
Today the Free Software Foundation Europe reminds us to thank and celebrate all those in Free Software we love and whose work we enjoy and built upon. In KDE, we stand on the shoulders of giants. Everything we do in some way depends on Free Software written by many other people - the huge ecosystem around us.
A picture is worth thousand words and describing love with letters is much more harder than with images. On this page we collect some examples of people from all over the world expressing their enthusiasm for freedom in both software and society with photos.
Last night I had a crazy realization: I could probably replace the majority of what my team hopes to accomplish with standup meetings, design documents, project management apps, and social code sharing features with a single tool.
Jennifer White’s painful family story is convincing hundreds of vaccine-hesitant parents around the world to rethink their actions.
On Tuesday, White wrote a Facebook post about her newborn baby’s possible exposure to measles in a Markham doctor’s office waiting room in late January. In it, she slammed anti-vaxxers and their refusal to protect their children, and hers.
Virginia could keep the suppliers of the drugs used in executions secret, as well as all the components they mix to make the drug cocktail used in lethal injections under a bill the state Senate approved Tuesday.
The internet has connected millions across the globe, rooting itself into the day-to-day activities. If something happens to it, it’s not just the end of kitty pictures - the whole world’s economy would collapse. What would the fallout be? How much harm can be done online? What does it mean to be a hacker these days? We ask professor at the University of Sussex and author of a book about hacking communities, Tim Jordan, on Sophie&Co.
President Obama says he has not yet decided whether to send arms to the Ukrainian military to fight Russian-backed rebels. Obama criticized Russia’s role in the conflict during a joint news conference at the White House with German Chancellor Angela Merkel.
The emotional weight a photojournalist endures in covering conflict can be suppressed, but it can never be understated. And the commitment to highlighting the spirit of survival in the victims of the conflict can never be overstated. For American photojournalist Heidi Levine, that emotional toll has been severely challenged over her nearly 30 years documenting the Palestinian-Israel conflict. In the past year, she has done her work while also facing the almost simultaneous passing of two family members–her grandmother and father–while on assignment nearly 8,000 miles away from home.
The news that President Obama has formally asked US Congress to authorize military force against ISIS is not surprising. What may come as a shock to Americans oblivious to these developments is that the administration has de facto declared war on Syria.
The U.N. envoy to Yemen has returned to Sanaa and resumed contacts with major political players to find a way out of a deepening crisis caused by a Shiite rebel takeover, participants in the talks said Sunday.
'The devastating and costly wars in Iraq and Afghanistan have taught us that when we give military authority to the executive, it should not be a blank check,' says Congressional Progressive Caucus
What is not silly is that we still have local employees at Embassy Sana’a. They, typically, are not evacuated when post suspends operations. In 2003, Ghulam Sakhi Ahmadzai, the building maintenance supervisor at the U.S. Embassy in Kabul was the Foreign Service National Employee of the Year. He was recognized for his exceptional efforts in Afghanistan during the 13-year absence of American employees and following the reopening of the U.S. Embassy in Kabul in December 2001. His loyalty to the U.S. government and to maintaining the integrity of the embassy during that absence, despite personal risk, could not be repaid by that one award. No doubt there are other Ghulams in Tripoli and Sana’a and in other posts where we have suspended operations in the past. Please keep them in your thoughts.
The arson attack was the third incident of Islamaphobic violence this week.
An early morning fire Friday at an Islamic center in southeast Houston left the facility's faithful wondering if what appears to be an intentionally set fire was tied to their religion.
Turkish President Tayyip Erdogan on Thursday criticized President Obama for his silence following the killings of three young Muslims in North Carolina this week, the latest sign relations between the two leaders have become strained.
Mohammad Na’us was one of the most respected men in al Bab. He was the undertaker who washed the bodies of the dead prior to burial, a pious Quranic scholar who issued the sundown call to prayer in the Syrian town near the Turkish border, and for the past year, a seller of bread in his neighborhood.
But on Dec. 28, the bakery’s delivery was late and he missed the prayers at sundown. Religious police arrested Na’us, a father of five in his 50s, and ordered him to spend one night in prison.
If American mass media seemed reluctant to cover the murder of three Muslims students at the University of North Carolina Chapel Hill as a hate crime, the same was not true in the Middle East, where strong opinions were aroused.
Turkish president Tayyip Erdogan criticized President Barack Obama and Vice President Joe Biden for not speaking out on the issue (which is under investigation by local police and the FBI).
Erdogan said, “If you stay silent when faced with an incident like this, and don’t make a statement, the world will stay silent towards you . . . As politicians, we are responsible for everything that happens in our countries and we have to show our positions.”
The good folks at NBC send over a partisan breakdown. Fifty two percent of Republicans support Obama’s authorization request, as do 51 percent of independents and 60 percent of Democrats.
A few points about this. First, Republican voters appear at odds with GOP lawmakers on this topic. The latter have been arguing that, if anything, Obama’s request is too limiting. As Marco Rubio put it so felicitously, Congress should give Obama an authorization that says nothing more than we “authorize the president to take whatever steps are necessary to defeat ISIS. Period.” But a bare majority of Republicans supports the limits in the authorization Obama proposed, such as they are.
President François Hollande of France on Thursday announced the sale of nearly $6 billion worth of military hardware to Egypt, including two dozen Rafale fighter jets and a naval frigate.
The contract represents the first foreign sale of the Rafale for its manufacturer, Dassault Aviation, which has been under intense pressure to find export customers for the warplane as France scales back its orders as part of government spending cuts.
The four-star general in charge of U.S. and international forces in Afghanistan told senators today that he has given the Pentagon different options for slowing the withdrawal of U.S. troops.
There are now roughly 13,000 international troops in Afghanistan, 9,800 of them Americans, Campbell said. President Obama’s current plan would have reduced that to 5,500 soldiers, mostly centered in Kabul, by the end of this year. Army Gen. Cambell said that the Afghan government under its new president, Ashraf Ghani, did not want the U.S. to pull back so quickly.
FBI Director James Comey repeatedly defended the police in a speech intended to address race relations after a series of high-profile killings by law enforcement officers.
Speaking at Georgetown University this morning, Comey said citizens need to have more empathy for police, that police response time is not influenced by race, and that “law enforcement is not the root cause of problems in our hardest-hit neighborhoods.”
Comey also cited and quoted from the song “Everyone’s a Little Bit Racist” from the Broadway play “Avenue Q,” adding that while everyone has a duty to try and overcome bias, “racial bias isn’t epidemic in those who join law enforcement any more than it is epidemic in academia or the arts.” And yet “after years of police work, officers often can’t help but be influenced by the cynicism they feel” and begin viewing black citizens differently.
Dr. Suzanne Barakat, sister of one of the Chapel Hill shooting victims, appeared on Morning Joe Friday morning to strongly dispute the early police theory that her brother, his wife, and sister-in-law were shot by Craig Stephens Hicks over a “parking dispute.” That all three victims were Muslim, and that Hicks had loudly proclaimed anti-religious sentiment, has led many to label the triple murder a hate crime.
Three years before 9/11, Ash Carter was already talking catastrophe.
Carter, confirmed Thursday as Obama's new Secretary of Defense, vividly predicted in 1998 a near-future terrorist attack that would have long-lasting consequences beyond the immediate loss of thousands of lives.
Mohammed Saleh Tauiman was just 13 years old in 2014 when the Guardian newspaper gave him a camera so he could record life under the drones that flew over Marib province, Yemen.
One of more than 150 religious leaders who drafted a statement opposing the use of lethal drones by the United States military said Feb. 11 it’s an issue that more Baptists should care about.
After readings from the Bible and the Qur’an the worshippers dedicated themselves to peace and shouted out "Stop the drones!" and "Drones kill". Most of the protestors were men and women training for ordained ministry in the Church of England and the Methodist Church. Bishop Edward Musonda from the Anglican Church in Zambia said: "It is a pleasure to take part in this act of Christian witness against this savage military weaponry."
A US drone strike which killed a senior al-Shabaab leader in Somalia a week ago appears to have been part of a change of tactics by the Americans since they started targeting the militant group in 2007. It was the fifth consecutive such strike against al-Shabaab’s leadership, with drones now appearing to have superseded other, manned aircraft and cruise missiles in the seven years since attacks began in Somalia.
Morality is missing in action as innocent people die in the strikes, fueling anger around the globe.
For years, the US has relied on drones to prevent Yemen from collapsing. The strategy hasn’t worked.
Sen. Rand Paul is joining three Democrats in urging a federal court to release secret documents about the government’s use of drones to kill three Americans.
Along with Sens. Ron Wyden (Ore.), Jeff Merkley (Ore.) and Martin Heinrich (N.M.), the Kentucky Republican filed a friend-of-the-court brief on Wednesday supporting a lawsuit filed by the American Civil Liberties Union (ACLU) and The New York Times.
Saying the government cites “national security” too often to shield information from scrutiny, four U.S. senators urged a federal appeals court Wednesday to divulge more about rules it follows when it makes U.S. citizens the target of anti-terror drone strikes.
While deployed, I concluded our drone strikes disproportionately kill innocent people. As a military chaplain, I preached a sermon questioning the morality of such warfare. After my commander read it, he said "the message does not support the mission" and had me investigated, officially reprimanded and released from active duty for "retraining."
No military technology is perhaps more viscerally upsetting than the idea of a machine, armed with a gun, making the decision on its own to kill people. It's a theme throughout dystopian fiction and films, and it animates protests against drones, despite the fact that military drones still have humans at the controls. Autonomy for weapons--where a gun turret or future machine will be programmed to press the trigger on its own--is a definite possibility in future wars. A new report from the Center for New American Security, a Washington D.C. think tank, wants to guide us calmly into understanding this future of armed thinking machines.
The peace movement is dead, the media are mute, and, in all likelihood, we will soon be engulfed in an electoral season in which the plain fact that Democrats and Republicans know not what they do will hardly even come up.
Well, not exactly. New James Bond novels and movies pop up all the time, but Gérard de Villiers (who died in 2013) wrote either 100 or 200 novels about an Austrian (and freelance CIA operative), named Malko Linge, that have sold millions of copies in France and made him “the most popular writer of spy thrillers in French history.” The discrepancy with the numbers (100 or 200) hardly matters, though those figures are cited in the biographical information about the writer at the beginning of the two novels discussed here: Chaos in Kabul and The Madmen of Benghazi, both originally published in France in 2013. Clearly, the guy was prolific—much more than Ian Fleming. His expertise was the Middle East, which made his stories not only current but, often, prescient.
[...]
At the beginning of Chaos in Kabul, Linge is hired to eliminate Hamid Karzai. Yes, you read that correctly. So Linge is flown into Afghanistan after responding to his CIA agent, “This mission is impossible. The Agency has everything it needs in Afghanistan. You operate a fleet of drones that can hit anything. What can you expect from one man against the Karzai machine? Besides, you know I’m not a killer.” And the answer to his response? It can’t be obvious that Americans caused Karzai’s death. So, Linge agrees, but first he’s got to find an accomplice who will do the actual killing. That guy is a South African thug, and the plan is that Karzai will be shot when he’s riding in his motorcade.
Even Judge Andrew P. Napolitano, the author of numerous books and a legal expert for Fox News, in an otherwise excellent history of the usurpation of unique American civil liberties at the expense of ever expanding executive power (see Suicide Pact: The Radical Expansion of Presidential Powers and the Lethal Threat to American Liberty) focuses too much on President Barack Obama’s killing of American citizens without due process – for example, Anwar al Alawki in Yemen in 2011. Napolitano correctly argues that an American president is essentially claiming the right to murder his own citizens without prior legal niceties, but he focuses too much on the use of exotic drone technology to do so and not enough on a larger and more important problem. If anyone – U.S. citizen or not – is attempting to attack the United States, the president should have a right to take them out, provided the Congress has authorized military action or declared war. Even then, according to the founders’ original constitutional vision, if the country is under imminent threat of attack, the president can take appropriate action and get congressional authorization at the earliest possible time. If the president doesn’t have such legislative approval or a legitimate "imminent attack" rationale, he is essentially murdering people – U.S. citizens or not.
In light of the threat posed by ISIS in Syria and Iraq, President Obama wants Congress to authorize military force against the Islamist group in the Middle East. Although the president believes a 2001 Authorization for the Use of Military Force (AUMF) gives him the legal grounds to go to war on his own, he has sent Congress a draft authorization for their approval.
If you already understand U.S. imperialism’s crimes in Iraq, that’s what you might take away from the movie, “American Sniper.” But many viewers, unaware of the truth behind the war, receive a distorted message. Directed by Clint Eastwood, the film looks at the events only through U.S. eyes. It twists the truth, falsifying historical context while adding poisonous anti-Arab bigotry.
I didn’t think much of this until hours ago when I read a banner story of the Manila Times written by its chairman emeritus Dr. Dante Ang. The burden of the piece is that in the Mamasapano raid, codenamed Operation Wolverine, the main protagonists were American agents out to get the Malaysian terrorist Marwan and the BIFF leader Abdulbasit Usman. The PNP-SAF commandos were only security escorts to the agents.
This was revealed by its commander then, now relieved Police Director Getulio Napeñas, during a hearing Monday, February 9, on the operation in Mamasapano, Maguindanao, that claimed the lives of at least 68 individuals, including 44 elite SAF troopers.
Lives: A total of 66 lives, not including Marwan’s, were lost – 44 SAF, 18 MILF and four civilians. The SAF casualties were nine of the 42 members of the 84th SAF Company dispatched to Pidsandawan to get Marwan and 35 of the 36 members of the 55th deployed in Tukanalipao – the lone survivor PO3 Robert Lalang.
Like many children, 13-year-old Mohammed Tuaiman suffered from nightmares. In his dreams, he would see flying “death machines” that turned family and friends into burning charcoal. No one could stop them, and they struck any place, at any time.
Unlike most children, Mohammed’s nightmares killed him.
Three weeks ago, a CIA drone operating over Yemen fired a missile at a car carrying the teenager, and two others. They were all incinerated. Nor was Mohammed the first in his family to be targeted: drones had already killed his father and brother.
Since president Barack Obama took office in 2009, the US has killed at least 2,464 people through drone strikes outside the country’s declared war zones. The figure is courtesy of The Bureau of Investigative Journalism, which says that at least 314 of the dead, one in seven, were civilians.
Recall that for Obama, as The New York Times reported in May 2012, “all military-age males in a strike zone” are counted “as combatants” – unless “there is explicit intelligence posthumously proving them innocent”.
It sounds like the stuff of nightmares.
Far too many politicians and legislators aren't happy with the fact that their emails are subject to public records requests. Some attempt to dodge this layer of accountability by using personal email accounts to handle official business. Oregon governor John Kitzhaber is one such politician.
Unfortunately for Kitzhaber and many others just like him, public records laws anticipate this endaround. In many states, personal email accounts are also FOIA-able if the emails discuss official (read: public) business. Kitzhaber, however, believed he could outbludgeon the system.
At the end of an hour-long panel discussion on the film Citizenfour on Thursday night that he was moderating, David Carr sat back in his chair and in his distinctive, weather-worn voice asked Edward Snowden, the NSA exile, a final question via video link. “I’ve got to channel all the moms in the audience for just a sec,” he said. “You’re in Russia. So are you getting enough to eat? Is the food good?” It was classic David Carr. Unexpected, empathetic, funny. It raised a robust laugh from the packed crowd.
On Twitter Thursday night, I tried to fight the rumor that beloved New York Times media columnist David Carr died the same evening. I’d seen him less than three hours earlier, interviewing Glenn Greenwald, Laura Poitras and Edward Snowden (via satellite) at a sold out “Times Talk.” He was sharp and funny; he seemed happy; he had a bad cough. But he could not possibly be dead.
We still haven't reached peak oil. But peak milk happened in 2004, peak soybeans in 2009, and peak chicken in 2006. Rice peaked in 1988.
A new study published in Ecology and Society explains that 21 key resources that humans rely on—mostly food—have already passed their peak rate of production.
"Peak," in this case, doesn't mean that we're actually producing fewer chickens or less milk yet. Instead, the researchers looked at the fact that the rate of production has plateaued, at the same time that population is increasing.
So it turns out that building your own regional water system is costly, time-consuming and difficult. Who knew?
Apparently not officials in Genesee, Lapeer and Sanilac counties, which unhooked from the Detroit Water and Sewerage Department to build their own system, the unpronounceable Karegnondi Water Authority, helmed by Genesee County Drain Commissioner Jeff Wright.
Since the turn of this century, the US south-west has spent more than a decade in drought. Last year was the warmest on record in California, which is in the middle of its driest spell for more than 400 years. But according to a new scientific study, that’s nothing compared to what comes next.
But Alderman got the primary surplus back to front. The definition should actually be before interest payments–the primary surplus being a measure of whether a government would be spending more than it takes in if it weren't paying back past borrowing. Could it be the Times reporter does not understand the magnitude of Greece's financial challenges?
The prosecutor leading the probe into possible coordination between Governor Scott Walker's campaign and outside groups has asked some Wisconsin Supreme Court justices to recuse themselves from hearing a challenge to the investigation.
A notation in court records titled "Motion for Recusal and Notice of Ethical Concerns" indicates that on February 12, Special Prosecutor Francis Schmitz filed a sealed motion for one or more of the Supreme Court justices to recuse themselves from the case. Schmitz was previously on George W. Bush's shortlist for U.S. Attorney and said that he voted for Walker.
Scott WalkerAlso on the show: Wisconsin Gov. Scott Walker said it was just a “drafting error” that led to his proposed budget calling for the evisceration of the central philosophy guiding the state's university system, along with $300 million in cuts. Reporters and activists showed that to be a falsehood, and Walker's proposed changes look like a revealing peak at the agenda of the man who wants to be the next president. We'll hear from a key player in that story, Mary Bottari from the Center for Media and Democracy.
Sun News Network, the right-wing Canadian news network described as "Fox News North," is shutting down.
It was the NYPD's very own "Hot Coffee" case–a sign of a supposedly hyper-litigious system spiraling out of control. A "machete-wielding mad man" attacks the cops, gets shot in the leg, and then sues the NYPD for damages.
We first spotted a version of this quote in a Bloomberg column by David Weigel, and then checked the quotes with our colleague Jose DelReal, who had attended the conference.
Hillary Clinton has everything she needs to run for president: money, name recognition, staff, organization. Everything except ideas.
The 2016 presidential campaign will begin in earnest in late summer. This hasn’t snuck up on her; she has known this was coming since at least 2008. Yet here she is, six months before the unofficial start of her run, starting to figure out what she’ll do if she wins.
François Zimeray, the French ambassador to Denmark who was also at the event, tweeted that he was "still alive."
Vilks, a 68-year-old Swedish artist, has faced several attempted attacks and death threats after he depicted the Prophet Muhammad as a dog in 2007.
The BBC could be given new powers to access to people’s private and public data as part of a raft of new measures to tackle licence-fee evasion.
An independent consultation suggested that the corporation could be given access to “new data sources” to help make collection of the charge more efficient.
It is also striking that the codes of conduct were released on the same day that the UK's secretive Investigatory Powers Tribunal ruled that British intelligence services had broken the law, but that they were now in compliance because previously unknown policies had been made public. As Nyst speculates, it could be that the UK government is releasing more details of its spying in the form of these consultation documents in an attempt to head off future losses in the courts.
Whether or not that is the case, it certainly seems that the attempts by civil liberties groups to end or at least limit mass surveillance are already having an effect on the UK government, and forcing it to provide basic details of its hitherto completely-secret activities. That success is a strong incentive to continue fighting for more proportionality and meaningful oversight here.
You might not think Canada’s digital spies are on par with those in the US and UK—but rest assured, America’s northern neighbour is just as capable of perpetuating mass surveillance on a global scale. Case in point: at over 200 locations around the world, spies from Canada's cyberintelligence agency have been monitoring huge volumes of global internet traffic travelling across the internet's core.
ââ¬â¹From these locations, Communications Security Establishment (CSE) can track who is accessing websites and files of interest. Its analysts can also log email addresses, phone numbers and even the content of unencrypted communications—and retain encrypted communication for later study, too—as well as intercept passwords and login details for later access to remote servers and websites.
ââ¬â¹But perhaps more importantly, tapping into global internet traffic is a means for CSE to monitor, and also exploit, an ever growing list of digital threats, such as vulnerabilities in networks and computers and the spread of malware as well as botnets and the computers under their control. In the process, analysts can keep tabs on both friendly and foreign governments conducting covert cyber attacks and infiltration of their own.
The National Security Agency, still reeling from massive leaks caused by Edward Snowden, is preparing to be hit with another major loss of secrets, according to U.S. intelligence officials.
The leaks are expected to be published in the near future by a news outlet that was not further identified by the officials familiar with details of the compromise. The NSA is aware of the news outlet’s forthcoming disclosures and is taking steps to try and minimize any damage they will cause.
According to the officials, the latest NSA disclosure of secrets is not the result of an insider stealing documents, as occurred in the case of fugitive NSA contractor Edward Snowden.
Instead, the leaks will reveal certain NSA technical cyber intelligence gathering capabilities. The officials did not provide details about the leaks.
For most Oscar nominees, the weeks before the February 22 ceremony are a whirlpool of stress.
But Laura Poitras, up for best documentary for "Citizenfour," insists it is like going for a healthy walk -- compared to what she went through to get here.
When former National Security Agency (NSA) consultant Edward Snowden, who revealed the massive scope of US intelligence surveillance, contacted the filmmaker, she found her life turned into a spy novel.
The top executives of Google Inc., Yahoo! Inc. and Facebook Inc. won’t attend President Barack Obama’s cybersecurity summit on Friday, at a time when relations between the White House and Silicon Valley have frayed over privacy issues.
Facebook Chairman and Chief Executive Officer Mark Zuckerberg, Yahoo CEO Marissa Mayer, and Google’s Larry Page and Eric Schmidt all were invited but won’t attend the public conference at Stanford University, according to the companies. Apple Inc. CEO Tim Cook is planning to be at the event, where Obama is scheduled to give the keynote speech and have a private lunch with a select group of attendees.
President Obama has signed an executive order that will attempt to protect America's crucial computer networks by sharing knowhow between g-men and techies.
The new order instructs federal agencies to set up a clearing house of real-time, up-to-the-minute information on what's menacing US infrastructure. Companies running those networks and systems will be able to look into the intelligence stream, get an idea of what's about to hit them, and beef up their defenses accordingly. This is assuming the system works as described.
This sharing of information is supposed to go two ways: businesses can use the clearing house to tip off the Feds about threats that everyone ought to know about, we're told.
President Obama called for companies to voluntarily share more cyber attack information with federal agencies during a first-ever White House summit on cyber security issues, signing an executive action to help pave the way for such sharing.
The Obama administration is expected to take executive action Friday, sweeping aside two years of congressional negotiations and bickering in an effort to bolster the country's cyber-defenses.
A California court has once again upheld the legality of the US National Security Agency's Bush-era mass telephone surveillance program, but has withheld its reasoning on grounds of national security.
A US JUDGE HAS ruled in favour of the National Security Agency (NSA) in a personal privacy case, despite the protests of rights group the Electronic Frontier Foundation (EFF).
Jewel vs the NSA was ruled on by judge Jeffrey White in Oakland, California, who told plaintiffs that they had failed to prove that the government violated a long established hope that ‘a man's home is his castle', or rather the Fourth Amendment.
An entire ballroom of more than 1,000 stood to applaud Edward Snowden as he was introduced at the Students for Liberty convention in Washington, and again after Snowden challenged them to "win" against the government's attempt to expand its own power.
An NSA document newly published today suggests two interesting facts that haven’t previously been reported.
The Intercept, which published the document, highlighted that in it the NSA expresses fear that it may be teaching Iran how to hack, but there are two other points in the document that merit attention.
One concerns the spy tool known as Flame; the other refers to concerns the NSA had about partnering with the British spy agency Government Communications Headquarters and Israeli intelligence in surveillance operations.
The document suggests that such attacks don’t just invite counterattacks but also school adversaries on new techniques and tools to use in their counterattacks, allowing them to increase the sophistication of these assaults. Iran, the document states, ‘has demonstrated a clear ability to learn from the capabilities and actions of others.’”
A federal judge ruled in favor of the National Security Agency in a key surveillance case on Tuesday, dismissing a challenge which claimed the government’s spying operations were groundless and unconstitutional.
This week, a US District Court judge ruled in favor of the NSA in a case challenging its tactics of intercepting messages on the internet without a warrant. California District Judge Jeffrey White said that the plaintiffs in Jewel vs. NSA didn't establish the legal standing needed to pursue claims that the US government violated their Fourth Amendment rights. White ruled that there wasn't enough evidence presented by the plaintiffs, and that the risk of revealing of state secrets would prevent the case from going forward even if they had. The group, who are all AT&T customers being represented by the Electronic Frontier Foundation (EFF), still has a case against the wider telephone record collection and other forms of mass surveillance employed by the National Security Agency. Jewel vs. NSA was filed in 2008 and is one of the earliest lawsuits brought against the federal government over its monitoring practices, preceding the whistleblowing work of Edward Snowden.
On Wednesday, Tennessee legislators filed bills to directly take on NSA spying by withholding vital state resources and material support from any federal agency engaged in warrantless surveillance.
The Investigatory Powers Tribunal (IPT) ruling that GCHQ’s access to information intercepted by the NSA breached human rights laws is feeding a growing and increasingly heated global debate regarding the whole issue of digital privacy.
U.S. President Barack Obama said on Monday that revelations of U.S. surveillance on German Chancellor Angela Merkel "damaged impressions" Germans hold of the U.S. government.
Though Snowden beamed in remotely, conversation hosted by New York Times brings together trio that revealed vast secretive surveillance network to global public.
President Barack Obama has called for the German people, and by extension Europe, to trust that the US is not infringing on their privacy, despite the Snowden leaks.
Obama issued the call for "trust" about the PRISM leaks during a joint press conference with German chancellor Angela Merkel when asked how the leaks have affected the two nations' relationship.
"There's no doubt that the Snowden revelations damaged the impressions of Germans with respect to the US government and our intelligence cooperation," he said.
"What I would ask would be that the German people recognise that the US has always been at the forefront of trying to promote civil liberties, and that we have traditions of due process that we respect.
Talks in Washington on Monday focused on the conflict in Ukraine, but German Chancellor Angela Merkel and US President Barack Obama also touched on issues including NSA espionage and nuclear negotiations with Iran.
President Barack Obama is asking Germans to give the United States "the benefit of the doubt" on National Security Agency surveillance, given U.S. history.
Obama says "there's no doubt" that NSA leaker Edward Snowden's revelations about the U.S. spying programs damaged the impression of U.S. intelligence operations among Germans. He says that's understandable, given Germany's history.
It’s been a lousy week so far for opponents of U.S. spy tactics: a federal judge shut down a long-running challenge to the NSA’s mass collection of customer internet data, while President Obama brushed off a call to do something about the sprawl of government surveillance.
One year ago, the Privacy and Civil Liberties Oversight Board (PCLOB) reviewed the National Security Agency’s bulk telephony metadata program and concluded the program was both illegal and imprudent as a policy matter. Under this program conducted pursuant to Section 215 of the USA PATRIOT Act, the NSA on a daily basis indiscriminately collects Americans’ calling records from telephone companies, including each call’s date and time, duration, and participating telephone numbers. This “metadata” does not include the contents of telephone conversations. The program is intended to enable the government to identify communications among known and unknown terrorism suspects. PCLOB recommended that the program be discontinued and that the government instead seek telephone call records directly from phone companies on a case-by-case basis where there is evidence of potential terrorist activity.
A bill filed in Montana yesterday would not only support efforts to turn off NSA’s water in Utah, but would have practical effects on federal surveillance programs if passed.
Montana Rep. Daniel Zolnikov (R-45) introduced HB443, a bill that would ban “material support or resources” from the state to warrantless federal spy programs, making it the 10th state to introduce legislation similar to a bill up for consideration in Utah this year.
“The best thing about privacy is that it is not a partisan issue,” said Zolnikov. “Groups like the ACLU and the Tea Party can work together to protect the rights of Montanans.”
ORG’s Executive Director Jim Killock will talk about mass surveillance, liberty and activism. He’ll say why mass surveillance is a danger to democracy and how we can work together to curb it.
MPs wants guarantees from the government that the decision to give the security services wider powers to tap phones and internet traffic will not be abused, website nu.nl reports on Tuesday. Home affairs minister Ronald Plasterk and defence minister Jeanine Hennis are due to present their draft legislation for expanding the security services’ intelligence-gathering powers shortly. Nu.nl questioned various party representatives about their position.
VVD Parliamentarian Klaas Dijkhoff denounced the phantom images raised by opponents that large scale data trawls will soon be conducted in the Netherlands, just like the NSA does in the United states, NU. reports. “The fear exists and people like to call up that feeling, but there is not country in the world where information is dealt with more carefully.” he said. But the Tweede Kamer (lower house of parliament) still wants guarantees that the expansion of the intelligence services’ surveillance capabilities will not lead to NSA practices.
President Obama won’t end the government’s controversial collection of data about millions of Americans on his own, because he’d rather the matter be dealt with by Congress.
Oklahoma HB1738 would deny much-needed material support or resources to warrantless federal spying programs. And SB444 would ban the state from participating in an unconstitutional federal-state information program. HB1738 must pass out of the House State and Federal Relations Committee while SB444 must pass out of the Senate Judiciary Committee before the bills can receive full votes in their respective chambers.
As we continue to read through documents released on February 3 that collectively detail the intelligence community’s efforts to implement Presidential Policy Directive-28, (PPD-28), we thought it would be helpful to overview briefly, and to compare. implementing documents issued by three agencies in particular: NSA, CIA, and FBI.
Overall, there is a great deal of overlap between the three agencies’ implementation policies. But they differ from each other in interesting ways, both with regard to retention and dissemination of information, and with regard to permitted departures from general rules contemplated by the policies themselves.
To drive the point home, he signed an executive order to this effect, in the hopes of inspiring collaboration between companies and government security agencies.
Twitter said today that the U.S. government has filed a highly redacted version of the company’s draft national security transparency report, a step that shows for the first time information about data requests Twitter has gotten from the NSA and other intelligence agencies.
Mass surveillance of the internet by GCHQ prior to December was unlawful, according to the Investigatory Powers Tribunal.
It said that the “intelligence sharing” process did not comply with human rights law, and there was a lack of transparency.
In the end - and maybe this is the biggest change of all - we all have to accept that perfect safety is illusory. Doing so would make society will be a little more open, a little more liberal, a little more scary, and perhaps a little more dangerous. But I think any democracy worthy of the name can live with that, because it’s the price of freedom.
A new US government "cyber threat" agency will take information on computer security breaches at private companies, pair it with classified intelligence – and put it back out to businesses so they can learn how to beef up their defences.
That's the dream, anyway, according to President Obama's homeland security and counterterrorism advisor Lisa Monaco, who launched the Cyber Threat Intelligence Integration Center (CTIIC) on Tuesday in Washington DC.
Next time Brian Williams or his carefully-coiffed successor assigns blame to some foreign actor for a cyberoutrage, I expect the “Cyber Threats Intelligence Integration Center” to figure prominently in the coverage.
We live in privacy obsessed times, which is rather ironic. After all, many of those who complained most vociferously about the alleged snooping of the NSA on our personal emails failed to realise that by posting every conceivable piece of personal information on social media, the average spook merely needs to follow you on Twitter to find out everything they need to know.
It's a bad week for Samsung. After the firm addressed privacy concerns, some of its Smart TVs began displaying annoying pop-up ads. Meanwhile, the White House plans to form a cybersecurity agency, and smartphone thefts decline thanks to kill switches.
Our smartphones and computers, of course, listen to us when we're making audio and video calls. But the microphones are always there, and there are ways a hacker, government, or clever company can turn those microphones on without our knowledge. Sometimes we turn them on ourselves. If we have an iPhone, the voice-processing system Siri listens to us, but only when we push the iPhone's button. Like Samsung, iPhones with the "Hey Siri" feature enabled listen all the time. So do Android devices with the "OK Google" feature enabled, and so does an Amazon voice-activated system called Echo. Facebook has the ability to turn your smartphone's microphone on when you're using the app.
If there's one thing we can thank this whole Samsung privacy brouhaha for, it's casting data retention debates in a whole new light.
The head of a federal privacy board is reiterating his call to end the government’s bulk collection and storage of Americans’ phone records.
David Medine, the chairman of the Privacy and Civil Liberties Oversight Board, called for either President Obama or Congress to shut down the National Security Agency program. Obama has deferred to Congress to make the change.
While some citizens fight back against more encroachments on privacy, the NSA and its backers in the White House, Congress and the Courts are expanding their own reach, now monitoring literally trillions of messages. While legislators have been unable to restrain the NSA, corporations and enterprising journalists are using encryption. Even as intelligence agencies in the US and abroad are escalating their cyber war capacities, private companies are commercializing their technology. All of these issues concern whistleblowers, who say they fear the emergence of a police state if the mass surveillance is not curtailed or stopped.
Those days of calling your bank to let them know that, yes, you really are in Thailand, and yes, you really did use your credit card to buy $200 in sarongs, may be coming to an end.
The payment processing company Visa will roll out a new feature this spring that will allow its cardholders to inform their banks where they are automatically, using the location function found in nearly every smartphone.
Having your bank and Visa know where you are at all times may sound a little like "Big Brother." But privacy experts are actually applauding the feature, saying that, if used correctly, it could protect cardholders and cut down on credit card fraud.
Look, his net neutrality proposal was great. It's clear that Obama has a deeper understanding of how the internet works than at least a shitload of other politicians. But this cybersecurity order looks potentially milquetoast on the threat-prevention front and straight-up worrisome on the government-slurping-all-our-data horizon.
Not only were Yahoo, Facebook, and Google among the original "PRISM" companies revealed by Edward Snowden to have been forced into turning over information about their customers to the NSA, but France, Italy, the United Kingdom, Mexico, and Germany were among nations the NSA is accused of spying on as part of related programs. Perhaps today is a bit late to ask for a more open policy of sharing information.
What we’re witnessing is Reform Theater. A sort of kabuki act which is intended to provide the impression that, in the wake of Ed blundenSnowden’s revelations, something is being done. Officials create the perception of action by occupying themselves with narrow aspects of mass interception and this is intentional. They wouldn’t dare do anything substantial that would threaten the gears of the surveillance state. Instead they’ll leave Big Brother’s infrastructure in place and dither around the edges.
The Sun was an unlikely advocate for privacy in its special investigation piece early this week on the snooping Samsung telly. Forget phone hacking, it’s the technology companies you need to watch out for. The Sun’s outrage was not confined to Samsung: a neighbouring article reminded us of recent privacy complaints against Facebook and Google.
After the bruising recriminations between the White House and the technology industry over the National Security Agency, Barack Obama will travel to the Bay Area on Friday to enlist Silicon Valley’s support for his post-Snowden push for cyber security legislation.
Facebook is teaming up with other big names on the interwebs to create a security information sharing portal, dubbed ThreatExchange*, which went live on Wednesday.
ThreatExchange is billed as a platform that enables security professionals to “share threat information more easily, learn from each other's discoveries, and make their own systems safer”.
If we are to end our post-9/11 national security state, the congressional leadership must come to believe that blocking efforts to restore the Bill of Rights will result in real political consequences. If, however, they continue to see no political consequences, Americans’ rights to privacy and due process will continue to diminish into artifacts of a bygone era.
President announces executive order ahead of summit to spur development of go-between for technology sector and government to share information
The top executives of Google Inc, Yahoo! Inc and Facebook Inc won't attend President Barack Obama's cybersecurity summit on Friday, at a time when relations between the White House and Silicon Valley have frayed over privacy issues.
Facebook Chairman and Chief Executive Officer Mark Zuckerberg, Yahoo CEO Marissa Mayer, and Google's Larry Page and Eric Schmidt were all invited but won't attend the public conference at Stanford University, according to the companies. Apple Inc CEO Tim Cook is planning to show to the event, where Obama is scheduled to give the keynote speech and have a private lunch with a select group of attendees.
President Obama will meet here on Friday with the nation’s top technologists on a host of cybersecurity issues and the threats posed by increasingly sophisticated hackers. But nowhere on the agenda is the real issue for the chief executives and tech company officials who will gather on the Stanford campus: the deepening estrangement between Silicon Valley and the government.
President Obama will announce a new executive order on the sharing of cybersecurity threats and information at Friday's cybersecurity summit at Stanford University, the White House said.
Most importantly to Silicon Valley, the president's proposal is expected to cement the role of the Department of Homeland Security, rather than the National Security Agency, as the government lead for information-sharing with the private sector.
President Obama will announce a new executive order on the sharing of cybersecurity threats and information at Friday's cybersecurity summit at Stanford University, the White House said.
Most importantly to Silicon Valley, the president's proposal is expected to cement the role of the Department of Homeland Security, rather than the National Security Agency, as the government lead for information-sharing with the private sector.
On Friday, the White House convened a “cyber summit” at Stanford’s campus in Palo Alto so that business and government leaders could get together and talk, essentially, about how scary hackers are.
President Barack Obama took the hot seat with Re/code’s Kara Swisher Friday as the two talked about a range of tech-focused topics, including cyber warfare, the White House’s relationship with Silicon Valley tech giants and the Apple Watch.
President Barack Obama said Friday that he probably leans more toward strong computer data encryption than many in law enforcement, but added that he understands investigators' concerns over the matter because of their need to protect people from attacks.
He suggested having a "public conversation" about the issue because "the first time that attack takes place in which it turns out that we had a lead and we couldn't follow up on it, the public's going to demand answers."
In fact, it seems noteworthy that this whole issue of increasing encryption by the tech companies to keep everyone out has been left off the official summit schedule. As the NY Times notes (in the link above), Silicon Valley seems to be pretty much completely fed up with the intelligence community after multiple Snowden revelations revealed just how far the NSA had gone in trying to "collect it all" -- including hacking into the foreign data centers of Google and Yahoo.
Last week, the Obama Administration released a report and documents cataloging progress toward signals intelligence (SIGINT) reform goals set a year ago by the President in a document known as PPD-28. PPD-28 promises foreigners some of the same privacy protections given to US citizens and residents. But it turns out that those protections, even for citizens, are fairly meager, in ways that have not yet fully entered the public conversation about surveillance. US citizens and residents have been — and remain — exposed to suspicionless electronic surveillance. Implementation of PPD-28 will do little to change that.
This week the Obama administration is releasing its second Executive Order in as many years on computer ("cyber") security, which reports are saying will create a new department in the intelligence community to handle computer security threat information sharing. Officials are hailing the center as "new" and unprecedented.
Larry Harvey, 71, thought he was doing everything right growing medical marijuana for his personal use. His home state of Washington legalized medical cannabis in 1998, and Harvey says his cultivation of plants with his wife, other family members and a close friend complied with the law.
Why was it again that, as President Obama said, “we tortured some folks” after the 9/11 attacks? Oh, right, because we were terrified. Because everyone knows that being afraid gives you moral license to do whatever you need to do to keep yourself safe. That’s why we don’t shame or punish those who were too scared to imagine doing anything else. We honor and revere them.
The US Senate Committee on Intelligence has issued a significant correction to an appendix to its report on CIA torture after mistakes were highlighted by the Bureau of Investigative Journalism.
A “notice of errata” was published earlier this month showing amendments for almost half of the 119 prisoners held in the CIA’s rendition and enhanced interrogation programme.
The mistakes, which have been put down to a “technical error”, relate to the number of days the detainees were held by the CIA during the programme.
Random American Citizen Roger Vanderklok (aka “Josef K.“) had the misfortune of going through TSA Supervisor Charles Kieser’s security-screening area. Vanderklok, 57, pictured with his wife, is a Philadelphia architect who runs half-marathons. He flies around the country for weekend races.
The TSA said it was concerned about the gear in his carry-on bag, and pulled him out of line. The items of concern turned out to be only a running watch and some Power Bars, wrapped in a small PVC pipe for protection against crushing. Nonetheless, for the next 30 minutes, screeners checked and rechecked the bag. They found nothing dangerous. Vanderklok protested that he was no threat, and that the items were of no danger to anyone, and insisted on making a complaint.
Electronics and “organic mass” can be used to make bombs, TSA Supervisor Charles Kieser said in response to Vanderlok’s complaint. “The passenger made a bomb threat to me,” Kieser testified later according to a court transcript. “He said ‘I’ll bring a bomb through here any day that I want… and you’ll never find it.'” - See more at: http://wemeantwell.com/blog/2015/02/13/man-held-20-hours-for-asking-to-file-tsa-complaint/#sthash.3S4vcvuH.dpuf
The world needs its whistleblowers. They are indispensable to a healthy society. The employee who, in the public interest, has the independence of judgment and the personal courage to challenge malpractice or illegality is a kind of public hero. Yet, as Sir Robert Francis reported on Wednesday , in the NHS as in any large and bureaucratic organisation, whistleblowers are far more likely to be resented than respected, as Helene Donnelly, the nurse who protested about the failings in care at Mid Staffs, found out. Far from having their names embossed on a roll of honour, Francis found that the doctors and nurses and other NHS staff who reported their anxieties about failings in patient care had been shunned, suspended or even sacked by hospital bosses. Many were left struggling to find a new job. Some have been driven to contemplate suicide.
Reporters Without Borders released its annual World Press Freedom Index Thursday and revealed the U.S. has received its lowest score since 2006.
The U.S. is ranked 49th in the world — dropping from 46th — right behind Malta, Niger, Burkina Faso and El Salvador.
In comparison, our northern neighbor Canada was ranked eighth this year. Mexico, on the other hand, is 148th.
Imprisoned former Chicago-area police sergeant Drew Peterson was charged today with hiring a hitman to kill the prosecutor who sent him to prison for 38 years.
Dressed in his prison uniform, Peterson asked for a public defender after hearing the charges against him. Peterson has been in jail since 2012, when he was found guilty of the murder of his third wife, Kathleen Savio.
We fire missiles from the sky that incinerate families huddled in their houses. They incinerate a pilot cowering in a cage. We torture hostages in our black sites and choke them to death by stuffing rags down their throats. They torture hostages in squalid hovels and behead them. We organize Shiite death squads to kill Sunnis. They organize Sunni death squads to kill Shiites. We produce high-budget films such as “American Sniper” to glorify our war crimes. They produce inspirational videos to glorify their twisted version of jihad.
Twenty-five years on from the web's inception, its creator has urged the public to re-engage with its original design: a decentralised internet that at its very core, remains open to all.
Speaking with Wired editor David Rowan at an event launching the magazine's March issue, Tim Berners-Lee said that although part of this is about keeping an eye on for-profit internet monopolies such as search engines and social networks, the greatest danger is the emergence of a balkanised web.
Vint Cerf is promoting an idea to preserve every piece of software and hardware so that it never becomes obsolete - just like what happens in a museum - but in digital form, in servers in the cloud.
I've written before about the GOP's peculiarly uncompromising stance on net neutrality. At its core, net neutrality has always been a battle between two huge industry groups and therefore never really presented an obvious reason for Republicans to feel strongly about one side or the other. But they've taken sides anyway, energetically supporting the anti-neutrality broadband industry against the pro-neutrality tech industry. Today an LA Times article dives more deeply into the problems this is causing:
In May 2013 I engaged in an hour long web chat with Jared Cohen, director of Google Ideas, a think tank that describes itself as “dedicated to understanding global challenges by applying technological solutions.”
New submitter Dharkfiber sends an article about the Hardened Anti-Reverse Engineering System (HARES), which is an encryption tool for software that doesn't allow the code to be decrypted until the last possible moment before it's executed. The purpose is to make applications as opaque as possible to malicious hackers trying to find vulnerabilities to exploit. It's likely to find work as an anti-piracy tool as well.
So the saga of the Left Shark and Katy Perry's lawyers keeps getting more and more strange. We've already covered the legal threat from Perry's lawyers to the guy who was offering a 3D printed figurine of the Left Shark, followed by the response explaining to Perry's lawyers that there is no copyright in left shark, leading to Perry's lawyers to issue a uh huh there is... while also using the figurine maker's own photo of his 3D printed shark in their (now abandoned) trademark application.
Andrus Nomm, one of the Megaupload employees indicted by the United States, has pleaded guilty and been sentenced to a year in prison. Nomm signed a plea deal and admitted that he personally downloaded copyright-infringing files from Mega's sites.
A few days ago, it came out that programmer Andrus Nomm had flown to Virginia to be arrested. Nomm had worked for Megaupload in Europe and had been listed in the criminal case against Megaupload and its various employees. His name had mostly fallen off the radar, since he wasn't down in New Zealand with most of the rest of them. It was obvious in his move to come to the US and be arrested that he must have worked out a plea deal with the feds, and that's confirmed today with him pleading "guilty" to criminal copyright infringement with prosecutors asking for a year and a day in prison, which the court granted. Kim Dotcom noted that he has "nothing but compassion and understanding for Andrus Nomm."
The Trans-Pacific Partnership agreement (TPP) poses massive threats to users in a dizzying number of ways. It will force other TPP signatories to accept the United States' excessive copyright terms of a minimum of life of the author plus 70 years, while locking the US to the same lengths so it will be harder to shorten them in the future. It contains DRM anti-circumvention provisions that will make it a crime to tinker with, hack, re-sell, preserve, and otherwise control any number of digital files and devices that you own. The TPP will encourage ISPs to monitor and police their users, likely leading to more censorship measures such as the blockage and filtering of content online in the name of copyright enforcement. And in the most recent leak of the TPP's Intellectual Property chapter, we found an even more alarming provision on trade secrets that could be used to crackdown on journalists and whistleblowers who report on corporate wrongdoing.
The text from the TPP reads “penalties that include sentences of imprisonment as well as monetary fines sufficiently high to provide a deterrent to future acts of infringement, consistently with the level of penalties applied for crimes of corresponding gravity.” The EFF suggest that countries who do not have “sufficiently high” fines could be subject to pressure from the US Trade Representative to impose fines the US deems suitable.
It doesn’t stop there though, TPP’s current copyright provisions enable judges to order the seizure, destruction or forfeiture of anything that can be “traceable to infringing activity”, used in the “creation of pirated copyright goods” or is “documentary evidence relevant to the alleged offence”. I find the last quote the most troubling, ‘documentary evidence’ could include the machine on which the content was created, servers it’s hosted on and could, at a stretch, include seizure of another persons machine based on chat logs if the activity was being discussed with a friend.