Any approach to solving problems of any nature—including problems with computers and Linux—must include more than just a list of symptoms and the steps necessary to fix or circumvent the problems which caused the symptoms. This so-called "symptom-fix" approach looks good on paper to the old-style managers (those managers who do not participate in The Open Organization) but sucks in practice.
Arne Exton has had the pleasure of informing Softpedia earlier today about the immediate availability for download of a new build of his Ubuntu-based LFA (Linux For ALL) distributions.
Use strong password
If you use SSH to connect to your system disable password authentication and use SSH Keys.
If you choose to ignore the above – use a strong password for your root user – avoid dictionary words
Change default SSH port
When working with cloud providers it is important to establish what responsibilities you retain for security and what is managed by the provider. Dependent on the nature of the service, the line of responsibility shifts. For IaaS providers, the customer is responsible for the operating system up; however, for SaaS providers, the customer is responsible for privileged users. This has a major impact on the security controls we implement to shore up our end of the bargain.
After announcing the immediate availability for download of Linux kernel 4.2.4, Linux kernel 4.1.11 LTS, and Linux kernel 3.14.55 LTS, Greg Kroah-Hartman has had the great pleasure of releasing a new maintenance version of Linux kernel 3.10 LTS.
So it may still be Saturday at home, but with the Kernel Summit in Korea coming up, I'm ahead of the curve in a +0900 timezone, and it's Sunday here. So it's release day.
This rc breaks the "nicely shrinking and calming down" trend, largely due to the fact that we had the networking fixes merged in rc7 (but not in rc6). There's also a few other slightly larger pulls (ARM SoC fixes, along with gpu, block layer and media fixes), and obviously all the usual misc driver fixes etc. But the networking changes is what makes it look a bit different from the previous rc.
Very early today, October 25, Linus Torvalds announced the release of the seventh and most probably the last RC (Release Candidate) build of the upcoming Linux 4.3 kernel.
SMAF, short for the Secure Memory Allocation Framework, is the newest framework in development for the mainline Linux kernel. SMAF is designed to allocate and secure memory by DMA_BUF.
A pull request has just been sent in that in turn will target Linux 4.4 for offering on-demand device probing for helping platforms using Device Tree / OpenFirmware.
For the past several months Tomeu Vizoso at Collabora has been working toward on-demand device probing for speeding up the boot process of ARM devices like the NVIDIA Tegra Chromebook.
Once again, Collabora's Emil Velikov has had the great pleasure of announcing a new maintenance release of the stable 11.0 branch of the Mesa 3D Graphics Library software for GNU/Linux operating systems.
For those not riding Mesa Git master for all of the latest open-source 3D driver functionality, Mesa 11.0.4 is now the latest stable release.
This past week marked three years since the release of Wayland 1.0 while finally next year it's looking like the Wayland-powered Linux desktop landscape could be much more complete.
Peter Hutterer announced the release of libinput 1.1.0 as the newest feature update to this display-server/protocol-agnostic Linux input handling library.
While there's just one week left to the month, there are a lot of exciting Linux hardware/software benchmarks coming up on Phoronix over the next week. Here's a preview.
A new maintenance release of the MKVToolNix 8.5 open-source MKV (Matroska) manipulation software has been released for all supported operating systems, including GNU/Linux, Microsoft Windows, and Mac OS X.
Over the summer I wrote about DirectFB.org disappearing with no signs of what happened to the project. Fortunately, while DirectFB.org remains M.I.A., the code has appeared on GitHub.
The Xen Project has announced version 4.6 of their software this morning, which they describe as the most punctual and highest quality release yet.
As you may know, Plank is the default dock app on Elementary OS 0.2 Luna, but it can be easily installed on other Ubuntu based systems, enabling the users to place their favorite apps in the dock, for an easier usage.
As you may know, uGet is an open-source, lightweight download manager, running on Linux, having good integration with Mozilla Firefox.
FocusWriter is a text editor, having a hide-away interface to provide a distraction-free environment. It is open-source and cross-plaftorm, working on Linux, Windows and Mac OS X. Among others, it has support for TXT, RTF and ODT, allows the users to set timers and alarms, it has auto-save and spell-check, it supports some new themes and is traslated in more than 20 languages.
Today we release the next version of LabPlot – 2.1.0. The summary of all new features was given already in the announcement of the release candidate. Only couple of small fixes were made after the release candidate was announced.
As you may know, Stellarium is an open-source planetarium application, providing a realistic and accurate sky image in 3D, as if the users were looking through a telescope.
It's been a while since last having anything to report on with the Pixman pixel manipulation library, but released yesterday was a new release candidate (v0.33.4) leading up to the Pixman 0.34 debut.
As you may know, LiVES is an open source video editor and VJ tool, enabling the users to easily add effects to more than 50 audio and video formats.
Ruarí ÃËdegaard from the Vivaldi team has had the pleasure of announcing the release and immediate availability for download and testing of a new snapshot build of the upcoming cross-platform web browser.
The following tutorial will teach anyone how to install the recently released Ubuntu 15.10 operating system on their PC or laptop. Dubbed Wily Werewolf, Ubuntu 15.10 arrived on October 22, 2015, and it's the 23rd release of Ubuntu Linux.
One of the promises made by the Larian Studios regarding Divinity Original Sin was about Linux support, and it looks like that's finally going to happen. It took the developers quite a long time to reach this stage, but they didn't forget about it. The community has been asking for the Linux port since the launch of the game, back in June 2014.
Pulse was funded on Kickstarter in April 2013, where it raised an impressive $80k. In this game you explore your surroundings using a process similar to echolocation, and you're aided by the adorable Mokos, which you can see in the trailer above.
We mentioned that Murder Miners was on its way to Linux, and it has arrived already in beta form! I tested it out very quickly earlier, and it seems to run perfectly.
After the release of the second 2015 Ubuntu family images, Jonathan Riddell has stepped down as release manager of Kubuntu. Riddell resigned from project lead post in June after being more or less ousted by Canonical in May over IP and donation accountability disagreements. Riddell remained active in the KDE and Kubuntu communities since, but today announced his resignation from the Kubuntu project entirely.
I’ve improved the docker image with the Qt Android applications using CMake build toolchain, and done some tests with my QML android app.
As I wrote in part one of this series, we are currently creating Human Interface Guidelines (HIG) for phone user interfaces for KDE applications.
On the road to a Calligra with no more need of the porting util KDELibs4Support another milestone has been passed: Karbon now also is based purely on Qt5 and KF5.
Since I migrated to Linux in 2010, there have been two constants. The first one is, of course, adaptation to new programs. The second one, the question on whether Gnome is better than KDE.
I recently participated in a survey on Google+ to that effect and, thanks to the survey, I remembered my experience with KDE.
I like KDE not because I think it is superior than other DEs, but because I find its flexibility very convenient for my workflow. The first Linux distro that I tried was Kubuntu, but never installed it and became a Mandriva 2009 user. Needless to say, I was using KDE then.
In months prior to the GUADEC 2015 conference, both the board of directors and engagement team were kept busy with an above-average workload, so the GNOME Foundation‘s Annual Report had to wait until things settled a bit. After the core days of GUADEC, we held an all-day meeting among members of the Engagement team (and whoever was interested in joining the fun, really):
It is with pleasure that the GNOME Foundation is announcing that Karlsruhe, Germany, will host GUADEC in the summer of 2016.
GNOME developers are working towards redesigning the GNOME Control Center and as one of the steps towards that is rolling out a new Mouse and Touchpad panel.
The Solus operating system is still under construction, and it looks like a lot of cool packages are getting implemented, including a new one called DoFlicky that will help users to install drivers much easier.
We have just been informed by the developer of the 4MLinux project, Zbigniew Konojacki, that version 14.0 of his 4MRescueKit Live CD is now in Beta stages of development.
Arne Exton informs us in an email that he managed to release a new update of his Exton|OS computer operating system based on the latest Ubuntu 15.10 (Wily Werewolf) and Debian GNU/Linux 8.1 (Jessie) OSes.
After some months in pre-release state, installation media of the milestone3 stable version are available for download with release 3.0.1.
Zentyal, the only international vendor to offer Linux kernel-based server technology that is natively interoperable with Microsoft's Exchange Server and Active Directory products, was proud to announce the release of Zentyal Server 4.2.
Arch BSD / PacBSD is a project based on Arch Linux and using its Pacman package manager but replaces the Linux kernel with the FreeBSD kernel. PacBSD is similar in concept to Debian GNU/kFreeBSD that uses Debian's user-land but with the FreeBSD kernel. Arch BSD was renamed to PacBSD earlier this year to avoid any potential trademark issues.
While PacBSD was active as of a few months ago and there's still Git work happening, there's been nothing major to report now in some time. In fact, the PacBSD ISOs haven't been re-spun in more than one year now. Trying to access the PacBSD mailing lists also appear down. There also doesn't appear to be any package updates since July.
The time has come for Manjaro Linux users to prepare their computers for a new major update, the fourth for the stable Manjaro 15.09 (Bellatrix) operating system, due for release later today, October 26, 2015.
Red Hat has announced that nominations are open for the 2016 Women in Open Source Awards.
This is the second year that the software company has put on the award, which recognizes women making significant contributions to open source, either through development, in creative use, or through various communities.
As with last year, nominations are taken in two different categories, namely Academic for full-time students enrolled in college or university, and Community, for women who work or volunteer on projects related to open source software.
Shares of Red Hat (NYSE:RHT) have received an average recommendation of “Buy” from the thirty-five brokerages that are currently covering the stock, Market Beat Ratings reports. One research analyst has rated the stock with a sell rating, eight have issued a hold rating and twenty-five have given a buy rating to the company. The average 12 month target price among brokers that have issued ratings on the stock in the last year is $82.80.
Red Hat, Inc. (NYSE:RHT) has received a top Growth Style score from Zack’s Research. The growth score is based on company financials as well as the company’s prospects for future growth. The score is a result of analysis of various aspects of the Balance Sheet, Cash Flow Statement and Income Statement. Stocks that are given a high growth score tend to have the characteristics resulting in market outperformance.
Chief Information Officers must actively consider ways to partner with the business. Lee Congdon, CIO of Red Hat Software shares practical advice for developing strategic relationships outside IT. Essential reading for every CIO and all IT personnel.
Red Hat, Inc. (NYSE:RHT) has dropped 0.3% during the past week, however, the bigger picture is still very bullish; the shares have posted positive gains of 6.13% in the last 4 weeks. The shares are however, negative as compared to the S&P 500 for the past week with a loss of 2.32%. Red Hat, Inc. (NYSE:RHT) has underperformed the index by 1.22% in the last 4 weeks. Investors should watch out for further signals and trade with caution.
Wall Street brokerages expect Red Hat, Inc. (NYSE:RHT) to report earnings per share of $0.31 for the current fiscal quarter. This number is based on the average estimate of the sell-side research firms that cover the stock. Red Hat, Inc. (NYSE:RHT) most recently reported earnings per share of $0.34 on 2015–0-9-21 for the quarter ended 2015-08-31.
As mentioned earlier some benchmarks to share this weekend are comparing the out-of-the-box OpenGL graphics performance on Fedora 23 when running some benchmarks under KDE Plasma, Xfce, GNOME, LXDE, and MATE.
Fedora 23 Server can be whatever you want it to be. We put it to work as a simple web server. You can really go full steam ahead and install an entire LAMP stack, but we opted for a limited Lighttpd configuration instead. You could simply leave it on your network as a file server with out-of-the-box SSH access configured. Or you could get more tricky and put it into a full server role which would require a lot more in-depth configuration and detail than what we can cover in this Review. That’s before we have even brushed on its potential for Cloud options. It’s worth noting that this is all deployed and supported completely free of any contract fees associated with Fedora, unlike its big commercial partner, Red Hat.
Fedora 23 is great for small business who are looking at options for cutting down on IT costs related to software. If Fedora doesn’t suit the task at hand, we remind our readers not to forget about CentOS 7.0. Sure, Ubuntu is also an equal potential option with solid and reliable performance. But it’s difficult to look past Fedora’s fine polish and overall friendly take on a server operating system. Additionally, the simple fact that Cockpit is so well equipped and installed by default with the core system, makes Fedora 23 that little bit more tempting.
Here are some weekend follow-up tests to last month's GNOME 3.18 On Fedora 23: X.Org vs. Wayland Performance article.
Even though Fedora 23 isn’t quite out the door yet, officially, I have been poking at the alpha and beta because… that’s what you do. Well, it’s what I do, anyway. Call it a form of desktop wanderlust, I am always itching to see what’s next and what might be new and fun around the corner. (This also has the benefit of hitting bugs before folks who feel slightly less adventurous.)
The Linux Kernel Oops website collects kernel errors from all over the World helping kernel developers finding issues occurring in the wild but they cannot help if no one sends reports to them.
The Kerneloops client used to be part of Debian releases but it has been removed from the archive due to not working with the new collector site.
It is designed for gamers that are seeking a versatile, open source machine, able to run desktop Linux apps and also emulate game consoles. It is able to emulate systems like the PlayStation 1, PlayStation Portable, Nintendo 64 and the Gameboy DS.
Most Ubuntu users would have known the new release of Ubuntu 15.10, 'Wily Werewolf'. If you're the one who doesn't know yet, then read our article here that explains all the new stuff in Ubuntu 15.10. The release has come up with couple of new features, alot improvements and fixes. Have you Upgraded to Ubuntu 15.10? Please take this poll and tell us what you think about the new release.
The differences that Jonathan Riddell, leader of the Kubuntu project, had with Canonical, the company behind Ubuntu, have finally led to him calling it quits.
Kubuntu is a GNU/Linux distribution funded by Canonical; it has the KDE desktop instead of Unity which is on Ubuntu. Canonical funds a number of offshoots of Ubuntu with different desktops: Lubuntu, Ubuntu GNOME, Ubuntu Kylin, Ubuntu MATE, Ubuntu Studio, and Xubuntu.
His resignation comes a day after the latest version of Kubuntu was released along with Ubuntu and other derivatives.
The Ubuntu Snappy Core Clinic online event took place earlier this week, and Canonical's Daniel Holbach reports on the things that have been discussed during the 45-minute-long online session.
In the second Ubuntu Snappy Core Clinic event, the Ubuntu Snappy developers talked about the snapcraft tool for crafting packages for the Snappy Ubuntu Core operating system and introduced the software to new users.
Canonical has officially launched Ubuntu 15.10, the latest version of the open-source Linux operating system distribution now available on desktops, phones and tablets. The new release brings several improvements, including more work on universal apps.
Developers continue making progress on maturing the Ubuntu Phone software stack, including Unity 8 atop Mir.
à Âukasz Zemczak wrote in yesterday's landing team update about the latest work. Aside from a new address book service and other package updates, a big Unity 8 update is in the works. Zemczak wrote, "A big Unity8 landing that was long in development, integrating unity-controlled mouse pointers, external screen support and many other convergence changes is now ready to land. The silo has been tested and now we're only waiting for a final archive admin binNEW review. Great stuff."
We've just been informed by Mr. Martin Wimpress from the Ubuntu MATE project that he and his team are in talks with the Lubuntu Linux developers to port the operating system to the Raspberry Pi 2 single-board computer (SBC).
At the start of the week I announced that work had begun on Moksha’s new control panel we are calling Swami. Today I am happy to share that the first two modules for Swami are ready for alpha testing:
We reported a few days ago news about the Juju Status Flasher proof-of-concept project created by Matt Williams for the Ubuntu Snappy Core operating system running on an Orange Match Box Raspberry Pi 2 with PiGlow.
Navstik Labs showed off its Linux-based “Flyt” commercial drone autopilot, while 3DR opened up its Solo quadcopter’s hardware add-on spec to developers.
It’s been a busy week for drones. While the Unmanned Aerial Vehicle (UAV) community argued over the merits of FCC regulations proposed this week that would require U.S. UAV owners to register their drones with the government, two new developments emerged in Linux-based drone hardware. A startup called Navstik Labs in Pune, India demonstrated a new Linux-based “Flyt” autopilot platform for commercial drones, while 3DR launched a “Made for Solo” hardware development program for third-party developers to build add-ons for the accessory bay of its Linux-based Solo quadcopter.
But Android may, in fact, be too successful. Although Google gives Android away for free, it benefits, as Android owners are encouraged to use Google's many Web services. Unfortunately for the search giant, Android's dominance has attracted the interest of regulators.
While some Android fans are looking forward to upgrading their existing Android smartphones to the latest version of the operating system, Android 6.0 Marshmallow, others are anticipating the release of new Android smartphones that will run the operating system out of the box. A document that Google has released to outline its requirements for manufacturers of Android smartphones and tablets gives us a glimpse of how phones for Android Marshmallow are going to handle some of the release’s most exciting new features.
There’s only one thing worse than losing your Android phone, and that’s losing your Android phone when there’s lots of personal stuff on it. If the thought of somebody else accessing your apps, your email or your secret plans for world domination scares you silly, we have the solution. Here’s how to remotely delete Android phone data and remotely wipe Android.
It is an evident factor that both Apple and Google have millions of hardcore users around the world.
With the latest version coming up in both Android and Apple, according to BGR, users are now engaged in a war that seems to be never ending. It is high time to consider the merits and demerits of both the operating system and the features that can be expected, while going ahead with purchase of new smart phone in market. A comparison between both OS will ultimately help a buyer rely on the best model in market.
A last minute change to the schedule at the Big Android BBQ this year looked almost like a joke on behalf of the event staff this year, but sure enough on Thursday afternoon a room at the Hurst Convention Center overflowed with people eager to hear the one and only John McAfee — namesake of the ubiquitous software suite — talk about users paying closer attention to personal security and being aware of just how important privacy is.
Anyone who knows their way around a camera should be familiar with raw image files. Simply put, they contain pure, uncompressed visual data captured by the camera's sensor. It is this data that a camera's image processor uses to produce the JPEGs we later view and post on the internet. It is this kind of file that a pro photographer would use to make the most of their images.
XDA was on site for another exciting, although rain-soaked, Big Android BBBQ 2015! We have been supporting the event for the past five years. XDA TV Host TK was at the Big Android BBQ and took the time to interview some of the attendees and other sponsors. In this video, he interviews Powell Kinney, the CTO of Vinli. Vinli is a company that bring advanced technology to your car through a small device plugged into your vehicle’s OBD (On-Board Diagnostics) port.
Definitely. This is it. The Android phone for everyone. It does most of the regular phone stuff you do everyday better than everything else. This is the purest and most polished Android experience you’re going to get. Period.
There will also be improved linking between apps, so you’ll see a lot less of that annoying screen that asks you to pick which app you want to use for a certain task. Certified apps will be able to ‘own’ links connected to them, for example by default the Twitter app will own Twitter links, and you’ll get taken straight to it should you click on one in a browser. You’ll be able to reassign these if you prefer another app, but by default it will be a far more seamless app-to-app and web-to-app experience.
Right now there are three Android phones and four Android tablets within arm's reach of my desk, and another half dozen or so in my closet. (It's OK, I don't have a problem. This is my job.) If you're in a similar situation, you can put some of those gadgets to use: they work great as remotes for set-top boxes like Android TV or Roku, or you can cobble them together into a sort of poor man's Sonos multi-room speaker system. Here's one more option: turn it into a home security camera.
Sam Jones last week reported on the rise of Blackphone, an encrypted smartphone service that wants to be the heir to BlackBerry by appealing to companies worried about security. Readers debated its merits.
I feel the same way about codes of conduct for open source projects as I do about codes of conduct for events. You can absolutely run a totally safe and effective event without one, but by having one you make very clear what your expectations are - and in turn this manages the expectations of the people attending that event.
Fonts are weirdly addictive. Most of us see a new, free font and within seconds it’s downloaded and in our font library but how often do you get to use each one? I have loads of fonts I have acquired over the years that I thought would come in handy at some point but they never have usually because they’re either too fancy and or too eccentric for anything but very specialized uses. If this has been your experience I have a font you’ll love which is different mainly because it’s one you’re very likely to use.
Chrome 47 brings splash screens to Android when launching a site from a user's home screen, cooperative multi-tasking support via a requestIdleCallback() function, support for auto-dismissing notifications, and various other updates. Chrome 47 also does away with its notification center.
Mozilla is starting an open source-supporting award program with an initial allocation of $1 million. The company has long been a proponent of open source software, and now wants to give something back to the community on which it so heavily relies.
Not 20 years ago, Mozilla was itself the eager young open-sourcer scrambling for income, often unsuccessfully. In those early years, the plan was to sell its Mozilla Application Suite, an open-source version of Netscape Navigator, to Netscape and Netscape's corporate parent, AOL. When that didn't work out, it instead offered up its browser wares to the public directly, becoming the mostly Google-funded household name we know today.
The Mozilla Foundation has announced the Mozilla Open Source Support (MOSS), a project which will give away $1 million / €0.91 million to open source projects it relies on.
Tempest is the OpenStack official test suite. Its purpose is to run tests for OpenStack API validation in an OpenStack cluster, in order to know how healthy our cloud is. It is also used as a gate for validating commits into the OpenStack core projects—it will avoid breaking them while merging changes. For more information about Tempest, see the developer documentation and the source code repository.
I studied CS at Epitech Paris until 2006, then worked mostly as an R&D engineer for several industries.
I currently work as a system engineer kind-of-a-devop on a project that involves distributed servers and mailing.
Amongst the flurry of commits from the l2k15 hackathon, Ken Westerback (krw@) has been hacking away on GPT support, and it's now enabled in the GENERIC kernel.
The FreeBSD 2015'Q3 quarterly report has been issued to recap the latest activity happening for this popular BSD project.
Landry, 33, living on the countryside in the middle of france, avid motorbiker/road-tripper, working on GIS databases, aerial pictures, storage infrastructure and building geographical web services for the public agencies in my area.
A friend introduced me to OpenBSD about 15 years ago. At first I was just fooling around with it, and dual booting as necessary, but once I started using it as a server, I didn’t want the embarrassment of downtime whenever I had to reboot. Then I figured out I could write papers using WordPerfect (via Linux emulation) and stuck with OpenBSD full time.
Scientific publisher Elsevier has donated 45 free ScienceDirect accounts to "top Wikipedia editors" to aid them in their work. Michael Eisen, one of the founders of the open access movement, which seeks to make research publications freely available online, tweeted that he was "shocked to see @wikipedia working hand-in-hand with Elsevier to populate encylopedia w/links people cannot access," and dubbed it "WikiGate." Over the last few days, a row has broken out between Eisen and other academics over whether a free and open service such as Wikipedia should be partnering with a closed, non-free company such as Elsevier.
HHVM 3.10.0 is out! You can get it from the usual places.
HHVM 3.10 was released today as the newest version of Facebook's interpreter for PHP and their Hack programming languages.
Twitter is not waiting to monetize its two-week-old Moments feature, which will run its first ad this weekend.
Advertisers will get their own Moments channel for 24 hours, where they can post and curate content (including images and video) as they see fit. The first to do so is a coalition of MGM, Warner Bros. and New Line Cinema, who are all banding together to push the movie Creed, which is a Rocky spinoff and not a documentary about the Christian rock band.
Published in 1949, “1984” grapples with diverse themes, including the relationship between language and thought, the repression of individuality and the manipulation of information, according to Richard Chwedyk, an adjunct professor in the Creative Writing Department.
Half-and-half scarves have been banned from a supporters' pub in the shadows of Old Trafford .
Despite the enmity between United and City, hundreds of derby day matchgoers have snapped up the 'tourist fans' souvenirs, which many supporters regard as a symbol of the soulless commercialisation of football.
But now The Trafford, on Chester Road, has banned the scarves and the popular boozer is refusing entry to supporters who turn up wearing them ahead of United home games.
"No half & half scarves! No exceptions!! Please place them in the bin and clear your conscience," the sign read on derby day.
While the boom in San Francisco has helped boost business, shops and restaurants are finding that they have no one to make the sales.
“We’re desperate,” said Jefferson McCarley, the owner of Mission Bicycle.
McCarley said he once chased a customer for two blocks down the street after thinking that his noticeably sunny attitude would make him good at sales. Unfortunately for Mission Bicycle, the man was a medical professional.
Chewy Marzolo, who manages Escape From New York pizza on 22nd Street, is hiring a prep cook and has been looking for a few weeks. That used to be the easiest position to fill, “because until recently, that’s something that everyone here knew how to do,” he said. Signs in window would fill the position.
One day in late 1959 or 1960 -- dates aren't totally clear in declassified documents -- a crack team of four CIA agents worked through the night in stocking feet taking apart a kidnapped Soviet Lunik spacecraft without removing it from its crate. They photographed every part and documented every construction element, then perfectly reassembled the whole thing without leaving a trace. It was a daring bit of espionage at the early years of the space race. Intended to level the playing field between two international superpowers, it was a heist that risked turning the cold war hot.
Often, those employing Dridex tricked people into downloading it by sending spam emails with malicious links or attachments, such as XML files and Microsoft Office documents.
WWF says we risk losing species critical to human food security unless action is taken to halt overfishing and other threats to marine life
The good news is that the library is resisting the pressure and keeping Tor running.
Target will be offering Fitbits to its employees in an attempt to improve their health and cut down on health care costs, Bloomberg reports.
Japanese prosecutors have charged the former founder and CEO of bitcoin exchange Mt. Gox with embezzling the money of clients. He faces up to 10 years in prison if convicted.
Late last week, Japanese prosecutors charged Mark Karpelès, the owner of famed Bitcoin exchange Mt. Gox, with embezzlement. Authorities there accused him of stealing millions of dollars worth of bitcoins from customers of Mt. Gox.
This marks the second time Karpelès has been charged in Japan. In July 2015, he was accused of falsifying financial data. For now, the Frenchman remains behind bars in Tokyo.
In a lawsuit filed by Elsevier, one of the largest academic publishers, the operator of Sci-Hub.org is facing millions of dollars in damages. This week she submitted her first reply to the court, scolding the publisher for exploiting researchers and blocking access to knowledge.
Almost 14 years to the day after the 9/11 terrorist attacks drove intelligence spending into the stratosphere, two of the largest business associations in the spying industry held a “summit” meeting to discuss the current state of national security. Two realities were immediately apparent.
A security guard has been banned from operating drone aircraft after admitting flying them over the Palace of Westminster, football stadiums and Buckingham Palace.
Nigel Wilson has been ordered to forfeit the three drones and the cameras he fitted to them because he flew them over built-up areas in “flagrant disregard” for the safety of people below. It is the first time a person has been prosecuted for using drones.
For all the hype surrounding the "Internet of Things" (IOT), it's becoming abundantly clear that the security actually governing the sector is little more than hot garbage. Whether it's televisions that bleed unencrypted, recorded living room conversations, or refrigerators that expose your Gmail credentials, IOT developers were so excited to cash in on the brave new world of connectivity, security was an absolute afterthought. Entertainingly, that has resulted in many "smart" technologies being little more than advertisements for the fact that sometimes, it's ok for your device to be as stupid as possible.
Lidl has said it will become the first UK supermarket to implement the minimum wage as recommended by the Living Wage Foundation.
The Foxification of National Geographic startled a few lemurs in the American media jungle last week. A new joint venture, built on an axis which takes the globally known magazine and its televisual and digital assets from the not-for-profit sector and puts them under the control of the Murdoch family’s 21st Century Fox, caused initial shock and dismay. While outside the US National Geographic might be best known to consumers as the source of monkey pictures in dentists’ waiting rooms, it is a significant investor in science and research; and while the Murdoch millions boosting the endowment are welcome, the shadow of a different editorial line is not. But maybe for once those fears are misplaced.
The European Commission has unveiled its proposals to overhaul the controversial investor-state dispute settlement (ISDS) mechanism, which grants foreign companies a privileged, extralegal system for suing governments over regulations and laws they claim would harm their investments. The Commission hopes the new approach will be included in the TTIP agreement currently being negotiated with the US. Problematically, the new proposals still grant exceptional legal privileges to foreign investors not enjoyed by domestic companies or the public.
Speaking today in Brussels, the Commissioner for Trade, Cecilia Malmström, said she wants to replace traditional ISDS tribunals with a new Investment Court System (ICS). Under the ICS, disputes between companies and countries would be decided by three judges drawn at random from a pool of 15—five from the EU, five from the US, and five from other nations—previously chosen jointly by the EU and US. The proceedings would be held in public, rather than in secret as with the current ISDS approach, which is based on ad-hoc tribunals formed of three specialist lawyers.
There is a major vulnerability in a library in iOS that allows an attacker to overwrite arbitrary files on a target device and, when used in conjunction with other techniques, install a signed app that the device will trust without prompting the user with a warning dialog.
Oliver later discussed the ordeal of a Floridian who was arrested on a traffic violation and racked up over $600 in court fees in order plead “no contest.” “They may as well as charged him an irony fee,” Oliver said, “because as it turns out, being poor in Florida is really fucking expensive.”
The Federal Communications Commission yesterday said it did not violate the First Amendment rights of Internet service providers when it voted to implement net neutrality rules.
Broadband providers who sued to overturn the rules claim their constitutional rights are being violated, but the FCC disputed that and other arguments in a filing in the US Court of Appeals for the District of Columbia Circuit.
British cyber-security experts have uncovered a trove of hundreds of millions of email addresses being used as a hitlist by criminals stealing financial data from banks, government bodies and other corporates.
Specialists at GCHQ have been alerting companies named in the files, as an international investigation seeks to track down those using it.
The hot social-networking startup is offering customers in the US the opportunity to re-watch photos and videos they've already seen, part of the latest effort to expand its business.
Adult movie studio Malibu Media has received a slap on the wrist from New York federal judge Katherine Forrest. The company asked permission to interrogate the neighbors and spouse of an accused downloader, a tactic the court equates to harassment.
A controversial UK Conservative party video portraying the Labour party's new leader in a negative light has been taken down by YouTube. The advert, which attacked incoming Labour leader Jeremy Corbyn, contained copyrighted content not authorized for use by the Tories. In fact, the footage is owned by a staunch Corbyn supporter.
After two winters of extremely low precipitation, California is suffering through a severe drought, one exacerbated by unusually warm weather. The heat influences the drought in part by enhancing evaporation, ensuring that less of the limited precipitation stays in the ground. But it also changes the dynamics of how the precipitation falls. That's because most of the precipitation comes in winter, and temperatures control whether it falls as rain or snow.
The snow cover on the iconic US mountain range of Sierra Nevada has hit a 500-year low, with the snowpack in April this year just 5 per cent of the average volumes recorded for that month between 1951 and 2000.
As the US presidential election season heats up, the public has focused on the candidates vying for the nation’s top office. But whether Donald Trump will secure the Republican nomination is secondary to a more serious quandary: whether the nation’s voting machines will hold up when Americans head to the polls in 2016.
Nearly every state is using electronic touchscreen and optical-scan voting systems that are at least a decade old, according to a report by the Brennan Center for Justice at New York University School of Law (.pdf). Beyond the fact the machines are technologically antiquated, after years of wear and tear, states are reporting increasing problems with degrading touchscreens, worn-out modems for transmitting election results, and failing motherboards and memory cards.
Online privacy projects come and go. But as the anonymity software Tor approaches its tenth year online, it’s grown into a powerful, deeply-rooted privacy network overlaid across the internet. And a new real-time map of that network illustrates just how widespread and global that network has become.
All-in-all, this is an exciting development, and one that could have a major impact on scholarly publishing if it is taken up more widely. However, the fact that it took even its inventor over two years to create his first diamond open access title shows that it is likely to be a while before that happens.
How did an unknown no-hoper end up winning the race to become leader of the Labour Party by a huge margin? Digital technology seems to have played a key part. According to The Guardian, the campaign deployed its own special canvassing app, "which allows anyone in the country to set up a phone bank on their home computer—making calls, listing questions to be asked and providing a place for answers to be registered." The app was specially created by a volunteer, many of whom were recruited through an extensive use of social media by Corbyn supporters.
Once considered a fringe candidate, Corbyn won a huge mandate. But can he consolidate the party and keep new voters energized?
A federal district court has ordered the FBI to lift an eleven-year- old gag order imposed on Nicholas Merrill forbidding him from speaking about a National Security Letter (“NSL”) that the FBI served on him in 2004. The ruling marks the first time that an NSL gag order has been lifted in full since the PATRIOT Act vastly expanded the scope of the FBI’s NSL authority in 2001. Mr. Merrill, the executive director of the Calyx Institute, is represented by law students and supervising attorneys of the Media Freedom and Information Access Clinic, a program of Yale Law School’s Abrams Institute for Freedom of Expression and Information Society Project.
Five years ago, we wrote about a pretty big victory against National Security Letters (NSLs), which the government has long used to get around the 4th Amendment, demanding information from companies, complete with a perpetual gag order. In 2007, an anonymous ISP owner fought back, speaking out against the whole gag order thing, but not even being able to say what ISP he was associated with, because of that gag order. In 2010, Nicholas Merrill, of Calyx Internet Access, was finally able to admit that he was the one fighting the gag order -- after reaching an agreement with the government (and that was after a number of trips back and forth between the district and appeals courts). Now, five years later, a federal court has finally ruled that the gag order, which was issued back in 2004, should be lifted, because the government has no "good reason" for keeping it in place and keeping the gag order would violate the First Amendment. You can read the redacted order here, which is an interesting read. Basically, a permanent gag order doesn't really fit with that whole First Amendment thing we have here in the US -- but the court prefers to focus on whether or not there's any reason to keep the order in place now.
Are you a computer scientist? A network engineer? Have you developed a new web-based protocol? If so, we want you to sign on to a statement [PDF] explaining to the DC Circuit Court that openness and neutrality are fundamental to how the Internet was designed and how it operates today.
Condé Nast president Robert A. Sauerberg Jr. will take over as CEO effective January 2016, with current chief exec Charles Townsend to become chairman of the publishing company.
As part of the shuffle at the top, S.I. Newhouse Jr. will assume the role of chairman emeritus.
Sauerberg, 54, joined the company in 2005 as executive VP. Previously he held senior leadership roles at Fairchild Fashion Media, including COO and CFO, and spent 18 years with the New York Times Co., eventually rising to CFO of its magazine group.
Last week, we wrote about how the famous hacker magazine 2600 received a copyright threat letter concerning the cover of its Spring 2012 issue (which, we noted, meant that the three-year statute of limitations had passed for a copyright claim anyway). But this was even worse, because the "claim" was over some ink splotches that were in the background of an image that the threat letter claimed copyright over, and which 2600 used a tiny bit of on its cover. Except... that the splotches themselves were actually from a Finnish artist going by the name Loadus, and licensed freely for either commercial or non-commercial use.
Now, the odds are small that police will run into conflicting, duplicate addresses, but this fact makes it impossible to guarantee that tracking down a MAC address actually means tracking down a stolen device. For that reason alone, L8NT's architecture may be changed to grab more identifying info… which will lead to more questions about the constitutionality of the device, which will act like a low-level search of a home's electronics. Its impact will also be blunted by the information it seeks, considering not every device is assigned a MAC address and addresses are unobtainable unless they're turned on and connected to a Wi-Fi network.
The former operators of Megaupload have failed in a last-ditch effort to delay their U.S. extradition hearing. Kim Dotcom and his associates argued for more time to prepare but the Court of Appeal said it was confident a fair hearing would be forthcoming. In response, Dotcom branded the NZ judiciary a "US owned dancing bear".
Professor Lawrence Lessig has provided an expert opinion in support of Kim Dotcom and his Megaupload co-defendants. In submissions filed today in New Zealand, the Creative Commons co-founder and U.S. presidential candidate concludes that the U.S. DoJ has not made a case that would be recognized by United States federal law and be subject to the US – NZ Extradition Treaty.
As Kim Dotcom's extradition case appears set to finally be heard (after many, many delays), Dotcom has brought in some interesting firepower. Presidential candidate and famed legal scholar Larry Lessig has submitted an affidavit that completely destroys the DOJ's case. He argues not only that Dotcom's actions do not amount to any sort of extraditable offense, but that they don't even seem to be against US law at all. If you've been following the case at all, you know that under the US/New Zealand extradition treaty, copyright infringement is not an extraditable offense. That's why the US has lumped in a bunch of questionable claims about "conspiracy" and "wire fraud." But most of those are just repeating the infringement claims in different ways.
The position of the United States is extreme and wrong. We must resist this extremism. Aaron’s death must mean at least that.
Politics and intellectual property always get weird and silly, often during Presidential election season. Following on last year's insanity in which Hillary Clinton's PAC tried to take down parodies on CafePress and Zazzle, presidential candidate Ben Carson has apparently decided no one should possibly be allowed to create any kind of Ben Carson merchandise, except for the Ben Carson PAC, and he's decided to list out every possible intellectual property argument he can think of: copyright, trademark, privacy rights. I'm almost surprised he didn't find a way to include patents too.
It was Carly Fiorina’s night last night. In the very crowded Republican clown car full of fatuous blowhards and screaming hawks, she stood out by being able to think on her feet quickly enough to use standard lines from her well honed, road tested stump speech to good effect as if they were spontaneous answers to the question. Compared to the others she seemed sharp and well-informed and the media dubbed her the big winner.
Fiorina has come a long way since the days of the “Demon Sheep.”
Some rich people don't hoard their cash or flaunt it as a status symbol so much as they use it as a dirty green cheat code. If life was a video game, they'd be the asshole kid with the turbo controller who can't ever lose. Meanwhile, the rest of us have to watch them have fun from the sidelines, vainly hoping we'll get a chance to touch the Super Nintendo before Mom comes to pick us up. ("Mom" in this case means the Grim Reaper, if that wasn't clear.)
Nowadays, excessive riches can get you more than bigger houses and hired help. People are using it to buy stuff that really shouldn't be buyable.
In other words, Litt admits that his side has lost this battle, but he doesn't want the administration to come out totally against legislation, because, you know, if there's an attack, then maybe the idiots in the public will finally accept the intelligence community shoving backdoors down their throat. After all, such a plan worked out pretty well with the PATRIOT Act, which took a bunch of bad and rejected ideas and rushed them into law. In fact, it's almost amazing that the law enforcement community didn't get backdooring encryption into the PATRIOT Act back in 2001 in the first place...
Over the last few months, I've heard rumblings and conversations from multiple people within the Obama administration suggesting that they don't support the FBI's crazy push to back door all encryption. From Congress, I heard that there was nowhere near enough support for any sort of legislative backdoor mandate. Both were good things to hear, but I worried that I was still only hearing from one side, so that there could still be serious efforts saying the opposite as well. However, the Washington Post has been leaked quite a document that outlines three options that the Obama administration can take in response to the whole "going dark" question. And the good news? None of them involve mandating encryption. Basically, the key message in this document is that no one believes legislation is a realistic option right now (more on that in another post coming shortly).
We've previously discussed how in 1993 Verizon conned the state of New Jersey into giving the telco all manner of subsidies and tax breaks in exchange for a promise to wire the majority of the state with symmetrical fiber. Fast forward to 2015, most of New Jersey remains on aging DSL, and the state decided it would be a wonderful idea to simply let Verizon walk away from its obligations. Of course this isn't new: Verizon's regulatory capture allowed it to do the exact same thing in Pennsylvania, and it's currently busy trying to dodge New York City FiOS build out requirements as well.
Back when Verizon sued to overturn the FCC's original, flimsier 2010 net neutrality rules, the telco argued that the FCC was aggressively and capriciously violating the company's First and Fifth Amendment rights. "Broadband networks are the modern-day microphone by which their owners engage in First Amendment speech," Verizon claimed at the time. It's an amusing claim given that the entire purpose of net neutrality is to protect the free and open distribution of content and data without incumbent ISP gatekeeper interference. Verizon ultimately won its case against the FCC -- but not because of its First Amendment claim, but because the FCC tried to impose common carrier rules on ISPs before declaring they were common carriers.
In the 2012 presidential election, the biggest foreign policy issue was the killing of the US ambassador to Libya Christopher Stevens in September of that year–an incident known by its location: Benghazi. Now, as we gear up for the 2016 presidential race, it looks like the biggest international issue is going to be–Benghazi.
The world is a big place, though you wouldn’t necessarily figure that out if you learned about it solely through electoral politics; in the debates between Barack Obama and Mitt Romney and their running mates in 2012 (FAIR Media Advisory, 10/26/12), there were 14 questions raised about other countries, and only one of those questions (about China) had to do with anyplace outside the Middle East (broadly defined, from Pakistan to Libya). And three of the 14 questions had to do with Benghazi–as many questions as were asked about Afghanistan, where at the time the US had more than 60,000 troops engaged in a ground war.
Clear drone footage showing the ongoing Syrian army offensive against a rebel stronghold in Damascus.
The theory there is that if drones weren’t be launched willy-nilly at ISIS, they’d be more able to carry out major attacks, and thus the attacks are doing what they’re intended to do. Yet ISIS seems to continue to carry out major attacks across Syria on a regular basis, which makes these claimed results, like so many others, illusory.
American whistleblowers hailed the release on Thursday of a collection of classified documents about US drone warfare as a blow on behalf of transparency and human rights.
The documents anchored a multi-part report by the Intercept on the Defense Department assassination program in Yemen and Somalia. Amnesty International, the American Civil Liberties Union (ACLU) and other rights groups said the report raised significant concerns about human rights violations by the US government, and called for an investigation.
We’ll also talk about the new top-secret NSA documents detailing the US drone program, which were leaked to The Intercept. How are US media reporting on US drone policy? Join the conversation on the next Your Call, with Rose Aguilar and you.
The above leak is a direct contradiction with President Barack Obama’s previous assertion to the American people that drone attacks have a “near-certainty that no civilians will be killed or injured.” While it’s clearly not panning out that way, the U.S. has a solution for that: automatically labeling anyone killed by a drone attack an “enemy” rather than a civilian.
If proof emerges that one of the killed was definitely an unaffiliated civilian, the U.S. will change the designation, but the country does not seem to be trying to reclassify anyone it doesn’t have to in order to keep the civilian count low. Though it’s true that at least some of the people adjacent to suspected terrorists are probably associated with these activities and not necessarily “innocent,” the fact is that they haven’t even first been vetted as potential threats.
Jeremy Scahill opens The Intercept's big whistle-blower-driven piece on the drone assassinations with an important point: What we're doing is extrajudicial killings. Assassinations. The U.S. has always done these (and torture too, of course), but until recently we've tried at least to maintain what the spy guys call "plausible deniability." No more. Now we just renamed them "targeted killings" and claim the victims are an "imminent threat." And we define imminent as "in the foreseeable future, possibly." And of course we make a list. Scahill's source is not comfortable with it: "This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them 'baseball cards,' assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong," the source told Scahill. The problem is not just moral, though, it's practical. We're killing people who could provide useful information if they were captured instead. And we're relying too much on "signals intelligence" (i.e. the vast data sweeps the NSA specializes in) instead of "human intelligence." We're doing this because it's convenient for war fighters. Incidentally, The Intercept uses the headline "The Kill Chain." That's the same one City Paper used a few years back when we tried to trace drone research through and by Johns Hopkins. The idea is to bring even more convenience in the future with autonomous drones that kill without human input. (Edward Ericson Jr.)
The Colombian government and the continent’s mightiest and longest-surviving guerrilla army, the Revolutionary Armed Forces of Colombia, or FARC, are set to finalize a bittersweet peace agreement next spring with no victors, millions of victims, and just enough justice to basically turn a page on decades of unrelenting bloodletting.
Of all the foreign problems facing prime minister-designate Justin Trudeau, the war in Syria and Iraq remains the most nettlesome.
It is tied to almost everything.
The Syrian refugee crisis that dominates headlines in Europe — and that made its way into the Canadian election campaign — is a direct result of that war.
Canada’s fraught relationship with Russian President Vladimir Putin over Ukraine is complicated by Moscow’s direct diplomatic and military involvement in Syria.
Tony Blair has apologised for some of the mistakes that were made during the Iraq War, and says he recognises “elements of truth” behind opinion that the invasion caused the rise of Isil.
In a candid interview with CNN, the former prime minister was challenged by US political broadcaster Fareed Zakar who accused Blair of being George Bush’s ‘poodle’ over the conflict.
At The Fact Checker, we place the burden of proof on the speaker. Trump has not responded to repeated requests by us or other media outlets for proof of his early opposition to the invasion.
Military action began on March 20, 2003. An extensive review of 2003 news coverage prior to March 20 surfaced just two references of Trump and his views on the invasion, as BuzzFeed News found during the GOP debate. The Huffington Post also wrote an analysis of Trump’s Iraq claims during the GOP debate, and again after Trump’s claims in October.
When then-freshman Vermont Congressman Bernie Sanders first arrived in Washington, D.C., he didn’t first tend to the great social democratic causes that he spent his life working on: a national living wage, health care for all, or expanding labor unions.
Rather, the very first bill he introduced was H.R. 695 – the Guard and Reserve Family Protection Act of 1991. The purpose of the bill was to make sure that reserve and National Guard soldiers who were deployed to serve in the Gulf War were entitled to any pay they may have missed as a result of going to war, to ensure that their deployment wages were equal to their civilian wages.
British broadband provider TalkTalk said on Sunday it had hired defense company BAE Systems to investigate a cyber attack that may have led to the theft of personal data from its more than 4 million customers.
A key reason that the US has so many wars is that big US media have a strong pro-war, pro-Empire bias.
Last year, I stopped travelling to Indonesia. I simply did… I just could not bear being there, anymore. It was making me unwell. I felt psychologically and physically sick.
Indonesia has matured into perhaps the most corrupt country on Earth, and possibly into the most indoctrinated and compassionless place anywhere under the sun. Here, even the victims were not aware of their own conditions anymore. The victims felt shame, while the mass murderers were proudly bragging about all those horrendous killings and rapes they had committed. Genocidal cadres are all over the government.
[...]
After the 1965 coup backed by the US, Australia and Europe, some 2-3 million Indonesians died, in fact were slaughtered mercilessly in an unbridled orgy of terror: teachers, intellectuals, artists, unionists, and Communists vanished. The US Embassy in Jakarta provided a detailed list of those who were supposed to be liquidated. The army, which was generously paid by the West and backed by the countless brainwashed religious cadres of all faiths, showed unprecedented zeal, killing and imprisoning almost everyone capable of thinking. Books were burned and film studios and theatres closed down.
Ten years later, after he had completed his studies in Mussoorie in 1969, Tunduk volunteered for a secretive all-Tibetan unit in the Indian army called Establishment 22, which the U.S. CIA helped stand up and train when China attacked India in the 1962 Sino-Indian War. Tunduk went through six months of basic training, which included jump training taught by CIA instructors, whom Tunduk remembered as “blond and tall.”
[...]
The Chinese soldiers tied Tunduk’s father’s arms and legs behind his back, beat him, and then shot him in the head. Next, they painted a target in charcoal on Tunduk’s mother’s chest, suspended her by her arms from two wood poles, and used her for target practice, pumping her body with bullets long after she was dead.
Mohammed Mossadegh, Iran’s democratically elected prime minister, was the farthest thing from a Communist, but painting him as reliant on Communist support was pivotal to turning public support against him and to building support at home in the US for his overthrow. But to what end? Why did the US turn from a supporter of Iranian democracy under President Truman, to plotting its destruction and imposing a dictatorship under President Eisenhower? Was it simply a paranoid (and wholly inaccurate) fear of Communism? Was it the ambitious, power-seeking aspirations of US intelligence agencies, keen on building their power-base and budgets by engineering the perception of fake threats to the US? Was it US corporate desire to control Iranian oil, in the face of efforts by Iran’s democratic government to nationalize its own resources (long plundered by western countries)?
A University of Washington human rights project is suing the Central Intelligence Agency for refusing to declassify and turn over documents relating to the U.S. role in El Salvador’s civil war and involvement in massacres by a retired Salvadorian colonel who was for a time the favorite of Americans.
We’re not sure how a question can be true or false, but to suggest that it’s implausible for the CIA to have burgled a professor’s office is patently ridiculous. This is an agency that, for nearly seventy years, has drugged, kidnapped, tortured, assassinated, burgled and bungled its way through history, banking heavily on the fact that clandestine operations, by definition, lack strong oversight.
The Centre for Human Rights at the University of Washington said in a statement published on its website that the break-in could have been in retaliation for its work, pointing out a number of peculiarities about the incident.
On Wednesday, the Stranger posted a fascinating blog titled, "Two Weeks After It Sued the CIA, Data Is Stolen from the University of Washington's Center for Human Rights." In short, the UWCHR filed a lawsuit against the CIA looking for information about war crimes committed in El Salvador (earlier in the month, the Stranger published "The University of Washington Is Taking the CIA to Court: Seeking Justice for Survivors of a Massacre in El Salvador, the Center for Human Rights Is Suing the Agency Over Withholding Public Records," by Ansel Herz) and then last weekend, someone broke into the Center For Human Rights' director's office and stole her desktop and a hard drive containing information pertaining to this case. On top of the whole thing just looking sketchy as hell, UWCHR pointed out that there was no forcible entry and that there were plenty of other computers in the building to steal and that this theft "parallels between this incident and attacks Salvadoran human rights organizations have experienced in recent years." Herz asked the CIA if they had anything to do with the theft, and they denied it. Herz also pointed out that the CIA "is an agency that assassinates people with drones, tortured prisoners, has helped to carry out bloody coup d'etats, and whose analysts were accused of hacking and stealing the data of senators who were investigating the agency just last year." (Brandon Soderberg)
The American Civil Liberties Union (ACLU) pressed ahead on Monday with a lawsuit to compel the CIA to turn over basic details about the US program of clandestine drone warfare, a week after startling contours of the program emerged in a new leak by an anonymous intelligence source.
The ACLU lawsuit seeks summary data from the CIA on drone strikes, including the locations and dates of strikes, the number of people killed and their identities or status. The ACLU also is seeking memos describing the legal reasoning underpinning the drone program.
As readers of this blog already know, last week The Intercept published a series of fascinating stories about the US drone campaign. The stories, and the official documents that accompany them, supply new details about the way the government chooses its targets, the way drone strikes are authorized, the way the government assesses civilian casualties, and the way the government judges the success or failure of individual strikes.
The American Civil Liberties Union (ACLU) has lodged a lawsuit compelling the CIA to turn over basic details about US drone strikes.
The lawsuit was filed Monday a week after shocking contours of the program were revealed by an anonymous intelligence source.
The American Civil Liberties Union (ACLU) is pressing ahead with a lawsuit calling on the CIA to release crucial information about the US' drone warfare program, amid calls for greater transparency into the intelligence agency's actions.
Advocacy group Consumers For Peace.org Director Nick Mottern claims that the videos of drone strikes launched by the US government against Islamic militants in Iraq and Syria should be released to the public.
The Central Intelligence Agency is under renewed legal pressure to release “thousands” of records pertaining to its international drone war, following an appeal filed Monday by the American Civil Liberties in Washington, D.C. The motion comes just days after The Intercept published an eight-part series based on cache of secret documents detailing the U.S. military’s parallel reliance on unmanned airstrikes in the war on terror.
The ACLU on Monday filed an appeal brief demanding that the Central Intelligence Agency (CIA) hand over data on its secretive global drone program, including the identities of people killed by airstrikes carried out by the U.S. military in Yemen, Somalia, and Afghanistan.
The American Civil Liberties Union is pressing forward with a lawsuit against the CIA demanding the agency turn over details about the U.S. drone program after a massive document leak revealed startling details about how targets are chosen and the number of civilians that have been accidentally struck.
The mothers have condemned as "callous" a Republican-led advert using their sons' legacies to try to destroy Hillary Clinton's presidential campaign
Guatemala’s current situation and tragic history can be traced back to the CIA-led coup in 1954 that ousted the democratically elected government of President Jacobo Arbenz and installed the military dictator Carlos Armas. Arbenz was an advocate for land reform and was loved by the poor. The wealthy hated him. And when the CIA couldn’t bribe him, they ousted him in a most humiliating way. Even after he went into exile, the agency used constant disinformation to smear him in every way imaginable until his strange death in a bathtub in 1971.
Salvador Allende was elected Chile’s president on 24th October, 1970.
An avowed Marxist, and the first socialist leader of the South American country, Allende’s election went on to trigger one of the most controversial, tragic periods in Chile’s history.
The US response to Allende’s election revealed the extent to which the North American superpower was willing to get involved in South American politics. To this day, documents are still classified about what actions the White House sanctioned in Chile as a means to remove Allende.
[...]
Democratically elected, Allende’s government was targeted by the United State’s for its socialist policies. Its successor, the dictatorship of Pinochet, was much more conservative, and allowed US investment back into Chile. It was also notorious for its brutal human rights violations.
Guevara’s eyes were famously opened to the harsh reality of capitalism for those born less privileged than him when, as a medical student in his early 20s, he hopped on a motorcycle and went on a tour of South America. He found disease, destitution and illiteracy – along with the sort of compassion and generosity that appears to be inversely related to the amount of wealth one possess. From that point on, he labored to uplift the working class from Cuba to Guatemala to the Congo. And, although his death was premature, his legacy continues to serve as an inspiration to revolutionaries around the world today.
The Wikileaks’ latest exposé on CIA Director John Brennan’s private emails reveals the role of Pakistan’s use of militant proxies for creating terror in India.
This partial timeline provides evidence that the U.S. government and Obama in particular bear a significant responsibility for the Syrian war and the results of that war. Obama approved elements of CIA plans that go back over 65 years. The CIA meddling is distinct from the Pentagon’s failed plan to train moderate rebels, not covered in this timeline.
Yesterday, two large rebel umbrella groups—Jaysh al-Fateh (Army of Conquest), a large consortium of Islamists which includes the official Syrian al-Qaeda franchise, and the Free Syrian Army, an admittedly catchall category but one that includes 39 CIA-vetted TOW recipients—announced a major counteroffensive.
Syrian Archbishop Jacques Behnan Hindo says he was disturbed to hear US Senator John McCain protesting that the Russians are not bombing the positions of the Islamic State, "but rather the anti-Assad rebels trained by the CIA."
Citing activists and anonymous government sources, US media outlets claim that Russian airstrikes are deliberately targeting the US-backed rebels, as Iranian and even Cuban troops are streaming into Syria.
The decision to help the rebels comes after growing frustration by the US with Russia, which has entered the war in support of Assad. While the US and Russia both agree that ISIS should be eradicated, the two countries do not agree on who should be in power in Syria.
Two Russian air strikes in Syria on Thursday hit a training camp operated by a rebel group that received military training from the U.S. Central Intelligence Agency (CIA) in Qatar and Saudi Arabia, its commander said.
Russia on Thursday escalated its military engagement in Syria, with warplanes carrying out a second day of heavy airstrikes in the wartorn country, as U.S. critics hurled fresh accusations at Vladimir Putin's intentions in the region.
Sen. John McCain (R-Ariz.), chairman of the Senate Committee on Armed Services, said that Russia is not focused on bombing Islamic State targets, and accused the country of targeting CIA-backed rebels seeking to topple Moscow's ally, Syrian President Bashar Assad.
Moscow says it targets only banned terrorist groups in Syria, primarily Islamic State.
The chief of Australia’s domestic spy agency, Asio, defied a direct order from then Labor prime minister Gough Whitlam in 1974 to sever all ties with America’s Central Intelligence Agency.
Whitlam – hostile to US spy bases in Australia and angy with the CIA’s undermining of leftwing administrations, including Chile’s Allende government in 1973 – effectively forced the Washington-Canberra intelligence relationship underground until the dismissal of his government in late 1975.
The decision by the director general of the Australian Security Intelligence Organisation, Peter Barbour, to ignore Whitlam’s directive is revealed in the latest volume of Asio’s official history by historian and former army officer John Blaxland.
Since 1980, the United States has intervened in the affairs of fourteen Muslim countries, at worst invading or bombing them. They are (in chronological order) Iran, Libya, Lebanon, Kuwait, Iraq, Somalia, Bosnia, Saudi Arabia, Afghanistan, Sudan, Kosovo, Yemen, Pakistan, and now Syria. Latterly these efforts have been in the name of the War on Terror and the attempt to curb Islamic extremism.
Yet for centuries Western countries have sought to harness the power of radical Islam to serve the interests of their own foreign policy. In the case of Britain, this dates back to the days of the Ottoman Empire; in more recent times, the US/UK alliance first courted, then turned against, Islamists in Afghanistan, Iraq, Libya, and Syria. In my view, the policies of the United States and Britain—which see them supporting and arming a variety of groups for short-term military, political, or diplomatic advantage—have directly contributed to the rise of IS.
This year’s best spy thriller isn’t fiction – it’s history. David Talbot’s previous book, the bestseller “Brothers: The Hidden History of the Kennedy Years” explored Robert F. Kennedy’s search for the truth following his brother’s murder. His new work, “The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government,” zooms out from JFK’s murder to investigate the rise of the shadowy network that Talbot holds ultimately responsible for the president’s assassination.
This isn’t merely a whodunit story, though. Talbot’s ultimate goal is exploring how the rise of the “deep state” has impacted the trajectory of America, and given our nation’s vast influence, the rest of the planet. “To thoroughly and honestly analyze [former CIA director] Allen Dulles’s legacy is to analyze the current state of national security in America and how it undermines democracy,” Talbot told Salon. “To really grapple with what is in my book is not just to grapple with history. It is to grapple with our current problems.”
During the past few years, CIA operatives stationed in Thailand were frequently visiting the red villages in the North and Northeast of Thailand. Why?
Soon after he was elected president, Barack Obama was strongly urged by Michael Hayden, the outgoing CIA director, and his new top counterterrorism adviser, John Brennan, to adopt the way of the scalpel — small footprint counterterrorism operations and drone strikes. In one briefing, Hayden bluntly told Obama that covert action was the only way to confront al Qaeda and other terrorist groups plotting attacks against the U.S.
“9/11 could have been prevented and there really is not just one way, there’s probably at least half a dozen ways 9/11 could have been prevented,” Rowley said. “For starters, the CIA had been tracking two of the hijackers since they met in Kuala Lumpur two years before 9/11. And after all these years we still don’t know the answer to that main question. Why was this information not shared?”
Coleen Rowley and Ray McGovern spoke to a full conference room at University Book & Supply as part of a nine-city Iowa tour dubbed "The Truth Shall Make You Free," sponsored by the state's three chapters of Veterans for Peace and 31 other organizations. They also spoke at the Waterloo Center for the Arts on Saturday.
Our Founding Fathers feared democracy. From these fears, and in order to form a more perfect union, the Constitution and our Republic were born. This revolution in government was adopted in the wake of a tremendous fight for independence. Against all odds, our country was born out of a state of oppression and limited personal freedom. There are few points in history that exhibit such a level of individual responsibility and absolute freedom among the common man as there were during this Constitutional period.
The US’ Central Intelligence Agency (CIA) has accused Australian Julian Assange, the founder of WikiLeaks, the controversial anti-secrecy venture, of “malicious crime” in the leak of hacked emails of its director John Brennan. As the cult figure wanted in Sweden for questioning on a rape accusation, he says he is innocent. As he fights extradition from Ecuador’s diplomatically immune embassy in the UK, fiction lovers would logically expect James Bond to show up from somewhere in Her Majesty’s name.
The CIA director is a prime target of attacks by civil libertarians and others concerned about privacy, torture and drone attacks.
WikiLeaks released two more documents and a list of contacts from CIA Director John Brennan's personal email account on Thursday — and again the material was neither classified nor revelatory.
Six other documents were released by WikiLeaks on Wednesday, days after an anonymous hacker told the New York Post that he had gained access to Brennan's AOL account. The account was also used by other members of the Brennan family.
The FBI and U.S. Secret Service have opened criminal inquiries into the hacking of a private email account used by CIA Director John Brennan and his family, the FBI said on Thursday.
The investigations followed the posting on social media earlier this week by the hackers of data stolen from an AOL account. Intelligence officials said the account was used by Brennan and his family, but was not used to transmit or store government secrets.
Lots of headlines and news accounts are reporting that the people that hacked the AOL email account of CIA Director John Brennan are high-schoolers or teens, but the Observer could find little reporting on any effort to verify their ages.
Part of a mysterious group of young hackers who stole confidential and work-related information from CIA Director John Brennan have spoken to RT, revealing why they targeted this senior official and what they’ve got planned for the future.
The resulting embarrassment caused by the group who are believed to be in their early 20s, highlights not only the poor email security of a number of senior intelligence officials in the US, but also the secrets within – such as the security clearance application Brennan submitted to the CIA on enrollment, containing the most confidential information any person could wish to protect.
Over-classification of documents is the weapon of choice wielded by the U.S. government to punish whistleblowers and keep the American people in the dark about its actions around the world. But the well-connected, like Hillary Clinton, get special forbearance, notes Diane Roark.
If the CIA’s Director John Brennan can’t keep his emails private, who can? Sadly, the fact that email and instant messaging are far more convenient than communicating via papers in envelopes or by actually talking on the phone, or (God forbid) face to face, these technologies are far more insecure. Could it be that the old ways protected both secrecy and privacy far better than what we have now?
Lauded as heroes by some, denounced as traitors by others, they're the "digital dissidents" whose revelations have made headlines around the world.
"Criticise me, hate me, but think about what matters in the issues. Right? Think about the world you want to live in." Edward Snowden
The decision by former US National Security Agency contractor Edward Snowden to reveal covert US surveillance programs exposed the massive capabilities of the US spy agency to monitor communications around the globe.
CIA director John Brennan reportedly used his AOL account to store possibly classified -- or, at very least, sensitive -- materials.
It will go down as one of Wikileaks’ more astonishing achievements that it managed to turn the director of the CIA—a man who some have vilified as the architect of the drone wars and an endorser of torture—into a sympathetic character.
WikiLeaks has vowed to release what will likely be even more tedious personal information in the coming days.
Three molten nuclear reactor cores are still missing and the radioactive contamination that this 300 ton mass of ‘corium’ continues to generate & release shows no signs of abating, in fact is increasing.
The LinkedIn profile of a former officer of the company lends credibility to that argument. In it, he boasts that as part of the Koch Industries’ communication team, he helped write opinion columns and letters that were signed by members of Congress.
Richard Tucker, a former communications manager at Koch Industries from August 2010 thro ugh March 2012, wrote in his LinkedIn profile that he was responsible for “op-eds and letters to the editor that were signed by company leaders, members of congress and citizen activists.” Tucker, a writer and editor for a number of conservative websites, said he also wrote “regular blog posts for company employees to help explain important Washington policy debates” and was a member of the “crisis communication team that produced swift responses to negative press coverage.”
Conservation charities have expressed alarm at plans for a Chinese-built nuclear power station in Essex, with one saying the plant could have “major impacts” on the estuary location, a haven for birds and marine life.
The new reactor in Bradwell, on the heavily protected Blackwater estuary, east of Chelmsford, could be confirmed this week during a state visit to Britain by China’s president, Xi Jinping.
The conservation concerns come on top of worries over the security implications of Chinese involvement in the UK nuclear industry.
It is time to admit the truth: meritocracy is BS. What we really have is a system run by people who create arbitrary measures of worthiness to perpetuate a status quo, a power structure that benefits them. Getting rid of the system and replacing it with one in which everyone’s unique gifts are valued equally — that would be meritocratic.
In this interview, we discuss wages, a pertinent current topic with the ongoing struggle for $15/hr, stagnating worker incomes, and what will be TPP’s further attack on wages in the United States. More importantly, what began as a discussion of wages quickly developed into a much broader critique of the current system’s political economy, and a way to fundamentally alter the way we produce, distribute, and consume. It is not enough to bargain with capitalists. We must instead look to how workers can take over the means of production and employ them for the benefit and wellbeing of all.
In a political and economic system seemingly tailor-made for the 1 percent, backlash against “wealth therapy” — the trend of moneyed Americans seeking counsel through their Occupy-induced feeling of shame and isolation — is well-placed. While the top 0.1 percent of families in the United States possess as much wealth as the bottom 90 percent, money psychologist Jamie Traege-Muney moaned to The Guardian that the movement wrongly “singled out the 1 percent and painted them globally as something negative.”
But a growing cadre of this statistical owning class are now crafting a healthier relationship to the rabble at their doorstep. Responding to Occupy and other movement moments, young people with wealth are organizing the resources of their peers and families to level the playing field — and support one another in the process.
Earlier this week, Amazon dragged itself back into the news with a retort to the New York Times over the paper’s scorching coverage: The two-months later response reminded people how devastating the Times’ story on the company’s white-collar workforce had been. That piece that chronicled a demoralized, overworked office staff in painful detail was surely revisited by many readers.
But a new story about the way Amazon treats workers lower down the food chain is even more poignant: “The Life and Death of an Amazon Warehouse Temp,” in the Huffington Post, spends most of its time on one 29-year-old man who died while toiling in a Virginia “fulfillment center.” The story’s detailed look at the life of Jeff Lockhart Jr. helps humanize the piece. But overall, what the rigorously reported and sharply written story exposes is a larger crisis among low-wage workers: One that’s being very profitably exploited by temp companies.
The majority of the story concerns Lockhart, who came in as an Amazon temp after being laid off at a building supply store. A burly, 300-pound guy who married his high school sweetheart – they had three children between them – he worked as a “picker,” taking orders from a handheld scanner. He was fast and good. The constant labor at the speeds required, perhaps, was not especially healthy for a man of his size. One winter morning about 2 a.m., he went to eat “lunch” in his car, called his wife, and went back to work. “Less than an hour later,” reporter Dave Jamieson writes, “a worker found Jeff on the third floor. He had collapsed and was lying unconscious in aisle A-215, beneath shelves stocked with Tupperware and heating pads.”
BILL O'REILLY: "Bill, I disagree with your comparison of Black Lives Matter to American Nazis." [I] did not make that comparison, Talli. Didn't make it. I asked if the Republican group -- if a Republican group -- embraced a radical group like Stormfront, would that be acceptable? In light of the Democrats not having a problem with Black Lives Matter? It's all about radicalism.
Jeb Bush has evidently never seen the memo given to George W. Bush in August 2001 about Osama bin Laden’s determination to attack the United States and perhaps hijack airplanes.
He went on Fox News last night to criticize Hillary Clinton over #Benghazi, but Megyn Kelly wanted to know why it was right to criticize Clinton for the deaths in Libya, but not his brother for the deaths on September 11. He insisted there was no double standard.
“Not at all because if someone had evidence that there was a pending attack, there was — a lot of investigations after 9/11, if there was evidence that there was an attack that was pending and no one acted, of course there were have been criticism, but that’s not the case.”
Singaporean teenage vlogger Amos Yee has said that he and Scholarism convenor Joshua Wong are completely different, to which Wong responded by saying that Yee was braver than himself. The comments came after an article on Fusion featured the pair and named them as examples of “a new generation of teen activists who are shaking up politics in Asia”.
What would you show your in-laws? A doodle of Lee Kuan Yew and Margaret Thatcher in a compromising position, perhaps? Or maybe not, as Justice Tay Yong Kwang raised just such a scenario in court recently. When one of teen blogger Amos Yee’s lawyers argued that the drawing was not obscene because it did not contain any genitalia, Tay’s response was that an image need not be explicit to be obscene, and that it was unlikely a young man visiting his girlfriend’s parents would show his prospective in-laws such an image.
He was born and raised in Hong Kong, has worked in Hong Kong, the Mainland and the United States, and is currently working in Singapore at a top-notch multinational corporation.
According to Kwok, many expatriates in Singapore (including himself) share this sentiment: “Singapore is a nice place for work but it can hardly be our home.”
But in the present day, is Hong Kong much better? The factors that have historically made Hong Kong such a stellar success include its positioning as an international city; its high safety standards; the quality of its workforce; its trusted systems and institutions; and a simple tax regime. But these advantages are fading and Singapore has outpaced Hong Kong in almost all of them. Even local tycoon Li Ka-shing has reportedly drawn up a “Plan B” to move at least part of his empire out of Hong Kong, and has asked Hong Kong to learn from Singapore.
Oxford University is embroiled in a censorship row after police confiscated 150 copies of a controversial student magazine.
The officers were called by student union leaders who claimed the No Offence magazine might upset rape victims and people from ethnic minorities.
Editor Jacob Williams said he was prevented from distributing the magazines. He feared being arrested as Thames Valley Police decided whether he had committed a crime, but they have now decided that no further action will be taken.
Warning not to hold sessions dedicated to honouring the victims of the mass killings of 1965 accompanied issuing of festival permit.
Less than a week before the festival kicks off, organizers for the Ubud Writers & Readers Festival (UWRF) were forced to cancel a series of events discussing Indonesia’s controversial 1965 killings.
A series of recent stories on Internet policy in Uganda paints a grim picture of the online-speech environment in the country. On October 6, Internal Affairs Minister James Baba announced plans to enforce new regulations governing the use of social media for Ugandans. Little more is known about the regulations at present, but the bill likely bodes poorly for Uganda’s tense speech environment. Advocates at Unwanted Witness, a local human rights and free expression organization, worry that the law will compound the chilling effects of already-existing cyber laws in the country such as the Computer Misuse Act, the Anti-Pornography law and the Communications Act.
Chief executive Travis Kalanick claimed messaging app WeChat, whose owners invest in Uber rival Didi Kuaidi, blocks Uber-related news
When Ukraine's Interior Minister announced the initiative to form a new cyberpolice unit on October 11, the focus of the media coverage—and of Minister Avakov's statement—was very much on fighting online crime and beefing up the information security practices of the Ukrainian government. The launch was touted as successful, with over three thousand Ukrainians applying to join the cyberpolice force in the first 24 hours after the announcement. But amid the robust response to plans for the cybercrime unit, an arguably less popular element of the initiative flew under many Ukrainians’ radars.
A Canadian software company is helping Yemen’s Houthi rebels expand the country’s Internet censorship regime in the midst of a bloody civil war, according to a new report from the University of Toronto’s Citizen Lab.
The Yemeni civil war, which has killed more than 5,400 people in seven months, has been fought not only on the streets, but online as well.
Houthi rebels, who have forced the government into exile, have been using technology provided by Canadian internet-filtering company Netsweeper to indiscriminately censor large swaths of the internet critical of the rebel group, according to new research.
Researchers at the Citizen Lab, an Internet-monitoring project at the Munk School of Global Affairs, say technology sold by Waterloo-based Netsweeper Inc. is increasingly being used to restrict access to websites on Yemen’s state-owned internet service provider, YemenNet.
Twitter “radically under-reports” censorship by Turkey, one of the world's most prolific Internet censors, according to new research from the Association of Computing Machinery.
Rocked by domestic and international unrest as well as an increasingly authoritarian government, Turkey's government has in recent years frequently turned to mass censorship as an answer to unsolved political problems.
Following the conclusion of an Oct. 19 to 21, 2015 joint international emergency press freedom mission to Turkey, representatives of participating international, regional and local groups dedicated to press freedom and free expression find that pressure on journalists operating in Turkey has severely escalated in the period between parliamentary elections held June 7 and the upcoming elections.
Former ambassadors and prominent politicians have warned against satellite operator Türksat AS’s censorship of Bugün TV, Kanaltürk, Samanyolu TV, S Haber, Mehtap TV, Irmak TV and Yumurcak TV, citing negative implications for the country’s image abroad, as well as violations of international law.
In the last few weeks, at least 40 Indian writers have returned top literary prizes in protest of what they call a “climate of intolerance”. Novelists, poets and playwrights say that since the Hindu nationalist Bharatiya Janata Party (BJP) party came to power with the election of Prime Minister Modi, the country has seen a rise in Hindu nationalism that has led to less freedom of speech and respect for secular rights. Writer Sonia Faleiro, and Wendy Doniger, whose book on Hindus was withdrawn from publication in India, join us to discuss the current climate in India.
Egypt’s Censorship Authority contacted the Egypt’s National Security Agency asking to clarify the legal status of the Story of God crew’s presence in Cairo.
The film is produced by National Geographic Channel with renowned American actor Morgan Freeman as its executive producer and host.
Papua New Guinea's government is preparing to crack down on people who use social media sites to criticise politicians.
It turns out that some people decided to celebrate the end of Banned Books Week at the beginning of this month by… well, trying to remove books from schools.
We saw some two cases in New Jersey that demonstrated, once again, that some parents and administrators think the way to deal with literature that some find offensive is to get it out of the schools as fast as possible.
Perhaps the toughest challenge facing any putatively multi-stakeholder governance process is its capture by vested interests. ICANN is a textbook illustration of this. Ever since its formation, public interest advocates have been engaged in a struggle to assert their influence within ICANN against an onslaught of intellectual property lobbyists, intent on stacking every committee and process with their own trademark, copyright and patent lawyers.
IP owners have attempted to subvert the ICANN policy process by introducing vague language into ICANN's contracts and then seeking to reinterpret them as mandates for draconian IP enforcement without court supervision. A key event was the introduction of a 2013 revision to ICANN's agreement with registrars, that requires them to take unspecified enforcement measures against those who "abuse" domain names. This has led to demands from copyright and pharma interests that registrars cancel domain names allegedly used to host or sell allegedly infringing content, side-stepping the small issue of such allegations actually being reviewed by a court.
In their search to invest their oil and diamond money in Europe, the Angolan oligarchy has bought strategic positions in the Portuguese media in recent years — a bid to gain prestige while silencing news concerning endemic corruption and human rights violations of the regime headed by José Eduardo dos Santos for the past 36 years
Russia has already blocked over 10,000 internet sites, describing them as propaganda for terrorism or pornography. But pages critical of the Kremlin have also been "deleted".
South Africa's government seeks to ban a hashtag as thousands of students protest about fees
Why did the U.N. feel justified in recommending such illiberal censorship policies while providing such shoddy evidence to back their claims?
When told at the wrong place at the wrong time, certain jokes can get you into big trouble. Jokes about sex at work. Jokes about bombs in an airport. And now: jokes about government conspiracies on Venmo.
Chinese artist says toy company told him it ‘cannot approve the use of Legos for political works’ ahead of exhibition at National Gallery of Victoria
The Press Freedom Index 2015, published by Reporters Without Borders, ranks Germany 12th in terms of press freedom. The working environment for journalists is sound, according to their report. However, journalists researching far-right political issues are reported to be monitored by the federal government. If the data storage law is passed, that could push down Germany's future ranking on the Press Freedom Index.
The CEO and founder of the messaging application Telegram says the service has been blocked in Iran after his company refused to allow authorities access to spy on users.
In a message on Twitter late Wednesday, Pavel Durov wrote that Iranian officials demanded the company provide them with "spying and censorship tools." He said: "We ignored the demand, they blocked us."
Iran walked back demands for censorship controls this week after a public outcry over its initial decision to block a popular encrypted messaging app.
The CEO of the instant messaging service Telegram, Pavel Durov, announced in a tweet on October 20, 2015, that the Iranian government had asked the company to spy on its users in Iran. The development is a dramatic twist in a six-month struggle by Iranian authorities to monitor the popular mobile phone application in Iran.
Durov tweeted that when the company declined to provide the Iranian government with backdoor access to user data in Iran, they blocked their services.
“Iranian ministry of ICT demanded that @telegram provided them with spying and censorship tools. We ignored the demand, they blocked us,” Durov tweeted.
German authorities have launched a probe into allegations of a new case of suspected spying linked to the US National Security Agency, German reports said today.
The report by news magazine Der Spiegel comes after an investigation into alleged US spying on German Chancellor Angela Merkel's mobile phone was dropped in June due to lack of proof.
German-US relations were badly strained after fugitive US intelligence contractor Edward Snowden revealed mass US surveillance around the world in 2013.
German authorities have launched a probe into allegations of a new case of suspected spying linked to the US National Security Agency, a media report said Saturday.
Lawyers for the plaintiffs argued that the surveillance program was innately harmful, despite the NSA’s silence on it in court. “The NSA’s mass surveillance violates our clients’ constitutional rights to privacy, freedom of speech, and freedom of association, and it poses a grave threat to a free internet and a free society,” said Ashley Gorski, a staff attorney with the ACLU national security project. “The private communications of innocent people don’t belong in government hands.”
Now that the cat is firmly out the bag, and it's clear that the NSA has cracked the encryption behind, potentially, a huge amount of internet traffic, the question inevitably turns to: what are internet engineers going to do about it?
Clearly the experts at the Internet Engineering Task Force (IETF) have pondered the same question: a blog post on Thursday by IETF chairman Jari Arkko and security specialist Paul Wouters outlines how to beef up the internet's security.
In August, National Security Agency officials advised US agencies and businesses to prepare for a not-too-distant time when the cryptography protecting virtually all sensitive government and business communications is rendered obsolete by quantum computing. The advisory recommended backing away from plans to deploy elliptic curve cryptography, a form of public key cryptography that the NSA spent the previous 20 years promoting as more secure than the older RSA cryptosystem.
Your next tinfoil hat will won’t be made of tinfoil. A small company called Conductive Composites out of Utah has developed a flexible material — thin and tough enough for wallpaper or woven fabric — that can keep electronic emissions in and electromagnetic pulses out.
The National Security Agency is bypassing encrypted Internet connections because the encryption data is all the same, researchers posited this week. It has long been believed the NSA had a way to bypass common types of encryption, but its methods haven't been known.
20 years ago today a federal judge in the US authorized the first legal computer wiretap. Prior to October 23rd, 1995, wiretap authorizations had been used primarily as a means to monitor telephone conversations of organized crime and drug suspects. The wiretap on Harvard computers during the last two months of 1995 ultimately led to the arrest of 21-year-old Julio Cesar Ardita of Buenos Aires who later pled guilty to illegal wiretapping and computer crime felonies.
As Senators prepare for a final vote on the Cybersecurity Information Sharing Act (CISA) next week, digital rights advocates are lobbying harder than ever to defeat the public-private cyber threat data-sharing legislation they describe as a “surveillance bill masquerading as a cybersecurity bill.”
TIME IS RUNNING OUT for anyone to grab a pitchfork and oppose the controversial Cybersecurity Information Sharing Act (CISA), which is to the internet what garrottes are to breathing.
A cluster of big-time technology companies has already made its feelings felt about CISA, but pressure group Fight for the Future is concerned that more is needed.
The group wants people to stream out and get the message heard, the message being that we ain't having it.
Tiffiny from Fight for the Future writes, "New information has surfaced about Facebook's position on S. 754, the Cybersecurity Information Sharing Act (CISA). Sources on the Hill tell us that Facebook lobbyists are welcoming CISA behind closed doors, even though Facebook has been lauded as opposing the bill after CCIA, an industry association they are a member of, came out against it.. CISA would give companies like Facebook legal immunity for violating privacy laws as long as they share information with the government. It's supposed to be for cybersecurity, but in reality companies would be encouraged to share information beyond cyber threat data and the information could be used for prosecuting all kinds of activities."
The Senate is set to pass a bill aimed at improving cybersecurity by encouraging the sharing of threat information among companies and the U.S. government.
The current version of CISA would allow any one of the many federal agencies using the data-sharing portal to override that "scrubbing" process, which is one of the few privacy safeguards in the controversial bill.
The National Security Agency is literally counting down the hours until its deadline to stop the bulk collection of information on American phone calls. The agency’s civil liberties and privacy officer, Rebecca Richards, said Wednesday morning that there are about 930 hours left. And yes, she said, “there is a big clock.”
The deadline is 11:59 p.m. on November 29. Richards said the NSA has not yet begun testing is alternate system. She spoke at the Second Annual Cato Surveillance Conference.
The collection of massive amounts of American metadata — who calls who, and how long they talk — is known as the 215 program on account of the section of the Patriot Act the government claimed gave it legal standing.
When then-NSA director Keith Alexander gave the keynote address at the Black Hat hackers convention in Las Vegas in 2013, he made an unusual pitch to the attendees: He asked them to help the NSA come up with ways to protect Americans' privacy and civil liberties.
"How do we start this discussion on defending our nation and protecting our civil liberties and privacy?" Alexander asked the crowd. "The reason I'm here is because you may have some ideas of how we can do it better. We need to hear those ideas."
At the Black Hat hacker convention in 2013, Former NSA director Keith Alexander asked hackers to help the NSA come up with ways to protect Americans' privacy and civil liberties.
"How do we start this discussion on defending our nation and protecting our civil liberties and privacy?" Alexander asked the Las Vegas crowd. "The reason I'm here is because you may have some ideas of how we can do it better. We need to hear those ideas."
Synack’s new system is called Hydra, in a reference to the ancient monster with multiple heads from the Greek and Roman mythologies. This Hydra is a platform that scans Synack customers’ networks, and looks for known vulnerabilities, sends certain code to test the response, and looks for patterns to spot potential bugs. It then feeds that information to the company’s cadre of freelance and in-house security researchers, who can then focus their efforts on the portion of the flagged code, rather than looking everywhere for bugs.
There are two possible alternative candidates for speaker who have far better records on surveillance reform than Boehner...
The legal wrangling between US corporations and the EU over the transfer of user data could potentially have huge consequences for individuals and businesses on both sides of the Atlantic. The ongoing battle taking place at the Irish High Court is just one aspect of what is becoming an increasingly complicated issue.
Earlier this month, US companies operating in Europe got some unwelcome news: the Data Transfer Pact between the European Union and the United States, more commonly known as “Safe Harbor,” had been ruled invalid.
For over 15 years, Safe Harbor had ensured that companies with EU operations could transfer online data about their employees and customers back to the United States despite stark differences between US and European privacy law.
Admiral Michael Rogers, director of the National Security Agency and US cyber commander, doesn't think that the United States will ever have a digital equivalent of Pearl Harbor.
Speaking on stage at the Wall Street Journal's WSJDLive conference, Rogers dismissed that analogy because he doesn't think that a massive cyber attacks could ever be as surprising today as the attack on Pearl Harbor was in 1941.
Dutch anti-piracy group BREIN has taken Google to court in an effort to obtain the personal details of one of its users. The account in question had been selling 'pirate' eBooks on Google Play but despite responding to BREIN's complaint by shutting down further sales, Google is refusing to hand over its user's identity.
The Cato Institute will host its Second Annual Surveillance Conference this week. The symposium – which will be live-streamed on the Internet and available on the Cato Institute’s website for later viewing – promises a gathering of “top scholars, litigators, intelligence officials, activists and technologists working at the intersection of privacy, technology and national security.”
[...]
The articles in this book predate the investigations in the 1970s by the Rockefeller Commission and the congressional Pike and Church Committees, all of which revealed longstanding surveillance abuses by the U.S. intelligence community. The HRLR symposium articles and the subsequent findings of these congressional investigations were prescient warnings of what Americans should have been expecting in the future from a surveillance state left unchecked by a lack of firm oversight and strict accountability.
During the Bush years, the chief privacy officer for the Department of Homeland Security was my old friend and colleague Hugo Teufel. In German, “Teufel” means “devil.” Germans may have been alarmed when DHS put the devil in charge of privacy – but in 2007, this devil put in place a privacy-friendly departmental policy that remains in effect. Teufel’s policy extended Privacy Act rights to non-US persons whose information was in “mixed” DHS systems – systems with both US and non-US person data.
The worst thing is there is very little smartphone users can do to stop it.
In the ramped-up secrecy of post-9/11 America, many of the more controversial revelations about U.S. national security and intelligence agencies have come to light via whistleblowers: conscientious objectors within government agencies.
While Edward Snowden may be the most recognizable name, many others have also come forward to raise awareness about secret programs ranging from CIA torture at so-called black sites to recent revelations to The Intercept about kill list assassinations by drone strikes.
What is it about whistleblowers that the powers that be can’t stand?
Hillary Clinton is wrong about Edward Snowden. Again.
The presidential candidate and former secretary of state insisted during the recent Democratic debate that Snowden should have remained in the United States to voice his concerns about government spying on U.S. citizens. Instead, she claimed, he “endangered U.S. secrets by fleeing to Russia.”
After accusing Snowden of stealing “very important information that has fallen into the wrong hands,” she added: “He should not be brought home without facing the music.”
Clinton should stop rooting for Snowden’s incarceration and get her facts straight.
During the coming weeks, FSRN will feature a series of reports on the intersections of technology policy, digital privacy, press freedom and democracy. As a preview, we’re publishing the entirety of a extended Q&A session between two whistleblowers – former NSA contractor Edward Snowden and ex-FBI agent Mike German.
Hillary Clinton recently criticized Snowden’s whistleblowing, saying that he should have come forward with his concerns through internal procedures. In his time at the FBI, Mike German did just that and shared his experiences and reflections in this 60 minute interview with Snowden.
A former contract employee who worked for the National Security Agency at Fort Gordon admitted Tuesday he falsified his timecards.
Could it be that the new huge agency complex being built out west almost certainly will eliminate many of the cushy jobs they have now?
On top of this, in recent times you have the Bush and Clinton branches of power concentration and clearly Hillary Clinton desires to maintain this strangulation of “democracy” in America. It is clearly true that issues related to family dynasties also exist in many other nations but within Western democracy it does appear that America is going backwards. This doesn’t imply that both families have ill intentions against the people of America. However, it indicates that the leverages of power are being constrained within a limited base and the same applies to national security whereby the same faces hold power concentration roles within the political system.
The NSA’s mass surveillance would not be possible if the internet wasn’t controlled by just a few major US companies, Nikolay Nikiforov, Russia’s communications minister, told RT after the first BRICS ministerial meeting on the de-monopolization of IT.
Nine out of ten employers admit they always check social media before hiring applicants, it has been revealed.
Ninety-three per cent use Facebook and Twitter ‘to keep tabs’ on potential candidates and to vet them pre-interview.
But over half (55 per cent) of recruiters have reconsidered appointing someone based on their social profile – with 61 per cent of these U-turns due to ‘negative’ reasons.
Researchers have uncovered active and highly clandestine attacks that have infected more than a dozen Cisco routers with a backdoor that can be used to gain a permanent foothold inside a targeted network.
The SYNful knock malware has been found on 14 routers in four countries, including Ukraine, the Philippines, Mexico, and India and is likely being used to infect other parts of the targeted networks, researchers from security firm FireEye wrote in a report published Tuesday morning. The malicious router implants are loaded each time the device is powered on and support up to 100 modules, which can be tailored to individual targets. Cisco Systems officials have confirmed the findings and published intrusion detection signatures that customers can use to block attacks in progress.
A lawsuit filed this week in San Francisco federal court alleges Twitter is "surreptitiously eavesdropping" on people who send private messages on the social media service in violation of federal and state privacy laws.
The lawsuit alleges Twitter is "systematically intercepting, reading and altering" messages without the knowledge or consent of users.
To most Twitter users, URL link shorteners are a convenient way to stuff more into a 140-character message. But a proposed class action lawsuit filed on Monday alleges that the social media service is using them in violation of the Electronic Communications Privacy Act and California's privacy law.
The complaint brought in federal court in San Francisco from Wilford Raney and others similarly situated is claiming that despite Twitter's assurances that users are allowed to "talk privately” among one another, "Twitter surreptitiously eavesdrops on its users’ private Direct Message communications. As soon as a user sends a Direct Message, Twitter intercepts, reads, and, at times, even alters the message."
The dodgy tweet, recommending people use insecure HTTP rather than encrypted HTTPS for online shopping and banking, has since been removed. El Reg readers will know it's HTTPS or bust when buying stuff online or checking your balance.
The link in the tweet, a goo.gl shortened URL, directed clickers to nursing.buybooksales.com, which redirects to the website of GCHQ, the Brit cousin of the NSA.
With origins in visual material he encountered as cinematographer for the 2014 Edward Snowden documentary Citizenfour, as well as deep thematic ties to the efforts of the whistleblowers and activists involved in that film, Paglen’s work here seeks to locate and describe the ostensibly invisible infrastructure of surveillance programs implemented by the NSA and other government organizations. In a format similar to his older images of gauzy, cloud-streaked skies whose titles reveal them to be populated by unseen drones, Paglen, who holds a Ph.D. in geography, captures the routes through which surveilled data flows. In NSA-Tapped Fiber Optic Cable Landing Site, Morro Bay, California, United States (all works 2015), serene coastal images show waves swelling along a beach under gray skies, surfers dotting the horizon (oddly reminiscent of Catherine Opie’s “Surfers” series); lest the viewer find the landscape calming, however, it is paired with annotated maps densely layered with information detailing in an appropriately nonlinear fashion the programs in place there. Having trained to scuba dive as part of his research, the artist also captures portraits of deep-sea cables tapped by the NSA. These rich, murky, and essentially abstract scenes—almost all shadow, the otherworldly structures emanating dark blues and greens—convey not so much a glimpse into the heretofore covert operations transpiring behind them as they do a sense of the fundamental opacity that characterizes the entire information enterprise.
She pointed out that the decision doesn't dig into the actual practices of Facebook and argues that the loss of safe harbor may mean a loss both in transparency and in the FTC's ability to come down on companies that violate the framework's rules. "Although companies with approved binding corporate rules are listed on the European Commission's website, the details of the rules that each company creates for itself are not public," she notes, while pointing out that "the invalidation of the Safe Harbor decision removes the most explicit link between FTC enforcement and our ability to protect European consumers."
Co-producer Duncan Macmillan even feared the state was listening in on his calls. “I got my entire email shut down at one point and one of the actors Tim Dutton was saying he started talking about something to do with NSA and GCHQ surveillance on the phone and the line went dead,” he told the Guardian.
[...]
There are parallels with North Korea, too.
Digital rights group Fight for the Future has launched a “Corporate Scorecard” that grades more than 30 of the world’s largest technology companies based on their public positions on key US policy questions affecting Internet users’ privacy and security.
For instance, according to its tally so far, 23 major tech companies oppose Cybersecurity Information Sharing Act (CISA), while 12 support it or are silent. Those that oppose CISA include Google, Microsoft, Apple, Twitter, Yahoo, Yelp, Netflix, Amazon, Ebay, Wikipedia and Dropbox.
Following former National Security Agency (NSA) contractor Edward Snowden's revelations in 2013 about the US government's PRISM surveillance program, which allowed the NSA to harvest swathes of data directly from big internet companies, campaigner Max Schrems (and 25,000 other social networkers) accused Facebook of illegally tracking their personal data and breaching their right to privacy.
In 1867 Timothy O’Sullivan headed out West. The Irish-born photographer’s acclaimed Civil War photos had brought him to the attention of the US Federal Government; now, he was joining a major geological survey at the government’s invitation. His job was to supply visual geographic information that would help in establishing links between the railroads, tapping natural resources, and romanticizing the American West to attract potential settlers. The resultant landscape photos crystallized the magic of wide-open American spaces in albumen-silver and laid crucial groundwork for Ansel Adams.
Public posts on Facebook will now be much easier to search, thanks to new and expanded options. But what does this mean for user privacy?
PEOPLE FARM FACILITY FACEBOOK has admitted that part of its software drains Apple smartphones batteries, but not to a soul-sucking sideline that parts people from the real world.
It would be unfair to expect Facebook to apologise for being a popular service, although it probably does have some questions to answer, particularly in Ireland. Thanks to European intervention the firm will bend over and relax for the country's Data Protection Commissioner.
Facebook has made a major update to its search feature, indexing the social network's 2 trillion posts in a way that makes it much easier to dig out your friends' old status updates.
Searching for terms likes "posts about drunk" or "posts about ashamed" will now dig out status updates from friends, as well as updates from other Facebook members who have made their statuses public.
It is also easier to search for users' status updates from a bygone era, for example "posts from Joe Bloggs in 2008".
Understandably, some folks were concerned about the privacy implications of such a move, especially given disclosures around government surveillance, and the fact that Microsoft previously hadn't built this kind of data collection into its operating system.
Down in Australia, it appears that phone giant Vodafone is facing a bit of a scandal as it's come out that the company went digging into a journalist's phone records after she wrote some stories about security flaws in a Vodafone system. Remember, a decade ago, when there was a big scandal at HP, when it spied on board members to try to stop leaks? That was bad. This is worse. This is directly violating a customers' privacy, just because you're upset about some leaks.
Alejandro Mayorkas, a high-ranking Department of Homeland Security official, opened a speech over the summer in Las Vegas before hundreds of hackers with a dare.
"I challenge you all to make my phone ring during my remarks," he said, brandishing a flip phone the size of a soda bottle. "Take a shot," he said, urging the crowd to hack his phone. Then he sweetened the deal: There would be a government job for anyone who succeeded.
The conference's volunteer organizers, known as goons, soon interrupted Mayorkas for a long-standing tradition at the cybersecurity convention DEF CON: First-time speakers take a shot of whiskey on stage.
The Irish Data Protection Commissioner has told the High Court she will speedily investigate a complaint by Austrian student Max Schrems alleging Facebook Ireland is making personal data available via Facebook Inc to US intelligence agencies.
Mr Justice Gerard Hogan was told the investigation will proceed arising from the recent decision of the European Court of Justice concerning the Safe Harbour arrangement relating to transfer of personal data.
The Irish data protection watchdog has confirmed it is to begin an official investigation into Facebook’s data transfers to the United States.
Every time you log in to Facebook, every time you click on your News Feed, every time you Like a photo, every time you send anything via Messenger, you add another data point to the galaxy they already have regarding you and your behavior. That, in turn, is a tiny, insignificant dot within their vast universe of information about their billion-plus users.
The aesthetics of the PowerPoint slides leaked by Snowden became a subject of fascination, and sometimes derision, when they were revealed, their visual style regarded by many as clunky and amateurish. Redesigns of the slides even became something of an internet meme. But in Denny’s view, the slides were far from inept. “They are very important cultural documents, and the leak made them into 21st-century masterpieces. These images contain a lot of cultural information that we just haven’t been able to unpack. The attempt with this exhibition is to give people the tools to do that. My skill is as an artist – I’m trying to contextualise this material from my tradition, which is the history of conceptual art.”
U.S. District Judge Edward Davila dismissed a $15-billion lawsuit filed by Facebook users over tracking of their activities after they have logged account of the website. The judge says the plaintiffs failed to specify how they were harmed by the tracking.
The UK “intervened strongly” in the legal challenge brought by Austrian law student Max Schrems that ruled Safe Harbour invalid, jeopardising data sharing between Europe and the US
[...]
Computer Weekly asked the Cabinet Office spokesperson to comment directly on the two “findings of fact” on which the court based its judgement. The Cabinet Office refused to comment directly on the ECJ’s decision, but a Cabinet Office spokesperson described the verdict as disappointing.
For the last 15 years, Europe and the United States have been been working together in perfect trans-Atlantic harmony over data privacy. That is, until a few weeks ago, when the European Court of Justice declared the Safe Harbor agreement invalid.
Most Americans oppose making it easier for the government to pry into confidential communications, and many think that tech companies main responsibility is to protect data privacy not help law enforcement
When suicide bombers killed at least 97 people at a rally of pro-Kurdish activists and civic groups advocating peace between the Turkish government and the militant Kurdistan Workers’ Party (PKK) in Ankara on October 10, the government’s response was as rapid as it was troubling. Turkish Prime Minister Ahmet Davutoßlu swiftly imposed a temporary broadcast ban on images of the terror attack, and many in the country reported that Twitter had been blocked on some of the most widely used mobile networks, including Turkcell and TTNET.
The U.N. envoy charged with safeguarding free speech around the globe has declared in a dramatic new report that confidential sources and whistleblowers are a crucial element of a healthy democracy, and that governments should protect them rather than demonize them.
The report by David Kaye, the United Nations Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, also highlights the harsh treatment of whistleblowers in the U.S., most notably former NSA contractor Edward Snowden, who is living in Russia as fugitive from the U.S. government.
It's hard to imagine a single American willing to shell out money to see a political documentary who doesn't already know nearly everything they'll be told in Imminent Threat, Janek Ambros's omnibus about governmental overreach in the post-9/11 world. Certainly one could argue that the shortage of meaningful action on domestic spying, remote-control killing and suppression of dissent proves that more citizens must voice their disapproval. But this crudely crafted film will be one of the least effective voices in that ongoing debate; only the support of actor James Cromwell, who lends his name here as exec-producer, gives the doc a chance of attracting more than the usual rabble-rousing crowd.
Dissidents from China and Tibet have accused British police of a significant overreaction after they were arrested under public order laws and had their houses searched following peaceful protests against the visiting Chinese president, Xi Jinping.
Shao Jiang, a survivor of the Tiananmen Square massacre now based in the UK, said he was shocked to be tackled by police after holding placards in front of Xi’s motorcade in London, and to learn his home had been searched and computers seized while he was in custody.
The Federal Communications Commission is about to face another lawsuit, this time over a vote to cap the prices prisoners pay for phone calls.
Yesterday's vote came after complaints that inmate-calling companies are overcharging prisoners, their families, and attorneys. Saying the price of calls sometimes hits $14 per minute, the FCC has now capped rates at 11€¢ per minute.
On Thursday, the Federal Communications Commission ruled that fees charged to inmates and their families for phone calls made from prison were “unconscionable and egregious.” The agency set caps for the first time on local and intrastate long distance calls, while further cutting fees for interstate calls. In some states, such calls once cost as much as $17 for a 15-minute conversation with added fees included; now, such calls will be capped at 11 cents per minute in state and federal prisons, only going as high as 22 cents per minute in small jails. Pricey add-ons, such as automated payments and paper-bill fees, have also been reined in significantly.
Holly Sterling, the wife of a former CIA officer convicted of leaking details about a botched CIA plan to give flawed nuclear blueprints to Iran, has asked President Barack Obama to pardon her husband who was targeted for prosecution after accusing the CIA of racial discrimination and taking his concerns about the Iran scheme to congressional authorities.
In a 14-page letter to President Obama, Holly Sterling recounted the personal nightmare of the US government's relentless pursuit of her husband, Jeffrey Sterling, an African-American, after an account of the Iran operation - codenamed Operation Merlin - appeared in State of War, a 2006 book by New York Times reporter James Risen.
John Kiriakou is an American patriot who informed us of the criminal behavior of illegal and immoral US “cloak and dagger” operations that were bringing dishonor to our country. His reward was to be called a “traitor” by the idiot conservative Republicans and sentenced to prison by the corrupt US government.
The anonymous hacker is quickly replacing the terrorist as the go-to bogeyman in the American cultural imagination. Like Islamist radicals, the kinds of hackers that have brought down the servers of corporate giants and government agencies are mysterious and stealthy, spreading fear and paranoia from a faraway land.
"The Obama Administration has presided over the most draconian crackdown on national security and intelligence whistleblowers in US history." Jesselyn Radack is the Yale graduate who defends those whistleblowers in court. She spoke out for Jeffrey Sterling at the National Press Club last week. Here is the video and transcript.
Two topless feminist protesters from Femen have stormed the stage of a conference discussing women in Islam.
A video of the incident appears to show one of the activists being kicked by a man as she is hauled off stage at the event in France.
The two women are from the Femen activist group, whose members are known for protesting topless with writing across their chest.
Journalist Ashoka Jegroo says that the movement against racialized police brutality aims to challenge state-sanctioned terror.
It’s been more than a year since the murders of Mike Brown in Ferguson and Eric Garner in Staten Island at the hands of police. But the fire lit by their unjust deaths has yet to be extinguished. And once again, people are protesting.
The Federal Aviation Administration along with the Transportation Department has announced a drone regulation system requiring recreational drone users to register their devices, according to news outlets.
Is This America? Chicago Police Detain Thousands of Black Men in Homan Square, CIA-Style Facility
FBI Surveillance flights over Baltimore and Ferguson as residents of those cities engaged in civil disobedience against racially-motivated police violence were lawful and useful, bureau Director James Comey claimed Thursday.
Comey said that the missions were flown at the behest of local law enforcement in each case, as demonstrations raged against the killings of Michael Brown and Freddie Gray by city cops.
The F.B.I. director, James B. Comey, said on Friday that the additional scrutiny and criticism of police officers in the wake of highly publicized episodes of police brutality may have led to an increase in violent crime in some cities as officers have become less aggressive.
Sabrina De Sousa, a former CIA operations officer who was convicted in absentia along with other agency personnel for her role in a 2003 plot to kidnap a suspected Al-Qaeda terrorist in Italy, has been detained in Portugal.
You might well enjoy hearing the ballad a few times in a day. But full volume continuously for days on end?
The American Civil Liberties Union (ACLU) issued writs against two psychologists who devised the CIA's Bush-era interrogation programme on Tuesday (13 October), saying they encouraged the agency "to adopt torture as official policy".
James Mitchell and Bruce Jessen, two former military psychologists, "designed the torture methods and performed illegal human experimentation on CIA prisoners to test and refine the programme," the ACLU said in a statement. "They personally took part in torture sessions and oversaw the programme's implementation for the CIA," it added. ACLU also said the men enriched themselves to the tune of millions of dollars in the process.
DAVID WELNA, BYLINE: The two psychologists named in the ACLU's lawsuit are former CIA contractors James Mitchell and Bruce Jessen.
There is a likelihood the CIA will sooner or later be brought to justice in the US and internationally for its brutal interrogation techniques, Ben Davis a member of the Advocates for US Torture Prosecutions told RT.
Several letters from the US Senate Select Committee on Intelligence have been revealed by WikiLeaks. In one of them vice chairman Christopher Bond suggests that agencies should be able to use any interrogation means available to them, without waiting for explicit approval. Bond also suggests methods which should be prohibited.
EU countries have not done enough to investigate the CIA’s detention, torture and rendition programs in Europe, MEPs were told Tuesday.
The debate in the European Parliament’s Civil Liberties, Justice and Home Affairs Committee included testimony from activists critical of EU member countries’ responses to revelations in a 2014 report by the U.S. Senate Select Committee on Intelligence.
The European Center for Constitutional and Human Rights (ECCHR) on Oct. 19 filed a criminal complaint against a high-ranking CIA official for mistreatment of Khaled el-Masri, a German citizen who was detained and allegedly tortured for four months in 2003. El-Masri was on vacation in Macedonia when he was mistaken for Khalid al-Masri, a suspect in the Sept. 11, 2001, terrorist attacks. El-Masri was then transported to Afghanistan where he was detained and questioned for four months under the direction of Alfreda Frances Bikowsky. At the time, Bikowsky was deputy chief of the Central Intelligence Agency's Bin Laden Issue Station. ECCHR asserts in the complaint that the US Senate Torture Report ties Bikowsky to el-Masri's detention, and ECCHR requests that the German federal prosecutor investigate.
The Newsweek article focused on Martine’s relationship to the notorious November 2003 death of a captured terrorist suspect in Iraq known as “the Iceman,” because his corpse was put on ice and hooked up to an IV to make it look as if he were still alive when he was removed from Abu Ghraib prison. It also noted that Martine and other former interrogators had been repeatedly investigated by the CIA’s internal watchdog as well as a federal grand jury and neither charged nor exonerated.
Dennis Johnson remembers a Melville House staff meeting on a Tuesday morning last winter, smack in the middle of the publishing industry’s busy holiday season. It was Dec. 9, and a few hours south of the publishing house's Brooklyn office, Sen. Dianne Feinstein (D-Calif.) was having a triumphant moment. After years of uphill battles, she was finally publicly releasing part of the Senate Intelligence Committee’s grueling interrogation report, an extended, often stomach-churning look at the CIA’s post-9/11 torture program.
It was a long-awaited publication, a culminating moment in a yearslong political battle and a sobering day of reckoning for the American public. Except no one outside the Government Printing Office wanted to touch it.
It looks like it will take a lot to finally stop the CIA’s use of torture techniques. Hopefully this stint will force them to reinvent and polish their approach to gathering intelligence.
Suleiman Abdullah Salim says he listens to Bob Marley to help cope after undergoing what a new American Civil Liberties Lawsuit alleges were unlawful CIA interrogation techniques that included the use of music as torture.
In spring 2003 an unnamed official at CIA headquarters in Langley sat down to compose a memo. It was 18 months after George W Bush had declared war on terror. “We cannot have enough blacksite hosts,” the official wrote. The reference was to one of the most closely guarded secrets of that war – the countries that had agreed to host the CIA’s covert prison sites.
Between 2002 and 2008, at least 119 people disappeared into a worldwide detention network run by the CIA and facilitated by its foreign partners.
Lawyers, journalists and human rights organisations spent the next decade trying to figure out whom the CIA had snatched and where it had put them. A mammoth investigation by the US Senate’s intelligence committee finally named 119 of the prisoners in December 2014. It also offered new insights into how the black site network functioned – and gruesome, graphic accounts of abuses perpetrated within it.
“There is no further evidence that Romania was complicit in the CIA’s covert detention programme. We stand by the conclusion of the parliamentary inquiries, which uncovered no evidence of wrongdoing. And no new evidence has emerged in the meantime,” MP Marius Obreja, the head of the Parliamentary Defence Committee, said on Saturday.
At some point in the fall of 2014 the CIA quietly said, 'we'll just leave this here' and published a bombshell PDF of a declassified article on George Washington University's National Security Archive. The 2013 piece by CIA Chief Historian David Robarge is titled "[Director of Central Intelligence] John McCone and the Assassination of President John F. Kennedy" and it basically admits that McCone—appointed by JFK to head the agency—was a little squirrelly in his testimony before the Warren Commission.
A former CIA director withheld information about President John F Kennedy's assassination, according to declassified agency reports.
The CIA reports, which were declassified last fall, claim that then-agency head John McCone and other top officials were part of a 'benign cover-up' surrounding the assassination of Kennedy in November 1963.
The report's author, CIA historian David Robarge, claims McCone withheld information to keep the Warren Commission focused on what the agency believed to by the 'best truth… that Lee Harvey Oswald, for as yet undetermined motives, had acted alone,' according to Politico.
What happens to your Facebook data — your identity information, photos, links and “likes” — when you share it outside of the US? Plenty. Your data will flow from your computer, to the nearest servers of the company, and eventually land at Facebook's home servers in California, where it will likely be mined by Facebook for commercial gain and subject to snooping by the NSA.
What laws protect your information along the way? Not many. But a recent court ruling should change this for European Internet users.
Until this month, a “Safe Harbor” regulatory policy agreement between the US and EU allowed companies like Facebook and Google to self-regulate the transfer of data between Europe and the US. It is now formally dead. Unilaterally approved by the European Commission in 2000, the policy allowed companies to promise that they would abide by EU privacy laws when handling the data of EU persons, without needing to provide explicit proof of their compliance. Among other things, it required companies to notify users of the collection and use of their data, allow them to opt out of its collection or transfer, and keep it secure.
Since our last update on the upcoming net neutrality regulation in the European Union, a further compromise proposal has been developed, which heads to a vote in the European Parliament on Tuesday next week. On its face, the draft regulation appears to hit all the most important points, including providing that "When providing internet access services, providers of those services should treat all traffic equally, without discrimination, restriction or interference, independently of its sender or receiver, content, application or service, or terminal equipment".
IT IS PANIC STATIONS across the Atlantic as the good people of America wake up to the threat to net neutrality in Europe.
A sage lawyer, Barbara van Schewick, is warning about a vote in the European Parliament next week designed to preserve net neutrality, saying that it is likely to fall in such a way that reflects badly on trade and communications.
Van Schewick, who is professor of law and director of Stanford Law School's Centre for Internet and Society, said that parliament members have a few days to get their heads in order and adopt what she called "key amendments".
On Tuesday next week, October 27, the European Parliament will vote in Strasbourg on rules that are supposed to protect net neutrality in the EU. The proposed text emerged from the so-called "trilogue" meeting between the European Commission, European Parliament, and the EU Council held in June to reach a "compromise" text taking into account the differing views held by the three institutions. However, there are serious problems with the compromise rules, and in the run-up to the vote next week, digital activists are urging the public to contact MEPs to ask them to support amendments that will fix the main issues.
For years we've explained that broadband usage caps are a horrible idea. Not only do they hinder innovation and confuse the hell out of customers -- but they simply aren't necessary on modern, intelligently-managed networks. Caps are an inelegant and impractical way to handle congestion, and U.S. broadband consumers already pay some of the highest prices for broadband in the developed world (2015 OECD data), more than covering the cost of running a network (as any incumbent ISP earnings report can attest).
Internet access will be free for passengers after the system verifies a user's mobile number with a one-time password sent by text message. However, only the first 30 minutes of usage will be on high-speed Internet, Telecom Talk reported.
The Internet is many things, but above all it is power. The power to communicate and connect, to document and share. And like any source of power, there is a battle over who gets to control it. Every day in the headlines, we see the war over net neutrality between governments, private enterprise, hackers, and activists waging. At the core, it is a battle to preserve freedom of communication and protect the population from government surveillance.
This is a sad story to write, but it's been percolating in the back of my mind for months if not years: The World Wide Web is gummed up with crap. This realization came into sharp focus today when I visited some media sites like cbc.ca and my CPU utilization when up to 100% and stayed there. Exactly why firefox was using so much CPU was a bit of a mystery. I had autoplay in firefox turned off, and there didn't appear to be any reason why the CPU should be maxed out.
The long saga of net neutrality in the EU is approaching its end, and things aren't looking good. The compromise text contains some huge loopholes, which I've written about elsewhere. The key vote is on Tuesday, so there's still time for EU citizens to write to their MEPs.
We first wrote about Nina Paley in 2009, upon hearing about the ridiculous copyright mess she found herself in concerning her wonderful movie Sita Sings the Blues. While she eventually was able to sort out that mess and release the film, she also discovered that the more she shared the film, the more money she made, and she began to question copyright entirely. She originally released the film under a ShareAlike license, promising to go after people who didn't uphold the ShareAlike parts, but then moved to a full public domain dedication and has become quite vocal in recent years about not supporting any kind of copyright and even raising some important concerns about many forms of Creative Commons licenses.
The Pirate Party, a movement founded in Sweden nine years ago, is continuing to surge across Europe, now surpassing Iceland’s local coalition government in recent polls.
The Pirates have been ahead in the polls for several months now, according to the Iceland Monitor. In March, the party was at 23.9 percent, making it the most popular party in the country. Now, at 34.2 percent, the Pirates have surged past the country’s current coalition Government, which includes the Independence Party at 21.7 percent and the Progressive Party at 10.4 percent.
Two prominent filmmaker unions are urging the government to criminalize streaming piracy. The labor unions describe streaming as the preferred viewing experience and argue that those who stream copyrighted movies without permission should face prison.
New Zealand's three-strikes anti-piracy law is turning into a huge disappointment for copyright holders. The costs that are involved with sending warning notices and pursuing cases at the copyright tribunal are proving to be too expensive. As a result, only one file-sharer was punished this year.
As of late, Nintendo's relationship with YouTube and the YouTube community has been, shall we say, tumultuous. After rolling out a bad policy to share revenue with YouTubers on the basis that those personalities torpedo their reputations by promising only positive Nintendo coverage, claiming the monetization for a large number of "let's play" videos uploaded by independent YouTubers, and even going so far as to lay claim to the review of a Nintendo game created by well-known YouTuber "Angry Joe", Nintendo clearly seems to believe that YouTube is not so much an independent community as it is some kind of official public relations wing for the company. This is really dumb on many different levels, but chiefly it's dumb because it breeds ill-will amongst fans, of which Nintendo used to have many.
As we've been covering over the past few years, there's been a big battle going on over the copyright status of "pre-1972 sound recordings." That may sound like a weird thing to be arguing over, but it's due to a weird bit of history in US copyright law. You see, for a very long time, Congress believed that copyright law could not cover sound recordings. However, various states stepped in and either through explicit state law or through common law, created copyright-like regulations for sound recordings. When copyright was finally updated in the 1976 Copyright Act, pre-1972 works were left out of the federal copyright system, even as federal copyright law basically wiped out all state copyright law for everything else. This has created some weird issues, including that some songs that should be in the public domain under federal copyright law are locked up in perpetuity. A simple and reasonable solution to this would be to just move pre-1972 sound recordings under federal copyright law and level the playing field. But, the RIAA has resisted this. That might seems strange, until you realize that the RIAA and its friends saw this weird quirk of copyright law as a wedge issue with which to try to squeeze more money out of everyone.
This week an Irish man was handed a four-year sentence for running a pirate linking site. The Court accepted that he led no lavish lifestyle. In contrast, a man who stole almost €£9m from a bank and bought homes worth €£1.4m, three Bentleys, three Aston Martins, a Porsche 911 and a Rolls Royce, was also jailed. He received just 3.5 years. Fair?
The Pirate Party in Iceland continues to gain support, causing a revolution in the local political arena. According to the latest poll the party now has over a third of all votes in the country, beating the current Government coalition.