Suman Chakravartula informed us this weekend that he and his team of hard-working developers managed to release a new stable update for their Rockstor Linux-based NAS (Network-attached storage) solution.
As you may know, Google has created the Chromebooks, their own cloud-based laptops, that use Chrome OS as default, which is a lightweight and fast Linux system.
Chromebook sales now account for more than half of all devices sold for U.S. classrooms, up from less than 1 percent in 2012, according to a new report from Futuresource Consulting. (The sales figures do not include desktop computers.) To analysts, this comes as a big surprise.
HP Envy 13 is a promising great laptop that’s being let down by the short battery life and above the average temperature when it operates. It can run Linux (Ubuntu) with limitation, the non working fingerprint scanner is to note if you need this feature to work.
A recent report by O’Reilly Media and Ruxit presents interesting findings on the adoption and use patterns of containers and Docker.
Docker was released as open source in March 2013, so in software terms it’s relatively new. As always with shiny things, nerds like me see their potential and start thinking of ways of using them everywhere.
The Linux Foundation offers many resources for developers, users, and administrators of Linux systems. One of the most important offerings is its Linux Certification Program. The program is designed help you differentiate your job skills in a competitive market.
How well does the certification prepare you for the real world? To illustrate that, the Linux Foundation will be featuring some of those who have recently passed the certification examinations. These testimonials may help decide if either the Linux Foundation Certified System Administrator or the Linux Foundation Certified Engineer certification is right for you. In this latest installment of our continuing series, we talk with Ariel Jolo, who recently became a Certified System Administrator.
If the suits who sit in the boardrooms of corporate tech think they need Microsoft — quite frankly, at this stage of the game they do — then the Linux Foundation will continue to put lipstick on a pig and declare there will be peace in our time, even as Microsoft continues practices like extorting money from manufacturers of Linux devices for patents it may or may not have.
Linus Torvalds has just tagged the fifth weekly release candidate for the Linux 4.4 kernel.
Linus has yet to send out his usual weekly RC release announcement but in monitoring the activity over the past week, it's been a fairly normal week of bug fixing and related changes.
Linux Lord Linus Torvalds says the fourth release candidate of Linux 4.4 contained “a fairly bad core bug” that's since been squashed, but may not have rung many alarm bells anyway.
“Another week, another rc,” Torvalds writes on the Linux Kernel mailing list, before going on to say that development work is progressing as usual save for “... a fairly bad core bug that was introduced in rc4 that is now fixed in rc5”.
If you are thinking of buying a low-capacity, affordable solid-state drive (SSD) as a stocking stuffer this holiday season or just looking for a new SSD without breaking the bank, here are benchmarks from eight different low-cost solid-state drives done on Ubuntu Linux with the EXT4 file-system.
`Take a Break` is a small application which can be used to (more or less) force users to take a break after a configurable work time, useful if something like a popup reminder is not effective for you.
We’re proud to announce the first stable release of the KeePassX 2 series after several years of development.
As you may know, PhotoFlow is an open-source, non-destructive photo editing software for adjusting photos from RAW images to high-quality printing.
If you haven't already come across it, diffoscope is a tool reveal what makes files or directories actually different. It recursively unpacks archives of many kinds, transforming various binary formats into more human-readable form in order to to compare them. It can compare two tarballs, ISO images, PDF, etc. just as easily.
The new Kodi 16.0 Beta 4 has been released today and is now ready for download and testing. It looks like the developers are putting the final touches, and we should see the first Release Candidates very soon.
In the past few years there has been a huge increase of Rogue-like games, especially thanks to the indie scene. Today, it is very fitting to point out one of the most important representatives of this genre.
It's been just one week since the last beta update of Kodi 16 but its development steam is sticking to the "release early, release often" and this morning shipped beta #4.
The developers of the MPlayer-based MPV open-source and cross-platform video player software announced this past weekend the release and immediate availability for download of MPV 0.14.0.
Sys admins, no matter what platforms they work on, are awash in great open source software tools. In this article, we highlight well-known—and not-so-well-known—tools that have released new versions in 2015.
Open Broadcaster Software, or OBS for short, is a pretty amazing project. Used extensively within the Gaming/Youtubing/Twitching community, OBS allows you to set up a virtual TV studio, combine a variety of video, audio and image sources into one or several “scenes”, and save them or stream them to the Internet.
I was all set to write a somewhat grumpy blog entry about getting xterm and Chrome to play nice with each other for cut and paste when I decided to re-test this systematically. Let me tell you, systematic testing and investigation changes quite a lot of blog entries around here, and this one appears to be no exception.
My inspiration came from his noting that happification could be done on numbers in bases other than 10. I immediately thought of hexadecimal, base-16, since I'm a programmer and that's what I think of. I also was trying to think of how one would graphically represent a large happification tree, when I realized that hexadecimal numbers are colors, and colors graphically represent things nicely!
The Wine development release 1.8-rc4 is now available.
What's new in this release (see below for details): - Bug fixes only, we are in code freeze.
The source is available from the following locations:
http://dl.winehq.org/wine/source/1.8/wine-1.8-rc4.tar.bz2 http://mirrors.ibiblio.org/wine/source/1.8/wine-1.8-rc4.tar.bz2
Binary packages for various distributions will be available from:
http://www.winehq.org/download
You will find documentation on http://www.winehq.org/documentation
You can also get the current source directly from the git repository. Check http://www.winehq.org/git for details.
Wine is available thanks to the work of many people. See the file AUTHORS in the distribution for the complete list.
The Wine developers, through Alexandre Julliard, have announced the release and immediate availability for download of the fourth and probably one of the last RC (Release Candidate) builds of the upcoming Wine 1.8 software.
If you still depend on a few Windows programs, or you want to help newbies make the switch to Linux, Wine is mightily useful.
Yesterday's article titled Are Open-Source Games and Community Game Engines Fading Away? continues to be one of the most-discussed threads in the forums this weekend.
Is it just me or are open-source games faltering? While open-source, community-based games really aren't mainstream and really never took off, it seems these days there's a lack of good open-source games more so than in past years as well as diminishing open-source game engine projects.
Oh boy, here we go. SMACH Z is a portable Steam Machine running SteamOS that will be powered by an AMD embedded low-powered SoC.
Poi is the latest of a small handful of 3D platformers to release for Linux these last couple of months, and is worth a look for fans of 90s era 3D platformers.
Wow. Haven’t booted to Windows in a long time. Had to run a bunch of updates that took almost a whole day, and then on top of that, the game wouldn’t even launch, so I had to have Steam verify the game cache. But now I’ve finally got a comparison between the ports.
Since i3 is mostly aimed at advanced computer users, it’s highly customiseable.
Hello folks, it’s Season of KDE!
It offers a convenient, KF5 and Qt5-based GUI coupled with a QML image view to browse, view, and download images hosted in two of the most famous Danbooru boards (konachan.com and yande.re).
Gabriele Musco ask me to express some thoughts about KDE in mobile world. I tried to make some clarifications about the topic, anyway the video is very long although the author cut some parts. He also asked if we will see a KDE distro in future, I replied that as a user I’d like a distro made by KDE, but currently there aren’t plans about it. Instead I happily mentioned the efforts in bringing mobile components also to the Android world :-)
Today, December 12, the Krita developers have announced the release and immediate availability for download and testing of the second Beta build of the upcoming Krita Animation Edition digital painting software.
I had no idea what to expect, but I learned how to use the Adobe Creative Suite, and they introduced tablets and digital painting to me. I took to it immediately and asked my parents for a tablet for Christmas. Before I got a tablet, I used Gimp to color sketches. My dad was and still is an avid Linux user, and he was the first to introduce me to open source programs.
December 12, 2015. KDE today announces the release of KDE Frameworks 5.17.0.
KDE Frameworks are 60 addon libraries to Qt which provide a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms. For an introduction see the Frameworks 5.0 release announcement.
This release is part of a series of planned monthly releases making improvements available to developers in a quick and predictable manner.
KDE has had the great pleasure of announcing the release and general availability of KDE Frameworks 5.17.0, a set of add-on libraries for the Qt5 GUI (Graphical User Interface) toolkit.
We are coming up on the 3.19.3 release this Monday and 3.19.4 will be January 14th which will also be the start of the UI freeze.
I wanted to take some time and give an update on what we have done for Maps this cycle and what we can expect in Maps 3.20.
Zbigniew Konojacki, the creator and lead developer of the 4MLinux project, who is responsible for various Live CDs and GNU/Linux distributions, including 4MRescueKit, Antivirus Live CD, and BakAndImgCD, has informed us about the release of 4MParted 15.0 Beta.
The Chakra GNU/Linux project produces a Linux distribution with a strong focus on the KDE desktop and software which uses the Qt development libraries. Chakra maintains a semi-rolling release where the core components of the operating system remain fairly stable while desktop software is updated frequently.
A few hours ago, December 13, Josh Strobl from the Solus Project had the great pleasure of publishing the fourteen installment of the awesome This Week in Solus newsletter.
We are happy to announce another review of Manjaro 15.12 (Capella)!
This is one of the biggest updates we did so far. Mostly due the C++ 11 ABI change within gcc. It is recommended to rebuild your AUR packages for this ABI.
With this we finally dropping KDE4 for good. All users of this desktop should either switch over to Plasma 5 or any other maintained desktop, like LXQt.
This past weekend, the developers of the Manjaro Linux operating system announced the general availability of Manjaro Update 2015-12-13, which is now in the testing repositories of Manjaro Linux 15.12 "Capella."
The Arch Linux developers, through Antonio Rojas, published a brief announcement on the project's website to inform all users of the lightweight and highly customizable computer operating system about some modifications in the KDE packages.
"Ultimately, we believe there are more winds at Red Hat's back than in its face," wrote Ader in a Dec. 8 research note.
[...]
Piper Jaffray analyst Katherine Egbert does "worry" in a research note issued Thursday: "Like with other high-multiple cloud vendors, anything but a large upside to revenue and billings upside may disappoint.
Jennison Associates reduced its position in Red Hat Inc (NYSE:RHT) by 2.4% during the third quarter, according to its most recent disclosure with the Securities and Exchange Commission (SEC). The institutional investor owned 15,549,632 shares of the open-source software company’s stock after selling 386,599 shares during the period. Red Hat comprises about 1.1% of Jennison Associates’ investment portfolio, making the stock its 22nd largest position. Jennison Associates owned about 8.47% of Red Hat worth $1,117,708,000 at the end of the most recent reporting period.
Today, December 12, we've been informed by the developers of the Linux AIO project about the release and immediate availability for download of Linux AIO Fedora 23 Live DVDs.
First of all, sorry my last post was about Flisol 2015 in Panamá, while many things had happen since then, many words and thoughts never become a post. Therefore here we go.
The main reason why I’m running for it is to give more community ideas to the actual body, which is composed mainly by US guys and RedHat employees or at least RH involved. I had the great opportunity in the last couple of years to attend all main events in our regions, from Beijing to Managua, through Rochester and Cordoba. This gave me the chance to get in contact with all local communities, much more than it’s possible just by writing mails or chatting on IRC. Furthermore I’m the founder of the italian Fedora community ten years ago, so I feel when it comes to end users I have many stories I can tell.
Few days ago, on November 23, we have had a Fedora 23 release party in Milan, as we announced in the wiki.
Let’s divide the post in two parts, the short history if you want just try out the packages and don’t care about the gross details and the long history, explaining the rocks we met in the path.
New hardware was installed into a Debian workstation with minor issues.
upebble is a new application currently being developed by the community that allows users of Ubuntu Touch to connect to their Pebble watches.
With Ubuntu 16.04 LTS, the Dash online search feature will be disabled by default.
The online search feature won't be removed and users will be able to re-enable it via System Settings > Security & Privacy.
Scopes are a leading feature of the Ubuntu Phone and of Unity 8 in general. That concept, the story of scopes, started out in Unity 7 and in 12.10 when we added results from online searches to the dash home screen.
The developers of the Linux Mint project published earlier, December 12, their report for the month of November 2015, to inform all users of the popular GNU/Linux distribution about the work done in the last month, as well as about upcoming events.
Just in time for the holidays, it’s a new release of elementary OS! Freya 0.3.2 is a minor release, mostly focused around solving some issues folks have had with UEFI & SecureBoot, but we’ve also managed to sneak in some internationalization updates and a couple new features.
Today we pushed the elementary icon set to GitHub to encourage collaboration and reuse. Read on to learn more about the decision and what it means for the future of the elementary code base!
The Linux Mint team has just announced that the OEM images for Linux Mint 17.3 “Rosa” Cinnamon and MATE have been released and are now available for download.
The main Linux Mint flavors are based on Ubuntu, but the developers are also working on another version based on Debian. It’s not the main focus of the team, but from what they are saying, it’s already catching up with the Ubuntu version.
Today we're continuing our "Watch" series of articles with something a little different, a video tutorial that tries to teaches those who run the Ubuntu MATE operating system on their Raspberry Pi 2 devices how to expand the filesystem.
An autonomous, Linux powered, indoor-friendly “Fleye” drone is available on Kickstarter for $742, featuring a protective hull, an HD camera, and 15km/h speed.
Belgian startup Fleye, newborn from The Faktory tech incubator, is close to its $185,837 Kickstarter goal for the programmable, autonomous Fleye, billed as the world’s safest drone. Videos show people gently shoving the drone away when it strays too close.
This cute, safe, hovering robot that looks like a flying marshmallow is going to reinvent drone design, its creators say.
It's called Fleye, and it's the exact opposite of "classic" drones, according to the Belgian engineers behind the bot. There's no huge propeller, no clunky frame, and no heavy crashing into bleachers at sporting events. It's being billed as a personal, autonomous robot.
The market has boomed with small computing boards ever since the Pi was originally introduced, and the PINE looks best suited to be the king of cheap and powerful.
Chirimen is a development board powered by Firefox OS. Co developed by Mozilla Japan & community, aimed at using browser technologies in science projects. Chirimen simply extends GPIO/I2C WebAPIs to control devices with Firefox OS 2.0 or later installed.
This impressive show was created using Open Source software and runs entirely off a Raspberry Pi.
The network provides free access for IoT devices, to communicate with internet applications and each other. Since LoRa networks can operate over longer distances but only for slow data transfer rates, they are typically used by tiny, battery-operated systems. This allows you to build sensor networks based on low-power devices that periodically send small amounts of data. The network can be used to connect boats, cars, lamp posts, dumpsters, and road and traffic systems, for example, allowing these to send information (i.e. measurements) and receive commands.
[...]
According to Leon Gommans, a leading figure in the development of open data in both the city and the port of Rotterdam, and co-owner of PlaySpace and Teqplay, this is only the first phase. "The Kickstarter project for The Things Network will make access points based on open hardware available at a price of 200 euro. That's only one fifth of any currently available LoRaWAN gateway." The goal of 150,000 euro was met in less than ten days. One month after the start of the project, almost 300,000 was pledged by over 900 backers.
Adding teeth to its growing internet and social media presence, the ISIS terrorist group has reportedly launched an app that features news and videos showing executions and battlefield victories and propagates its agenda, the media reported.
Android has made two recent strides forward that are huge for app developers: the release of the Marshmallow update and the newly minted Android Studio 2.0. Both of these technological advances signal Android’s commitment to making it easier for companies of all types to publish and update apps. At the same time, the privacy changes that accompanied Marshmallow give consumers more room to decide what type of personal data they are willing to share with app developers.
It's been only two months since Google rolled out Android 6.0 Marshmallow, but some Googlers are already hinting at some new features that might arrive with Android N, the next update to the operating system. One of those features might be support for a split-screen to enable easier multi-tasking on tablets.
A new set of images has hit the internet after first showing up on Weibo (China’s Twitter equivalent). There’s not much to see in most slides, but one of the shots did capture an update roadmap depicting when specific Lenovo handsets will get the Android 6.0 Marshmallow update. It looks like they come from a meeting. Let’s take a quick look at it.
BlackBerry Priv Android phones are flying off shelves more than a month after its release. According to CNN Money, Walmart and Best Buy had to restock shelves in the past week due to high volume BlackBerry Priv sales. CNN Money reports that the company's stock price (BBRY) jumped by 7 percent on Thursday, Dec. 10, to $8.05 in response to the Priv's surprising demand. That said, BlackBerry stock had fallen slightly to $7.68 per share by Friday end-of-day.
Amid talk that the honor brand will be coming to the U.S., an enhanced version of the honor 7 has been announced. The honor 7 Enhanced Edition will come with Android 6.0 right out of the box, and Huawei's EMUI 4.0 skin will be running on top.
Frame rate is a term that gamers should be well familiar with. For those who aren't, a bite-sized explanation follows. In the context of gaming, the frame rate indicates how many frames per second are being drawn on the screen while a game is running. The higher the number, the smoother the video looks, with 60 fps considered an ideal figure. No less importantly, the framerate is a good indicator of a device's graphics performance. It is what most graphics benchmark test scores are based on.
With my previous post about killing the back button I got a some scepticism about it from some users, but what was common in all those feedbacks was the approach to manage different apps: yes killing the back button breaks some things, but I wrote it mainly to introduce the real idea: new approaches to task managing on mobile devices.
Cupcake. Donut. Eclair. Frozen Yogurt. Gingerbread. Honeycomb. Ice Cream Sandwich. Jelly Bean. Kit Kat. Lollipop. Marshmallow. This isn’t a litany of looks Derek Zoolander is going to unveil on the silver screen next year. Google fans know these are the tasty treats Mountain View has chosen to name its major Android builds after. The question, however, is just who else knows this.
This week Google released their first Android tablet , the Pixel C . While the device has decent hardware specs and a full size keyboard accessory, it does not have the productivity capacity of other tablets like the Surface Pro or iPad Pro.
In a recent Reddit conversation , user experience director of Android and Chrome Glen Murphy revealed Google is working on enhancements to make the Android OS better compete with tablets running Chrome OS, Microsoft Windows and Apple’s iOS 9 which have better multitasking features. “ There are many things, like multi-window, that we've been spending a lot of time on--hopefully we can share more about this soon.”
For the first time Google chose to collaborate with Huawei to manufacture the Nexus 6P smartphone. Now, fresh rumors suggest that both companies again will work together in building the Google Nexus 6 (2016) smartphone.
According to Gizmo China, industry expert Pan Jiutang has revealed that the alleged Google Nexus 6P successor will be a Huawei product. However, since it will be a flagship smartphone, it is likely to be powered by Snapdragon 820 chipset.
Today I want to change things a bit: instead of covering a technical subject, I want to share with you what it means to run an open source project
For more than two years, my friend David Rousset and I have led Babylon.js. We started the project after hearing that IE11 would support WebGL and we wanted to make it easier for people to build 3D scenes and games. For the following two years I spent all of my spare time making Babylon.js a simple and powerful 3D engine for web developers.
Year 2015 ends. Taking time to honor those peoples who work in Linux and Open Source community and don’t have deserved popularity. Maybe you use everyday several products from these peoples – this is your personal chance to say “thank you”.
William Hill is moving away from traditional IT vendor relationships as it seeks to modernise its business, choosing to build applications internally using open source technologies pioneered by internet giants such as Google and Facebook.
I have enjoyed reading the stories others have shared about how they got started with open source software, so I thought I'd add mine. It is different in that I came to open source purely for business reasons. While I later embraced the open source way for reasons such as personal freedom and community, my initial exposure to it came from trying to find the best solution to a business problem.
The FOSDEM Organization has graciously given devroom organizers a little extension. We are therefore extending our own deadline for the Desktops DevRoom: the new deadline is December 14th. There will be no further extensions.
I'm currently in Paris for TADHack, an opportunity to collaborate on a range of telephony APIs and services. People can also win prizes by doing something innovative with the platforms promoted by the sponsors.
We are delighted to announce the first set of awards in the Mozilla Open Source Support program’s “Foundational Technology” track, which supports projects that Mozilla uses or relies upon.
We have been greatly helped in evaluating applications and making awards by the MOSS “Foundational Technology” Committee – many thanks to them.
Along the internet browser business, Mozilla has been also working at Firefox OS, their Linux-based mobile operating system built in HTML5, for the low-cost phones.
Google has unveiled the next gen of its Cloud SQL service, a hosted version of the MySQL database.
The second generation Beta Cloud SQL is more than seven times faster than the first generation of Cloud SQL. And it scales to 10TB of data, 15,000 IOPS and 104GB of RAM per instance.
The first generation of Cloud SQL was launched in October 2011 .
A 16-year-old boy recently asked the r/Linux community for advice. When his parents discovered that he'd reloaded his laptop with Linux, they were horrified—after all, this "free" software must certainly be riddled with viruses and/or hackers. It didn't help matters any that he'd "ruined" an expensive gift, and was no longer using some of the expensive software that had been purchased with it. He tried to talk to them about it, but it was tough—he was the teenager; they were the adults.
While most artificial intelligence is powered by software, as the software gets more sophisticated, it relies on more powerful and sophisticated hardware to execute its needs. The social network will reportedly submit all the relevant design materials to the Open Compute Project, an organization that manages the sharing of datacenter infrastructure designs. "They've designed quite an elegant solution that can fully power and cool that number of GPUs and deliver maximum performance".
One of the key provisions of the GNU General Public License (GPL) is that derivative products must also be released under the GPL. A great many companies rigorously follow the terms of the license, while others avoid GPL-licensed software altogether because they are unwilling to follow those terms. Some companies, though, seem to feel that the terms of the GPL do not apply to them, presenting the copyright holder with two alternatives: find a way to get those companies to change their behavior, or allow the terms of the license to be flouted. In recent times, little effort has gone into the first option; depending on the results of an ongoing fundraising campaign, that effort may drop to nearly zero. We would appear to be at a decision point with regard to how (and whether) we would like to see GPL enforcement done within our community.
So, who *does* use xz? kernel.org. Also, the linux kernel itself optionally supports xz compression of initrd images. Vendors just need to pay attention and turn the flags on. Anyone else want to be part of the elite field of people who use xz? Please?
Eight years ago, Morgan Quigley, Eric Berger, and Andrew Ng published a paper that was not about ROS. It was about STAIR, the STanford Artificial Intelligence Robot, which used a library called Switchyard to pass messages between software modules to perform complex manipulation tasks like stapler grasping. Switchyard was a purpose-built framework that was designed to be modular and robot-independent, and it was such a good idea that in 2009, “ROS: An Open-Source Robot Operating System” was presented at the IEEE International Conference on Robotics and Automation (ICRA) in Japan. As of this month, the paper introducing ROS has been cited 2,020 times, an increase of more than 50 percent over last year.
The API economy is the reality we live in and it’s an enormous one that, once the Internet of Things kicks into full gear, will feature an infinite number of API calls a day. But as we globalize, the world and the products—in this case APIs—we sell in it become more complicated and often more expensive as we factor in all the friction of exchange rates and credit card micropayments. It’s in everybody’s interest to smooth over that friction so developers can access our APIs or application programming interfaces more easily.
If you are a soldering ninja with a flair for working with tiny parts and modules, check out the Open Source Watch a.k.a. OSWatch built by [Jonathan Cook]. His goals when starting out the project were to make it Arduino compatible, have enough memory for future applications, last a full day on one charge, use BLE as Central or Peripheral and be small in size. With some ingenuity, 3d printing and hacker skills, he was able to accomplish all of that.
We've been awarded $150,000 to help fund the development of Channels, the initiative to rewrite the core of Django to support (among other things) WebSockets and background tasks, and to integrate key parts of the Django REST Framework request/response code into Django, such as content negotiation. Together, these projects will help considerably improve Django's role of backing rich web experiences as well as native applications.
Some days ago ago Apple released Swift as open source language with instructions for Ubuntu Linux 15.10. So I decided to do a couple of simple benchmarks just to test some basic general purpose things like cpu, functions, read/write and not sequential access to arrays, concurrent parallel execution where possibile.
“F.D.R.’s War Plans!” reads a headline from a 1941 Chicago Daily Tribune. Had this article been written today, it might rather have said “21 War Plans F.D.R. Does Not Want You To Know About. Number 6 may shock you!”. Modern writers have become very good at squeezing out the maximum clickability out of every headline. But this sort of writing seems formulaic and unoriginal. What if we could automate the writing of these, thus freeing up clickbait writers to do useful work?
Twitter has long argued that its reach and influence extends far beyond the 320 million people who log into its social media service at least once a month. Tweets are embedded on thousands of other websites and apps, emailed, displayed on television and published in newspapers.
Sorry may be the hardest word, but it seems to be tripping off Microsoft's tongue quite freely at the moment. Maybe it's the holiday season making the company look at itself, but we've had two apologies in recent days -- first, a semi-apology for stealing OneDrive storage from people, and now it's sorry about the Surface Book and Surface Pro 4.
In the 1950s, a group of scientists spoke out against the dangers of nuclear weapons. Should cryptographers take on the surveillance state?
Despite recent efforts by health experts, doctors, and the Food and Drug Administration to pull the meat industry away from its heavy use of antimicrobials, livestock producers seem to have dug in their heels.
From 2009 to 2014, the amount of antimicrobials sold and distributed for use in livestock increased by 22 percent, according to an FDA report released Thursday. Of the antimicrobials sold in 2014, 62 percent were related to drugs used in human health, also called medically important. From 2009 to 2014, sale and distribution of medically important antimicrobials used on farms also jumped—an increase of 23 percent.
That brings the 2014 total of antimicrobials sold for US livestock to 15,358,210 kilograms, including 9,475,989 kilograms of medically important drugs, according to the report.
Two weeks ago, the server I host all my personal projects on was hacked by some guy in Ukraine.
We're all anxiously awaiting the day that Windows 10's new Edge browser becomes usable. That hasn't happened yet, but it will some day next year. Microsoft Edge should represent a huge improvement in browser security, particularly when compared with the ancient, creaking, and leaky Internet Explorer. Recent events, though, have me wondering if Edge really represents that big of a step forward.
TrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship with a tightly integrated system coupling a rifle, an ARM-powered scope running a modified version of Linux, and a linked trigger mechanism. The scope can follow targets, calculate ballistics and drastically increase its user's first shot accuracy. The scope can also record video and audio, as well as stream video to other devices using its own wireless network and mobile applications.
An RFC patch from Dave Watson at Facebook proposes moving the bulk of Transport Layer Security (TLS) processing into the kernel. There are a number of advantages he sees for doing so, but most of the commenters on the patch set seem a bit skeptical about the idea. TLS is, of course, the encryption layer that protects HTTPS and other internet protocols.
It is important to understand that Turkish President Recep Tayyip Erdogan is not at war with Daesh (ISIL). He is waging war against the Syrian government over the Kurdish problem, said Philip Giraldi, a former CIA officer and Executive Director of the Council for the National Interest.
When Anne Arundel County police responded Saturday to a grocery story in Edgewater, officers said they found a man who was threatening people's lives and claimed to "own" the government.
Officers detained the man, 56-year-old Kirk Green of Edgewater, and later found guns, ammunition and plans to attack government agencies in his vehicle, police said.
The CIA analyst is confident about what is likely to happen in Syria. He says that “Assad is playing his last major card to keep his regime in power”. He believes that the Assad government will step up its efforts to prove that its enemies “are being manipulated by outsiders”. The probable outcome is a split within Syria’s ruling elite leading to Assad being ousted, though he admits that there is no obvious replacement for him.
Afghan Govt: Six Civilians Killed in Home Raids Last Month
Raging fires in Indonesia’s forests and peat lands since July this year are precipitating a climate and public-health catastrophe with repercussions across local, regional and global levels, experts told IndiaSpend.
Acrid smoke and haze have enveloped Indonesia, Singapore and Malaysia, and have reached Thailand, choking people, reducing visibility and spiking respiratory illnesses, according to Susan Minnemeyer, Mapping and Data Manager for Washington-based World Resources Institute’s (WRI) Global Forest Watch Fires initiative.
When I landed in Palangkaraya, the capital of the Indonesian province of central Borneo, in early September the smoke was already fairly thick. I was surprised they hadn't cancelled the flight on seeing the ground suddenly come into view what seemed like a few seconds before landing.
The smoky smell and thick warm air was something I recognised from 2011, the last El Niño year to hit the region (causing an extended dry season). There was definitely something of a "here we go again" sentiment from the locals I knew there too. My friend Yuyus texted: "selamat datang di kota asap" when I told him I'd arrived - welcome to smoke town. Within the next two days, all flights to and from the town had been grounded.
Tens of thousands of wildfires ravaged Indonesia in September and October. A sizable portion of these blazes was smoldering subterranean peat fires, which sent toxic gas and particulate matter into the atmosphere. This new map shows the extensive spread of one particularly nasty gas: carbon monoxide.
Wildfires in Indonesia are particularly troublesome. Unlike “conventional” forest fires, these fires smolder under the surface, making it extremely difficult to extinguish; it usually takes a good downpour during the rainy season to put them out. Making matters worse, these peat-fueled fires release far more smoke and air pollution than most other types of wildfires.
Two decades ago, the rolling hills of Paso Robles were mostly covered with golden grass and oak trees. Now the hills and valleys are blanketed with more than 32,000 acres of grapevines.
Surging demand for wine has brought an explosion of vineyards, and along with it heavy pumping of groundwater. With the water table dropping, many people have had to cope as their taps have sputtered and their wells have gone dry.
The act creates a new Sec. 7345 that requires the secretary of State to deny, revoke, or limit the passport of any person who the IRS certifies has a seriously delinquent tax debt. “Seriously delinquent tax debt” is defined as an outstanding tax debt in excess of $50,000 (adjusted for inflation) for which a notice of lien or a levy has been filed, unless the individual is making timely payments under an agreement with the IRS or collection is suspended because a Collection Due Process hearing or innocent spouse relief has been requested or is pending. This provision is effective upon enactment.
In 2008, someone calling themselves Satoshi Nakamoto posted a paper describing the workings of what would become the world’s most important digital cryptocurrency, bitcoin. Two months later, he posted the code for the first version of the software that would allow people to create and exchange the currency.
The paper was revolutionary because it brought together ideas that people had been working on in the area of digital currencies. It solved the problem of exchanging money in a safe and secure way, without having to trust third parties or even the other person in the deal.
A mother and father in Rosemount were alarmed by what their 11-year-old daughter brought home from school: A novel about how a one-day fling in Paris with a Dutch hunk changed an American teenager’s life.
Gayle Forman’s 2013 work of fiction, “Just One Day,” has received critical acclaim for its depiction of a young woman taking control of her life from overprotective parents. Yet Ben and Kandi Lovin of Rosemount seized on the pages that for them went too far: an f-bomb dropped on page 261, the b-word on page 274, clothes being shed and a condom appearing in the brief sex scene on page 128.
Unhappy with the response from the principal, vice principal, librarian and teacher, the Lovins filed a formal request in October to the Rosemount-Apple Valley-Eagan district to remove the book from the district’s middle and high school libraries. “It is a novel that has no life lesson to be learned from at this age level that cannot be learned from any of many quality books available,” they wrote.
The life lessons of this episode are many. Books are far more than the sum of their pages. Due process still exists. And librarians matter.
A senior Chinese official known as the “gatekeeper” of the country’s internet has denied that the country censors online information.
Lu Wei, chief of the State Internet Information Office, said China does not censor but “manages” internet content in Zhejiang on Wednesday.
For a little clarity on Iran’s often combustible—and always confusing—combination of religion and politics, it might help to watch two big-budget movies about Shia Islam’s holiest figures, released within weeks of each other this summer.
Nudity in art has been around for thousands of years, but Facebook still can’t take it. The social media site has deleted pics of artworks by people like Kate Durbin and Erika Ordosgoitto. It has blocked users like Frédéric Durand-Baïssas for sharing paintings including Gustave Courbet’s “L’Origine du Monde.” And though some people have protested by creating Facebook groups like Artists Against Art Censorship, recording every instance of censorship — let alone fighting back — is next to impossible.
It’s been a bad few weeks for the people of Bangladesh, made worse by the ham-handed internet censorship of its government. Their decision to block some online messaging services was a disproportionate and unnecessary attempt to silence all speech on a slapdash list of messenger applications.
PINAC reporter Jeff Gray received 38 “school safe zones” / trespassing warning letters from the Superintendent of St. Johns County schools and every single principal of every single school in his home county, where his children are enrolled.
The letters were dated December 7th, a day that will now live in censorship infamy.
Jeff Gray aka HonorYourOath was at the receiving end of a (poorly drafted) retaliatory lawsuit by the St Johns County School Board, as we reported earlier this week.
Now, a certified letter containing 38 blanket trespassing warnings arrived too.
Even the St. Johns Virtual School dutifully delivered a trespass warning, though it’s uncertain how the school board intends to keep Mr. Gray from enjoying their website.
As deadline descended on El Mañana’s newsroom and reporters rushed to file their stories, someone in the employ of a local drug cartel called with a demand from his crime boss.
The caller was a journalist for another newspaper, known here as an enlace, or “link” to the cartel. The compromised journalist barked out the order: Publish an article saying the mayor in Matamoros had not paid the cartel $2 million a month in protection fees, as an El Mañana front-page story had alleged the day before.
When the topic of conversation shifts to the most iconic comedy films of all time, Monty Python and the Holy Grail almost always rears its head. The 1975 film from the British comedy troupe has become famous for its employment of silly humor set against the backdrop of the Middle Ages. While relatively tame by today’s standards, the film evidently went through the wringer with censors back in the 1970s.
We’ve heard it many times before: college students are coddled, politically correct children who can’t take a joke, enjoy a holiday or even fulfill the requirements of a class without wanting professorial hand-holding. The proof of this round generalization of an entire generation? Trigger warnings.
Jonathan Heawood, director of English PEN, a charity supporting free expression, told the inquiry co-regulation was a veiled form of statutory regulation, and said he had never seen a model incorporating the best of self-regulation and state intervention.
The ACLU contends BART engaged in political censorship. BART officials, though, said they didn’t object to the topic of gentrification, but found one of the pieces too profane and mean.
The Internet Service Providers' Association (ISPA) has called on the Film and Publications Board (FPB) to publish public comments made in response to the Draft Online Regulation Policy.
Earlier this year, the FBP unveiled the draft Online Regulation Policy to enable the effective regulation and speedy classification of digital content in SA.
The figures place Poland third in the EU in its support of the government censoring “free speech”. Germany led with 70 percent being for government censorship and 27 percent being against. Italy was a close second with 62 percent and 32 percent in both categories respectively.
In an op-ed for The New York Times (paywall), Eric Schmidt, the executive chairman of Google, inserted himself directly into the middle of a heated debate about the line between fighting terrorism’s online reach and internet censorship.
Technology companies should work on tools to disrupt terrorism - such as creating a hate speech "spell-checker" - Google's chairman Eric Schmidt has said.
Writing in the New York Times, Mr Schmidt said using technology to automatically filter-out extremist material would "de-escalate tensions on social media" and "remove videos before they spread".
His essay comes as presidential hopeful Hillary Clinton again called on Silicon Valley to help tackle terrorism, specifically seeking tools to combat the so-called Islamic State.
When my older kids were little, before my youngest was born, my then-boyfriend now husband sculptor Sabin Howard and I took them, and his daughter, to Rome. A few days into our jaunt, we climbed the Capitoline Hill and went to the museum there. My middle daughter ran around the great gallery of sculptures, pointing and yelling, “Peeny-weeny!” wherever the male genitalia were intact.
The hundreds of thousands demanding that Britain ban Donald Trump should ask themselves if they would be happy about America banning Jeremy Corbyn. The answer you give will show whether you understand how to fight the illiberal ideologies that are flourishing across the western world.
However, it is not just those most-dedicated free-speech campaigners who worry that censorship weapons unleashed against the cyber-jihad could run out of control.
In India, online content can be blocked according to Section 69A of the Information Technology Act, 2000. Directions for blocking of unlawful content may be given by the government on its own accord, or upon complaints made by individuals, as long as the directions fall within the reasonable restrictions that can be imposed on free speech according to the Indian Constitution. Instances of Internet censorship in India range from Internet shut-downs in various states, mass URL blocking as well as complete shut-down of websites.
For weeks, Rome has been transfixed by the spectacle of the “Capital Mafia” trial, which began on 5 November. The prosecutors are laying bare an alleged network of corrupt relationships between politicians and criminal syndicates in the city. The scandal involves the misappropriation of funding that was destined for city services, according to prosecutors.
The rights of a 23-year-old accused murderer to get a fair trial could be torpedoed by Palm Beach County Circuit Judge Jack Schramm Cox’s order that keeps key records in his case from being made public, his attorney and the Palm Beach County Public Defender’s Office said in separate motions filed Thursday.
A GROUP opposed to a plan to store nuclear waste on the Darling Downs is calling for officials to stop censoring proceedings from the media.
The poet's announcement comes as the latest reaction to a debate over censorship and how state funding is allocated to the arts following a speech from NAC Chairman Professor Chan Heng Hee late last month.
"In short, she [Chan] claimed that the state has the right and the obligation to decide on what to fund, based on other considerations besides the artistic merit of the application,” Koh noted in his post.
A perennial silly season story has resurfaced for the umpteenth time, with a cross-party gaggle of Australian senators fretting about Internet pornography.
A motion passed nearly unnoticed by the Senate last week will establish an inquiry into the impact of pornography on Australian children. The full motion, here, was backed by the Australian Labor Party's Senator Joe Bullock, the Democratic Labor Party's John Madigan, and Liberals Joanna Lindgren and Chris Back.
A new rule enabling third parties to request reviews of defamatory online postings for removal is igniting dispute.
A 17-year-old Singaporean is being investigated by the police for allegedly making religiously offensive remarks online.
In a statement yesterday, the Singapore Police Force said that reports had been lodged against the youth, in connection with certain religiously offensive remarks posted online.
In a news release, police said the teenager is under investigation in connection with the case. No further details were given.
A 17-year-old male, believed to be teen blogger Amos Yee, is under investigation for allegedly making offensive remarks about religion online.
In September, I spent a day at the United States military academy at West Point, an elite, 213-year-old academic institution. I’d been invited to lecture by the Army Cyber Institute, a new academic department that focuses on cybersecurity and policies related to the military implications of attacking and defending electronic infrastructure.
It’s not my usual speaking gig. I grew up as an organiser in the anti-nuclear-weapons movement; my experience of the military mostly revolves around protesting outside bases, not being invited inside them. West Point was the first military audience I’d ever addressed, yet I’d heard that they have used my young-adult novel Little Brother, which concerns net-savvy kids in San Francisco who form an underground movement to resist Homeland Security incursions on civil liberties following a terrorist attack.
West Point is an American oddity: a leafy, ancient (by US standards) campus on a lazy river with academic standards to match any Big Ten or Ivy League university, but with a student body that is far more likely to come from racial minorities and poor people than any of America’s notoriously high-ticket educational institutions. I’ve done teaching stints at American universities where annual tuition ran to $50,000, and the contrasts between the student body at those schools and West Point could be the subject of a dissertation on American history, sociology, race relations or economics.
In the wake of the California shootings, Republican presidential candidates Marco Rubio, Jeb Bush, Chris Christie and Lindsey Graham are complaining that U.S. intelligence agencies have lost their authority to collect phone records on Americans under a controversial National Security Agency surveillance program. They want the government to bring that program back.
Florida Sen. Marco Rubio amped his criticism Friday of the Obama administration’s support for restrictions to a major National Security Agency surveillance program, and joined with fellow Republicans to call for increasing the agency’s powers in the wake of recent deadly shootings in Paris and California inspired by the Islamic State.
Taking on critics in his own party, Republican presidential contender Ted Cruz on Thursday defended Middle East dictators as useful allies against Islamic extremists during a Washington address decrying political correctness and stricter gun laws as an impediment to national security.
Ted Cruz has launched a stinging attack on fellow Republicans who have demanded the return of mass telephone surveillance in the wake of the San Bernardino terrorist attack.
It's more than a little odd seeing the world hail their libertarian hero, mourn that he was "arrested for inventing Bitcoin”* (as is being claimed on Twitter), and find that he ate government money like a horse.
As the old adage has it, never meet your heroes. If Craig Steven Wright, an Australian serial entrepreneur, really is the creator of Bitcoin, then lovers of the world’s most popular cryptocurrency are going to be a little disappointed: Satoshi Nakamoto is not the man you thought he was.
Reporters from Wired and Gizmodo have unmasked someone who has been a long-time purveyor of business cliches, someone who claims to be one of the most certified security professionals on the planet, and, rather than working against government, appears to have done plenty of work for the establishment. He even claimed to have relationships with employees at the NSA. As both publications admit, however, it could all be one elaborate ruse.
If news goes unnoticed for years, is it still new news, especially if the present brings new perspectives to light? While researching another article I came across an internal NSA document that was written in 1995 and declassified in 2008, not long before the invention of Bitcoin. The document, which is publicly available on the NSA website, is a weekly internal newsletter for NSA employees called Communicator and in it, they discuss the early iterations of digital currencies that were make headway at the time, specifically David Chaum’s Digicash.
Director of National Intelligence James Clapper now has a fifth reason for why he lied to the US Congress over the NSA's spying program: he just plain forgot it existed.
Speaking during a panel discussion last week, Clapper's general counsel Robert Litt said that Clapper had not had time to prepare an answer to the question posed to him by Senator Ron Wyden (D-OR) about storing data on Americans.
The terrorist attacks in California and Paris should not spur Congress to reinstate the mass surveillance of Americans' phone records, House Homeland Security Chairman Michael McCaul said Wednesday.
But McCaul, R-Texas, said phone companies may need to keep customer data longer to help federal agents investigate terrorists such as the couple that carried out the mass shooting last week in San Bernardino. Federal agents have complained that a new law reining in the National Security Agency's bulk collection of phone data limited how many years of phone records they could analyze in the San Bernardino case.
NSA’s one of the known snooping tactics is installing a malware into hard drive’s firmware which makes the deletion of the malware nearly impossible even the malware can avoid formatting of the hard drive.
Nemesis is a malware that can be used for similar purposes as it can avoid clean-up software and can even avoid reinstalling of windows altogether by hiding behind boot records, according to FireEye.
When America’s premier federal security recruiters go fishing for new technical talent, they have plenty of lures to dangle. There’s the patriotic mission; the promise of a government salary; the thrill of working under the hood on the country’s classified cyber mechanics.
And then there’s the pile of free purple and orange pens.
At a recent job fair in this city’s cavernous convention center, the National Security Agency set up an eight-foot-long folding table and covered it with a black cloth and assorted pieces of schwag, trying to rope in coders and tech experts. “Push the limits of innovation,” read one of its posters. Brochures touted a mission producing results “that you might see on the nightly news,” like disrupting a terrorist attack, catching international drug traffickers or preventing a crippling cyberattack.
Tice stated that the NSA is lying that they are only collecting the meta-data of USA citizens, and that the entire contents of every single form of communication in the United States is illegally and unconstitutionally spied upon and recorded by the NSA.
Tice made the shocking allegations that the NSA is specifically targeting Congressmen, Supreme Court Justices, and that the NSA has targeted and wire-tapped President Obama while he was campaigning prior to being elected!
I'm flopping in my fins toward my first scuba dive in the ocean, accompanying artist Trevor Paglen on a mission to the ocean floor. We're heading 70 feet down off the coast of Fort Lauderdale, Florida. The captain asks me how I'm feeling.
"Scared," I say with a shrug, as if to say, How else would I feel?
“Remember," he tells me, “Jacques Cousteau did not die from diving. He died an old man."
When I hit the water, though, the anxiety is gone, and I am going slowly into the deep, hand over hand along a yellow rope.
Asheem and Jelani, were born exactly one year apart to the day, in the warm Junes of 1991 and ‘92. “I always felt there was something special about that,” says their mother Alethia. “A little bit of magic.” The two grew up together in their mother’s small apartment on the corner of 129th Street and Malcolm X Boulevard in New York’s Harlem neighborhood.
As young children, the brothers were good friends with kids from all over Harlem. But as they matured into adolescent young men, a set of once-invisible rivalries began to surface. The True Money Gang from the Johnson Houses was at war with the Air It Out crew from the Taft Houses. Crews from Grant and Manhattanville projects exchanged gunfire in the streets. As he grew up, Jelani looked forward to leaving the neighborhood for school, “So I didn’t have to look behind my back every two seconds to see if someone about to bash me in the head,” he says.
Vandals have damaged the entrance to a building in Hamburg that houses the offices of social network Facebook, smashing glass, throwing paint and spraying “Facebook dislike” on a wall, according to police in the northern German city.
Police said in a statement on Sunday that the overnight attack was carried out by a group of 15-20 people wearing black clothes and hoods. An investigation has been launched. Facebook was not immediately available to comment.
Privacy advocates are leaning on the White House to counter lawmakers' renewed efforts to pass encryption-piercing legislation in the wake of the terror attacks in Paris and San Bernardino, Calif.
Despite a lack of direct evidence the technology played a role in either incident, lawmakers continue to use both deadly plots to promote a bill that would force companies to decrypt data upon request.
The tactic has left technologists and privacy advocates frustrated, even outraged.
In a meeting with privacy and civil liberties groups on Thursday, the Obama administration said it was preparing to issue an updated stance on encryption policy in the coming weeks, giving the pro-encryption community hope it might have a new ally in its fight.
The FBI still wants backdoors into encrypted communications, it just doesn’t want to call them backdoors and it doesn’t want to dictate what they should look like.
FBI Director James Comey told the Senate Judiciary Committee that he’d been in talks with unspecified tech leaders about his need to crack encrypted communications in order to track down terrorists and that these leaders understood the need.
A Congresswoman from California is questioning Department of Homeland Security officials who put pressure on a local public library to take down the relay node it had set up for the anonymity network Tor.
You may recall back in September, when the Kilton Public Library in Lebanon, New Hampshire briefly disabled its Tor relay after meeting with local police, who had received a tip from agents with Homeland Security's investigations branch warning that the network can be used by criminals. Relay nodes act as the middle points of the Tor network, whose layers of encryption allow activists, journalists, human rights workers, and average citizens (and, yes, criminals) to access the Internet anonymously. The more nodes, the faster the network becomes.
The fearmongering backfired spectacularly: the Lebanon library unanimously voted to restore its Tor relay and announced plans to convert it into a Tor exit node, one of the essential gateways which provides the last “hop” allowing Tor users to anonymously connect to Internet sites and services. More than a dozen other libraries around the U.S. also piled on, declaring their intention to run Tor nodes of their own in defiance.
Now Congresswoman Zoe Lofgren is asking just what the hell compelled the DHS to intervene.
A mysterious AT&T relic reveals connections between telecommunications infrastructure and the Cold War.
In an interview following the launch of OpenAI, Musk explained how his new nonprofit was designed to help.
Digital rights advocates are in an uproar as the final text of a major cybersecurity bill appears to lack some of the privacy community's favored clauses.
In the last few weeks, House and Senate negotiators have been working unofficially to reach a compromise between multiple versions of a cyber bill that would encourage businesses to share more data on hacking threats with the government.
President could be referring to encryption debate
Since Edward Snowden revealed the federal government's unlawful and unconstitutional use of federal statutes to justify spying on all in America all the time, including the members of Congress who unwittingly wrote and passed the statutes, I have been arguing that the Fourth Amendment prohibits all domestic spying, except that which has been authorized by a search warrant issued by a judge. The same amendment also requires that warrants be issued only based on a serious level of individualized suspicion backed up by evidence -- called probable cause -- and the warrants must specifically identify the place and person to be spied upon.
Earlier this week, we wrote about an absolutely ridiculous Associated Press story by reporter Ted Bridis, claiming that law enforcement investigating the San Bernardino shootings are being somehow held back because of the close of the NSA's Section 215 phone records program. There were all sorts of problems with that story, so it's great to see the Associated Press ask one of its enterprising young reporters -- a guy who goes by the name Ted Bridis -- to do a "fact check" piece on Republican Presidential candidates who are now repeating the very claims that Bridis himself made earlier in the week.
Ron Suskind, a Pulitzer Prize-winning journalist will moderate the February 16 event from the Macky Auditorium. Attendees will be able to ask Snowden questions, but details about that process have not been released.
The FBI has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing shows.
The NSA is violating the Fourth Amendment: Reasonable search and seizure. They’re providing none. They have no reasonable warrant to do this.
TOR is an encryption network developed by the U.S. Naval Research Laboratory in the 1990s. The military’s hope was to enable government workers to search the web without exposing their locations and identities. The system today is widely available, runs on open-source code, and is popular among privacy advocates as a more secure alternative to open Internet surfing, particularly in countries with repressive regimes. It works by encrypting the user’s address and routing the traffic through servers that are located around the world (so-called “onion routing.”) How does the NSA access it? Through a computer system called XKeyscore, one of the various agency surveillance tools that NSA leaker Edward Snowden disclosed last summer.
Wheeler writes widely about the legal aspects of the “war on terror” and its effects on civil liberties. She blogs at emptywheel.net. She just wrote the piece “6 Responses to Why the AP’s Call Record Article Is So Stupid,” about the NSA’s monitoring of San Bernardino shooting suspect Tashfeen Malik which states: “The AP engaged in willful propaganda yesterday, in what appears to be a planned cutout role for the Marco Rubio campaign. Rubio’s campaign immediately pointed to the article to make claims they know — or should, given that Rubio is on the Senate Intelligence Committee — to be false, relying on the AP article. That’s the A1 cutout method Dick Cheney used to make false claims about aluminum tubes to catastrophic effect back in 2002.
The takeaway from the AP story is that investigators lost out on the NSA’s phone record dragnet when one of the NSA’s bulk collection programs expired, which would have allowed them to access five years of phone records on shooters Syed Rizwan Farook and Tashfeen Malik. Now, the AP story implies, they’re stuck obtaining records directly from phone companies under the USA Freedom Act.
Host Chuck Todd said, “Senator, respond to something Marco Rubio said. He said the following a week ago, ‘We were still able to see the phone records of a potential terrorist cause, we held them, now you have to hope the phone company still has them, you have to argue with their chief counsel by the time you get access to it and find out who they’ve been talking to before it’s too late.’ You were on the forefront of trying to change this law. Any second thoughts?”
Kentucky Senator Rand Paul says the US National Security Agency’s program of collecting US citizens’ phone metadata has failed to thwart terrorist attacks or help detain criminals as had been claimed by the United States authorities.
Nov. 29 was the deadline for the end of NSA bulk collection of telephone records as established by the USA Freedom Act six months ago. This ended the Patriot Act, revealed by Edward Snowden, to have been the authority used to collect the bulk phone records of hundreds of millions of Americans, a certain big government invasion of privacy, which incensed civil libertarians. Libertarians and Constitutionalists, on Fourth Amendment concerns, led by Sen. Rand Paul brought the demise of the hated Patriot Act. This ends government surveillance of its citizens. Or does it?
The USA Freedom Act called for a six-month transition period allowing NSA to continue bulk collection as before, but at its end NSA must only access targeted data from telephone providers with judicial approval. Unfortunately for Constitutionalists it, like its predecessor the Patriot Act, nullifies the 4th Amendment requirement of “probable cause” and thus is as unconstitutional as the law it replaced.
President Obama and Hillary Clinton made statements on Sunday indicating that the post-San Bernardino focus on rooting out radicalized individuals is going to lead to heightened pressure on social media sites and tech companies that provide unbreakable end-to-end encryption.
In his Oval Office speech on Sunday night about the fight against ISIS, President Obama devoted one line in his speech to the topic. “I will urge high-tech and law enforcement leaders to make it harder for terrorists to use technology to escape from justice,” he said.
Today Freedom of the Press Foundation is proud to announce a new crowd-funding campaign that will fund local journalists around the United States to file Freedom of Information Act (FOIA) and other transparency lawsuits aimed at uncovering video evidence of police misconduct and brutality against unarmed men and women. You can donate to the fund here.
However one assesses that chain and its consequences, it seems clear that the large majority of legal immigrants choose to come—or, more exactly, are chosen by their relatives—for their own reasons. They are not selected by the United States to advance some national interest. Illegal immigrants are of course entirely self-selected, as are asylum seekers. Even the refugee process, reportedly the most tightly screened, operates to a considerable extent outside national control: The first assessment of refugees is typically made by the UN High Commission on Refugees from within camps it operates. That explains why, for example, Christian Syrians make up only about 3 percent of the refugees admitted to the United States, despite accounting for 10 percent of the country’s population: Fearing violence from Sunni Muslims, they apparently hesitate to enter UN camps in the first place.
The Society for the German Language (GfdS) placed "refugees" at the top of its list of the ten most important words of 2015 released on Friday.
"What's decisive in choosing the Word of the Year isn't how often it's used, but much more its significance and popularity," the GfdS said in its announcement.
"The list hits the linguistic nerve of the year as it nears its end and is a contribution to contemporary history."
The Local looks at the top ten words that defined 2015, according to the GfdS.
Millennials are disillusioned about the American dream, don't trust the government and don't think much of the current presidential candidates. They also want more boots on the ground to fight Islamic State… but they want other Americans to serve.
You have a 1 in 85 chance of being killed in a vehicle accident, and a 1 in 115 chance of suicide -- one U.S. resident every 15 minutes.
Those responsible for the torture of suspected terrorists in the wake of the September 11 attacks cannot dodge justice forever, a top UN human rights official, Juan Mendez, told Middle East Eye.
Mendez criticised US officials for not prosecuting intelligence agents for a widespread use of torture that was detailed in the US government’s own report – a damning probe that was released a year ago this week.
Thanakorn Siripaiboon was arrested at his home in Samut Prakan province for sharing the doctored photo of King Bhumibol Adulyadej, as well as an infographic on a Thai corruption scandal, with around 600 friends.
Under Thai law, anyone convicted of insulting the revered but ailing 88-year-old king can face up to 15 years in jail on each count.
"On December 2, he clicked the 'like' link on a doctored photo of the king and shared it with 608 friends," said Colonel Burin Thongprapai, a military junta legal officer.
Negotiations began in June and the agreement was reached on Thursday, Ecuador's Foreign Ministry said in a statement, adding that it will enter into force "in the coming days."
Sweden wants to question Assange on a rape allegation dating back to 2010.
Assange, an Australian citizen, sought refuge at the Ecuadorian mission in June 2012 after losing a long battle in the British courts to avoid extradition to Sweden.
When it comes to thwarting and persecuting dissenting voices, the strategy of hiding real, often political motivations behind a false facade of allegations has always been a common practice since antiquityââ¬Å —ââ¬Å Socrates is blatant and clear example of this. It’s an easy process, if you have enough money or power to bribe or scare a sufficient number of people: you just need to find a trickââ¬Å —ââ¬Å usually a highly defamatory accusation, for example one concerning widely-recognized taboos, disgusting crimes or perhaps… the sexual sphereââ¬Å —ââ¬Å to start the character assassination of the thorny guy in question. Then, you will simply need to keep it up as long as possible, leaving the rest to the (manipulated, fooled and unaware) public opinion, which will abandon the person with cynicism and conformism.
A heavily redacted report on CIA torture that Senate investigators released one year ago today shows that Rahman was dead within three weeks, having succumbed to hypothermia.
A year after the release of a sweeping United States Senate Intelligence Committee report on Bush-era torture practices, the international nonprofit NGO Human Rights Watch is demanding a raft of former top officials be subject to prosecution.
The 159-page report, issued Dec. 1, said the U.S. government "has an obligation under international law to prosecute torture where warranted and provide redress to victims, but it has done neither."
HRW targeted 16 government officials and contractors for "conspiracy to torture," including former President George W. Bush, Vice President Dick Cheney, National Security Adviser Condoleezza Rice, Central Intelligence Agency Director George Tenet and Attorney General John Ashcroft. Also among the names were former CIA-contracted psychologists James Mitchell and Idaho native Bruce Jessen.
A year after the US Senate published a major report into the CIA torture programme (9 December 2014), there is still no sign of either the UK’s own inquiry or a decision from the Crown Prosecution Service (CPS) regarding the role the British Government played, says the legal and human rights organisation Reprieve.
When the CIA met with party-boy, explosion-obsessed Hollywood filmmaker Michael Bay earlier this year, the agency said it was on a matter of national security.
Big data analytics company Palantir has been valued at around $20bn following a large boost in funding.
The company, which provides tools around areas such as cyber security, crisis response and military intelligence, raised $129 million in new funding.
This latest funding forms part of a round that has seen it raise close to $680 million. Investors have included Founders Fund and In-Q-Tel, which is a non-profit venture capital firm that focuses on investing in technology companies that help the Central Intelligence Agency.
Palantir, a 12 year-old company from Palo Alto, has clients such as the U.S. government and deals with other companies in finance and legal research.
“The internet is shit today. It’s broken. It was probably always broken, but it’s worse than ever.”
The United Kingdom is holding a consultation as to when a provision of the Enterprise and Regulatory Reform Act 2013 should take effect. Copyright in works of artistic craftsmanship—utilitarian objects (even if mass-produced) which are deemed artistic—shall be extended. Currently, the copyright lasts for 25 years after an item is first offered for sale; the new term will be for the life of the creator, then another 70 years. This means that some works which are now in the public domain will become copyrighted. Publishers of derivative works of such items, for example a book or film in which a work of artistic craftsmanship was photographed, will be obliged to obtain permissions, except for uses which fall under fair dealing.
A pirate ordered to get 200,000 YouTube views or risk getting sued by companies including Microsoft has smashed his target. Against the odds Jakub F's anti-piracy video now has more than a million views. Could it be that everyone involved - from corporations to pirates - have benefited from this exercise?